فهرست منبع

Simplify hellowebfluxfn

This sample should be absolute minimal example
Rob Winch 8 سال پیش
والد
کامیت
1fe414379c

+ 21 - 118
samples/javaconfig/hellowebfluxfn/src/integration-test/java/sample/HelloWebfluxFnApplicationITests.java

@@ -15,13 +15,14 @@
  */
 package sample;
 
+import java.time.Duration;
+
 import org.junit.Before;
 import org.junit.Test;
 import org.junit.runner.RunWith;
+
 import org.springframework.beans.factory.annotation.Value;
-import org.springframework.http.HttpHeaders;
-import org.springframework.http.HttpStatus;
-import org.springframework.security.web.server.header.ContentTypeOptionsHttpHeadersWriter;
+import org.springframework.http.ResponseCookie;
 import org.springframework.test.context.ContextConfiguration;
 import org.springframework.test.context.TestPropertySource;
 import org.springframework.test.context.junit4.SpringRunner;
@@ -29,10 +30,6 @@ import org.springframework.test.web.reactive.server.ExchangeResult;
 import org.springframework.test.web.reactive.server.WebTestClient;
 import org.springframework.web.reactive.function.client.ExchangeFilterFunction;
 
-import java.nio.charset.Charset;
-import java.time.Duration;
-import java.util.Base64;
-
 import static org.springframework.web.reactive.function.client.ExchangeFilterFunctions.basicAuthentication;
 
 /**
@@ -57,161 +54,67 @@ public class HelloWebfluxFnApplicationITests {
 	}
 
 	@Test
-	public void basicRequired() throws Exception {
+	public void basicWhenNoCredentialsThenUnauthorized() throws Exception {
 		this.rest
 			.get()
-			.uri("/users")
+			.uri("/")
 			.exchange()
 			.expectStatus().isUnauthorized();
 	}
 
 	@Test
-	public void basicWorks() throws Exception {
+	public void basicWhenValidCredentialsThenOk() throws Exception {
 		this.rest
 			.mutate()
-			.filter(robsCredentials())
+			.filter(userCredentials())
 			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
 			.expectStatus().isOk()
-			.expectBody().json("{\"username\":\"rob\"}");
+			.expectBody().json("{\"message\":\"Hello user!\"}");
 	}
 
 	@Test
-	public void basicWhenPasswordInvalid401() throws Exception {
+	public void basicWhenInvalidCredentialsThenUnauthorized() throws Exception {
 		this.rest
 			.mutate()
 			.filter(invalidPassword())
 			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
 			.expectStatus().isUnauthorized()
 			.expectBody().isEmpty();
 	}
 
-	@Test
-	public void authorizationAdmin403() throws Exception {
-		this.rest
-			.mutate()
-			.filter(robsCredentials())
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isEqualTo(HttpStatus.FORBIDDEN)
-			.expectBody().isEmpty();
-	}
-
-	@Test
-	public void authorizationAdmin200() throws Exception {
-		this.rest
-			.mutate()
-			.filter(adminCredentials())
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isOk();
-	}
-
-	@Test
-	public void basicMissingUser401() throws Exception {
-		this.rest
-			.mutate()
-			.filter(basicAuthentication("missing-user", "password"))
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
-	@Test
-	public void basicInvalidPassword401() throws Exception {
-		this.rest
-			.mutate()
-			.filter(invalidPassword())
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
-	@Test
-	public void basicInvalidParts401() throws Exception {
-		this.rest
-			.get()
-			.uri("/admin")
-			.header("Authorization", "Basic " + base64Encode("no colon"))
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
 	@Test
 	public void sessionWorks() throws Exception {
 		ExchangeResult result = this.rest
 			.mutate()
-			.filter(robsCredentials())
+			.filter(userCredentials())
 			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
+			.expectStatus().isOk()
 			.returnResult(String.class);
 
-		String session = result.getResponseHeaders().getFirst("Set-Cookie");
+		ResponseCookie session = result.getResponseCookies().getFirst("SESSION");
 
 		this.rest
 			.get()
-			.uri("/principal")
-			.header("Cookie", session)
+			.uri("/")
+			.cookie(session.getName(), session.getValue())
 			.exchange()
 			.expectStatus().isOk();
 	}
 
-	@Test
-	public void principal() throws Exception {
-		this.rest
-			.mutate()
-			.filter(robsCredentials())
-			.build()
-			.get()
-			.uri("/principal")
-			.exchange()
-			.expectStatus().isOk()
-			.expectBody().json("{\"username\" : \"rob\"}");
-	}
-
-	@Test
-	public void headers() throws Exception {
-		this.rest
-			.mutate()
-			.filter(robsCredentials())
-			.build()
-			.get()
-			.uri("/principal")
-			.exchange()
-			.expectHeader().valueEquals(HttpHeaders.CACHE_CONTROL, "no-cache, no-store, max-age=0, must-revalidate")
-			.expectHeader().valueEquals(HttpHeaders.EXPIRES, "0")
-			.expectHeader().valueEquals(HttpHeaders.PRAGMA, "no-cache")
-			.expectHeader().valueEquals(ContentTypeOptionsHttpHeadersWriter.X_CONTENT_OPTIONS, ContentTypeOptionsHttpHeadersWriter.NOSNIFF);
-	}
-
-	private ExchangeFilterFunction robsCredentials() {
-		return basicAuthentication("rob","rob");
+	private ExchangeFilterFunction userCredentials() {
+		return basicAuthentication("user","user");
 	}
 
 	private ExchangeFilterFunction invalidPassword() {
-		return basicAuthentication("rob","INVALID");
-	}
-
-	private ExchangeFilterFunction adminCredentials() {
-		return basicAuthentication("admin","admin");
-	}
-
-	private String base64Encode(String value) {
-		return Base64.getEncoder().encodeToString(value.getBytes(Charset.defaultCharset()));
+		return basicAuthentication("user","INVALID");
 	}
 }

+ 14 - 24
samples/javaconfig/hellowebfluxfn/src/main/java/sample/UserController.java → samples/javaconfig/hellowebfluxfn/src/main/java/sample/HelloUserController.java

@@ -16,40 +16,30 @@
 
 package sample;
 
+import java.security.Principal;
+import java.util.Collections;
+
+import reactor.core.publisher.Mono;
+
 import org.springframework.http.MediaType;
-import org.springframework.security.core.Authentication;
-import org.springframework.security.core.userdetails.User;
-import org.springframework.security.web.server.context.SecurityContextRepository;
-import org.springframework.security.web.server.context.WebSessionSecurityContextRepository;
 import org.springframework.stereotype.Component;
 import org.springframework.web.reactive.function.server.ServerRequest;
 import org.springframework.web.reactive.function.server.ServerResponse;
-import reactor.core.publisher.Flux;
-import reactor.core.publisher.Mono;
-
-import java.util.Collections;
-import java.util.Map;
 
 /**
  * @author Rob Winch
  * @since 5.0
  */
 @Component
-public class UserController {
-	private final SecurityContextRepository repo = new WebSessionSecurityContextRepository();
-
-
-	public Mono<ServerResponse> principal(ServerRequest serverRequest) {
-		return serverRequest.principal().cast(Authentication.class).flatMap(p ->
-			ServerResponse.ok()
-				.contentType(MediaType.APPLICATION_JSON)
-				.syncBody(p.getPrincipal()));
-	}
+public class HelloUserController {
 
-	public Mono<ServerResponse> admin(ServerRequest serverRequest) {
-		return serverRequest.principal().cast(Authentication.class).flatMap(p ->
-			ServerResponse.ok()
-				.contentType(MediaType.APPLICATION_JSON)
-				.syncBody( Collections.singletonMap("isadmin", "true")));
+	public Mono<ServerResponse> hello(ServerRequest serverRequest) {
+		return serverRequest.principal()
+			.map(Principal::getName)
+			.flatMap(username ->
+				ServerResponse.ok()
+					.contentType(MediaType.APPLICATION_JSON)
+					.syncBody(Collections.singletonMap("message", "Hello " + username + "!"))
+			);
 	}
 }

+ 4 - 4
samples/javaconfig/hellowebfluxfn/src/main/java/sample/HelloWebfluxFnApplication.java

@@ -53,16 +53,16 @@ public class HelloWebfluxFnApplication {
 	@Bean
 	public NettyContext nettyContext(HttpHandler handler) {
 		ReactorHttpHandlerAdapter adapter = new ReactorHttpHandlerAdapter(handler);
-		HttpServer httpServer = HttpServer.create("localhost", port);
+		HttpServer httpServer = HttpServer.create("localhost", this.port);
 		return httpServer.newHandler(adapter).block();
 	}
 
 	@Bean
-	public RouterFunction<ServerResponse> routes(UserController userController) {
+	public RouterFunction<ServerResponse> routes(HelloUserController userController) {
 		return route(
-			GET("/principal"), userController::principal).andRoute(
-			GET("/admin"), userController::admin);
+			GET("/"), userController::hello);
 	}
+
 	@Bean
 	public HttpHandler httpHandler(RouterFunction<ServerResponse> routes, WebFilter springSecurityFilterChain) {
 		HandlerStrategies handlerStrategies = HandlerStrategies.builder()

+ 42 - 0
samples/javaconfig/hellowebfluxfn/src/main/java/sample/HelloWebfluxFnSecurityConfig.java

@@ -0,0 +1,42 @@
+/*
+ *
+ *  * Copyright 2002-2017 the original author or authors.
+ *  *
+ *  * Licensed under the Apache License, Version 2.0 (the "License");
+ *  * you may not use this file except in compliance with the License.
+ *  * You may obtain a copy of the License at
+ *  *
+ *  *      http://www.apache.org/licenses/LICENSE-2.0
+ *  *
+ *  * Unless required by applicable law or agreed to in writing, software
+ *  * distributed under the License is distributed on an "AS IS" BASIS,
+ *  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  * See the License for the specific language governing permissions and
+ *  * limitations under the License.
+ *
+ */
+
+package sample;
+
+import org.springframework.context.annotation.Bean;
+import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity;
+import org.springframework.security.core.userdetails.MapUserDetailsRepository;
+import org.springframework.security.core.userdetails.User;
+import org.springframework.security.core.userdetails.UserDetails;
+
+/**
+ * @author Rob Winch
+ * @since 5.0
+ */
+@EnableWebFluxSecurity
+public class HelloWebfluxFnSecurityConfig {
+
+	@Bean
+	public MapUserDetailsRepository userDetailsRepository() {
+		UserDetails user = User.withUsername("user")
+			.password("user")
+			.roles("USER")
+			.build();
+		return new MapUserDetailsRepository(user);
+	}
+}

+ 0 - 65
samples/javaconfig/hellowebfluxfn/src/main/java/sample/SecurityConfig.java

@@ -1,65 +0,0 @@
-/*
- *
- *  * Copyright 2002-2017 the original author or authors.
- *  *
- *  * Licensed under the Apache License, Version 2.0 (the "License");
- *  * you may not use this file except in compliance with the License.
- *  * You may obtain a copy of the License at
- *  *
- *  *      http://www.apache.org/licenses/LICENSE-2.0
- *  *
- *  * Unless required by applicable law or agreed to in writing, software
- *  * distributed under the License is distributed on an "AS IS" BASIS,
- *  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- *  * See the License for the specific language governing permissions and
- *  * limitations under the License.
- *
- */
-
-package sample;
-
-import org.springframework.context.annotation.Bean;
-import org.springframework.security.core.userdetails.MapUserDetailsRepository;
-import org.springframework.security.authorization.AuthorizationDecision;
-import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity;
-import org.springframework.security.config.web.server.HttpSecurity;
-import org.springframework.security.core.Authentication;
-import org.springframework.security.core.userdetails.User;
-import org.springframework.security.core.userdetails.UserDetails;
-import org.springframework.security.web.server.SecurityWebFilterChain;
-import org.springframework.security.web.server.WebFilterChainFilter;
-import org.springframework.security.web.server.authorization.AuthorizationContext;
-import reactor.core.publisher.Mono;
-
-/**
- * @author Rob Winch
- * @since 5.0
- */
-@EnableWebFluxSecurity
-public class SecurityConfig {
-
-	@Bean
-	SecurityWebFilterChain httpSecurity(HttpSecurity http) throws Exception {
-		return http
-			.authorizeExchange()
-				.pathMatchers("/admin/**").hasRole("ADMIN")
-				.pathMatchers("/users/{user}/**").access(this::currentUserMatchesPath)
-				.anyExchange().authenticated()
-				.and()
-			.build();
-	}
-
-	private Mono<AuthorizationDecision> currentUserMatchesPath(Mono<Authentication> authentication, AuthorizationContext context) {
-		return authentication
-			.map( a -> context.getVariables().get("user").equals(a.getName()))
-			.map( granted -> new AuthorizationDecision(granted));
-	}
-
-	@Bean
-	public MapUserDetailsRepository userDetailsRepository() {
-		UserDetails rob = User.withUsername("rob").password("rob").roles("USER").build();
-		UserDetails admin = User.withUsername("admin").password("admin").roles("USER","ADMIN").build();
-		return new MapUserDetailsRepository(rob, admin);
-	}
-
-}

+ 26 - 128
samples/javaconfig/hellowebfluxfn/src/test/java/sample/HelloWebfluxFnApplicationTests.java

@@ -20,13 +20,10 @@ package sample;
 import org.junit.Before;
 import org.junit.Test;
 import org.junit.runner.RunWith;
+
 import org.springframework.beans.factory.annotation.Autowired;
-import org.springframework.http.HttpHeaders;
-import org.springframework.http.HttpStatus;
 import org.springframework.http.ResponseCookie;
-import org.springframework.security.test.web.reactive.server.SecurityMockServerConfigurers;
 import org.springframework.security.web.server.WebFilterChainFilter;
-import org.springframework.security.web.server.header.ContentTypeOptionsHttpHeadersWriter;
 import org.springframework.test.context.ActiveProfiles;
 import org.springframework.test.context.ContextConfiguration;
 import org.springframework.test.context.junit4.SpringRunner;
@@ -35,9 +32,7 @@ import org.springframework.test.web.reactive.server.WebTestClient;
 import org.springframework.web.reactive.function.client.ExchangeFilterFunction;
 import org.springframework.web.reactive.function.server.RouterFunction;
 
-import java.nio.charset.Charset;
-import java.util.Base64;
-
+import static org.springframework.security.test.web.reactive.server.SecurityMockServerConfigurers.mockUser;
 import static org.springframework.security.test.web.reactive.server.SecurityMockServerConfigurers.springSecurity;
 import static org.springframework.web.reactive.function.client.ExchangeFilterFunctions.basicAuthentication;
 
@@ -59,188 +54,91 @@ public class HelloWebfluxFnApplicationTests {
 	@Before
 	public void setup() {
 		this.rest = WebTestClient
-			.bindToRouterFunction(routerFunction)
-			.webFilter(springSecurityFilterChain)
+			.bindToRouterFunction(this.routerFunction)
+			.webFilter(this.springSecurityFilterChain)
+			.apply(springSecurity())
 			.build();
 	}
 
 	@Test
-	public void basicRequired() throws Exception {
+	public void basicWhenNoCredentialsThenUnauthorized() throws Exception {
 		this.rest
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
 			.expectStatus().isUnauthorized();
 	}
 
 	@Test
-	public void basicWorks() throws Exception {
+	public void basicWhenValidCredentialsThenOk() throws Exception {
 		this.rest
 			.mutate()
-			.filter(robsCredentials())
+			.filter(userCredentials())
 			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
 			.expectStatus().isOk()
-			.expectBody().json("{\"username\":\"rob\"}");
+			.expectBody().json("{\"message\":\"Hello user!\"}");
 	}
 
 	@Test
-	public void basicWhenPasswordInvalid401() throws Exception {
+	public void basicWhenInvalidCredentialsThenUnauthorized() throws Exception {
 		this.rest
 			.mutate()
 			.filter(invalidPassword())
 			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
 			.expectStatus().isUnauthorized()
 			.expectBody().isEmpty();
 	}
 
-	@Test
-	public void authorizationAdmin403() throws Exception {
-		this.rest
-			.mutate()
-			.filter(robsCredentials())
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isEqualTo(HttpStatus.FORBIDDEN)
-			.expectBody().isEmpty();
-	}
-
-	@Test
-	public void authorizationAdmin200() throws Exception {
-		this.rest
-			.mutate()
-			.filter(adminCredentials())
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isOk();
-	}
-
-	@Test
-	public void basicMissingUser401() throws Exception {
-		this.rest
-			.mutate()
-			.filter(basicAuthentication("missing-user", "password"))
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
-	@Test
-	public void basicInvalidPassword401() throws Exception {
-		this.rest
-			.mutate()
-			.filter(invalidPassword())
-			.build()
-			.get()
-			.uri("/admin")
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
-	@Test
-	public void basicInvalidParts401() throws Exception {
-		this.rest
-			.get()
-			.uri("/admin")
-			.header("Authorization", "Basic " + base64Encode("no colon"))
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
 	@Test
 	public void sessionWorks() throws Exception {
 		ExchangeResult result = this.rest
 			.mutate()
-			.filter(robsCredentials())
+			.filter(userCredentials())
 			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
+			.expectStatus().isOk()
 			.returnResult(String.class);
 
 		ResponseCookie session = result.getResponseCookies().getFirst("SESSION");
 
 		this.rest
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.cookie(session.getName(), session.getValue())
 			.exchange()
 			.expectStatus().isOk();
 	}
 
 	@Test
-	public void mockSupport() throws Exception {
-		WebTestClient mockRest = WebTestClient.bindToRouterFunction(this.routerFunction)
-			.webFilter(springSecurityFilterChain)
-			.apply(springSecurity())
-			.build();
-
-		mockRest
-			.mutateWith(SecurityMockServerConfigurers.mockUser())
-			.get()
-			.uri("/principal")
-			.exchange()
-			.expectStatus().isOk();
-
-		mockRest
-			.get()
-			.uri("/principal")
-			.exchange()
-			.expectStatus().isUnauthorized();
-	}
-
-	@Test
-	public void principal() throws Exception {
+	public void mockSupportWhenValidMockUserThenOk() throws Exception {
 		this.rest
-			.mutate()
-			.filter(robsCredentials())
-			.build()
+			.mutateWith(mockUser())
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
 			.expectStatus().isOk()
-			.expectBody().json("{\"username\" : \"rob\"}");
-	}
+			.expectBody().json("{\"message\":\"Hello user!\"}");
 
-	@Test
-	public void headers() throws Exception {
 		this.rest
-			.mutate()
-			.filter(robsCredentials())
-			.build()
 			.get()
-			.uri("/principal")
+			.uri("/")
 			.exchange()
-			.expectHeader().valueEquals(HttpHeaders.CACHE_CONTROL, "no-cache, no-store, max-age=0, must-revalidate")
-			.expectHeader().valueEquals(HttpHeaders.EXPIRES, "0")
-			.expectHeader().valueEquals(HttpHeaders.PRAGMA, "no-cache")
-			.expectHeader().valueEquals(ContentTypeOptionsHttpHeadersWriter.X_CONTENT_OPTIONS, ContentTypeOptionsHttpHeadersWriter.NOSNIFF);
+			.expectStatus().isUnauthorized();
 	}
 
-	private ExchangeFilterFunction robsCredentials() {
-		return basicAuthentication("rob","rob");
+	private ExchangeFilterFunction userCredentials() {
+		return basicAuthentication("user","user");
 	}
 
 	private ExchangeFilterFunction invalidPassword() {
-		return basicAuthentication("rob","INVALID");
-	}
-
-	private ExchangeFilterFunction adminCredentials() {
-		return basicAuthentication("admin","admin");
-	}
-
-	private String base64Encode(String value) {
-		return Base64.getEncoder().encodeToString(value.getBytes(Charset.defaultCharset()));
+		return basicAuthentication("user","INVALID");
 	}
 }