Tokens for Testing
Compatible with
* OAuth2
* OpenID Connect (OIDC)
* JOSE (Signed Access Tokens)
  * JWT
  * JWK
  * JWS
Resources
  * https://mock.pocketid.app/access_token
  * https://mock.pocketid.app/authorization_header
  * https://mock.pocketid.app/inspect_token
  * https://xxx.mock.pocketid.app/.well-known/openid-configuration
  * https://xxx.mock.pocketid.app/.well-known/jwks.json
  * https://mock.pocketid.app/key.jwk.json
  * POST https://xxx.mock.pocketid.app/api/jwks
    { "kty":"EC", "crv":"P-256", "x":"xxx", "y":"yyy" }
  * GET  https://xxx.mock.pocketid.app/.well-known/jwks.json
Get a token
Get a verifiable access token
  https://mock.pocketid.app/access_token
For example:
  TOKEN=$(curl -fL https://mock.pocketid.app/access_token)
You can set the expiration (`exp`) with query parameters:
  * https://mock.pocketid.app/access_token?exp=90d (+90 days)
  * https://mock.pocketid.app/access_token?exp=3h (+3 hours)
  * https://mock.pocketid.app/access_token?exp=15m (+15 minutes)
  * https://mock.pocketid.app/access_token?exp=1565739000 (exactly 2019-08-13 5:30pm)
(you can also get the whole header)
  https://mock.pocketid.app/authorization_header
For example:
  HEADER=$(curl -fL https://mock.pocketid.app/authorization_header)
  # Authorization: Bearer <token>
Inspecting the Token
You can see its decoded form at the `inspect_token` endpoint:
  curl -fL https://mock.pocketid.app/inspect_token \
    -H "$(curl -fL https://mock.pocketid.app/authorization_header)"
The Token, Decoded
The Token will look like this:
  eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiIsImtpZCI6IlU1Ym0tQUxtSVFOQ3hfMlFPT1piSm5Ec0d1aEd4WkRnV053alNqck5IbzQifQ.eyJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjQwODAvIiwic3ViIjoiZHVtbXkiLCJleHAiOjE1NjI4NzEyNTh9.PWK2eTDQcVCpT_weogKuh4bHInnjqY6TGSnQzwEIc133WnJ1eUmLjq799COxSW7Dr6Khm1Po-CAXGVwCADIBEw
The first part is the JWS protected header.
Decoded, it looks like this:
  {"typ":"JWT","alg":"ES256","kid":"U5bm-ALmIQNCx_2QOOZbJnDsGuhGxZDgWNwjSjrNHo4"}
The second part is the JWS payload of JWT claims.
Decoded, it looks like this:
  {"iss":"http://localhost:4080/","sub":"dummy","exp":1562871258}
The third part is the signature.
It can't be "decoded", per se. It's two positive 32-bit BigInts called R and S, padded with zeros to fill out all the bytes.
Validate the Issuer
The token be signed and verifiable.
If the token issuer (iss) is "https://mock.pocketid.app/"
  * the key url (jwks_uri) will be found at "https://mock.pocketid.app/.well-known/openid-configuration"
  * which will point to "https://mock.pocketid.app/.well-known/jwks.json"
  * where there will be a key whose thumbprint (kid) matches that in the token
The public key found there will look like this:
  { "crv":"P-256"
  , "x":"ToL2HppsTESXQKvp7ED6NMgV4YnwbMeONexNry3KDNQ"
  , "y":"Tt6Q3rxU37KAinUV9PLMlwosNy1t3Bf2VDg5q955AGc"
  }
Get the Private Key
In truth, there's only one private key right now.
  https://mock.pocketid.app/key.jwk.json
You shouldn't use it for automated testing, because it will change, but it looks like this:
  { "crv":"P-256"
  , "x":"ToL2HppsTESXQKvp7ED6NMgV4YnwbMeONexNry3KDNQ"
  , "y":"Tt6Q3rxU37KAinUV9PLMlwosNy1t3Bf2VDg5q955AGc"
  , "d":"GYAwlBHc2mPsj1lp315HbYOmKNJ7esmO3JAkZVn9nJs"
  }