123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953 |
- [[test-mockmvc]]
- == Spring MVC Test Integration
- Spring Security provides comprehensive integration with https://docs.spring.io/spring/docs/current/spring-framework-reference/html/testing.html#spring-mvc-test-framework[Spring MVC Test]
- [[test-mockmvc-setup]]
- === Setting Up MockMvc and Spring Security
- In order to use Spring Security with Spring MVC Test it is necessary to add the Spring Security `FilterChainProxy` as a `Filter`.
- It is also necessary to add Spring Security's `TestSecurityContextHolderPostProcessor` to support <<Running as a User in Spring MVC Test with Annotations,Running as a User in Spring MVC Test with Annotations>>.
- This can be done using Spring Security's `SecurityMockMvcConfigurers.springSecurity()`.
- For example:
- NOTE: Spring Security's testing support requires spring-test-4.1.3.RELEASE or greater.
- ====
- .Java
- [source,java,role="primary"]
- ----
- import static org.springframework.security.test.web.servlet.setup.SecurityMockMvcConfigurers.*;
- @RunWith(SpringJUnit4ClassRunner.class)
- @ContextConfiguration(classes = SecurityConfig.class)
- @WebAppConfiguration
- public class CsrfShowcaseTests {
- @Autowired
- private WebApplicationContext context;
- private MockMvc mvc;
- @Before
- public void setup() {
- mvc = MockMvcBuilders
- .webAppContextSetup(context)
- .apply(springSecurity()) // <1>
- .build();
- }
- ...
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @RunWith(SpringJUnit4ClassRunner::class)
- @ContextConfiguration(classes = [SecurityConfig::class])
- @WebAppConfiguration
- class CsrfShowcaseTests {
- @Autowired
- private lateinit var context: WebApplicationContext
- private var mvc: MockMvc? = null
- @Before
- fun setup() {
- mvc = MockMvcBuilders
- .webAppContextSetup(context)
- .apply<DefaultMockMvcBuilder>(springSecurity()) // <1>
- .build()
- }
- // ...
- ----
- ====
- <1> `SecurityMockMvcConfigurers.springSecurity()` will perform all of the initial setup we need to integrate Spring Security with Spring MVC Test
- [[test-mockmvc-smmrpp]]
- === SecurityMockMvcRequestPostProcessors
- Spring MVC Test provides a convenient interface called a `RequestPostProcessor` that can be used to modify a request.
- Spring Security provides a number of `RequestPostProcessor` implementations that make testing easier.
- In order to use Spring Security's `RequestPostProcessor` implementations ensure the following static import is used:
- ====
- .Java
- [source,java,role="primary"]
- ----
- import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.*;
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- import org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.*
- ----
- ====
- [[test-mockmvc-csrf]]
- ==== Testing with CSRF Protection
- When testing any non-safe HTTP methods and using Spring Security's CSRF protection, you must be sure to include a valid CSRF Token in the request.
- To specify a valid CSRF token as a request parameter using the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(post("/").with(csrf()))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.post("/") {
- with(csrf())
- }
- ----
- ====
- If you like you can include CSRF token in the header instead:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(post("/").with(csrf().asHeader()))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.post("/") {
- with(csrf().asHeader())
- }
- ----
- ====
- You can also test providing an invalid CSRF token using the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(post("/").with(csrf().useInvalidToken()))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.post("/") {
- with(csrf().useInvalidToken())
- }
- ----
- ====
- [[test-mockmvc-securitycontextholder]]
- ==== Running a Test as a User in Spring MVC Test
- It is often desirable to run tests as a specific user.
- There are two simple ways of populating the user:
- * <<Running as a User in Spring MVC Test with RequestPostProcessor,Running as a User in Spring MVC Test with RequestPostProcessor>>
- * <<Running as a User in Spring MVC Test with Annotations,Running as a User in Spring MVC Test with Annotations>>
- [[test-mockmvc-securitycontextholder-rpp]]
- ==== Running as a User in Spring MVC Test with RequestPostProcessor
- There are a number of options available to associate a user to the current `HttpServletRequest`.
- For example, the following will run as a user (which does not need to exist) with the username "user", the password "password", and the role "ROLE_USER":
- [NOTE]
- ====
- The support works by associating the user to the `HttpServletRequest`.
- To associate the request to the `SecurityContextHolder` you need to ensure that the `SecurityContextPersistenceFilter` is associated with the `MockMvc` instance.
- A few ways to do this are:
- * Invoking <<test-mockmvc-setup,apply(springSecurity())>>
- * Adding Spring Security's `FilterChainProxy` to `MockMvc`
- * Manually adding `SecurityContextPersistenceFilter` to the `MockMvc` instance may make sense when using `MockMvcBuilders.standaloneSetup`
- ====
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/").with(user("user")))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/") {
- with(user("user"))
- }
- ----
- ====
- You can easily make customizations.
- For example, the following will run as a user (which does not need to exist) with the username "admin", the password "pass", and the roles "ROLE_USER" and "ROLE_ADMIN".
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/admin").with(user("admin").password("pass").roles("USER","ADMIN")))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/admin") {
- with(user("admin").password("pass").roles("USER","ADMIN"))
- }
- ----
- ====
- If you have a custom `UserDetails` that you would like to use, you can easily specify that as well.
- For example, the following will use the specified `UserDetails` (which does not need to exist) to run with a `UsernamePasswordAuthenticationToken` that has a principal of the specified `UserDetails`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/").with(user(userDetails)))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/") {
- with(user(userDetails))
- }
- ----
- ====
- You can run as anonymous user using the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/").with(anonymous()))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/") {
- with(anonymous())
- }
- ----
- ====
- This is especially useful if you are running with a default user and wish to process a few requests as an anonymous user.
- If you want a custom `Authentication` (which does not need to exist) you can do so using the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/").with(authentication(authentication)))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/") {
- with(authentication(authentication))
- }
- ----
- ====
- You can even customize the `SecurityContext` using the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/").with(securityContext(securityContext)))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/") {
- with(securityContext(securityContext))
- }
- ----
- ====
- We can also ensure to run as a specific user for every request by using ``MockMvcBuilders``'s default request.
- For example, the following will run as a user (which does not need to exist) with the username "admin", the password "password", and the role "ROLE_ADMIN":
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc = MockMvcBuilders
- .webAppContextSetup(context)
- .defaultRequest(get("/").with(user("user").roles("ADMIN")))
- .apply(springSecurity())
- .build();
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc = MockMvcBuilders
- .webAppContextSetup(context)
- .defaultRequest<DefaultMockMvcBuilder>(get("/").with(user("user").roles("ADMIN")))
- .apply<DefaultMockMvcBuilder>(springSecurity())
- .build()
- ----
- ====
- If you find you are using the same user in many of your tests, it is recommended to move the user to a method.
- For example, you can specify the following in your own class named `CustomSecurityMockMvcRequestPostProcessors`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- public static RequestPostProcessor rob() {
- return user("rob").roles("ADMIN");
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- fun rob(): RequestPostProcessor {
- return user("rob").roles("ADMIN")
- }
- ----
- ====
- Now you can perform a static import on `SecurityMockMvcRequestPostProcessors` and use that within your tests:
- ====
- .Java
- [source,java,role="primary"]
- ----
- import static sample.CustomSecurityMockMvcRequestPostProcessors.*;
- ...
- mvc
- .perform(get("/").with(rob()))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- import sample.CustomSecurityMockMvcRequestPostProcessors.*
- //...
- mvc.get("/") {
- with(rob())
- }
- ----
- ====
- ===== Running as a User in Spring MVC Test with Annotations
- As an alternative to using a `RequestPostProcessor` to create your user, you can use annotations described in <<Testing Method Security>>.
- For example, the following will run the test with the user with username "user", password "password", and role "ROLE_USER":
- ====
- .Java
- [source,java,role="primary"]
- ----
- @Test
- @WithMockUser
- public void requestProtectedUrlWithUser() throws Exception {
- mvc
- .perform(get("/"))
- ...
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @Test
- @WithMockUser
- fun requestProtectedUrlWithUser() {
- mvc
- .get("/")
- // ...
- }
- ----
- ====
- Alternatively, the following will run the test with the user with username "user", password "password", and role "ROLE_ADMIN":
- ====
- .Java
- [source,java,role="primary"]
- ----
- @Test
- @WithMockUser(roles="ADMIN")
- public void requestProtectedUrlWithUser() throws Exception {
- mvc
- .perform(get("/"))
- ...
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @Test
- @WithMockUser(roles = ["ADMIN"])
- fun requestProtectedUrlWithUser() {
- mvc
- .get("/")
- // ...
- }
- ----
- ====
- ==== Testing HTTP Basic Authentication
- While it has always been possible to authenticate with HTTP Basic, it was a bit tedious to remember the header name, format, and encode the values.
- Now this can be done using Spring Security's `httpBasic` `RequestPostProcessor`.
- For example, the snippet below:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/").with(httpBasic("user","password")))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/") {
- with(httpBasic("user","password"))
- }
- ----
- ====
- will attempt to use HTTP Basic to authenticate a user with the username "user" and the password "password" by ensuring the following header is populated on the HTTP Request:
- [source,text]
- ----
- Authorization: Basic dXNlcjpwYXNzd29yZA==
- ----
- [[testing-oauth2]]
- ==== Testing OAuth 2.0
- When it comes to OAuth 2.0, the same principles covered earlier still apply: Ultimately, it depends on what your method under test is expecting to be in the `SecurityContextHolder`.
- For example, for a controller that looks like this:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(Principal user) {
- return user.getName();
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(user: Principal): String {
- return user.name
- }
- ----
- ====
- There's nothing OAuth2-specific about it, so you will likely be able to simply <<test-method-withmockuser,use `@WithMockUser`>> and be fine.
- But, in cases where your controllers are bound to some aspect of Spring Security's OAuth 2.0 support, like the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(@AuthenticationPrincipal OidcUser user) {
- return user.getIdToken().getSubject();
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(@AuthenticationPrincipal user: OidcUser): String {
- return user.idToken.subject
- }
- ----
- ====
- then Spring Security's test support can come in handy.
- [[testing-oidc-login]]
- ==== Testing OIDC Login
- Testing the method above with Spring MVC Test would require simulating some kind of grant flow with an authorization server.
- Certainly this would be a daunting task, which is why Spring Security ships with support for removing this boilerplate.
- For example, we can tell Spring Security to include a default `OidcUser` using the `SecurityMockMvcRequestPostProcessors#oidcLogin` method, like so:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint").with(oidcLogin()));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oidcLogin())
- }
- ----
- ====
- What this will do is configure the associated `MockHttpServletRequest` with an `OidcUser` that includes a simple `OidcIdToken`, `OidcUserInfo`, and `Collection` of granted authorities.
- Specifically, it will include an `OidcIdToken` with a `sub` claim set to `user`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(user.getIdToken().getClaim("sub")).isEqualTo("user");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(user.idToken.getClaim<String>("sub")).isEqualTo("user")
- ----
- ====
- an `OidcUserInfo` with no claims set:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(user.getUserInfo().getClaims()).isEmpty();
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(user.userInfo.claims).isEmpty()
- ----
- ====
- and a `Collection` of authorities with just one authority, `SCOPE_read`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(user.getAuthorities()).hasSize(1);
- assertThat(user.getAuthorities()).containsExactly(new SimpleGrantedAuthority("SCOPE_read"));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(user.authorities).hasSize(1)
- assertThat(user.authorities).containsExactly(SimpleGrantedAuthority("SCOPE_read"))
- ----
- ====
- Spring Security does the necessary work to make sure that the `OidcUser` instance is available for <<mvc-authentication-principal,the `@AuthenticationPrincipal` annotation>>.
- Further, it also links that `OidcUser` to a simple instance of `OAuth2AuthorizedClient` that it deposits into an mock `OAuth2AuthorizedClientRepository`.
- This can be handy if your tests <<testing-oauth2-client,use the `@RegisteredOAuth2AuthorizedClient` annotation>>..
- [[testing-oidc-login-authorities]]
- ===== Configuring Authorities
- In many circumstances, your method is protected by filter or method security and needs your `Authentication` to have certain granted authorities to allow the request.
- In this case, you can supply what granted authorities you need using the `authorities()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(oidcLogin()
- .authorities(new SimpleGrantedAuthority("SCOPE_message:read"))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oidcLogin()
- .authorities(SimpleGrantedAuthority("SCOPE_message:read"))
- )
- }
- ----
- ====
- [[testing-oidc-login-claims]]
- ===== Configuring Claims
- And while granted authorities are quite common across all of Spring Security, we also have claims in the case of OAuth 2.0.
- Let's say, for example, that you've got a `user_id` claim that indicates the user's id in your system.
- You might access it like so in a controller:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(@AuthenticationPrincipal OidcUser oidcUser) {
- String userId = oidcUser.getIdToken().getClaim("user_id");
- // ...
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(@AuthenticationPrincipal oidcUser: OidcUser): String {
- val userId = oidcUser.idToken.getClaim<String>("user_id")
- // ...
- }
- ----
- ====
- In that case, you'd want to specify that claim with the `idToken()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(oidcLogin()
- .idToken(token -> token.claim("user_id", "1234"))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oidcLogin()
- .idToken {
- it.claim("user_id", "1234")
- }
- )
- }
- ----
- ====
- since `OidcUser` collects its claims from `OidcIdToken`.
- [[testing-oidc-login-user]]
- ===== Additional Configurations
- There are additional methods, too, for further configuring the authentication; it simply depends on what data your controller expects:
- * `userInfo(OidcUserInfo.Builder)` - For configuring the `OidcUserInfo` instance
- * `clientRegistration(ClientRegistration)` - For configuring the associated `OAuth2AuthorizedClient` with a given `ClientRegistration`
- * `oidcUser(OidcUser)` - For configuring the complete `OidcUser` instance
- That last one is handy if you:
- 1. Have your own implementation of `OidcUser`, or
- 2. Need to change the name attribute
- For example, let's say that your authorization server sends the principal name in the `user_name` claim instead of the `sub` claim.
- In that case, you can configure an `OidcUser` by hand:
- ====
- .Java
- [source,java,role="primary"]
- ----
- OidcUser oidcUser = new DefaultOidcUser(
- AuthorityUtils.createAuthorityList("SCOPE_message:read"),
- OidcIdToken.withTokenValue("id-token").claim("user_name", "foo_user").build(),
- "user_name");
- mvc
- .perform(get("/endpoint")
- .with(oidcLogin().oidcUser(oidcUser))
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- val oidcUser: OidcUser = DefaultOidcUser(
- AuthorityUtils.createAuthorityList("SCOPE_message:read"),
- OidcIdToken.withTokenValue("id-token").claim("user_name", "foo_user").build(),
- "user_name"
- )
- mvc.get("/endpoint") {
- with(oidcLogin().oidcUser(oidcUser))
- }
- ----
- ====
- [[testing-oauth2-login]]
- ==== Testing OAuth 2.0 Login
- As with <<testing-oidc-login,testing OIDC login>>, testing OAuth 2.0 Login presents a similar challenge of mocking a grant flow.
- And because of that, Spring Security also has test support for non-OIDC use cases.
- Let's say that we've got a controller that gets the logged-in user as an `OAuth2User`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(@AuthenticationPrincipal OAuth2User oauth2User) {
- return oauth2User.getAttribute("sub");
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(@AuthenticationPrincipal oauth2User: OAuth2User): String? {
- return oauth2User.getAttribute("sub")
- }
- ----
- ====
- In that case, we can tell Spring Security to include a default `OAuth2User` using the `SecurityMockMvcRequestPostProcessors#oauth2User` method, like so:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint").with(oauth2Login()));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oauth2Login())
- }
- ----
- ====
- What this will do is configure the associated `MockHttpServletRequest` with an `OAuth2User` that includes a simple `Map` of attributes and `Collection` of granted authorities.
- Specifically, it will include a `Map` with a key/value pair of `sub`/`user`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat((String) user.getAttribute("sub")).isEqualTo("user");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(user.getAttribute<String>("sub")).isEqualTo("user")
- ----
- ====
- and a `Collection` of authorities with just one authority, `SCOPE_read`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(user.getAuthorities()).hasSize(1);
- assertThat(user.getAuthorities()).containsExactly(new SimpleGrantedAuthority("SCOPE_read"));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(user.authorities).hasSize(1)
- assertThat(user.authorities).containsExactly(SimpleGrantedAuthority("SCOPE_read"))
- ----
- ====
- Spring Security does the necessary work to make sure that the `OAuth2User` instance is available for <<mvc-authentication-principal,the `@AuthenticationPrincipal` annotation>>.
- Further, it also links that `OAuth2User` to a simple instance of `OAuth2AuthorizedClient` that it deposits in a mock `OAuth2AuthorizedClientRepository`.
- This can be handy if your tests <<testing-oauth2-client,use the `@RegisteredOAuth2AuthorizedClient` annotation>>.
- [[testing-oauth2-login-authorities]]
- ===== Configuring Authorities
- In many circumstances, your method is protected by filter or method security and needs your `Authentication` to have certain granted authorities to allow the request.
- In this case, you can supply what granted authorities you need using the `authorities()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(oauth2Login()
- .authorities(new SimpleGrantedAuthority("SCOPE_message:read"))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oauth2Login()
- .authorities(SimpleGrantedAuthority("SCOPE_message:read"))
- )
- }
- ----
- ====
- [[testing-oauth2-login-claims]]
- ===== Configuring Claims
- And while granted authorities are quite common across all of Spring Security, we also have claims in the case of OAuth 2.0.
- Let's say, for example, that you've got a `user_id` attribute that indicates the user's id in your system.
- You might access it like so in a controller:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(@AuthenticationPrincipal OAuth2User oauth2User) {
- String userId = oauth2User.getAttribute("user_id");
- // ...
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(@AuthenticationPrincipal oauth2User: OAuth2User): String {
- val userId = oauth2User.getAttribute<String>("user_id")
- // ...
- }
- ----
- ====
- In that case, you'd want to specify that attribute with the `attributes()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(oauth2Login()
- .attributes(attrs -> attrs.put("user_id", "1234"))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oauth2Login()
- .attributes { attrs -> attrs["user_id"] = "1234" }
- )
- }
- ----
- ====
- [[testing-oauth2-login-user]]
- ===== Additional Configurations
- There are additional methods, too, for further configuring the authentication; it simply depends on what data your controller expects:
- * `clientRegistration(ClientRegistration)` - For configuring the associated `OAuth2AuthorizedClient` with a given `ClientRegistration`
- * `oauth2User(OAuth2User)` - For configuring the complete `OAuth2User` instance
- That last one is handy if you:
- 1. Have your own implementation of `OAuth2User`, or
- 2. Need to change the name attribute
- For example, let's say that your authorization server sends the principal name in the `user_name` claim instead of the `sub` claim.
- In that case, you can configure an `OAuth2User` by hand:
- ====
- .Java
- [source,java,role="primary"]
- ----
- OAuth2User oauth2User = new DefaultOAuth2User(
- AuthorityUtils.createAuthorityList("SCOPE_message:read"),
- Collections.singletonMap("user_name", "foo_user"),
- "user_name");
- mvc
- .perform(get("/endpoint")
- .with(oauth2Login().oauth2User(oauth2User))
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- val oauth2User: OAuth2User = DefaultOAuth2User(
- AuthorityUtils.createAuthorityList("SCOPE_message:read"),
- mapOf(Pair("user_name", "foo_user")),
- "user_name"
- )
- mvc.get("/endpoint") {
- with(oauth2Login().oauth2User(oauth2User))
- }
- ----
- ====
- [[testing-oauth2-client]]
- ==== Testing OAuth 2.0 Clients
- Independent of how your user authenticates, you may have other tokens and client registrations that are in play for the request you are testing.
- For example, your controller may be relying on the client credentials grant to get a token that isn't associated with the user at all:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(@RegisteredOAuth2AuthorizedClient("my-app") OAuth2AuthorizedClient authorizedClient) {
- return this.webClient.get()
- .attributes(oauth2AuthorizedClient(authorizedClient))
- .retrieve()
- .bodyToMono(String.class)
- .block();
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(@RegisteredOAuth2AuthorizedClient("my-app") authorizedClient: OAuth2AuthorizedClient?): String? {
- return this.webClient.get()
- .attributes(oauth2AuthorizedClient(authorizedClient))
- .retrieve()
- .bodyToMono(String::class.java)
- .block()
- }
- ----
- ====
- Simulating this handshake with the authorization server could be cumbersome.
- Instead, you can use `SecurityMockMvcRequestPostProcessor#oauth2Client` to add a `OAuth2AuthorizedClient` into a mock `OAuth2AuthorizedClientRepository`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint").with(oauth2Client("my-app")));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(
- oauth2Client("my-app")
- )
- }
- ----
- ====
- What this will do is create an `OAuth2AuthorizedClient` that has a simple `ClientRegistration`, `OAuth2AccessToken`, and resource owner name.
- Specifically, it will include a `ClientRegistration` with a client id of "test-client" and client secret of "test-secret":
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(authorizedClient.getClientRegistration().getClientId()).isEqualTo("test-client");
- assertThat(authorizedClient.getClientRegistration().getClientSecret()).isEqualTo("test-secret");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(authorizedClient.clientRegistration.clientId).isEqualTo("test-client")
- assertThat(authorizedClient.clientRegistration.clientSecret).isEqualTo("test-secret")
- ----
- ====
- a resource owner name of "user":
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(authorizedClient.getPrincipalName()).isEqualTo("user");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(authorizedClient.principalName).isEqualTo("user")
- ----
- ====
- and an `OAuth2AccessToken` with just one scope, `read`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(authorizedClient.getAccessToken().getScopes()).hasSize(1);
- assertThat(authorizedClient.getAccessToken().getScopes()).containsExactly("read");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(authorizedClient.accessToken.scopes).hasSize(1)
- assertThat(authorizedClient.accessToken.scopes).containsExactly("read")
- ----
- ====
- The client can then be retrieved as normal using `@RegisteredOAuth2AuthorizedClient` in a controller method.
- [[testing-oauth2-client-scopes]]
- ===== Configuring Scopes
- In many circumstances, the OAuth 2.0 access token comes with a set of scopes.
- If your controller inspects these, say like so:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(@RegisteredOAuth2AuthorizedClient("my-app") OAuth2AuthorizedClient authorizedClient) {
- Set<String> scopes = authorizedClient.getAccessToken().getScopes();
- if (scopes.contains("message:read")) {
- return this.webClient.get()
- .attributes(oauth2AuthorizedClient(authorizedClient))
- .retrieve()
- .bodyToMono(String.class)
- .block();
- }
- // ...
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(@RegisteredOAuth2AuthorizedClient("my-app") authorizedClient: OAuth2AuthorizedClient): String? {
- val scopes = authorizedClient.accessToken.scopes
- if (scopes.contains("message:read")) {
- return webClient.get()
- .attributes(oauth2AuthorizedClient(authorizedClient))
- .retrieve()
- .bodyToMono(String::class.java)
- .block()
- }
- // ...
- }
- ----
- ====
- then you can configure the scope using the `accessToken()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(oauth2Client("my-app")
- .accessToken(new OAuth2AccessToken(BEARER, "token", null, null, Collections.singleton("message:read"))))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(oauth2Client("my-app")
- .accessToken(OAuth2AccessToken(BEARER, "token", null, null, Collections.singleton("message:read")))
- )
- }
- ----
- ====
- [[testing-oauth2-client-registration]]
- ===== Additional Configurations
- There are additional methods, too, for further configuring the authentication; it simply depends on what data your controller expects:
- * `principalName(String)` - For configuring the resource owner name
- * `clientRegistration(Consumer<ClientRegistration.Builder>)` - For configuring the associated `ClientRegistration`
- * `clientRegistration(ClientRegistration)` - For configuring the complete `ClientRegistration`
- That last one is handy if you want to use a real `ClientRegistration`
- For example, let's say that you are wanting to use one of your app's `ClientRegistration` definitions, as specified in your `application.yml`.
- In that case, your test can autowire the `ClientRegistrationRepository` and look up the one your test needs:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @Autowired
- ClientRegistrationRepository clientRegistrationRepository;
- // ...
- mvc
- .perform(get("/endpoint")
- .with(oauth2Client()
- .clientRegistration(this.clientRegistrationRepository.findByRegistrationId("facebook"))));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @Autowired
- lateinit var clientRegistrationRepository: ClientRegistrationRepository
- // ...
- mvc.get("/endpoint") {
- with(oauth2Client("my-app")
- .clientRegistration(clientRegistrationRepository.findByRegistrationId("facebook"))
- )
- }
- ----
- ====
- [[testing-jwt]]
- ==== Testing JWT Authentication
- In order to make an authorized request on a resource server, you need a bearer token.
- If your resource server is configured for JWTs, then this would mean that the bearer token needs to be signed and then encoded according to the JWT specification.
- All of this can be quite daunting, especially when this isn't the focus of your test.
- Fortunately, there are a number of simple ways that you can overcome this difficulty and allow your tests to focus on authorization and not on representing bearer tokens.
- We'll look at two of them now:
- ===== `jwt() RequestPostProcessor`
- The first way is via a `RequestPostProcessor`.
- The simplest of these would look something like this:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint").with(jwt()));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(jwt())
- }
- ----
- ====
- What this will do is create a mock `Jwt`, passing it correctly through any authentication APIs so that it's available for your authorization mechanisms to verify.
- By default, the `JWT` that it creates has the following characteristics:
- [source,json]
- ----
- {
- "headers" : { "alg" : "none" },
- "claims" : {
- "sub" : "user",
- "scope" : "read"
- }
- }
- ----
- And the resulting `Jwt`, were it tested, would pass in the following way:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(jwt.getTokenValue()).isEqualTo("token");
- assertThat(jwt.getHeaders().get("alg")).isEqualTo("none");
- assertThat(jwt.getSubject()).isEqualTo("sub");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(jwt.tokenValue).isEqualTo("token")
- assertThat(jwt.headers["alg"]).isEqualTo("none")
- assertThat(jwt.subject).isEqualTo("sub")
- ----
- ====
- These values can, of course be configured.
- Any headers or claims can be configured with their corresponding methods:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(jwt().jwt(jwt -> jwt.header("kid", "one").claim("iss", "https://idp.example.org"))));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(
- jwt().jwt { jwt -> jwt.header("kid", "one").claim("iss", "https://idp.example.org") }
- )
- }
- ----
- ====
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(jwt().jwt(jwt -> jwt.claims(claims -> claims.remove("scope")))));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(
- jwt().jwt { jwt -> jwt.claims { claims -> claims.remove("scope") } }
- )
- }
- ----
- ====
- The `scope` and `scp` claims are processed the same way here as they are in a normal bearer token request.
- However, this can be overridden simply by providing the list of `GrantedAuthority` instances that you need for your test:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(jwt().authorities(new SimpleGrantedAuthority("SCOPE_messages"))));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(
- jwt().authorities(SimpleGrantedAuthority("SCOPE_messages"))
- )
- }
- ----
- ====
- Or, if you have a custom `Jwt` to `Collection<GrantedAuthority>` converter, you can also use that to derive the authorities:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(jwt().authorities(new MyConverter())));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(
- jwt().authorities(MyConverter())
- )
- }
- ----
- ====
- You can also specify a complete `Jwt`, for which `{security-api-url}org/springframework/security/oauth2/jwt/Jwt.Builder.html[Jwt.Builder]` comes quite handy:
- ====
- .Java
- [source,java,role="primary"]
- ----
- Jwt jwt = Jwt.withTokenValue("token")
- .header("alg", "none")
- .claim("sub", "user")
- .claim("scope", "read")
- .build();
- mvc
- .perform(get("/endpoint")
- .with(jwt().jwt(jwt)));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- val jwt: Jwt = Jwt.withTokenValue("token")
- .header("alg", "none")
- .claim("sub", "user")
- .claim("scope", "read")
- .build()
- mvc.get("/endpoint") {
- with(
- jwt().jwt(jwt)
- )
- }
- ----
- ====
- ===== `authentication()` `RequestPostProcessor`
- The second way is by using the `authentication()` `RequestPostProcessor`.
- Essentially, you can instantiate your own `JwtAuthenticationToken` and provide it in your test, like so:
- ====
- .Java
- [source,java,role="primary"]
- ----
- Jwt jwt = Jwt.withTokenValue("token")
- .header("alg", "none")
- .claim("sub", "user")
- .build();
- Collection<GrantedAuthority> authorities = AuthorityUtils.createAuthorityList("SCOPE_read");
- JwtAuthenticationToken token = new JwtAuthenticationToken(jwt, authorities);
- mvc
- .perform(get("/endpoint")
- .with(authentication(token)));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- val jwt = Jwt.withTokenValue("token")
- .header("alg", "none")
- .claim("sub", "user")
- .build()
- val authorities: Collection<GrantedAuthority> = AuthorityUtils.createAuthorityList("SCOPE_read")
- val token = JwtAuthenticationToken(jwt, authorities)
- mvc.get("/endpoint") {
- with(
- authentication(token)
- )
- }
- ----
- ====
- Note that as an alternative to these, you can also mock the `JwtDecoder` bean itself with a `@MockBean` annotation.
- [[testing-opaque-token]]
- ==== Testing Opaque Token Authentication
- Similar to <<testing-jwt,JWTs>>, opaque tokens require an authorization server in order to verify their validity, which can make testing more difficult.
- To help with that, Spring Security has test support for opaque tokens.
- Let's say that we've got a controller that retrieves the authentication as a `BearerTokenAuthentication`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(BearerTokenAuthentication authentication) {
- return (String) authentication.getTokenAttributes().get("sub");
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(authentication: BearerTokenAuthentication): String {
- return authentication.tokenAttributes["sub"] as String
- }
- ----
- ====
- In that case, we can tell Spring Security to include a default `BearerTokenAuthentication` using the `SecurityMockMvcRequestPostProcessors#opaqueToken` method, like so:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint").with(opaqueToken()));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(opaqueToken())
- }
- ----
- ====
- What this will do is configure the associated `MockHttpServletRequest` with a `BearerTokenAuthentication` that includes a simple `OAuth2AuthenticatedPrincipal`, `Map` of attributes, and `Collection` of granted authorities.
- Specifically, it will include a `Map` with a key/value pair of `sub`/`user`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat((String) token.getTokenAttributes().get("sub")).isEqualTo("user");
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(token.tokenAttributes["sub"] as String).isEqualTo("user")
- ----
- ====
- and a `Collection` of authorities with just one authority, `SCOPE_read`:
- ====
- .Java
- [source,java,role="primary"]
- ----
- assertThat(token.getAuthorities()).hasSize(1);
- assertThat(token.getAuthorities()).containsExactly(new SimpleGrantedAuthority("SCOPE_read"));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- assertThat(token.authorities).hasSize(1)
- assertThat(token.authorities).containsExactly(SimpleGrantedAuthority("SCOPE_read"))
- ----
- ====
- Spring Security does the necessary work to make sure that the `BearerTokenAuthentication` instance is available for your controller methods.
- [[testing-opaque-token-authorities]]
- ===== Configuring Authorities
- In many circumstances, your method is protected by filter or method security and needs your `Authentication` to have certain granted authorities to allow the request.
- In this case, you can supply what granted authorities you need using the `authorities()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(opaqueToken()
- .authorities(new SimpleGrantedAuthority("SCOPE_message:read"))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(opaqueToken()
- .authorities(SimpleGrantedAuthority("SCOPE_message:read"))
- )
- }
- ----
- ====
- [[testing-opaque-token-attributes]]
- ===== Configuring Claims
- And while granted authorities are quite common across all of Spring Security, we also have attributes in the case of OAuth 2.0.
- Let's say, for example, that you've got a `user_id` attribute that indicates the user's id in your system.
- You might access it like so in a controller:
- ====
- .Java
- [source,java,role="primary"]
- ----
- @GetMapping("/endpoint")
- public String foo(BearerTokenAuthentication authentication) {
- String userId = (String) authentication.getTokenAttributes().get("user_id");
- // ...
- }
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- @GetMapping("/endpoint")
- fun foo(authentication: BearerTokenAuthentication): String {
- val userId = authentication.tokenAttributes["user_id"] as String
- // ...
- }
- ----
- ====
- In that case, you'd want to specify that attribute with the `attributes()` method:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(get("/endpoint")
- .with(opaqueToken()
- .attributes(attrs -> attrs.put("user_id", "1234"))
- )
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc.get("/endpoint") {
- with(opaqueToken()
- .attributes { attrs -> attrs["user_id"] = "1234" }
- )
- }
- ----
- ====
- [[testing-opaque-token-principal]]
- ===== Additional Configurations
- There are additional methods, too, for further configuring the authentication; it simply depends on what data your controller expects.
- One such is `principal(OAuth2AuthenticatedPrincipal)`, which you can use to configure the complete `OAuth2AuthenticatedPrincipal` instance that underlies the `BearerTokenAuthentication`
- It's handy if you:
- 1. Have your own implementation of `OAuth2AuthenticatedPrincipal`, or
- 2. Want to specify a different principal name
- For example, let's say that your authorization server sends the principal name in the `user_name` attribute instead of the `sub` attribute.
- In that case, you can configure an `OAuth2AuthenticatedPrincipal` by hand:
- ====
- .Java
- [source,java,role="primary"]
- ----
- Map<String, Object> attributes = Collections.singletonMap("user_name", "foo_user");
- OAuth2AuthenticatedPrincipal principal = new DefaultOAuth2AuthenticatedPrincipal(
- (String) attributes.get("user_name"),
- attributes,
- AuthorityUtils.createAuthorityList("SCOPE_message:read"));
- mvc
- .perform(get("/endpoint")
- .with(opaqueToken().principal(principal))
- );
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- val attributes: Map<String, Any> = Collections.singletonMap("user_name", "foo_user")
- val principal: OAuth2AuthenticatedPrincipal = DefaultOAuth2AuthenticatedPrincipal(
- attributes["user_name"] as String?,
- attributes,
- AuthorityUtils.createAuthorityList("SCOPE_message:read")
- )
- mvc.get("/endpoint") {
- with(opaqueToken().principal(principal))
- }
- ----
- ====
- Note that as an alternative to using `opaqueToken()` test support, you can also mock the `OpaqueTokenIntrospector` bean itself with a `@MockBean` annotation.
- === SecurityMockMvcRequestBuilders
- Spring MVC Test also provides a `RequestBuilder` interface that can be used to create the `MockHttpServletRequest` used in your test.
- Spring Security provides a few `RequestBuilder` implementations that can be used to make testing easier.
- In order to use Spring Security's `RequestBuilder` implementations ensure the following static import is used:
- ====
- .Java
- [source,java,role="primary"]
- ----
- import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.*;
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- import org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.*
- ----
- ====
- ==== Testing Form Based Authentication
- You can easily create a request to test a form based authentication using Spring Security's testing support.
- For example, the following will submit a POST to "/login" with the username "user", the password "password", and a valid CSRF token:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin())
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin())
- ----
- ====
- It is easy to customize the request.
- For example, the following will submit a POST to "/auth" with the username "admin", the password "pass", and a valid CSRF token:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin("/auth").user("admin").password("pass"))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin("/auth").user("admin").password("pass"))
- ----
- ====
- We can also customize the parameters names that the username and password are included on.
- For example, this is the above request modified to include the username on the HTTP parameter "u" and the password on the HTTP parameter "p".
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin("/auth").user("u","admin").password("p","pass"))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin("/auth").user("u","admin").password("p","pass"))
- ----
- ====
- [[test-logout]]
- ==== Testing Logout
- While fairly trivial using standard Spring MVC Test, you can use Spring Security's testing support to make testing log out easier.
- For example, the following will submit a POST to "/logout" with a valid CSRF token:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(logout())
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(logout())
- ----
- ====
- You can also customize the URL to post to.
- For example, the snippet below will submit a POST to "/signout" with a valid CSRF token:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(logout("/signout"))
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(logout("/signout"))
- ----
- ====
- === SecurityMockMvcResultMatchers
- At times it is desirable to make various security related assertions about a request.
- To accommodate this need, Spring Security Test support implements Spring MVC Test's `ResultMatcher` interface.
- In order to use Spring Security's `ResultMatcher` implementations ensure the following static import is used:
- ====
- .Java
- [source,java,role="primary"]
- ----
- import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.*;
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- import org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.*
- ----
- ====
- ==== Unauthenticated Assertion
- At times it may be valuable to assert that there is no authenticated user associated with the result of a `MockMvc` invocation.
- For example, you might want to test submitting an invalid username and password and verify that no user is authenticated.
- You can easily do this with Spring Security's testing support using something like the following:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin().password("invalid"))
- .andExpect(unauthenticated());
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin().password("invalid"))
- .andExpect { unauthenticated() }
- ----
- ====
- ==== Authenticated Assertion
- It is often times that we must assert that an authenticated user exists.
- For example, we may want to verify that we authenticated successfully.
- We could verify that a form based login was successful with the following snippet of code:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin())
- .andExpect(authenticated());
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin())
- .andExpect { authenticated() }
- ----
- ====
- If we wanted to assert the roles of the user, we could refine our previous code as shown below:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin().user("admin"))
- .andExpect(authenticated().withRoles("USER","ADMIN"));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin())
- .andExpect { authenticated().withRoles("USER","ADMIN") }
- ----
- ====
- Alternatively, we could verify the username:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin().user("admin"))
- .andExpect(authenticated().withUsername("admin"));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin().user("admin"))
- .andExpect { authenticated().withUsername("admin") }
- ----
- ====
- We can also combine the assertions:
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin().user("admin"))
- .andExpect(authenticated().withUsername("admin").withRoles("USER", "ADMIN"));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin().user("admin"))
- .andExpect { authenticated().withUsername("admin").withRoles("USER", "ADMIN") }
- ----
- ====
- We can also make arbitrary assertions on the authentication
- ====
- .Java
- [source,java,role="primary"]
- ----
- mvc
- .perform(formLogin())
- .andExpect(authenticated().withAuthentication(auth ->
- assertThat(auth).isInstanceOf(UsernamePasswordAuthenticationToken.class)));
- ----
- .Kotlin
- [source,kotlin,role="secondary"]
- ----
- mvc
- .perform(formLogin())
- .andExpect {
- authenticated().withAuthentication { auth ->
- assertThat(auth).isInstanceOf(UsernamePasswordAuthenticationToken::class.java) }
- }
- }
- ----
- ====
- === SecurityMockMvcResultHandlers
- Spring Security provides a few ``ResultHandler``s implementations.
- In order to use Spring Security's ``ResultHandler``s implementations ensure the following static import is used:
- [source,java]
- ----
- import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultHandlers.*;
- ----
- ==== Exporting the SecurityContext
- Often times we want to query a repository to see if some `MockMvc` request actually persisted in the database.
- In some cases our repository query uses the <<data,Spring Data Integration>> to filter the results based on current user's username or any other property.
- Let's see an example:
- A repository interface:
- [source,java]
- ----
- private interface MessageRepository extends JpaRepository<Message, Long> {
- @Query("SELECT m.content FROM Message m WHERE m.sentBy = ?#{ principal?.name }")
- List<String> findAllUserMessages();
- }
- ----
- Our test scenario:
- [source,java]
- ----
- mvc
- .perform(post("/message")
- .content("New Message")
- .contentType(MediaType.TEXT_PLAIN)
- )
- .andExpect(status().isOk());
- List<String> userMessages = messageRepository.findAllUserMessages();
- assertThat(userMessages).hasSize(1);
- ----
- This test won't pass because after our request finishes, the `SecurityContextHolder` will be cleared out by the filter chain.
- We can then export the `TestSecurityContextHolder` to our `SecurityContextHolder` and use it as we want:
- [source,java]
- ----
- mvc
- .perform(post("/message")
- .content("New Message")
- .contentType(MediaType.TEXT_PLAIN)
- )
- .andDo(exportTestSecurityContext())
- .andExpect(status().isOk());
- List<String> userMessages = messageRepository.findAllUserMessages();
- assertThat(userMessages).hasSize(1);
- ----
- [NOTE]
- ====
- Remember to clear the `SecurityContextHolder` between your tests, or it may leak amongst them
- ====
|