ory-am/hydra

View on GitHub
internal/certification/IT.F.T.T.s/OP-scope-profile.txt

Summary

Maintainability
Test Coverage
Test tool version: 2.1.3
Issuer: https://oidc-certification.ory.sh:8443/
Profile: []
Test ID: OP-scope-profile
Test description: Scope requesting profile claims
Timestamp: 2018-06-23T11:25:00Z

============================================================

Trace output

0.0 phase <--<-- 0 --- Webfinger -->-->
0.0 not expected to do WebFinger
0.0 phase <--<-- 1 --- Discovery -->-->
0.0 provider_config kwargs:{'issuer': 'https://oidc-certification.ory.sh:8443/'}
0.074 http response url:https://oidc-certification.ory.sh:8443/.well-known/openid-configuration status_code:200
0.076 ProviderConfigurationResponse {
    "authorization_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/auth",
    "claims_parameter_supported": false,
    "claims_supported": [
        "sub"
    ],
    "grant_types_supported": [
        "authorization_code",
        "implicit",
        "client_credentials",
        "refresh_token"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "issuer": "https://oidc-certification.ory.sh:8443/",
    "jwks_uri": "https://oidc-certification.ory.sh:8443/.well-known/jwks.json",
    "registration_endpoint": "https://oidc-certification.ory.sh:8443/clients",
    "request_parameter_supported": true,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": true,
    "response_modes_supported": [
        "query",
        "fragment"
    ],
    "response_types_supported": [
        "code",
        "code id_token",
        "id_token",
        "token id_token",
        "token",
        "token id_token code"
    ],
    "scopes_supported": [
        "offline",
        "openid"
    ],
    "subject_types_supported": [
        "pairwise",
        "public"
    ],
    "token_endpoint": "https://oidc-certification.ory.sh:8443/oauth2/token",
    "token_endpoint_auth_methods_supported": [
        "client_secret_post",
        "client_secret_basic",
        "private_key_jwt",
        "none"
    ],
    "userinfo_endpoint": "https://oidc-certification.ory.sh:8443/userinfo",
    "userinfo_signing_alg_values_supported": [
        "none",
        "RS256"
    ],
    "version": "3.0"
}
0.076 phase <--<-- 2 --- Registration -->-->
0.076 register kwargs:{'application_name': 'OIC test tool', 'response_types': ['id_token token'], 'contacts': ['roland@example.com'], 'redirect_uris': ['https://op.certification.openid.net:61353/authz_cb'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61353/logout'], 'jwks_uri': 'https://op.certification.openid.net:61353/static/jwks_61353.json', 'grant_types': ['implicit'], 'application_type': 'web', 'url': 'https://oidc-certification.ory.sh:8443/clients'}
0.076 RegistrationRequest {
    "application_type": "web",
    "contacts": [
        "roland@example.com"
    ],
    "grant_types": [
        "implicit"
    ],
    "jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
    "post_logout_redirect_uris": [
        "https://op.certification.openid.net:61353/logout"
    ],
    "redirect_uris": [
        "https://op.certification.openid.net:61353/authz_cb"
    ],
    "request_uris": [
        "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RhttwRMa8jPNFTFG"
    ],
    "response_types": [
        "id_token token"
    ]
}
0.268 http response url:https://oidc-certification.ory.sh:8443/clients status_code:201
0.269 RegistrationResponse {
    "client_id": "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba",
    "client_secret": "bte5w8SbBuu5",
    "client_secret_expires_at": 0,
    "contacts": [
        "roland@example.com"
    ],
    "grant_types": [
        "implicit"
    ],
    "id": "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba",
    "jwks_uri": "https://op.certification.openid.net:61353/static/jwks_61353.json",
    "public": false,
    "redirect_uris": [
        "https://op.certification.openid.net:61353/authz_cb"
    ],
    "request_uris": [
        "https://op.certification.openid.net:61353/requests/e3ecc141f5419bd33d25d760861d32323144d583feaf26eb1b5cbf20147608b9#RhttwRMa8jPNFTFG"
    ],
    "response_types": [
        "id_token token"
    ],
    "scope": "openid offline offline_access profile email address phone",
    "token_endpoint_auth_method": "client_secret_basic",
    "userinfo_signed_response_alg": "none"
}
0.269 phase <--<-- 3 --- AsyncAuthn -->-->
0.269 condition Check support: status=WARNING, message=No support for: scopes_supported=['profile']
0.269 AuthorizationRequest {
    "client_id": "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba",
    "nonce": "r6CGOk4IYITMes5l",
    "redirect_uri": "https://op.certification.openid.net:61353/authz_cb",
    "response_type": "id_token token",
    "scope": "openid profile",
    "state": "2gSKdcE9yftQQC7k"
}
0.269 redirect url https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db0a70da-0fe9-4e51-a3c8-b231d6eab4ba&state=2gSKdcE9yftQQC7k&response_type=id_token+token&nonce=r6CGOk4IYITMes5l
0.269 redirect https://oidc-certification.ory.sh:8443/oauth2/auth?scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61353%2Fauthz_cb&client_id=db0a70da-0fe9-4e51-a3c8-b231d6eab4ba&state=2gSKdcE9yftQQC7k&response_type=id_token+token&nonce=r6CGOk4IYITMes5l
2.634 http args {}
2.808 response URL with fragment
2.808 response access_token=UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ&expires_in=3599&id_token=eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibTRJb1FzbUFqdFB3UVI5YllwTGI3ZyIsImF1ZCI6WyJkYjBhNzBkYS0wZmU5LTRlNTEtYTNjOC1iMjMxZDZlYWI0YmEiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTksImlhdCI6MTUyOTc1MzA5OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNjUzMTU4OTAtNzUzMS00YTA3LTkwM2EtMWJhMzljZWM0NzM3Iiwibm9uY2UiOiJyNkNHT2s0SVlJVE1lczVsIiwicmF0IjoxNTI5NzUzMDk3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.E_VnZnt91QlLFyk0tad_26U6x0C_Y6DLSeXTVofYiHnbzyoqbozhxR9uSSWAT_m-_EGy6ahOyRK31_j31fII5BsfwJB911En2puSfxLZd2FGu5YHAWn9HQyQ_zYrFnI1Ly6uP3ZuWU22xGru8eBhq5hD72td3oHJQ_yoyQBhF9eRAzL72fjcPb9OwphypqaYx_7ofI9iew9cM41qoygMJdzKkaz2xlhzf3JnF6yIuf28XNeKKBxXwBMeDk6iWNWOtw6TvYatcJjBRGmdW_V6pxBJJkoxGZ7wTNWY9MORD1giGsiW3wpwwKx1WPWdHgqcvglN0NUIrse_DmWiEWeejcIGJlVzd_5lMfICBucQocG30sVqWHF3pRMhrAT3ytN6dR8SVFb_o_LNj8q_fC2sixEadVV0NaGOpCSaZfQKTQmFNs1AYmtNqP_X5TYAqBYARLxHAHhlHI6fUyP5H4GqTn5CMOQ--6peax72dgg4Yr_iPwm7j1JKGSlWEJEb0taXcNl5iDwVWyVPCMHiOYUL2ghKJPWJ_mMOy2nAmK1vQ_RSZc1nTO873vY5IRRJdmZrPxkac480EQhTaJAsZ_o-oiBLfrmvpnLgwnTZTkCjTmLEH0zFnEzValX-Z9A-CLf3C0Vg_ufQFUmuWzngvDfbjaZWfMwhpzLXfivlgPacAH4&scope=openid%20profile&state=2gSKdcE9yftQQC7k&token_type=bearer
2.809 response {'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6InB1YmxpYzo0YWU0OWJmNC05ZGEwLTRhODItYmNjZS04OTNjMzcyOWYyMmEiLCJ0eXAiOiJKV1QifQ.eyJhdF9oYXNoIjoibTRJb1FzbUFqdFB3UVI5YllwTGI3ZyIsImF1ZCI6WyJkYjBhNzBkYS0wZmU5LTRlNTEtYTNjOC1iMjMxZDZlYWI0YmEiXSwiYXV0aF90aW1lIjoxNTI5NzUzMDA5LCJleHAiOjE1Mjk3NTY2OTksImlhdCI6MTUyOTc1MzA5OSwiaXNzIjoiaHR0cHM6Ly9vaWRjLWNlcnRpZmljYXRpb24ub3J5LnNoOjg0NDMvIiwianRpIjoiNjUzMTU4OTAtNzUzMS00YTA3LTkwM2EtMWJhMzljZWM0NzM3Iiwibm9uY2UiOiJyNkNHT2s0SVlJVE1lczVsIiwicmF0IjoxNTI5NzUzMDk3LCJzdWIiOiJmb29AYmFyLmNvbSJ9.E_VnZnt91QlLFyk0tad_26U6x0C_Y6DLSeXTVofYiHnbzyoqbozhxR9uSSWAT_m-_EGy6ahOyRK31_j31fII5BsfwJB911En2puSfxLZd2FGu5YHAWn9HQyQ_zYrFnI1Ly6uP3ZuWU22xGru8eBhq5hD72td3oHJQ_yoyQBhF9eRAzL72fjcPb9OwphypqaYx_7ofI9iew9cM41qoygMJdzKkaz2xlhzf3JnF6yIuf28XNeKKBxXwBMeDk6iWNWOtw6TvYatcJjBRGmdW_V6pxBJJkoxGZ7wTNWY9MORD1giGsiW3wpwwKx1WPWdHgqcvglN0NUIrse_DmWiEWeejcIGJlVzd_5lMfICBucQocG30sVqWHF3pRMhrAT3ytN6dR8SVFb_o_LNj8q_fC2sixEadVV0NaGOpCSaZfQKTQmFNs1AYmtNqP_X5TYAqBYARLxHAHhlHI6fUyP5H4GqTn5CMOQ--6peax72dgg4Yr_iPwm7j1JKGSlWEJEb0taXcNl5iDwVWyVPCMHiOYUL2ghKJPWJ_mMOy2nAmK1vQ_RSZc1nTO873vY5IRRJdmZrPxkac480EQhTaJAsZ_o-oiBLfrmvpnLgwnTZTkCjTmLEH0zFnEzValX-Z9A-CLf3C0Vg_ufQFUmuWzngvDfbjaZWfMwhpzLXfivlgPacAH4', 'scope': 'openid profile', 'access_token': 'UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ', 'state': '2gSKdcE9yftQQC7k', 'expires_in': 3599, 'token_type': 'bearer'}
2.899 AuthorizationResponse {
    "access_token": "UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ",
    "expires_in": 3599,
    "id_token": {
        "at_hash": "m4IoQsmAjtPwQR9bYpLb7g",
        "aud": [
            "db0a70da-0fe9-4e51-a3c8-b231d6eab4ba"
        ],
        "auth_time": 1529753009,
        "exp": 1529756699,
        "iat": 1529753099,
        "iss": "https://oidc-certification.ory.sh:8443/",
        "jti": "65315890-7531-4a07-903a-1ba39cec4737",
        "nonce": "r6CGOk4IYITMes5l",
        "rat": 1529753097,
        "sub": "foo@bar.com"
    },
    "scope": "openid profile",
    "state": "2gSKdcE9yftQQC7k",
    "token_type": "bearer"
}
2.899 phase <--<-- 4 --- AccessToken -->-->
2.899 phase <--<-- 5 --- UserInfo -->-->
2.899 do_user_info_request kwargs:{'state': '2gSKdcE9yftQQC7k', 'method': 'GET', 'authn_method': 'bearer_header'}
2.899 request {'body': None}
2.899 request_url https://oidc-certification.ory.sh:8443/userinfo
2.899 request_http_args {'headers': {'Authorization': 'Bearer UUq_jnvP3KR0u88xAGIPtVLf2LxgEs8w1fexBXsYek8.JLFdtUXtee9cn1nrmTYDwZjEgdUeB3OvoK52af9ZQhQ'}}
3.008 http response url:https://oidc-certification.ory.sh:8443/userinfo status_code:200
3.009 OpenIDSchema {
    "sub": "foo@bar.com"
}
3.009 OpenIDSchema {
    "sub": "foo@bar.com"
}
3.009 phase <--<-- 6 --- Done -->-->
3.009 end 
3.01 assertion CheckHTTPResponse
3.01 condition check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
3.01 assertion VerifyResponse
3.01 condition verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
3.011 assertion VerifyScopes
3.011 condition verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
3.011 condition Done: status=OK



============================================================

Conditions

Check support: status=WARNING, message=No support for: scopes_supported=['profile']
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username'] [Verifies that the claims corresponding to the requested scopes are returned]
Done: status=OK



============================================================

RESULT: WARNING
Warnings:
No support for: scopes_supported=['profile']
The following claims were missing from the returned information: ['name', 'given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username']