fake_auth.rs 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857
  1. use std::env;
  2. use std::str::FromStr;
  3. use std::sync::Arc;
  4. use std::time::Duration;
  5. use bip39::Mnemonic;
  6. use cashu::{MintAuthRequest, MintInfo};
  7. use cdk::amount::{Amount, SplitTarget};
  8. use cdk::mint_url::MintUrl;
  9. use cdk::nuts::nut00::ProofsMethods;
  10. use cdk::nuts::{
  11. AuthProof, AuthToken, BlindAuthToken, CheckStateRequest, CurrencyUnit, MeltQuoteBolt11Request,
  12. MeltQuoteState, MeltRequest, MintQuoteBolt11Request, MintRequest, RestoreRequest, State,
  13. SwapRequest,
  14. };
  15. use cdk::wallet::{AuthHttpClient, AuthMintConnector, HttpClient, MintConnector, WalletBuilder};
  16. use cdk::{Error, OidcClient};
  17. use cdk_fake_wallet::create_fake_invoice;
  18. use cdk_integration_tests::fund_wallet;
  19. use cdk_sqlite::wallet::memory;
  20. const MINT_URL: &str = "http://127.0.0.1:8087";
  21. const ENV_OIDC_USER: &str = "CDK_TEST_OIDC_USER";
  22. const ENV_OIDC_PASSWORD: &str = "CDK_TEST_OIDC_PASSWORD";
  23. fn get_oidc_credentials() -> (String, String) {
  24. let user = env::var(ENV_OIDC_USER).unwrap_or_else(|_| "test".to_string());
  25. let password = env::var(ENV_OIDC_PASSWORD).unwrap_or_else(|_| "test".to_string());
  26. (user, password)
  27. }
  28. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  29. async fn test_invalid_credentials() {
  30. let db = Arc::new(memory::empty().await.unwrap());
  31. let wallet = WalletBuilder::new()
  32. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  33. .unit(CurrencyUnit::Sat)
  34. .localstore(db.clone())
  35. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  36. .build()
  37. .expect("Wallet");
  38. let mint_info = wallet
  39. .get_mint_info()
  40. .await
  41. .expect("mint info")
  42. .expect("could not get mint info");
  43. // Try to get a token with invalid credentials
  44. let token_result =
  45. get_custom_access_token(&mint_info, "invalid_user", "invalid_password").await;
  46. // Should fail with an error
  47. assert!(
  48. token_result.is_err(),
  49. "Expected authentication to fail with invalid credentials"
  50. );
  51. }
  52. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  53. async fn test_quote_status_without_auth() {
  54. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  55. // Test mint quote status
  56. {
  57. let quote_res = client
  58. .get_mint_quote_status("123e4567-e89b-12d3-a456-426614174000")
  59. .await;
  60. assert!(
  61. matches!(quote_res, Err(Error::BlindAuthRequired)),
  62. "Expected AuthRequired error, got {:?}",
  63. quote_res
  64. );
  65. }
  66. // Test melt quote status
  67. {
  68. let quote_res = client
  69. .get_melt_quote_status("123e4567-e89b-12d3-a456-426614174000")
  70. .await;
  71. assert!(
  72. matches!(quote_res, Err(Error::BlindAuthRequired)),
  73. "Expected AuthRequired error, got {:?}",
  74. quote_res
  75. );
  76. }
  77. }
  78. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  79. async fn test_mint_without_auth() {
  80. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  81. {
  82. let request = MintQuoteBolt11Request {
  83. unit: CurrencyUnit::Sat,
  84. amount: 10.into(),
  85. description: None,
  86. pubkey: None,
  87. };
  88. let quote_res = client.post_mint_quote(request).await;
  89. assert!(
  90. matches!(quote_res, Err(Error::BlindAuthRequired)),
  91. "Expected AuthRequired error, got {:?}",
  92. quote_res
  93. );
  94. }
  95. {
  96. let request = MintRequest {
  97. quote: "123e4567-e89b-12d3-a456-426614174000".to_string(),
  98. outputs: vec![],
  99. signature: None,
  100. };
  101. let mint_res = client.post_mint(request).await;
  102. assert!(
  103. matches!(mint_res, Err(Error::BlindAuthRequired)),
  104. "Expected AuthRequired error, got {:?}",
  105. mint_res
  106. );
  107. }
  108. {
  109. let mint_res = client
  110. .get_mint_quote_status("123e4567-e89b-12d3-a456-426614174000")
  111. .await;
  112. assert!(
  113. matches!(mint_res, Err(Error::BlindAuthRequired)),
  114. "Expected AuthRequired error, got {:?}",
  115. mint_res
  116. );
  117. }
  118. }
  119. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  120. async fn test_mint_bat_without_cat() {
  121. let client = AuthHttpClient::new(MintUrl::from_str(MINT_URL).expect("valid mint url"), None);
  122. let res = client
  123. .post_mint_blind_auth(MintAuthRequest { outputs: vec![] })
  124. .await;
  125. assert!(
  126. matches!(res, Err(Error::ClearAuthRequired)),
  127. "Expected AuthRequired error, got {:?}",
  128. res
  129. );
  130. }
  131. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  132. async fn test_swap_without_auth() {
  133. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  134. let request = SwapRequest::new(vec![], vec![]);
  135. let quote_res = client.post_swap(request).await;
  136. assert!(
  137. matches!(quote_res, Err(Error::BlindAuthRequired)),
  138. "Expected AuthRequired error, got {:?}",
  139. quote_res
  140. );
  141. }
  142. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  143. async fn test_melt_without_auth() {
  144. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  145. // Test melt quote request
  146. {
  147. let request = MeltQuoteBolt11Request {
  148. request: create_fake_invoice(100, "".to_string()),
  149. unit: CurrencyUnit::Sat,
  150. options: None,
  151. };
  152. let quote_res = client.post_melt_quote(request).await;
  153. assert!(
  154. matches!(quote_res, Err(Error::BlindAuthRequired)),
  155. "Expected AuthRequired error, got {:?}",
  156. quote_res
  157. );
  158. }
  159. // Test melt quote
  160. {
  161. let request = MeltQuoteBolt11Request {
  162. request: create_fake_invoice(100, "".to_string()),
  163. unit: CurrencyUnit::Sat,
  164. options: None,
  165. };
  166. let quote_res = client.post_melt_quote(request).await;
  167. assert!(
  168. matches!(quote_res, Err(Error::BlindAuthRequired)),
  169. "Expected AuthRequired error, got {:?}",
  170. quote_res
  171. );
  172. }
  173. // Test melt
  174. {
  175. let request = MeltRequest::new(
  176. "123e4567-e89b-12d3-a456-426614174000".to_string(),
  177. vec![],
  178. None,
  179. );
  180. let melt_res = client.post_melt(request).await;
  181. assert!(
  182. matches!(melt_res, Err(Error::BlindAuthRequired)),
  183. "Expected AuthRequired error, got {:?}",
  184. melt_res
  185. );
  186. }
  187. // Check melt quote state
  188. {
  189. let melt_res = client
  190. .get_melt_quote_status("123e4567-e89b-12d3-a456-426614174000")
  191. .await;
  192. assert!(
  193. matches!(melt_res, Err(Error::BlindAuthRequired)),
  194. "Expected AuthRequired error, got {:?}",
  195. melt_res
  196. );
  197. }
  198. }
  199. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  200. async fn test_check_without_auth() {
  201. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  202. let request = CheckStateRequest { ys: vec![] };
  203. let quote_res = client.post_check_state(request).await;
  204. assert!(
  205. matches!(quote_res, Err(Error::BlindAuthRequired)),
  206. "Expected AuthRequired error, got {:?}",
  207. quote_res
  208. );
  209. }
  210. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  211. async fn test_restore_without_auth() {
  212. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  213. let request = RestoreRequest { outputs: vec![] };
  214. let restore_res = client.post_restore(request).await;
  215. assert!(
  216. matches!(restore_res, Err(Error::BlindAuthRequired)),
  217. "Expected AuthRequired error, got {:?}",
  218. restore_res
  219. );
  220. }
  221. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  222. async fn test_mint_blind_auth() {
  223. let db = Arc::new(memory::empty().await.unwrap());
  224. let wallet = WalletBuilder::new()
  225. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  226. .unit(CurrencyUnit::Sat)
  227. .localstore(db.clone())
  228. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  229. .build()
  230. .expect("Wallet");
  231. let mint_info = wallet.get_mint_info().await.unwrap().unwrap();
  232. let (access_token, _) = get_access_token(&mint_info).await;
  233. wallet.set_cat(access_token).await.unwrap();
  234. wallet
  235. .mint_blind_auth(10.into())
  236. .await
  237. .expect("Could not mint blind auth");
  238. let proofs = wallet
  239. .get_unspent_auth_proofs()
  240. .await
  241. .expect("Could not get auth proofs");
  242. assert!(proofs.len() == 10)
  243. }
  244. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  245. async fn test_mint_with_auth() {
  246. let db = Arc::new(memory::empty().await.unwrap());
  247. let wallet = WalletBuilder::new()
  248. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  249. .unit(CurrencyUnit::Sat)
  250. .localstore(db.clone())
  251. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  252. .build()
  253. .expect("Wallet");
  254. let mint_info = wallet
  255. .get_mint_info()
  256. .await
  257. .expect("mint info")
  258. .expect("could not get mint info");
  259. let (access_token, _) = get_access_token(&mint_info).await;
  260. println!("st{}", access_token);
  261. wallet.set_cat(access_token).await.unwrap();
  262. wallet
  263. .mint_blind_auth(10.into())
  264. .await
  265. .expect("Could not mint blind auth");
  266. let wallet = Arc::new(wallet);
  267. let mint_amount: Amount = 100.into();
  268. let (_, proofs) = wallet
  269. .mint_once_paid(mint_amount, None, Duration::from_secs(10))
  270. .await
  271. .unwrap();
  272. let proofs = proofs.await.expect("could not mint");
  273. assert!(proofs.total_amount().expect("Could not get proofs amount") == mint_amount);
  274. }
  275. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  276. async fn test_swap_with_auth() {
  277. let db = Arc::new(memory::empty().await.unwrap());
  278. let wallet = WalletBuilder::new()
  279. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  280. .unit(CurrencyUnit::Sat)
  281. .localstore(db.clone())
  282. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  283. .build()
  284. .expect("Wallet");
  285. let mint_info = wallet.get_mint_info().await.unwrap().unwrap();
  286. let (access_token, _) = get_access_token(&mint_info).await;
  287. wallet.set_cat(access_token).await.unwrap();
  288. let wallet = Arc::new(wallet);
  289. wallet.mint_blind_auth(10.into()).await.unwrap();
  290. fund_wallet(wallet.clone(), 100.into()).await;
  291. let proofs = wallet
  292. .get_unspent_proofs()
  293. .await
  294. .expect("Could not get proofs");
  295. let swapped_proofs = wallet
  296. .swap(
  297. Some(proofs.total_amount().unwrap()),
  298. SplitTarget::default(),
  299. proofs.clone(),
  300. None,
  301. false,
  302. )
  303. .await
  304. .expect("Could not swap")
  305. .expect("Could not swap");
  306. let check_spent = wallet
  307. .check_proofs_spent(proofs.clone())
  308. .await
  309. .expect("Could not check proofs");
  310. for state in check_spent {
  311. if state.state != State::Spent {
  312. panic!("Input proofs should be spent");
  313. }
  314. }
  315. assert!(swapped_proofs.total_amount().unwrap() == proofs.total_amount().unwrap())
  316. }
  317. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  318. async fn test_melt_with_auth() {
  319. let db = Arc::new(memory::empty().await.unwrap());
  320. let wallet = WalletBuilder::new()
  321. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  322. .unit(CurrencyUnit::Sat)
  323. .localstore(db.clone())
  324. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  325. .build()
  326. .expect("Wallet");
  327. let mint_info = wallet
  328. .get_mint_info()
  329. .await
  330. .expect("Mint info not found")
  331. .expect("Mint info not found");
  332. let (access_token, _) = get_access_token(&mint_info).await;
  333. wallet.set_cat(access_token).await.unwrap();
  334. let wallet = Arc::new(wallet);
  335. wallet.mint_blind_auth(10.into()).await.unwrap();
  336. fund_wallet(wallet.clone(), 100.into()).await;
  337. let bolt11 = create_fake_invoice(2_000, "".to_string());
  338. let melt_quote = wallet
  339. .melt_quote(bolt11.to_string(), None)
  340. .await
  341. .expect("Could not get melt quote");
  342. let after_melt = wallet.melt(&melt_quote.id).await.expect("Could not melt");
  343. assert!(after_melt.state == MeltQuoteState::Paid);
  344. }
  345. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  346. async fn test_mint_auth_over_max() {
  347. let db = Arc::new(memory::empty().await.unwrap());
  348. let wallet = WalletBuilder::new()
  349. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  350. .unit(CurrencyUnit::Sat)
  351. .localstore(db.clone())
  352. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  353. .build()
  354. .expect("Wallet");
  355. let wallet = Arc::new(wallet);
  356. let mint_info = wallet
  357. .get_mint_info()
  358. .await
  359. .expect("Mint info not found")
  360. .expect("Mint info not found");
  361. let (access_token, _) = get_access_token(&mint_info).await;
  362. wallet.set_cat(access_token).await.unwrap();
  363. let auth_proofs = wallet
  364. .mint_blind_auth((mint_info.nuts.nut22.expect("Auth enabled").bat_max_mint + 1).into())
  365. .await;
  366. assert!(
  367. matches!(
  368. auth_proofs,
  369. Err(Error::AmountOutofLimitRange(
  370. Amount::ZERO,
  371. Amount::ZERO,
  372. Amount::ZERO,
  373. ))
  374. ),
  375. "Expected amount out of limit error, got {:?}",
  376. auth_proofs
  377. );
  378. }
  379. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  380. async fn test_reuse_auth_proof() {
  381. let db = Arc::new(memory::empty().await.unwrap());
  382. let wallet = WalletBuilder::new()
  383. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  384. .unit(CurrencyUnit::Sat)
  385. .localstore(db.clone())
  386. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  387. .build()
  388. .expect("Wallet");
  389. let mint_info = wallet.get_mint_info().await.unwrap().unwrap();
  390. let (access_token, _) = get_access_token(&mint_info).await;
  391. wallet.set_cat(access_token).await.unwrap();
  392. wallet.mint_blind_auth(1.into()).await.unwrap();
  393. let proofs = wallet
  394. .localstore
  395. .get_proofs(None, Some(CurrencyUnit::Auth), None, None)
  396. .await
  397. .unwrap();
  398. assert!(proofs.len() == 1);
  399. {
  400. let quote = wallet
  401. .mint_quote(10.into(), None)
  402. .await
  403. .expect("Quote should be allowed");
  404. assert!(quote.amount == Some(10.into()));
  405. }
  406. wallet
  407. .localstore
  408. .update_proofs(proofs, vec![])
  409. .await
  410. .unwrap();
  411. {
  412. let quote_res = wallet.mint_quote(10.into(), None).await;
  413. assert!(
  414. matches!(quote_res, Err(Error::TokenAlreadySpent)),
  415. "Expected AuthRequired error, got {:?}",
  416. quote_res
  417. );
  418. }
  419. }
  420. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  421. async fn test_melt_with_invalid_auth() {
  422. let db = Arc::new(memory::empty().await.unwrap());
  423. let wallet = WalletBuilder::new()
  424. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  425. .unit(CurrencyUnit::Sat)
  426. .localstore(db.clone())
  427. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  428. .build()
  429. .expect("Wallet");
  430. let mint_info = wallet.get_mint_info().await.unwrap().unwrap();
  431. let (access_token, _) = get_access_token(&mint_info).await;
  432. wallet.set_cat(access_token).await.unwrap();
  433. wallet.mint_blind_auth(10.into()).await.unwrap();
  434. fund_wallet(Arc::new(wallet.clone()), 1.into()).await;
  435. let proofs = wallet
  436. .get_unspent_proofs()
  437. .await
  438. .expect("wallet has proofs");
  439. println!("{:#?}", proofs);
  440. let proof = proofs.first().expect("wallet has one proof");
  441. let client = HttpClient::new(MintUrl::from_str(MINT_URL).expect("Valid mint url"), None);
  442. {
  443. let invalid_auth_proof = AuthProof {
  444. keyset_id: proof.keyset_id,
  445. secret: proof.secret.clone(),
  446. c: proof.c,
  447. dleq: proof.dleq.clone(),
  448. };
  449. let _auth_token = AuthToken::BlindAuth(BlindAuthToken::new(invalid_auth_proof));
  450. let request = MintQuoteBolt11Request {
  451. unit: CurrencyUnit::Sat,
  452. amount: 10.into(),
  453. description: None,
  454. pubkey: None,
  455. };
  456. let quote_res = client.post_mint_quote(request).await;
  457. assert!(
  458. matches!(quote_res, Err(Error::BlindAuthRequired)),
  459. "Expected AuthRequired error, got {:?}",
  460. quote_res
  461. );
  462. }
  463. {
  464. let (access_token, _) = get_access_token(&mint_info).await;
  465. wallet.set_cat(access_token).await.unwrap();
  466. }
  467. }
  468. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  469. async fn test_refresh_access_token() {
  470. let db = Arc::new(memory::empty().await.unwrap());
  471. let wallet = WalletBuilder::new()
  472. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  473. .unit(CurrencyUnit::Sat)
  474. .localstore(db.clone())
  475. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  476. .build()
  477. .expect("Wallet");
  478. let mint_info = wallet
  479. .get_mint_info()
  480. .await
  481. .expect("mint info")
  482. .expect("could not get mint info");
  483. let (access_token, refresh_token) = get_access_token(&mint_info).await;
  484. // Set the initial access token and refresh token
  485. wallet.set_cat(access_token.clone()).await.unwrap();
  486. wallet
  487. .set_refresh_token(refresh_token.clone())
  488. .await
  489. .unwrap();
  490. // Mint some blind auth tokens with the initial access token
  491. wallet.mint_blind_auth(5.into()).await.unwrap();
  492. // Refresh the access token
  493. wallet.refresh_access_token().await.unwrap();
  494. // Verify we can still perform operations with the refreshed token
  495. let mint_amount: Amount = 10.into();
  496. // Try to mint more blind auth tokens with the refreshed token
  497. let auth_proofs = wallet.mint_blind_auth(5.into()).await.unwrap();
  498. assert_eq!(auth_proofs.len(), 5);
  499. let total_auth_proofs = wallet.get_unspent_auth_proofs().await.unwrap();
  500. assert_eq!(total_auth_proofs.len(), 10); // 5 from before refresh + 5 after refresh
  501. // Try to get a mint quote with the refreshed token
  502. let mint_quote = wallet
  503. .mint_quote(mint_amount, None)
  504. .await
  505. .expect("failed to get mint quote with refreshed token");
  506. assert_eq!(mint_quote.amount, Some(mint_amount));
  507. // Verify the total number of auth tokens
  508. let total_auth_proofs = wallet.get_unspent_auth_proofs().await.unwrap();
  509. assert_eq!(total_auth_proofs.len(), 9); // 5 from before refresh + 5 after refresh - 1 for the quote
  510. }
  511. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  512. async fn test_invalid_refresh_token() {
  513. let db = Arc::new(memory::empty().await.unwrap());
  514. let wallet = WalletBuilder::new()
  515. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  516. .unit(CurrencyUnit::Sat)
  517. .localstore(db.clone())
  518. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  519. .build()
  520. .expect("Wallet");
  521. let mint_info = wallet
  522. .get_mint_info()
  523. .await
  524. .expect("mint info")
  525. .expect("could not get mint info");
  526. let (access_token, _) = get_access_token(&mint_info).await;
  527. // Set the initial access token
  528. wallet.set_cat(access_token.clone()).await.unwrap();
  529. // Set an invalid refresh token
  530. wallet
  531. .set_refresh_token("invalid_refresh_token".to_string())
  532. .await
  533. .unwrap();
  534. // Attempt to refresh the access token with an invalid refresh token
  535. let refresh_result = wallet.refresh_access_token().await;
  536. // Should fail with an error
  537. assert!(refresh_result.is_err(), "Expected refresh token error");
  538. }
  539. #[tokio::test(flavor = "multi_thread", worker_threads = 1)]
  540. async fn test_auth_token_spending_order() {
  541. let db = Arc::new(memory::empty().await.unwrap());
  542. let wallet = WalletBuilder::new()
  543. .mint_url(MintUrl::from_str(MINT_URL).expect("Valid mint url"))
  544. .unit(CurrencyUnit::Sat)
  545. .localstore(db.clone())
  546. .seed(Mnemonic::generate(12).unwrap().to_seed_normalized(""))
  547. .build()
  548. .expect("Wallet");
  549. let mint_info = wallet
  550. .get_mint_info()
  551. .await
  552. .expect("mint info")
  553. .expect("could not get mint info");
  554. let (access_token, _) = get_access_token(&mint_info).await;
  555. wallet.set_cat(access_token).await.unwrap();
  556. // Mint auth tokens in two batches to test ordering
  557. wallet.mint_blind_auth(2.into()).await.unwrap();
  558. // Get the first batch of auth proofs
  559. let first_batch = wallet.get_unspent_auth_proofs().await.unwrap();
  560. assert_eq!(first_batch.len(), 2);
  561. // Mint a second batch
  562. wallet.mint_blind_auth(3.into()).await.unwrap();
  563. // Get all auth proofs
  564. let all_proofs = wallet.get_unspent_auth_proofs().await.unwrap();
  565. assert_eq!(all_proofs.len(), 5);
  566. // Use tokens and verify they're used in the expected order (FIFO)
  567. for i in 0..3 {
  568. let mint_quote = wallet
  569. .mint_quote(10.into(), None)
  570. .await
  571. .expect("failed to get mint quote");
  572. assert_eq!(mint_quote.amount, Some(10.into()));
  573. // Check remaining tokens after each operation
  574. let remaining = wallet.get_unspent_auth_proofs().await.unwrap();
  575. assert_eq!(
  576. remaining.len(),
  577. 5 - (i + 1),
  578. "Expected {} remaining auth tokens after {} operations",
  579. 5 - (i + 1),
  580. i + 1
  581. );
  582. }
  583. }
  584. async fn get_access_token(mint_info: &MintInfo) -> (String, String) {
  585. let openid_discovery = mint_info
  586. .nuts
  587. .nut21
  588. .clone()
  589. .expect("Nutxx defined")
  590. .openid_discovery;
  591. let oidc_client = OidcClient::new(openid_discovery, None);
  592. // Get the token endpoint from the OIDC configuration
  593. let token_url = oidc_client
  594. .get_oidc_config()
  595. .await
  596. .expect("Failed to get OIDC config")
  597. .token_endpoint;
  598. // Create the request parameters
  599. let (user, password) = get_oidc_credentials();
  600. let params = [
  601. ("grant_type", "password"),
  602. ("client_id", "cashu-client"),
  603. ("username", &user),
  604. ("password", &password),
  605. ];
  606. // Make the token request directly
  607. let client = reqwest::Client::new();
  608. let response = client
  609. .post(token_url)
  610. .form(&params)
  611. .send()
  612. .await
  613. .expect("Failed to send token request");
  614. let token_response: serde_json::Value = response
  615. .json()
  616. .await
  617. .expect("Failed to parse token response");
  618. let access_token = token_response["access_token"]
  619. .as_str()
  620. .expect("No access token in response")
  621. .to_string();
  622. let refresh_token = token_response["refresh_token"]
  623. .as_str()
  624. .expect("No access token in response")
  625. .to_string();
  626. (access_token, refresh_token)
  627. }
  628. /// Get a new access token with custom credentials
  629. async fn get_custom_access_token(
  630. mint_info: &MintInfo,
  631. username: &str,
  632. password: &str,
  633. ) -> Result<(String, String), Error> {
  634. let openid_discovery = mint_info
  635. .nuts
  636. .nut21
  637. .clone()
  638. .expect("Nutxx defined")
  639. .openid_discovery;
  640. let oidc_client = OidcClient::new(openid_discovery, None);
  641. // Get the token endpoint from the OIDC configuration
  642. let token_url = oidc_client
  643. .get_oidc_config()
  644. .await
  645. .map_err(|_| Error::Custom("Failed to get OIDC config".to_string()))?
  646. .token_endpoint;
  647. // Create the request parameters
  648. let params = [
  649. ("grant_type", "password"),
  650. ("client_id", "cashu-client"),
  651. ("username", username),
  652. ("password", password),
  653. ];
  654. // Make the token request directly
  655. let client = reqwest::Client::new();
  656. let response = client
  657. .post(token_url)
  658. .form(&params)
  659. .send()
  660. .await
  661. .map_err(|_| Error::Custom("Failed to send token request".to_string()))?;
  662. if !response.status().is_success() {
  663. return Err(Error::Custom(format!(
  664. "Token request failed with status: {}",
  665. response.status()
  666. )));
  667. }
  668. let token_response: serde_json::Value = response
  669. .json()
  670. .await
  671. .map_err(|_| Error::Custom("Failed to parse token response".to_string()))?;
  672. let access_token = token_response["access_token"]
  673. .as_str()
  674. .ok_or_else(|| Error::Custom("No access token in response".to_string()))?
  675. .to_string();
  676. let refresh_token = token_response["refresh_token"]
  677. .as_str()
  678. .ok_or_else(|| Error::Custom("No refresh token in response".to_string()))?
  679. .to_string();
  680. Ok((access_token, refresh_token))
  681. }