Test Info

Issuerhttps://oidc-test.ergon.ch
Profile[]
Test IDOP-OAuth-2nd
Test descriptionTrying to use authorization code twice should result in an error
Timestamp2020-02-03T17:02:10Z

Conditions


check-http-error-response: status=OK [Checks that an error code is either 400 or 401 which are the only ones accepted by OAuth2/OIDC.]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0not expected to doDynamic discovery
0phase<--<-- 2 --- Registration -->-->
0not expected to doDynamic registration
0phase<--<-- 3 --- Note -->-->
7phase<--<-- 4 --- AsyncAuthn -->-->
7AuthorizationRequest
{
    "client_id": "oidcConformance_clientId",
    "nonce": "gUX4iV3TGoGs6zoR",
    "redirect_uri": "https://op.certification.openid.net:60272/authz_cb",
    "response_type": "code",
    "scope": "openid",
    "state": "MdumfdiciWnkHAzM"
}
7redirect urlhttps://oidc-test.ergon.ch/auth-oidc/oauth2/oidcConformance_clientId?state=MdumfdiciWnkHAzM&nonce=gUX4iV3TGoGs6zoR&response_type=code&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60272%2Fauthz_cb&client_id=oidcConformance_clientId
7redirecthttps://oidc-test.ergon.ch/auth-oidc/oauth2/oidcConformance_clientId?state=MdumfdiciWnkHAzM&nonce=gUX4iV3TGoGs6zoR&response_type=code&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60272%2Fauthz_cb&client_id=oidcConformance_clientId
8responseResponse URL with query part
8response{'code': 'rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi', 'state': 'MdumfdiciWnkHAzM'}
8response{'code': 'rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi', 'state': 'MdumfdiciWnkHAzM'}
8AuthorizationResponse
{
    "code": "rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi",
    "state": "MdumfdiciWnkHAzM"
}
8phase<--<-- 5 --- AccessToken -->-->
8requestop_args: {'state': 'MdumfdiciWnkHAzM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:60272/authz_cb'}
8do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:60272/authz_cb', 'code': 'rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi', 'state': 'MdumfdiciWnkHAzM', 'grant_type': 'authorization_code', 'client_id': 'oidcConformance_clientId'}, 'state': 'MdumfdiciWnkHAzM', 'authn_method': 'client_secret_basic'}
8AccessTokenRequest
{
    "code": "rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:60272/authz_cb",
    "state": "MdumfdiciWnkHAzM"
}
8request_urlhttps://oidc-test.ergon.ch/auth-oidc/oauth2/oidcConformance_clientId
8request_http_args{'headers': {'Authorization': 'Basic b2lkY0NvbmZvcm1hbmNlX2NsaWVudElkOml4MG9vQ2hlX2VlcmUxTXVrX29vamVpOUllX0VpdGhhaTRq', 'Content-Type': 'application/x-www-form-urlencoded'}}
8requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60272%2Fauthz_cb&code=rBk_WZZFtYWO0NZTEd0mDnVFqSg%7E9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi&state=MdumfdiciWnkHAzM
10http response
url:https://oidc-test.ergon.ch/auth-oidc/oauth2/oidcConformance_clientId status_code:200
10response{'access_token': 'KfIt1ylKj-7O5toxnPzLrXUiIFk~OaWv6VZKJNsjZ4gMveXk4Ecgs-hNhoi2cGFRjUmw', 'refresh_token': 'YhdXn10iZHcMsa2tx37M_z_GgHw~MJuUBhp963n81Ph-cjgi18sfmyNd1husvntMLwkH', 'id_token': 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJtaWtlIiwiYXVkIjoib2lkY0NvbmZvcm1hbmNlX2NsaWVudElkIiwiYXV0aF90aW1lIjoxNTgwNzQ5MjAxLCJpc3MiOiJodHRwczpcL1wvb2lkYy10ZXN0LmVyZ29uLmNoIiwiZXhwIjoxNTgwNzQ5NDQ3LCJpYXQiOjE1ODA3NDkzMjcsIm5vbmNlIjoiZ1VYNGlWM1RHb0dzNnpvUiJ9.RjuPPa94of9gRyQGOcDeHM7JEfFUjoSUGQqBIgsF9ns', 'token_type': 'bearer', 'expires_in': 179}
10AccessTokenResponse
{
    "access_token": "KfIt1ylKj-7O5toxnPzLrXUiIFk~OaWv6VZKJNsjZ4gMveXk4Ecgs-hNhoi2cGFRjUmw",
    "expires_in": 179,
    "id_token": {
        "aud": [
            "oidcConformance_clientId"
        ],
        "auth_time": 1580749201,
        "exp": 1580749447,
        "iat": 1580749327,
        "iss": "https://oidc-test.ergon.ch",
        "nonce": "gUX4iV3TGoGs6zoR",
        "sub": "mike"
    },
    "refresh_token": "YhdXn10iZHcMsa2tx37M_z_GgHw~MJuUBhp963n81Ph-cjgi18sfmyNd1husvntMLwkH",
    "token_type": "bearer"
}
10jws header{'typ': 'JWT', 'alg': 'HS256'}
10phase<--<-- 6 --- AccessToken -->-->
10requestop_args: {'state': 'MdumfdiciWnkHAzM'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:60272/authz_cb'}
10do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:60272/authz_cb', 'code': 'rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi', 'state': 'MdumfdiciWnkHAzM', 'grant_type': 'authorization_code', 'client_id': 'oidcConformance_clientId'}, 'state': 'MdumfdiciWnkHAzM', 'authn_method': 'client_secret_basic'}
10AccessTokenRequest
{
    "code": "rBk_WZZFtYWO0NZTEd0mDnVFqSg~9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:60272/authz_cb",
    "state": "MdumfdiciWnkHAzM"
}
10request_urlhttps://oidc-test.ergon.ch/auth-oidc/oauth2/oidcConformance_clientId
10request_http_args{'headers': {'Authorization': 'Basic b2lkY0NvbmZvcm1hbmNlX2NsaWVudElkOml4MG9vQ2hlX2VlcmUxTXVrX29vamVpOUllX0VpdGhhaTRq', 'Content-Type': 'application/x-www-form-urlencoded'}}
10requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A60272%2Fauthz_cb&code=rBk_WZZFtYWO0NZTEd0mDnVFqSg%7E9h6LXLR-0rKxIJAmkHRW1d1d01KAw0saInXmZnoi&state=MdumfdiciWnkHAzM
11http response
url:https://oidc-test.ergon.ch/auth-oidc/oauth2/oidcConformance_clientId status_code:400 message:{"error":"invalid_grant"}
11response{'error': 'invalid_grant'}
11eventGot expected error
11TokenErrorResponse
{
    "error": "invalid_grant"
}
11phase<--<-- 7 --- Done -->-->
11end
11assertionCheckHTTPErrorResponse
11conditioncheck-http-error-response: status=OK [Checks that an error code is either 400 or 401 which are the only ones accepted by OAuth2/OIDC.]
11assertionVerifyResponse
11conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
11conditionDone: status=OK

Result

PASSED