|
@@ -0,0 +1,195 @@
|
|
|
+/*
|
|
|
+ * Copyright 2021 the original author or authors.
|
|
|
+ *
|
|
|
+ * Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
+ * you may not use this file except in compliance with the License.
|
|
|
+ * You may obtain a copy of the License at
|
|
|
+ *
|
|
|
+ * https://www.apache.org/licenses/LICENSE-2.0
|
|
|
+ *
|
|
|
+ * Unless required by applicable law or agreed to in writing, software
|
|
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ * See the License for the specific language governing permissions and
|
|
|
+ * limitations under the License.
|
|
|
+ */
|
|
|
+
|
|
|
+package example;
|
|
|
+
|
|
|
+import java.util.Map;
|
|
|
+
|
|
|
+import com.fasterxml.jackson.core.type.TypeReference;
|
|
|
+import com.fasterxml.jackson.databind.ObjectMapper;
|
|
|
+import org.junit.jupiter.api.Test;
|
|
|
+
|
|
|
+import org.springframework.beans.factory.annotation.Autowired;
|
|
|
+import org.springframework.boot.test.autoconfigure.web.servlet.AutoConfigureMockMvc;
|
|
|
+import org.springframework.boot.test.context.SpringBootTest;
|
|
|
+import org.springframework.http.HttpHeaders;
|
|
|
+import org.springframework.mock.web.MockHttpServletRequest;
|
|
|
+import org.springframework.test.context.ActiveProfiles;
|
|
|
+import org.springframework.test.web.servlet.MockMvc;
|
|
|
+import org.springframework.test.web.servlet.MvcResult;
|
|
|
+import org.springframework.test.web.servlet.request.RequestPostProcessor;
|
|
|
+
|
|
|
+import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post;
|
|
|
+import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.jsonPath;
|
|
|
+import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
|
|
+
|
|
|
+/**
|
|
|
+ * Integration tests for {@link OAuth2AuthorizationServerApplication}.
|
|
|
+ *
|
|
|
+ * @author Steve Riesenberg
|
|
|
+ */
|
|
|
+@SpringBootTest
|
|
|
+@AutoConfigureMockMvc
|
|
|
+@ActiveProfiles("test")
|
|
|
+public class OAuth2AuthorizationServerApplicationITests {
|
|
|
+
|
|
|
+ private static final String CLIENT_ID = "messaging-client";
|
|
|
+
|
|
|
+ private static final String CLIENT_SECRET = "secret";
|
|
|
+
|
|
|
+ private final ObjectMapper objectMapper = new ObjectMapper();
|
|
|
+
|
|
|
+ @Autowired
|
|
|
+ private MockMvc mockMvc;
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performTokenRequestWhenValidClientCredentialsThenOk() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/token")
|
|
|
+ .param("grant_type", "client_credentials")
|
|
|
+ .param("scope", "message:read")
|
|
|
+ .with(basicAuth(CLIENT_ID, CLIENT_SECRET)))
|
|
|
+ .andExpect(status().isOk())
|
|
|
+ .andExpect(jsonPath("$.access_token").isString())
|
|
|
+ .andExpect(jsonPath("$.expires_in").isNumber())
|
|
|
+ .andExpect(jsonPath("$.scope").value("message:read"))
|
|
|
+ .andExpect(jsonPath("$.token_type").value("Bearer"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performTokenRequestWhenMissingScopeThenOk() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/token")
|
|
|
+ .param("grant_type", "client_credentials")
|
|
|
+ .param("scope", "message:read message:write")
|
|
|
+ .with(basicAuth(CLIENT_ID, CLIENT_SECRET)))
|
|
|
+ .andExpect(status().isOk())
|
|
|
+ .andExpect(jsonPath("$.access_token").isString())
|
|
|
+ .andExpect(jsonPath("$.expires_in").isNumber())
|
|
|
+ .andExpect(jsonPath("$.scope").value("message:read message:write"))
|
|
|
+ .andExpect(jsonPath("$.token_type").value("Bearer"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performTokenRequestWhenInvalidClientCredentialsThenUnauthorized() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/token")
|
|
|
+ .param("grant_type", "client_credentials")
|
|
|
+ .param("scope", "message:read")
|
|
|
+ .with(basicAuth("bad", "password")))
|
|
|
+ .andExpect(status().isUnauthorized())
|
|
|
+ .andExpect(jsonPath("$.error").value("invalid_client"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performTokenRequestWhenMissingGrantTypeThenUnauthorized() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/token")
|
|
|
+ .with(basicAuth("bad", "password")))
|
|
|
+ .andExpect(status().isUnauthorized())
|
|
|
+ .andExpect(jsonPath("$.error").value("invalid_client"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performTokenRequestWhenGrantTypeNotRegisteredThenBadRequest() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/token")
|
|
|
+ .param("grant_type", "client_credentials")
|
|
|
+ .with(basicAuth("login-client", "openid-connect")))
|
|
|
+ .andExpect(status().isBadRequest())
|
|
|
+ .andExpect(jsonPath("$.error").value("unauthorized_client"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performIntrospectionRequestWhenValidTokenThenOk() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/introspect")
|
|
|
+ .param("token", getAccessToken())
|
|
|
+ .with(basicAuth(CLIENT_ID, CLIENT_SECRET)))
|
|
|
+ .andExpect(status().isOk())
|
|
|
+ .andExpect(jsonPath("$.active").value("true"))
|
|
|
+ .andExpect(jsonPath("$.aud[0]").value(CLIENT_ID))
|
|
|
+ .andExpect(jsonPath("$.client_id").value(CLIENT_ID))
|
|
|
+ .andExpect(jsonPath("$.exp").isNumber())
|
|
|
+ .andExpect(jsonPath("$.iat").isNumber())
|
|
|
+ .andExpect(jsonPath("$.iss").value("http://localhost:9000"))
|
|
|
+ .andExpect(jsonPath("$.nbf").isNumber())
|
|
|
+ .andExpect(jsonPath("$.scope").value("message:read"))
|
|
|
+ .andExpect(jsonPath("$.sub").value(CLIENT_ID))
|
|
|
+ .andExpect(jsonPath("$.token_type").value("Bearer"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ void performIntrospectionRequestWhenInvalidCredentialsThenUnauthorized() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ this.mockMvc.perform(post("/oauth2/introspect")
|
|
|
+ .param("token", getAccessToken())
|
|
|
+ .with(basicAuth("bad", "password")))
|
|
|
+ .andExpect(status().isUnauthorized())
|
|
|
+ .andExpect(jsonPath("$.error").value("invalid_client"));
|
|
|
+ // @formatter:on
|
|
|
+ }
|
|
|
+
|
|
|
+ private String getAccessToken() throws Exception {
|
|
|
+ // @formatter:off
|
|
|
+ MvcResult mvcResult = this.mockMvc.perform(post("/oauth2/token")
|
|
|
+ .param("grant_type", "client_credentials")
|
|
|
+ .param("scope", "message:read")
|
|
|
+ .with(basicAuth(CLIENT_ID, CLIENT_SECRET)))
|
|
|
+ .andExpect(status().isOk())
|
|
|
+ .andExpect(jsonPath("$.access_token").exists())
|
|
|
+ .andReturn();
|
|
|
+ // @formatter:on
|
|
|
+
|
|
|
+ String tokenResponseJson = mvcResult.getResponse().getContentAsString();
|
|
|
+ Map<String, Object> tokenResponse = this.objectMapper.readValue(tokenResponseJson, new TypeReference<>() {
|
|
|
+ });
|
|
|
+
|
|
|
+ return tokenResponse.get("access_token").toString();
|
|
|
+ }
|
|
|
+
|
|
|
+ private static BasicAuthenticationRequestPostProcessor basicAuth(String username, String password) {
|
|
|
+ return new BasicAuthenticationRequestPostProcessor(username, password);
|
|
|
+ }
|
|
|
+
|
|
|
+ private static final class BasicAuthenticationRequestPostProcessor implements RequestPostProcessor {
|
|
|
+
|
|
|
+ private final String username;
|
|
|
+
|
|
|
+ private final String password;
|
|
|
+
|
|
|
+ private BasicAuthenticationRequestPostProcessor(String username, String password) {
|
|
|
+ this.username = username;
|
|
|
+ this.password = password;
|
|
|
+ }
|
|
|
+
|
|
|
+ @Override
|
|
|
+ public MockHttpServletRequest postProcessRequest(MockHttpServletRequest request) {
|
|
|
+ HttpHeaders headers = new HttpHeaders();
|
|
|
+ headers.setBasicAuth(this.username, this.password);
|
|
|
+ request.addHeader("Authorization", headers.getFirst("Authorization"));
|
|
|
+ return request;
|
|
|
+ }
|
|
|
+
|
|
|
+ }
|
|
|
+
|
|
|
+}
|