|
@@ -1,487 +0,0 @@
|
|
|
-/*
|
|
|
- * Copyright 2002-2025 the original author or authors.
|
|
|
- *
|
|
|
- * Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
- * you may not use this file except in compliance with the License.
|
|
|
- * You may obtain a copy of the License at
|
|
|
- *
|
|
|
- * https://www.apache.org/licenses/LICENSE-2.0
|
|
|
- *
|
|
|
- * Unless required by applicable law or agreed to in writing, software
|
|
|
- * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
- * See the License for the specific language governing permissions and
|
|
|
- * limitations under the License.
|
|
|
- */
|
|
|
-
|
|
|
-package org.springframework.security.oauth2.client.endpoint;
|
|
|
-
|
|
|
-import java.io.IOException;
|
|
|
-import java.net.URLEncoder;
|
|
|
-import java.nio.charset.StandardCharsets;
|
|
|
-import java.time.Instant;
|
|
|
-
|
|
|
-import okhttp3.mockwebserver.MockResponse;
|
|
|
-import okhttp3.mockwebserver.MockWebServer;
|
|
|
-import okhttp3.mockwebserver.RecordedRequest;
|
|
|
-import org.junit.jupiter.api.AfterEach;
|
|
|
-import org.junit.jupiter.api.BeforeEach;
|
|
|
-import org.junit.jupiter.api.Test;
|
|
|
-
|
|
|
-import org.springframework.core.convert.converter.Converter;
|
|
|
-import org.springframework.http.HttpHeaders;
|
|
|
-import org.springframework.http.HttpMethod;
|
|
|
-import org.springframework.http.HttpStatus;
|
|
|
-import org.springframework.http.MediaType;
|
|
|
-import org.springframework.http.RequestEntity;
|
|
|
-import org.springframework.http.ResponseEntity;
|
|
|
-import org.springframework.security.oauth2.client.registration.ClientRegistration;
|
|
|
-import org.springframework.security.oauth2.client.registration.TestClientRegistrations;
|
|
|
-import org.springframework.security.oauth2.core.AuthorizationGrantType;
|
|
|
-import org.springframework.security.oauth2.core.ClientAuthenticationMethod;
|
|
|
-import org.springframework.security.oauth2.core.OAuth2AccessToken;
|
|
|
-import org.springframework.security.oauth2.core.OAuth2AuthorizationException;
|
|
|
-import org.springframework.security.oauth2.core.OAuth2ErrorCodes;
|
|
|
-import org.springframework.security.oauth2.core.OAuth2Token;
|
|
|
-import org.springframework.security.oauth2.core.TestOAuth2AccessTokens;
|
|
|
-import org.springframework.security.oauth2.core.endpoint.OAuth2AccessTokenResponse;
|
|
|
-import org.springframework.security.oauth2.core.endpoint.OAuth2ParameterNames;
|
|
|
-import org.springframework.security.oauth2.jwt.TestJwts;
|
|
|
-import org.springframework.util.StringUtils;
|
|
|
-import org.springframework.web.client.RestOperations;
|
|
|
-
|
|
|
-import static org.assertj.core.api.Assertions.assertThat;
|
|
|
-import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
|
|
-import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;
|
|
|
-import static org.mockito.ArgumentMatchers.any;
|
|
|
-import static org.mockito.ArgumentMatchers.eq;
|
|
|
-import static org.mockito.BDDMockito.given;
|
|
|
-import static org.mockito.Mockito.mock;
|
|
|
-import static org.mockito.Mockito.spy;
|
|
|
-import static org.mockito.Mockito.verify;
|
|
|
-
|
|
|
-/**
|
|
|
- * Tests for {@link DefaultJwtBearerTokenResponseClient}.
|
|
|
- *
|
|
|
- * @author Steve Riesenberg
|
|
|
- */
|
|
|
-public class DefaultTokenExchangeTokenResponseClientTests {
|
|
|
-
|
|
|
- private static final String ACCESS_TOKEN_TYPE_VALUE = "urn:ietf:params:oauth:token-type:access_token";
|
|
|
-
|
|
|
- private static final String JWT_TOKEN_TYPE_VALUE = "urn:ietf:params:oauth:token-type:jwt";
|
|
|
-
|
|
|
- private DefaultTokenExchangeTokenResponseClient tokenResponseClient;
|
|
|
-
|
|
|
- private ClientRegistration.Builder clientRegistration;
|
|
|
-
|
|
|
- private OAuth2Token subjectToken;
|
|
|
-
|
|
|
- private OAuth2Token actorToken;
|
|
|
-
|
|
|
- private MockWebServer server;
|
|
|
-
|
|
|
- @BeforeEach
|
|
|
- public void setUp() throws IOException {
|
|
|
- this.tokenResponseClient = new DefaultTokenExchangeTokenResponseClient();
|
|
|
- this.server = new MockWebServer();
|
|
|
- this.server.start();
|
|
|
- String tokenUri = this.server.url("/oauth2/token").toString();
|
|
|
- // @formatter:off
|
|
|
- this.clientRegistration = TestClientRegistrations.clientCredentials()
|
|
|
- .clientId("client-1")
|
|
|
- .clientSecret("secret")
|
|
|
- .authorizationGrantType(AuthorizationGrantType.TOKEN_EXCHANGE)
|
|
|
- .tokenUri(tokenUri)
|
|
|
- .scope("read", "write");
|
|
|
- // @formatter:on
|
|
|
- this.subjectToken = TestOAuth2AccessTokens.scopes("read", "write");
|
|
|
- this.actorToken = null;
|
|
|
- }
|
|
|
-
|
|
|
- @AfterEach
|
|
|
- public void cleanUp() throws IOException {
|
|
|
- this.server.shutdown();
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void setRequestEntityConverterWhenConverterIsNullThenThrowIllegalArgumentException() {
|
|
|
- // @formatter:off
|
|
|
- assertThatIllegalArgumentException()
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.setRequestEntityConverter(null))
|
|
|
- .withMessage("requestEntityConverter cannot be null");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void setRestOperationsWhenRestOperationsIsNullThenThrowIllegalArgumentException() {
|
|
|
- // @formatter:off
|
|
|
- assertThatIllegalArgumentException()
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.setRestOperations(null))
|
|
|
- .withMessage("restOperations cannot be null");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenGrantRequestIsNullThenThrowIllegalArgumentException() {
|
|
|
- // @formatter:off
|
|
|
- assertThatIllegalArgumentException()
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.getTokenResponse(null))
|
|
|
- .withMessage("grantRequest cannot be null");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenSuccessResponseThenReturnAccessTokenResponse() throws Exception {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\",\n"
|
|
|
- + " \"scope\": \"read write\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- Instant expiresAtBefore = Instant.now().plusSeconds(3600);
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- OAuth2AccessTokenResponse accessTokenResponse = this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- Instant expiresAtAfter = Instant.now().plusSeconds(3600);
|
|
|
- RecordedRequest recordedRequest = this.server.takeRequest();
|
|
|
- assertThat(recordedRequest.getMethod()).isEqualTo(HttpMethod.POST.toString());
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.ACCEPT)).isEqualTo(MediaType.APPLICATION_JSON_VALUE);
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.CONTENT_TYPE))
|
|
|
- .isEqualTo(MediaType.APPLICATION_FORM_URLENCODED_VALUE + ";charset=UTF-8");
|
|
|
- String formParameters = recordedRequest.getBody().readUtf8();
|
|
|
- // @formatter:off
|
|
|
- assertThat(formParameters).contains(
|
|
|
- param(OAuth2ParameterNames.GRANT_TYPE, AuthorizationGrantType.TOKEN_EXCHANGE.getValue()),
|
|
|
- param(OAuth2ParameterNames.REQUESTED_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN, this.subjectToken.getTokenValue()),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SCOPE, StringUtils.collectionToDelimitedString(this.clientRegistration.build().getScopes(), " "))
|
|
|
- );
|
|
|
- // @formatter:on
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenValue()).isEqualTo("access-token-1234");
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenType()).isEqualTo(OAuth2AccessToken.TokenType.BEARER);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getExpiresAt()).isBetween(expiresAtBefore, expiresAtAfter);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getScopes()).containsExactlyInAnyOrder("read", "write");
|
|
|
- assertThat(accessTokenResponse.getRefreshToken()).isNull();
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenSubjectTokenIsJwtThenSubjectTokenTypeIsJwt() throws Exception {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\",\n"
|
|
|
- + " \"scope\": \"read write\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- Instant expiresAtBefore = Instant.now().plusSeconds(3600);
|
|
|
- this.subjectToken = TestJwts.jwt().build();
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- OAuth2AccessTokenResponse accessTokenResponse = this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- Instant expiresAtAfter = Instant.now().plusSeconds(3600);
|
|
|
- RecordedRequest recordedRequest = this.server.takeRequest();
|
|
|
- assertThat(recordedRequest.getMethod()).isEqualTo(HttpMethod.POST.toString());
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.ACCEPT)).isEqualTo(MediaType.APPLICATION_JSON_VALUE);
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.CONTENT_TYPE))
|
|
|
- .isEqualTo(MediaType.APPLICATION_FORM_URLENCODED_VALUE + ";charset=UTF-8");
|
|
|
- String formParameters = recordedRequest.getBody().readUtf8();
|
|
|
- // @formatter:off
|
|
|
- assertThat(formParameters).contains(
|
|
|
- param(OAuth2ParameterNames.GRANT_TYPE, AuthorizationGrantType.TOKEN_EXCHANGE.getValue()),
|
|
|
- param(OAuth2ParameterNames.REQUESTED_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN, this.subjectToken.getTokenValue()),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN_TYPE, JWT_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SCOPE, StringUtils.collectionToDelimitedString(this.clientRegistration.build().getScopes(), " "))
|
|
|
- );
|
|
|
- // @formatter:on
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenValue()).isEqualTo("access-token-1234");
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenType()).isEqualTo(OAuth2AccessToken.TokenType.BEARER);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getExpiresAt()).isBetween(expiresAtBefore, expiresAtAfter);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getScopes()).containsExactlyInAnyOrder("read", "write");
|
|
|
- assertThat(accessTokenResponse.getRefreshToken()).isNull();
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenActorTokenIsNotNullThenActorParametersAreSent() throws Exception {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\",\n"
|
|
|
- + " \"scope\": \"read write\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- Instant expiresAtBefore = Instant.now().plusSeconds(3600);
|
|
|
- this.actorToken = TestOAuth2AccessTokens.noScopes();
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- OAuth2AccessTokenResponse accessTokenResponse = this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- Instant expiresAtAfter = Instant.now().plusSeconds(3600);
|
|
|
- RecordedRequest recordedRequest = this.server.takeRequest();
|
|
|
- assertThat(recordedRequest.getMethod()).isEqualTo(HttpMethod.POST.toString());
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.ACCEPT)).isEqualTo(MediaType.APPLICATION_JSON_VALUE);
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.CONTENT_TYPE))
|
|
|
- .isEqualTo(MediaType.APPLICATION_FORM_URLENCODED_VALUE + ";charset=UTF-8");
|
|
|
- String formParameters = recordedRequest.getBody().readUtf8();
|
|
|
- // @formatter:off
|
|
|
- assertThat(formParameters).contains(
|
|
|
- param(OAuth2ParameterNames.GRANT_TYPE, AuthorizationGrantType.TOKEN_EXCHANGE.getValue()),
|
|
|
- param(OAuth2ParameterNames.REQUESTED_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN, this.subjectToken.getTokenValue()),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.ACTOR_TOKEN, this.actorToken.getTokenValue()),
|
|
|
- param(OAuth2ParameterNames.ACTOR_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SCOPE, StringUtils.collectionToDelimitedString(this.clientRegistration.build().getScopes(), " "))
|
|
|
- );
|
|
|
- // @formatter:on
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenValue()).isEqualTo("access-token-1234");
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenType()).isEqualTo(OAuth2AccessToken.TokenType.BEARER);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getExpiresAt()).isBetween(expiresAtBefore, expiresAtAfter);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getScopes()).containsExactlyInAnyOrder("read", "write");
|
|
|
- assertThat(accessTokenResponse.getRefreshToken()).isNull();
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenActorTokenIsJwtThenActorTokenTypeIsJwt() throws Exception {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\",\n"
|
|
|
- + " \"scope\": \"read write\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- Instant expiresAtBefore = Instant.now().plusSeconds(3600);
|
|
|
- this.actorToken = TestJwts.jwt().build();
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- OAuth2AccessTokenResponse accessTokenResponse = this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- Instant expiresAtAfter = Instant.now().plusSeconds(3600);
|
|
|
- RecordedRequest recordedRequest = this.server.takeRequest();
|
|
|
- assertThat(recordedRequest.getMethod()).isEqualTo(HttpMethod.POST.toString());
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.ACCEPT)).isEqualTo(MediaType.APPLICATION_JSON_VALUE);
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.CONTENT_TYPE))
|
|
|
- .isEqualTo(MediaType.APPLICATION_FORM_URLENCODED_VALUE + ";charset=UTF-8");
|
|
|
- String formParameters = recordedRequest.getBody().readUtf8();
|
|
|
- // @formatter:off
|
|
|
- assertThat(formParameters).contains(
|
|
|
- param(OAuth2ParameterNames.GRANT_TYPE, AuthorizationGrantType.TOKEN_EXCHANGE.getValue()),
|
|
|
- param(OAuth2ParameterNames.REQUESTED_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN, this.subjectToken.getTokenValue()),
|
|
|
- param(OAuth2ParameterNames.SUBJECT_TOKEN_TYPE, ACCESS_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.ACTOR_TOKEN, this.actorToken.getTokenValue()),
|
|
|
- param(OAuth2ParameterNames.ACTOR_TOKEN_TYPE, JWT_TOKEN_TYPE_VALUE),
|
|
|
- param(OAuth2ParameterNames.SCOPE, StringUtils.collectionToDelimitedString(this.clientRegistration.build().getScopes(), " "))
|
|
|
- );
|
|
|
- // @formatter:on
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenValue()).isEqualTo("access-token-1234");
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getTokenType()).isEqualTo(OAuth2AccessToken.TokenType.BEARER);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getExpiresAt()).isBetween(expiresAtBefore, expiresAtAfter);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getScopes()).containsExactlyInAnyOrder("read", "write");
|
|
|
- assertThat(accessTokenResponse.getRefreshToken()).isNull();
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenAuthenticationClientSecretBasicThenAuthorizationHeaderIsSent() throws Exception {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- RecordedRequest recordedRequest = this.server.takeRequest();
|
|
|
- assertThat(recordedRequest.getHeader(HttpHeaders.AUTHORIZATION)).startsWith("Basic ");
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenAuthenticationClientSecretPostThenFormParametersAreSent() throws Exception {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- ClientRegistration clientRegistration = this.clientRegistration
|
|
|
- .clientAuthenticationMethod(ClientAuthenticationMethod.CLIENT_SECRET_POST)
|
|
|
- .build();
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(clientRegistration, this.subjectToken,
|
|
|
- this.actorToken);
|
|
|
- this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- RecordedRequest recordedRequest = this.server.takeRequest();
|
|
|
- String formParameters = recordedRequest.getBody().readUtf8();
|
|
|
- assertThat(formParameters).contains("client_id=client-1", "client_secret=secret");
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenSuccessResponseAndNotBearerTokenTypeThenThrowOAuth2AuthorizationException() {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"not-bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- // @formatter:off
|
|
|
- assertThatExceptionOfType(OAuth2AuthorizationException.class)
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.getTokenResponse(grantRequest))
|
|
|
- .satisfies((ex) -> assertThat(ex.getError().getErrorCode()).isEqualTo("invalid_token_response"))
|
|
|
- .withMessageContaining("[invalid_token_response] An error occurred while attempting to retrieve the OAuth 2.0 Access Token Response")
|
|
|
- .havingRootCause().withMessage("tokenType cannot be null");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenSuccessResponseIncludesScopeThenAccessTokenHasResponseScope() {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\",\n"
|
|
|
- + " \"scope\": \"read\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- OAuth2AccessTokenResponse accessTokenResponse = this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getScopes()).containsExactly("read");
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenSuccessResponseDoesNotIncludeScopeThenAccessTokenHasNoScope() {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- OAuth2AccessTokenResponse accessTokenResponse = this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- assertThat(accessTokenResponse.getAccessToken().getScopes()).isEmpty();
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenErrorResponseThenThrowOAuth2AuthorizationException() {
|
|
|
- String accessTokenErrorResponse = "{\"error\": \"invalid_grant\"}";
|
|
|
- this.server.enqueue(jsonResponse(accessTokenErrorResponse).setResponseCode(400));
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- // @formatter:off
|
|
|
- assertThatExceptionOfType(OAuth2AuthorizationException.class)
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.getTokenResponse(grantRequest))
|
|
|
- .satisfies((ex) -> assertThat(ex.getError().getErrorCode()).isEqualTo(OAuth2ErrorCodes.INVALID_GRANT))
|
|
|
- .withMessageContaining("[invalid_grant]");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenServerErrorResponseThenThrowOAuth2AuthorizationException() {
|
|
|
- this.server.enqueue(new MockResponse().setResponseCode(500));
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- // @formatter:off
|
|
|
- assertThatExceptionOfType(OAuth2AuthorizationException.class)
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.getTokenResponse(grantRequest))
|
|
|
- .satisfies((ex) -> assertThat(ex.getError().getErrorCode()).isEqualTo("invalid_token_response"))
|
|
|
- .withMessageContaining("[invalid_token_response] An error occurred while attempting to retrieve the OAuth 2.0 Access Token Response");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenCustomClientAuthenticationMethodThenIllegalArgument() {
|
|
|
- ClientRegistration clientRegistration = this.clientRegistration
|
|
|
- .clientAuthenticationMethod(new ClientAuthenticationMethod("basic"))
|
|
|
- .build();
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(clientRegistration, this.subjectToken,
|
|
|
- this.actorToken);
|
|
|
- // @formatter:off
|
|
|
- assertThatExceptionOfType(IllegalArgumentException.class)
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.getTokenResponse(grantRequest))
|
|
|
- .withMessageContaining("This class supports `client_secret_basic`, `client_secret_post`, and `none` by default.");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenUnsupportedClientAuthenticationMethodThenIllegalArgument() {
|
|
|
- ClientRegistration clientRegistration = this.clientRegistration
|
|
|
- .clientAuthenticationMethod(ClientAuthenticationMethod.CLIENT_SECRET_JWT)
|
|
|
- .build();
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(clientRegistration, this.subjectToken,
|
|
|
- this.actorToken);
|
|
|
- // @formatter:off
|
|
|
- assertThatExceptionOfType(IllegalArgumentException.class)
|
|
|
- .isThrownBy(() -> this.tokenResponseClient.getTokenResponse(grantRequest))
|
|
|
- .withMessageContaining("This class supports `client_secret_basic`, `client_secret_post`, and `none` by default.");
|
|
|
- // @formatter:on
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenCustomRequestEntityConverterSetThenCalled() {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- Converter<TokenExchangeGrantRequest, RequestEntity<?>> requestEntityConverter = spy(
|
|
|
- TokenExchangeGrantRequestEntityConverter.class);
|
|
|
- this.tokenResponseClient.setRequestEntityConverter(requestEntityConverter);
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- verify(requestEntityConverter).convert(grantRequest);
|
|
|
- }
|
|
|
-
|
|
|
- @Test
|
|
|
- public void getTokenResponseWhenCustomRestOperationsSetThenCalled() {
|
|
|
- // @formatter:off
|
|
|
- String accessTokenSuccessResponse = "{\n"
|
|
|
- + " \"access_token\": \"access-token-1234\",\n"
|
|
|
- + " \"token_type\": \"bearer\",\n"
|
|
|
- + " \"expires_in\": \"3600\"\n"
|
|
|
- + "}\n";
|
|
|
- // @formatter:on
|
|
|
- this.server.enqueue(jsonResponse(accessTokenSuccessResponse));
|
|
|
- RestOperations restOperations = mock(RestOperations.class);
|
|
|
- given(restOperations.exchange(any(RequestEntity.class), eq(OAuth2AccessTokenResponse.class)))
|
|
|
- .willReturn(new ResponseEntity<>(HttpStatus.OK));
|
|
|
- this.tokenResponseClient.setRestOperations(restOperations);
|
|
|
- TokenExchangeGrantRequest grantRequest = new TokenExchangeGrantRequest(this.clientRegistration.build(),
|
|
|
- this.subjectToken, this.actorToken);
|
|
|
- this.tokenResponseClient.getTokenResponse(grantRequest);
|
|
|
- verify(restOperations).exchange(any(RequestEntity.class), eq(OAuth2AccessTokenResponse.class));
|
|
|
- }
|
|
|
-
|
|
|
- private MockResponse jsonResponse(String json) {
|
|
|
- return new MockResponse().setHeader(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_JSON_VALUE).setBody(json);
|
|
|
- }
|
|
|
-
|
|
|
- private static String param(String parameterName, String parameterValue) {
|
|
|
- return "%s=%s".formatted(parameterName, URLEncoder.encode(parameterValue, StandardCharsets.UTF_8));
|
|
|
- }
|
|
|
-
|
|
|
-}
|