|
@@ -59,6 +59,7 @@ import org.springframework.security.web.authentication.AuthenticationFailureHand
|
|
|
import org.springframework.security.web.authentication.AuthenticationSuccessHandler;
|
|
|
import org.springframework.security.web.authentication.WebAuthenticationDetails;
|
|
|
import org.springframework.util.StringUtils;
|
|
|
+import org.springframework.web.util.UriComponentsBuilder;
|
|
|
|
|
|
import static org.assertj.core.api.Assertions.assertThat;
|
|
|
import static org.assertj.core.api.Assertions.assertThatThrownBy;
|
|
@@ -78,6 +79,7 @@ import static org.mockito.Mockito.when;
|
|
|
* @author Daniel Garnier-Moiroux
|
|
|
* @author Anoop Garlapati
|
|
|
* @author Dmitriy Dubson
|
|
|
+ * @author Greg Li
|
|
|
* @since 0.0.1
|
|
|
*/
|
|
|
public class OAuth2AuthorizationEndpointFilterTests {
|
|
@@ -170,7 +172,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.RESPONSE_TYPE,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.removeParameter(OAuth2ParameterNames.RESPONSE_TYPE));
|
|
|
+ request -> {
|
|
|
+ request.removeParameter(OAuth2ParameterNames.RESPONSE_TYPE);
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -179,7 +184,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.RESPONSE_TYPE,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.addParameter(OAuth2ParameterNames.RESPONSE_TYPE, "id_token"));
|
|
|
+ request -> {
|
|
|
+ request.addParameter(OAuth2ParameterNames.RESPONSE_TYPE, "id_token");
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -188,7 +196,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.RESPONSE_TYPE,
|
|
|
OAuth2ErrorCodes.UNSUPPORTED_RESPONSE_TYPE,
|
|
|
- request -> request.setParameter(OAuth2ParameterNames.RESPONSE_TYPE, "id_token"));
|
|
|
+ request -> {
|
|
|
+ request.setParameter(OAuth2ParameterNames.RESPONSE_TYPE, "id_token");
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -197,7 +208,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.CLIENT_ID,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.removeParameter(OAuth2ParameterNames.CLIENT_ID));
|
|
|
+ request -> {
|
|
|
+ request.removeParameter(OAuth2ParameterNames.CLIENT_ID);
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -206,7 +220,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.CLIENT_ID,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.addParameter(OAuth2ParameterNames.CLIENT_ID, "client-2"));
|
|
|
+ request -> {
|
|
|
+ request.addParameter(OAuth2ParameterNames.CLIENT_ID, "client-2");
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -215,7 +232,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.REDIRECT_URI,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.addParameter(OAuth2ParameterNames.REDIRECT_URI, "https://example2.com"));
|
|
|
+ request -> {
|
|
|
+ request.addParameter(OAuth2ParameterNames.REDIRECT_URI, "https://example2.com");
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -224,7 +244,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.SCOPE,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.addParameter(OAuth2ParameterNames.SCOPE, "scope2"));
|
|
|
+ request -> {
|
|
|
+ request.addParameter(OAuth2ParameterNames.SCOPE, "scope2");
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -233,7 +256,10 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
TestRegisteredClients.registeredClient().build(),
|
|
|
OAuth2ParameterNames.STATE,
|
|
|
OAuth2ErrorCodes.INVALID_REQUEST,
|
|
|
- request -> request.addParameter(OAuth2ParameterNames.STATE, "state2"));
|
|
|
+ request -> {
|
|
|
+ request.addParameter(OAuth2ParameterNames.STATE, "state2");
|
|
|
+ updateQueryString(request);
|
|
|
+ });
|
|
|
}
|
|
|
|
|
|
@Test
|
|
@@ -263,6 +289,7 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
request -> {
|
|
|
request.addParameter(PkceParameterNames.CODE_CHALLENGE, "code-challenge");
|
|
|
request.addParameter(PkceParameterNames.CODE_CHALLENGE, "another-code-challenge");
|
|
|
+ updateQueryString(request);
|
|
|
});
|
|
|
}
|
|
|
|
|
@@ -275,6 +302,7 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
request -> {
|
|
|
request.addParameter(PkceParameterNames.CODE_CHALLENGE_METHOD, "S256");
|
|
|
request.addParameter(PkceParameterNames.CODE_CHALLENGE_METHOD, "S256");
|
|
|
+ updateQueryString(request);
|
|
|
});
|
|
|
}
|
|
|
|
|
@@ -557,6 +585,7 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
|
|
|
MockHttpServletRequest request = createAuthorizationRequest(registeredClient);
|
|
|
request.addParameter("custom-param", "custom-value-1", "custom-value-2");
|
|
|
+ updateQueryString(request);
|
|
|
|
|
|
MockHttpServletResponse response = new MockHttpServletResponse();
|
|
|
FilterChain filterChain = mock(FilterChain.class);
|
|
@@ -602,6 +631,7 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
|
|
|
MockHttpServletRequest request = createAuthorizationRequest(registeredClient);
|
|
|
request.setMethod("POST"); // OpenID Connect supports POST method
|
|
|
+ request.setQueryString(null);
|
|
|
MockHttpServletResponse response = new MockHttpServletResponse();
|
|
|
FilterChain filterChain = mock(FilterChain.class);
|
|
|
|
|
@@ -656,6 +686,7 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
request.addParameter(OAuth2ParameterNames.SCOPE,
|
|
|
StringUtils.collectionToDelimitedString(registeredClient.getScopes(), " "));
|
|
|
request.addParameter(OAuth2ParameterNames.STATE, "state");
|
|
|
+ updateQueryString(request);
|
|
|
|
|
|
return request;
|
|
|
}
|
|
@@ -673,6 +704,18 @@ public class OAuth2AuthorizationEndpointFilterTests {
|
|
|
return request;
|
|
|
}
|
|
|
|
|
|
+ private static void updateQueryString(MockHttpServletRequest request) {
|
|
|
+ UriComponentsBuilder uriBuilder = UriComponentsBuilder.fromUriString(request.getRequestURI());
|
|
|
+ request.getParameterMap().forEach((key, values) -> {
|
|
|
+ if (values.length > 0) {
|
|
|
+ for (String value : values) {
|
|
|
+ uriBuilder.queryParam(key, value);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ });
|
|
|
+ request.setQueryString(uriBuilder.build().getQuery());
|
|
|
+ }
|
|
|
+
|
|
|
private static String scopeCheckbox(String scope) {
|
|
|
return MessageFormat.format(
|
|
|
"<input class=\"form-check-input\" type=\"checkbox\" name=\"scope\" value=\"{0}\" id=\"{0}\">",
|