// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: MPL-2.0 package xds import ( "encoding/base64" "path/filepath" "testing" envoy_core_v3 "github.com/envoyproxy/go-control-plane/envoy/config/core/v3" envoy_route_v3 "github.com/envoyproxy/go-control-plane/envoy/config/route/v3" envoy_http_jwt_authn_v3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/http/jwt_authn/v3" "github.com/hashicorp/consul/agent/structs" "github.com/stretchr/testify/require" "google.golang.org/protobuf/types/known/durationpb" "google.golang.org/protobuf/types/known/wrapperspb" ) type ixnOpts struct { src string action structs.IntentionAction jwt *structs.IntentionJWTRequirement perms *structs.IntentionPermission } func makeProvider(name string) structs.IntentionJWTProvider { return structs.IntentionJWTProvider{ Name: name, } } func decodeJWKS(t *testing.T, jw string) string { s, err := base64.StdEncoding.DecodeString(jw) require.NoError(t, err) return string(s) } var ( token = "eyJrZXlzIjogW3sKICAiY3J2IjogIlAtMjU2IiwKICAia2V5X29wcyI6IFsKICAgICJ2ZXJpZnkiCiAgXSwKICAia3R5IjogIkVDIiwKICAieCI6ICJXYzl1WnVQYUI3S2gyRk1jOXd0SmpSZThYRDR5VDJBWU5BQWtyWWJWanV3IiwKICAieSI6ICI2OGhSVEppSk5Pd3RyaDRFb1BYZVZuUnVIN2hpU0RKX2xtYmJqZkRmV3EwIiwKICAiYWxnIjogIkVTMjU2IiwKICAidXNlIjogInNpZyIsCiAgImtpZCI6ICJhYzFlOGY5MGVkZGY2MWM0MjljNjFjYTA1YjRmMmUwNyIKfV19" oktaProvider = makeProvider("okta") auth0Provider = makeProvider("auth0") fakeProvider = makeProvider("fake-provider") oktaIntention = &structs.IntentionJWTRequirement{ Providers: []*structs.IntentionJWTProvider{ &oktaProvider, }, } auth0Intention = &structs.IntentionJWTRequirement{ Providers: []*structs.IntentionJWTProvider{ &auth0Provider, }, } fakeIntention = &structs.IntentionJWTRequirement{ Providers: []*structs.IntentionJWTProvider{ &fakeProvider, }, } multiProviderIntentions = &structs.IntentionJWTRequirement{ Providers: []*structs.IntentionJWTProvider{ &oktaProvider, &auth0Provider, }, } pWithOktaProvider = &structs.IntentionPermission{ Action: structs.IntentionActionAllow, HTTP: &structs.IntentionHTTPPermission{ PathPrefix: "some-special-path", }, JWT: oktaIntention, } pWithMultiProviders = &structs.IntentionPermission{ Action: structs.IntentionActionAllow, HTTP: &structs.IntentionHTTPPermission{ PathPrefix: "some-special-path", }, JWT: multiProviderIntentions, } pWithNoJWT = &structs.IntentionPermission{ Action: structs.IntentionActionAllow, HTTP: &structs.IntentionHTTPPermission{ PathPrefix: "some-special-path", }, } fullRetryPolicy = &structs.JWKSRetryPolicy{ RetryPolicyBackOff: &structs.RetryPolicyBackOff{ BaseInterval: 0, MaxInterval: 10, }, NumRetries: 1, } oktaRemoteJWKS = &structs.RemoteJWKS{ RequestTimeoutMs: 1000, FetchAsynchronously: true, URI: "https://example-okta.com/.well-known/jwks.json", } auth0RemoteJWKS = &structs.RemoteJWKS{ RequestTimeoutMs: 1000, FetchAsynchronously: true, URI: "https://example-auth0.com/.well-known/jwks.json", } extendedRemoteJWKS = &structs.RemoteJWKS{ RequestTimeoutMs: 1000, FetchAsynchronously: true, URI: "https://example-okta.com/.well-known/jwks.json", RetryPolicy: fullRetryPolicy, CacheDuration: 20, } localJWKS = &structs.LocalJWKS{ JWKS: token, } localJWKSFilename = &structs.LocalJWKS{ Filename: "file.txt", } ) func makeTestIntention(t *testing.T, opts ixnOpts) *structs.Intention { t.Helper() ixn := structs.TestIntention(t) ixn.SourceName = opts.src if opts.jwt != nil { ixn.JWT = opts.jwt } if opts.perms != nil { ixn.Permissions = append(ixn.Permissions, opts.perms) } if opts.action != "" { ixn.Action = opts.action } return ixn } func TestMakeJWTAUTHFilters(t *testing.T) { simplified := func(ixns ...*structs.Intention) structs.SimplifiedIntentions { return structs.SimplifiedIntentions(ixns) } var ( remoteCE = map[string]*structs.JWTProviderConfigEntry{ "okta": { Kind: "jwt-provider", Name: "okta", Issuer: "test-issuer", JSONWebKeySet: &structs.JSONWebKeySet{ Remote: oktaRemoteJWKS, }, }, "auth0": { Kind: "jwt-provider", Name: "auth0", Issuer: "another-issuer", JSONWebKeySet: &structs.JSONWebKeySet{ Remote: auth0RemoteJWKS, }, }, } localCE = map[string]*structs.JWTProviderConfigEntry{ "okta": { Kind: "jwt-provider", Name: "okta", Issuer: "test-issuer", JSONWebKeySet: &structs.JSONWebKeySet{ Local: localJWKS, }, }, } ) // All tests here depend on golden files located under: agent/xds/testdata/jwt_authn/* tests := map[string]struct { intentions structs.SimplifiedIntentions provider map[string]*structs.JWTProviderConfigEntry }{ "remote-provider": { intentions: simplified(makeTestIntention(t, ixnOpts{src: "web", action: structs.IntentionActionAllow, jwt: oktaIntention})), provider: remoteCE, }, "local-provider": { intentions: simplified(makeTestIntention(t, ixnOpts{src: "web", action: structs.IntentionActionAllow, jwt: oktaIntention})), provider: localCE, }, "intention-with-path": { intentions: simplified(makeTestIntention(t, ixnOpts{src: "web", action: structs.IntentionActionAllow, perms: pWithOktaProvider})), provider: remoteCE, }, "top-level-provider-with-permission": { intentions: simplified(makeTestIntention(t, ixnOpts{src: "web", action: structs.IntentionActionAllow, jwt: oktaIntention, perms: pWithOktaProvider})), provider: remoteCE, }, "multiple-providers-and-one-permission": { intentions: simplified(makeTestIntention(t, ixnOpts{src: "web", action: structs.IntentionActionAllow, jwt: multiProviderIntentions, perms: pWithOktaProvider})), provider: remoteCE, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { filter, err := makeJWTAuthFilter(tt.provider, tt.intentions) require.NoError(t, err) gotJSON := protoToJSON(t, filter) require.JSONEq(t, goldenSimple(t, filepath.Join("jwt_authn", name), gotJSON), gotJSON) }) } } func TestMakeComputedProviderName(t *testing.T) { tests := map[string]struct { name string perm *structs.IntentionPermission idx int expected string }{ "no-permissions": { name: "okta", idx: 0, expected: "okta", }, "exact-path-permission": { name: "auth0", perm: &structs.IntentionPermission{ HTTP: &structs.IntentionHTTPPermission{ PathExact: "admin", }, }, idx: 5, expected: "auth0_5", }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { reqs := makeComputedProviderName(tt.name, tt.perm, tt.idx) require.Equal(t, reqs, tt.expected) }) } } func TestBuildPayloadInMetadataKey(t *testing.T) { tests := map[string]struct { name string perm *structs.IntentionPermission permIdx int expected string }{ "no-permissions": { name: "okta", expected: "jwt_payload_okta", }, "path-prefix-permission": { name: "auth0", perm: &structs.IntentionPermission{ HTTP: &structs.IntentionHTTPPermission{ PathPrefix: "admin", }, }, permIdx: 4, expected: "jwt_payload_auth0_4", }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { reqs := buildPayloadInMetadataKey(tt.name, tt.perm, tt.permIdx) require.Equal(t, reqs, tt.expected) }) } } func TestCollectJWTAuthnProviders(t *testing.T) { tests := map[string]struct { intention *structs.Intention expected []*jwtAuthnProvider }{ "empty-top-level-jwt-and-empty-permissions": { intention: makeTestIntention(t, ixnOpts{src: "web"}), expected: []*jwtAuthnProvider{}, }, "top-level-jwt-and-empty-permissions": { intention: makeTestIntention(t, ixnOpts{src: "web", jwt: oktaIntention}), expected: []*jwtAuthnProvider{{Provider: &oktaProvider, ComputedName: oktaProvider.Name}}, }, "multi-top-level-jwt-and-empty-permissions": { intention: makeTestIntention(t, ixnOpts{src: "web", jwt: multiProviderIntentions}), expected: []*jwtAuthnProvider{ {Provider: &oktaProvider, ComputedName: oktaProvider.Name}, {Provider: &auth0Provider, ComputedName: auth0Provider.Name}, }, }, "top-level-jwt-and-one-jwt-permission": { intention: makeTestIntention(t, ixnOpts{src: "web", jwt: auth0Intention, perms: pWithOktaProvider}), expected: []*jwtAuthnProvider{ {Provider: &auth0Provider, ComputedName: auth0Provider.Name}, {Provider: &oktaProvider, ComputedName: "okta_0"}, }, }, "top-level-jwt-and-multi-jwt-permissions": { intention: makeTestIntention(t, ixnOpts{src: "web", jwt: fakeIntention, perms: pWithMultiProviders}), expected: []*jwtAuthnProvider{ {Provider: &fakeProvider, ComputedName: fakeProvider.Name}, {Provider: &oktaProvider, ComputedName: "okta_0"}, {Provider: &auth0Provider, ComputedName: "auth0_0"}, }, }, "empty-top-level-jwt-and-one-jwt-permission": { intention: makeTestIntention(t, ixnOpts{src: "web", perms: pWithOktaProvider}), expected: []*jwtAuthnProvider{{Provider: &oktaProvider, ComputedName: "okta_0"}}, }, "empty-top-level-jwt-and-multi-jwt-permission": { intention: makeTestIntention(t, ixnOpts{src: "web", perms: pWithMultiProviders}), expected: []*jwtAuthnProvider{ {Provider: &oktaProvider, ComputedName: "okta_0"}, {Provider: &auth0Provider, ComputedName: "auth0_0"}, }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { reqs := collectJWTAuthnProviders(tt.intention) require.ElementsMatch(t, reqs, tt.expected) }) } } func TestGetPermissionsProviders(t *testing.T) { tests := map[string]struct { perms []*structs.IntentionPermission expected []*jwtAuthnProvider }{ "empty-permissions": { perms: []*structs.IntentionPermission{}, expected: []*jwtAuthnProvider{}, }, "nil-permissions": { perms: nil, expected: []*jwtAuthnProvider{}, }, "permissions-with-no-jwt": { perms: []*structs.IntentionPermission{pWithNoJWT}, expected: []*jwtAuthnProvider{}, }, "permissions-with-one-jwt": { perms: []*structs.IntentionPermission{pWithOktaProvider, pWithNoJWT}, expected: []*jwtAuthnProvider{ {Provider: &oktaProvider, ComputedName: "okta_0"}, }, }, "permissions-with-multiple-jwt": { perms: []*structs.IntentionPermission{pWithMultiProviders, pWithNoJWT}, expected: []*jwtAuthnProvider{ {Provider: &auth0Provider, ComputedName: "auth0_0"}, {Provider: &oktaProvider, ComputedName: "okta_0"}, }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { t.Run("getPermissionsProviders", func(t *testing.T) { p := getPermissionsProviders(tt.perms) require.ElementsMatch(t, p, tt.expected) }) }) } } func TestBuildJWTProviderConfig(t *testing.T) { var ( fullCE = structs.JWTProviderConfigEntry{ Kind: "jwt-provider", Issuer: "auth0", Audiences: []string{"aud"}, JSONWebKeySet: &structs.JSONWebKeySet{ Local: &structs.LocalJWKS{ JWKS: token, }, }, Forwarding: &structs.JWTForwardingConfig{HeaderName: "user-token"}, Locations: []*structs.JWTLocation{ {Header: &structs.JWTLocationHeader{Forward: true, Name: "Authorization", ValuePrefix: "Bearer"}}, }, } ceRemoteJWKS = structs.JWTProviderConfigEntry{ Kind: "jwt-provider", Issuer: "auth0", Audiences: []string{"aud"}, JSONWebKeySet: &structs.JSONWebKeySet{ Remote: oktaRemoteJWKS, }, } ceInvalidJWKS = structs.JWTProviderConfigEntry{JSONWebKeySet: &structs.JSONWebKeySet{}} ) tests := map[string]struct { ce *structs.JWTProviderConfigEntry expected *envoy_http_jwt_authn_v3.JwtProvider expectedError string providerName string }{ "config-entry-with-invalid-localJWKS": { ce: &ceInvalidJWKS, expectedError: "invalid jwt provider config; missing JSONWebKeySet for provider", }, "valid-config-entry": { ce: &fullCE, expected: &envoy_http_jwt_authn_v3.JwtProvider{ Issuer: fullCE.Issuer, Audiences: fullCE.Audiences, ForwardPayloadHeader: "user-token", PayloadInMetadata: buildPayloadInMetadataKey(ceRemoteJWKS.Name, nil, 0), PadForwardPayloadHeader: false, Forward: true, JwksSourceSpecifier: &envoy_http_jwt_authn_v3.JwtProvider_LocalJwks{ LocalJwks: &envoy_core_v3.DataSource{ Specifier: &envoy_core_v3.DataSource_InlineString{ InlineString: decodeJWKS(t, localJWKS.JWKS), }, }, }, FromHeaders: []*envoy_http_jwt_authn_v3.JwtHeader{{Name: "Authorization", ValuePrefix: "Bearer"}}, }, }, "entry-with-remote-jwks": { ce: &ceRemoteJWKS, expected: &envoy_http_jwt_authn_v3.JwtProvider{ Issuer: fullCE.Issuer, Audiences: fullCE.Audiences, PayloadInMetadata: buildPayloadInMetadataKey(ceRemoteJWKS.Name, nil, 0), JwksSourceSpecifier: &envoy_http_jwt_authn_v3.JwtProvider_RemoteJwks{ RemoteJwks: &envoy_http_jwt_authn_v3.RemoteJwks{ HttpUri: &envoy_core_v3.HttpUri{ Uri: oktaRemoteJWKS.URI, HttpUpstreamType: &envoy_core_v3.HttpUri_Cluster{Cluster: makeJWKSClusterName(ceRemoteJWKS.Name)}, Timeout: &durationpb.Duration{Seconds: 1}, }, AsyncFetch: &envoy_http_jwt_authn_v3.JwksAsyncFetch{ FastListener: oktaRemoteJWKS.FetchAsynchronously, }, }, }, }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { res, err := buildJWTProviderConfig(tt.ce, tt.ce.GetName()) if tt.expectedError != "" { require.Error(t, err) require.Contains(t, err.Error(), tt.expectedError) } else { require.Equal(t, res, tt.expected) } }) } } func TestMakeLocalJWKS(t *testing.T) { tests := map[string]struct { jwks *structs.LocalJWKS providerName string expected *envoy_http_jwt_authn_v3.JwtProvider_LocalJwks expectedError string }{ "invalid-base64-jwks": { jwks: &structs.LocalJWKS{JWKS: "decoded-jwks"}, expectedError: "illegal base64 data", }, "no-jwks-and-no-filename": { jwks: &structs.LocalJWKS{}, expectedError: "invalid jwt provider config; missing JWKS/Filename for local provider", }, "localjwks-with-filename": { jwks: localJWKSFilename, expected: &envoy_http_jwt_authn_v3.JwtProvider_LocalJwks{ LocalJwks: &envoy_core_v3.DataSource{ Specifier: &envoy_core_v3.DataSource_Filename{ Filename: localJWKSFilename.Filename, }, }, }, }, "localjwks-with-jwks": { jwks: localJWKS, expected: &envoy_http_jwt_authn_v3.JwtProvider_LocalJwks{ LocalJwks: &envoy_core_v3.DataSource{ Specifier: &envoy_core_v3.DataSource_InlineString{ InlineString: decodeJWKS(t, localJWKS.JWKS), }, }, }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { res, err := makeLocalJWKS(tt.jwks, tt.providerName) if tt.expectedError != "" { require.Error(t, err) require.Contains(t, err.Error(), tt.expectedError) } else { require.Equal(t, res, tt.expected) } }) } } func TestMakeRemoteJWKS(t *testing.T) { tests := map[string]struct { jwks *structs.RemoteJWKS providerName string expected *envoy_http_jwt_authn_v3.JwtProvider_RemoteJwks }{ "with-no-cache-duration": { jwks: oktaRemoteJWKS, providerName: "auth0", expected: &envoy_http_jwt_authn_v3.JwtProvider_RemoteJwks{ RemoteJwks: &envoy_http_jwt_authn_v3.RemoteJwks{ HttpUri: &envoy_core_v3.HttpUri{ Uri: oktaRemoteJWKS.URI, HttpUpstreamType: &envoy_core_v3.HttpUri_Cluster{Cluster: makeJWKSClusterName("auth0")}, Timeout: &durationpb.Duration{Seconds: 1}, }, AsyncFetch: &envoy_http_jwt_authn_v3.JwksAsyncFetch{ FastListener: oktaRemoteJWKS.FetchAsynchronously, }, }, }, }, "with-retry-policy": { jwks: extendedRemoteJWKS, providerName: "okta", expected: &envoy_http_jwt_authn_v3.JwtProvider_RemoteJwks{ RemoteJwks: &envoy_http_jwt_authn_v3.RemoteJwks{ HttpUri: &envoy_core_v3.HttpUri{ Uri: oktaRemoteJWKS.URI, HttpUpstreamType: &envoy_core_v3.HttpUri_Cluster{Cluster: makeJWKSClusterName("okta")}, Timeout: &durationpb.Duration{Seconds: 1}, }, AsyncFetch: &envoy_http_jwt_authn_v3.JwksAsyncFetch{ FastListener: oktaRemoteJWKS.FetchAsynchronously, }, RetryPolicy: buildJWTRetryPolicy(extendedRemoteJWKS.RetryPolicy), CacheDuration: &durationpb.Duration{Seconds: int64(extendedRemoteJWKS.CacheDuration)}, }, }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { res := makeRemoteJWKS(tt.jwks, tt.providerName) require.Equal(t, res, tt.expected) }) } } func TestBuildJWTRetryPolicy(t *testing.T) { var ( noBackofRetryPolicy = &structs.JWKSRetryPolicy{NumRetries: 1} noNumRetriesPolicy = &structs.JWKSRetryPolicy{ RetryPolicyBackOff: &structs.RetryPolicyBackOff{BaseInterval: 0, MaxInterval: 10}, } ) tests := map[string]struct { retryPolicy *structs.JWKSRetryPolicy expected *envoy_core_v3.RetryPolicy }{ "nil-retry-policy": { retryPolicy: nil, expected: nil, }, "retry-policy-with-no-backoff": { retryPolicy: noBackofRetryPolicy, expected: &envoy_core_v3.RetryPolicy{NumRetries: wrapperspb.UInt32(uint32(1))}, }, "retry-policy-with-backoff": { retryPolicy: fullRetryPolicy, expected: &envoy_core_v3.RetryPolicy{ NumRetries: wrapperspb.UInt32(uint32(1)), RetryBackOff: &envoy_core_v3.BackoffStrategy{ BaseInterval: structs.DurationToProto(0), MaxInterval: structs.DurationToProto(10), }, }, }, "retry-policy-with-no-retries": { retryPolicy: noNumRetriesPolicy, expected: &envoy_core_v3.RetryPolicy{ RetryBackOff: &envoy_core_v3.BackoffStrategy{ BaseInterval: structs.DurationToProto(0), MaxInterval: structs.DurationToProto(10), }, NumRetries: wrapperspb.UInt32(uint32(0)), }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { res := buildJWTRetryPolicy(tt.retryPolicy) require.Equal(t, res, tt.expected) }) } } func TestBuildRouteRule(t *testing.T) { var ( pWithExactPath = &structs.IntentionPermission{ Action: structs.IntentionActionAllow, HTTP: &structs.IntentionHTTPPermission{ PathExact: "/exact-match", }, } pWithRegex = &structs.IntentionPermission{ Action: structs.IntentionActionAllow, HTTP: &structs.IntentionHTTPPermission{ PathRegex: "p([a-z]+)ch", }, } ) tests := map[string]struct { provider *structs.IntentionJWTProvider perm *structs.IntentionPermission route string expected *envoy_http_jwt_authn_v3.RequirementRule }{ "permission-nil": { provider: &oktaProvider, perm: nil, route: "/my-route", expected: &envoy_http_jwt_authn_v3.RequirementRule{ Match: &envoy_route_v3.RouteMatch{PathSpecifier: &envoy_route_v3.RouteMatch_Prefix{Prefix: "/my-route"}}, RequirementType: &envoy_http_jwt_authn_v3.RequirementRule_Requires{ Requires: &envoy_http_jwt_authn_v3.JwtRequirement{ RequiresType: &envoy_http_jwt_authn_v3.JwtRequirement_ProviderName{ ProviderName: oktaProvider.Name, }, }, }, }, }, "permission-with-path-prefix": { provider: &oktaProvider, perm: pWithOktaProvider, route: "/my-route", expected: &envoy_http_jwt_authn_v3.RequirementRule{ Match: &envoy_route_v3.RouteMatch{PathSpecifier: &envoy_route_v3.RouteMatch_Prefix{ Prefix: pWithMultiProviders.HTTP.PathPrefix, }}, RequirementType: &envoy_http_jwt_authn_v3.RequirementRule_Requires{ Requires: &envoy_http_jwt_authn_v3.JwtRequirement{ RequiresType: &envoy_http_jwt_authn_v3.JwtRequirement_ProviderName{ ProviderName: makeComputedProviderName(oktaProvider.Name, pWithMultiProviders, 0), }, }, }, }, }, "permission-with-exact-path": { provider: &oktaProvider, perm: pWithExactPath, route: "/", expected: &envoy_http_jwt_authn_v3.RequirementRule{ Match: &envoy_route_v3.RouteMatch{PathSpecifier: &envoy_route_v3.RouteMatch_Path{ Path: pWithExactPath.HTTP.PathExact, }}, RequirementType: &envoy_http_jwt_authn_v3.RequirementRule_Requires{ Requires: &envoy_http_jwt_authn_v3.JwtRequirement{ RequiresType: &envoy_http_jwt_authn_v3.JwtRequirement_ProviderName{ ProviderName: makeComputedProviderName(oktaProvider.Name, pWithExactPath, 0), }, }, }, }, }, "permission-with-regex": { provider: &oktaProvider, perm: pWithRegex, route: "/", expected: &envoy_http_jwt_authn_v3.RequirementRule{ Match: &envoy_route_v3.RouteMatch{PathSpecifier: &envoy_route_v3.RouteMatch_SafeRegex{ SafeRegex: makeEnvoyRegexMatch(pWithRegex.HTTP.PathRegex), }}, RequirementType: &envoy_http_jwt_authn_v3.RequirementRule_Requires{ Requires: &envoy_http_jwt_authn_v3.JwtRequirement{ RequiresType: &envoy_http_jwt_authn_v3.JwtRequirement_ProviderName{ ProviderName: makeComputedProviderName(oktaProvider.Name, pWithRegex, 0), }, }, }, }, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { res := buildRouteRule(tt.provider, tt.perm, tt.route, 0) require.Equal(t, res, tt.expected) }) } } func TestHasJWTconfig(t *testing.T) { tests := map[string]struct { perms []*structs.IntentionPermission expected bool }{ "empty-permissions": { perms: []*structs.IntentionPermission{}, expected: false, }, "nil-permissions": { perms: nil, expected: false, }, "permissions-with-no-jwt": { perms: []*structs.IntentionPermission{pWithNoJWT}, expected: false, }, "permissions-with-one-jwt": { perms: []*structs.IntentionPermission{pWithOktaProvider, pWithNoJWT}, expected: true, }, "permissions-with-multiple-jwt": { perms: []*structs.IntentionPermission{pWithMultiProviders, pWithNoJWT}, expected: true, }, } for name, tt := range tests { tt := tt t.Run(name, func(t *testing.T) { res := hasJWTconfig(tt.perms) require.Equal(t, res, tt.expected) }) } }