| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274 | 
							- [[webflux-testing-oauth2]]
 
- = Testing OAuth 2.0
 
- When it comes to OAuth 2.0, xref:reactive/test/method.adoc#test-erms[the same principles covered earlier still apply]: Ultimately, it depends on what your method under test is expecting to be in the `SecurityContextHolder`.
 
- Consider the following example of a controller:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(Principal user) {
 
-     return Mono.just(user.getName());
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(user: Principal): Mono<String> {
 
-     return Mono.just(user.name)
 
- }
 
- ----
 
- ======
 
- Nothing about it is OAuth2-specific, so you can xref:reactive/test/method.adoc#test-erms[use `@WithMockUser`] and be fine.
 
- However, consider a case where your controller is bound to some aspect of Spring Security's OAuth 2.0 support:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(@AuthenticationPrincipal OidcUser user) {
 
-     return Mono.just(user.getIdToken().getSubject());
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(@AuthenticationPrincipal user: OidcUser): Mono<String> {
 
-     return Mono.just(user.idToken.subject)
 
- }
 
- ----
 
- ======
 
- In that case, Spring Security's test support is handy.
 
- [[webflux-testing-oidc-login]]
 
- == Testing OIDC Login
 
- Testing the method shown in the <<webflux-testing-oauth2,preceding section>> with `WebTestClient` requires simulating some kind of grant flow with an authorization server.
 
- This is a daunting task, which is why Spring Security ships with support for removing this boilerplate.
 
- For example, we can tell Spring Security to include a default `OidcUser` by using the `SecurityMockServerConfigurers#oidcLogin` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOidcLogin()).get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOidcLogin())
 
-     .get().uri("/endpoint")
 
-     .exchange()
 
- ----
 
- ======
 
- That line configures the associated `MockServerRequest` with an `OidcUser` that includes a simple `OidcIdToken`, an `OidcUserInfo`, and a `Collection` of granted authorities.
 
- Specifically, it includes an `OidcIdToken` with a `sub` claim set to `user`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(user.getIdToken().getClaim("sub")).isEqualTo("user");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(user.idToken.getClaim<String>("sub")).isEqualTo("user")
 
- ----
 
- ======
 
- It also includes an `OidcUserInfo` with no claims set:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(user.getUserInfo().getClaims()).isEmpty();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(user.userInfo.claims).isEmpty()
 
- ----
 
- ======
 
- It also includes a `Collection` of authorities with just one authority, `SCOPE_read`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(user.getAuthorities()).hasSize(1);
 
- assertThat(user.getAuthorities()).containsExactly(new SimpleGrantedAuthority("SCOPE_read"));
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(user.authorities).hasSize(1)
 
- assertThat(user.authorities).containsExactly(SimpleGrantedAuthority("SCOPE_read"))
 
- ----
 
- ======
 
- Spring Security makes sure that the `OidcUser` instance is available forxref:servlet/integrations/mvc.adoc#mvc-authentication-principal[the `@AuthenticationPrincipal` annotation].
 
- Further, it also links the `OidcUser` to a simple instance of `OAuth2AuthorizedClient` that it deposits into a mock `ServerOAuth2AuthorizedClientRepository`.
 
- This can be handy if your tests <<webflux-testing-oauth2-client,use the `@RegisteredOAuth2AuthorizedClient` annotation>>..
 
- [[webflux-testing-oidc-login-authorities]]
 
- === Configuring Authorities
 
- In many circumstances, your method is protected by filter or method security and needs your `Authentication` to have certain granted authorities to allow the request.
 
- In those cases, you can supply what granted authorities you need by using the `authorities()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOidcLogin()
 
-         .authorities(new SimpleGrantedAuthority("SCOPE_message:read"))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOidcLogin()
 
-         .authorities(SimpleGrantedAuthority("SCOPE_message:read"))
 
-     )
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-oidc-login-claims]]
 
- === Configuring Claims
 
- While granted authorities are common across all of Spring Security, we also have claims in the case of OAuth 2.0.
 
- Suppose, for example, that you have a `user_id` claim that indicates the user's ID in your system.
 
- You might access it as follows in a controller:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(@AuthenticationPrincipal OidcUser oidcUser) {
 
-     String userId = oidcUser.getIdToken().getClaim("user_id");
 
-     // ...
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(@AuthenticationPrincipal oidcUser: OidcUser): Mono<String> {
 
-     val userId = oidcUser.idToken.getClaim<String>("user_id")
 
-     // ...
 
- }
 
- ----
 
- ======
 
- In that case, you can specify that claim with the `idToken()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOidcLogin()
 
-         .idToken(token -> token.claim("user_id", "1234"))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOidcLogin()
 
-         .idToken { token -> token.claim("user_id", "1234") }
 
-     )
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- That works because `OidcUser` collects its claims from `OidcIdToken`.
 
- [[webflux-testing-oidc-login-user]]
 
- === Additional Configurations
 
- There are additional methods, too, for further configuring the authentication, depending on what data your controller expects:
 
- * `userInfo(OidcUserInfo.Builder)`: Configures the `OidcUserInfo` instance
 
- * `clientRegistration(ClientRegistration)`: Configures the associated `OAuth2AuthorizedClient` with a given `ClientRegistration`
 
- * `oidcUser(OidcUser)`: Configures the complete `OidcUser` instance
 
- That last one is handy if you:
 
- * Have your own implementation of `OidcUser` or
 
- * Need to change the name attribute
 
- For example, suppose that your authorization server sends the principal name in the `user_name` claim instead of the `sub` claim.
 
- In that case, you can configure an `OidcUser` by hand:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- OidcUser oidcUser = new DefaultOidcUser(
 
-         AuthorityUtils.createAuthorityList("SCOPE_message:read"),
 
-         OidcIdToken.withTokenValue("id-token").claim("user_name", "foo_user").build(),
 
-         "user_name");
 
- client
 
-     .mutateWith(mockOidcLogin().oidcUser(oidcUser))
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val oidcUser: OidcUser = DefaultOidcUser(
 
-     AuthorityUtils.createAuthorityList("SCOPE_message:read"),
 
-     OidcIdToken.withTokenValue("id-token").claim("user_name", "foo_user").build(),
 
-     "user_name"
 
- )
 
- client
 
-     .mutateWith(mockOidcLogin().oidcUser(oidcUser))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-oauth2-login]]
 
- == Testing OAuth 2.0 Login
 
- As with <<webflux-testing-oidc-login,testing OIDC login>>, testing OAuth 2.0 Login presents a similar challenge: mocking a grant flow.
 
- Because of that, Spring Security also has test support for non-OIDC use cases.
 
- Suppose that we have a controller that gets the logged-in user as an `OAuth2User`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(@AuthenticationPrincipal OAuth2User oauth2User) {
 
-     return Mono.just(oauth2User.getAttribute("sub"));
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(@AuthenticationPrincipal oauth2User: OAuth2User): Mono<String> {
 
-     return Mono.just(oauth2User.getAttribute("sub"))
 
- }
 
- ----
 
- ======
 
- In that case, we can tell Spring Security to include a default `OAuth2User` by using the `SecurityMockServerConfigurers#oauth2User` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Login())
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Login())
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- The preceding example configures the associated `MockServerRequest` with an `OAuth2User` that includes a simple `Map` of attributes and a `Collection` of granted authorities.
 
- Specifically, it includes a `Map` with a key/value pair of `sub`/`user`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat((String) user.getAttribute("sub")).isEqualTo("user");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(user.getAttribute<String>("sub")).isEqualTo("user")
 
- ----
 
- ======
 
- It also includes a `Collection` of authorities with just one authority, `SCOPE_read`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(user.getAuthorities()).hasSize(1);
 
- assertThat(user.getAuthorities()).containsExactly(new SimpleGrantedAuthority("SCOPE_read"));
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(user.authorities).hasSize(1)
 
- assertThat(user.authorities).containsExactly(SimpleGrantedAuthority("SCOPE_read"))
 
- ----
 
- ======
 
- Spring Security does the necessary work to make sure that the `OAuth2User` instance is available for xref:servlet/integrations/mvc.adoc#mvc-authentication-principal[the `@AuthenticationPrincipal` annotation].
 
- Further, it also links that `OAuth2User` to a simple instance of `OAuth2AuthorizedClient` that it deposits in a mock `ServerOAuth2AuthorizedClientRepository`.
 
- This can be handy if your tests <<webflux-testing-oauth2-client,use the `@RegisteredOAuth2AuthorizedClient` annotation>>.
 
- [[webflux-testing-oauth2-login-authorities]]
 
- === Configuring Authorities
 
- In many circumstances, your method is protected by filter or method security and needs your `Authentication` to have certain granted authorities to allow the request.
 
- In this case, you can supply the granted authorities you need by using the `authorities()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Login()
 
-         .authorities(new SimpleGrantedAuthority("SCOPE_message:read"))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Login()
 
-         .authorities(SimpleGrantedAuthority("SCOPE_message:read"))
 
-     )
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-oauth2-login-claims]]
 
- === Configuring Claims
 
- While granted authorities are quite common across all of Spring Security, we also have claims in the case of OAuth 2.0.
 
- Suppose, for example, that you have a `user_id` attribute that indicates the user's ID in your system.
 
- You might access it as follows in a controller:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(@AuthenticationPrincipal OAuth2User oauth2User) {
 
-     String userId = oauth2User.getAttribute("user_id");
 
-     // ...
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(@AuthenticationPrincipal oauth2User: OAuth2User): Mono<String> {
 
-     val userId = oauth2User.getAttribute<String>("user_id")
 
-     // ...
 
- }
 
- ----
 
- ======
 
- In that case, you can specify that attribute with the `attributes()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Login()
 
-         .attributes(attrs -> attrs.put("user_id", "1234"))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Login()
 
-         .attributes { attrs -> attrs["user_id"] = "1234" }
 
-     )
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-oauth2-login-user]]
 
- === Additional Configurations
 
- There are additional methods, too, for further configuring the authentication, depending on what data your controller expects:
 
- * `clientRegistration(ClientRegistration)`: Configures the associated `OAuth2AuthorizedClient` with a given `ClientRegistration`
 
- * `oauth2User(OAuth2User)`: Configures the complete `OAuth2User` instance
 
- That last one is handy if you:
 
- * Have your own implementation of `OAuth2User` or
 
- * Need to change the name attribute
 
- For example, suppose that your authorization server sends the principal name in the `user_name` claim instead of the `sub` claim.
 
- In that case, you can configure an `OAuth2User` by hand:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- OAuth2User oauth2User = new DefaultOAuth2User(
 
-         AuthorityUtils.createAuthorityList("SCOPE_message:read"),
 
-         Collections.singletonMap("user_name", "foo_user"),
 
-         "user_name");
 
- client
 
-     .mutateWith(mockOAuth2Login().oauth2User(oauth2User))
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val oauth2User: OAuth2User = DefaultOAuth2User(
 
-     AuthorityUtils.createAuthorityList("SCOPE_message:read"),
 
-     mapOf(Pair("user_name", "foo_user")),
 
-     "user_name"
 
- )
 
- client
 
-     .mutateWith(mockOAuth2Login().oauth2User(oauth2User))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-oauth2-client]]
 
- == Testing OAuth 2.0 Clients
 
- Independent of how your user authenticates, you may have other tokens and client registrations that are in play for the request you are testing.
 
- For example, your controller may rely on the client credentials grant to get a token that is not associated with the user at all:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(@RegisteredOAuth2AuthorizedClient("my-app") OAuth2AuthorizedClient authorizedClient) {
 
-     return this.webClient.get()
 
-         .attributes(oauth2AuthorizedClient(authorizedClient))
 
-         .retrieve()
 
-         .bodyToMono(String.class);
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- import org.springframework.web.reactive.function.client.bodyToMono
 
- // ...
 
- @GetMapping("/endpoint")
 
- fun foo(@RegisteredOAuth2AuthorizedClient("my-app") authorizedClient: OAuth2AuthorizedClient?): Mono<String> {
 
-     return this.webClient.get()
 
-         .attributes(oauth2AuthorizedClient(authorizedClient))
 
-         .retrieve()
 
-         .bodyToMono()
 
- }
 
- ----
 
- ======
 
- Simulating this handshake with the authorization server can be cumbersome.
 
- Instead, you can use `SecurityMockServerConfigurers#oauth2Client` to add a `OAuth2AuthorizedClient` to a mock `ServerOAuth2AuthorizedClientRepository`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Client("my-app"))
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Client("my-app"))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- This creates an `OAuth2AuthorizedClient` that has a simple `ClientRegistration`, a `OAuth2AccessToken`, and a resource owner name.
 
- Specifically, it includes a `ClientRegistration` with a client ID of `test-client` and a client secret of `test-secret`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(authorizedClient.getClientRegistration().getClientId()).isEqualTo("test-client");
 
- assertThat(authorizedClient.getClientRegistration().getClientSecret()).isEqualTo("test-secret");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(authorizedClient.clientRegistration.clientId).isEqualTo("test-client")
 
- assertThat(authorizedClient.clientRegistration.clientSecret).isEqualTo("test-secret")
 
- ----
 
- ======
 
- It also includes a resource owner name of `user`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(authorizedClient.getPrincipalName()).isEqualTo("user");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(authorizedClient.principalName).isEqualTo("user")
 
- ----
 
- ======
 
- It also includes an `OAuth2AccessToken` with one scope, `read`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(authorizedClient.getAccessToken().getScopes()).hasSize(1);
 
- assertThat(authorizedClient.getAccessToken().getScopes()).containsExactly("read");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(authorizedClient.accessToken.scopes).hasSize(1)
 
- assertThat(authorizedClient.accessToken.scopes).containsExactly("read")
 
- ----
 
- ======
 
- You can then retrieve the client as usual by using `@RegisteredOAuth2AuthorizedClient` in a controller method.
 
- [[webflux-testing-oauth2-client-scopes]]
 
- === Configuring Scopes
 
- In many circumstances, the OAuth 2.0 access token comes with a set of scopes.
 
- Consider the following example of how a controller can inspect the scopes:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(@RegisteredOAuth2AuthorizedClient("my-app") OAuth2AuthorizedClient authorizedClient) {
 
-     Set<String> scopes = authorizedClient.getAccessToken().getScopes();
 
-     if (scopes.contains("message:read")) {
 
-         return this.webClient.get()
 
-             .attributes(oauth2AuthorizedClient(authorizedClient))
 
-             .retrieve()
 
-             .bodyToMono(String.class);
 
-     }
 
-     // ...
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- import org.springframework.web.reactive.function.client.bodyToMono
 
- // ...
 
- @GetMapping("/endpoint")
 
- fun foo(@RegisteredOAuth2AuthorizedClient("my-app") authorizedClient: OAuth2AuthorizedClient): Mono<String> {
 
-     val scopes = authorizedClient.accessToken.scopes
 
-     if (scopes.contains("message:read")) {
 
-         return webClient.get()
 
-             .attributes(oauth2AuthorizedClient(authorizedClient))
 
-             .retrieve()
 
-             .bodyToMono()
 
-     }
 
-     // ...
 
- }
 
- ----
 
- ======
 
- Given a controller that inspects scopes, you can configure the scope by using the `accessToken()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Client("my-app")
 
-         .accessToken(new OAuth2AccessToken(BEARER, "token", null, null, Collections.singleton("message:read")))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOAuth2Client("my-app")
 
-         .accessToken(OAuth2AccessToken(BEARER, "token", null, null, setOf("message:read")))
 
- )
 
- .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-oauth2-client-registration]]
 
- === Additional Configurations
 
- You can also use additional methods to further configure the authentication depending on what data your controller expects:
 
- * `principalName(String)`; Configures the resource owner name
 
- * `clientRegistration(Consumer<ClientRegistration.Builder>)`: Configures the associated `ClientRegistration`
 
- * `clientRegistration(ClientRegistration)`: Configures the complete `ClientRegistration`
 
- That last one is handy if you want to use a real `ClientRegistration`
 
- For example, suppose that you want to use one of your application's `ClientRegistration` definitions, as specified in your `application.yml`.
 
- In that case, your test can autowire the `ReactiveClientRegistrationRepository` and look up the one your test needs:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @Autowired
 
- ReactiveClientRegistrationRepository clientRegistrationRepository;
 
- // ...
 
- client
 
-     .mutateWith(mockOAuth2Client()
 
-         .clientRegistration(this.clientRegistrationRepository.findByRegistrationId("facebook").block())
 
-     )
 
-     .get().uri("/exchange").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @Autowired
 
- lateinit var clientRegistrationRepository: ReactiveClientRegistrationRepository
 
- // ...
 
- client
 
-     .mutateWith(mockOAuth2Client()
 
-         .clientRegistration(this.clientRegistrationRepository.findByRegistrationId("facebook").block())
 
-     )
 
-     .get().uri("/exchange").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-jwt]]
 
- == Testing JWT Authentication
 
- To make an authorized request on a resource server, you need a bearer token.
 
- If your resource server is configured for JWTs, the bearer token needs to be signed and then encoded according to the JWT specification.
 
- All of this can be quite daunting, especially when this is not the focus of your test.
 
- Fortunately, there are a number of simple ways in which you can overcome this difficulty and let your tests focus on authorization and not on representing bearer tokens.
 
- We look at two of them in the next two subsections.
 
- === `mockJwt() WebTestClientConfigurer`
 
- The first way is with a `WebTestClientConfigurer`.
 
- The simplest of these would be to use the `SecurityMockServerConfigurers#mockJwt` method like the following:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockJwt()).get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockJwt()).get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- This example creates a mock `Jwt` and passes it through any authentication APIs so that it is available for your authorization mechanisms to verify.
 
- By default, the `JWT` that it creates has the following characteristics:
 
- [source,json]
 
- ----
 
- {
 
-   "headers" : { "alg" : "none" },
 
-   "claims" : {
 
-     "sub" : "user",
 
-     "scope" : "read"
 
-   }
 
- }
 
- ----
 
- The resulting `Jwt`, were it tested, would pass in the following way:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(jwt.getTokenValue()).isEqualTo("token");
 
- assertThat(jwt.getHeaders().get("alg")).isEqualTo("none");
 
- assertThat(jwt.getSubject()).isEqualTo("sub");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(jwt.tokenValue).isEqualTo("token")
 
- assertThat(jwt.headers["alg"]).isEqualTo("none")
 
- assertThat(jwt.subject).isEqualTo("sub")
 
- ----
 
- ======
 
- Note that you configure these values.
 
- You can also configure any headers or claims with their corresponding methods:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
- 	.mutateWith(mockJwt().jwt(jwt -> jwt.header("kid", "one")
 
- 		.claim("iss", "https://idp.example.org")))
 
- 	.get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockJwt().jwt { jwt -> jwt.header("kid", "one")
 
-         .claim("iss", "https://idp.example.org")
 
-     })
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
- 	.mutateWith(mockJwt().jwt(jwt -> jwt.claims(claims -> claims.remove("scope"))))
 
- 	.get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockJwt().jwt { jwt ->
 
-         jwt.claims { claims -> claims.remove("scope") }
 
-     })
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- The `scope` and `scp` claims are processed the same way here as they are in a normal bearer token request.
 
- However, this can be overridden simply by providing the list of `GrantedAuthority` instances that you need for your test:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
- 	.mutateWith(mockJwt().authorities(new SimpleGrantedAuthority("SCOPE_messages")))
 
- 	.get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockJwt().authorities(SimpleGrantedAuthority("SCOPE_messages")))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- Alternatively, if you have a custom `Jwt` to `Collection<GrantedAuthority>` converter, you can also use that to derive the authorities:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
- 	.mutateWith(mockJwt().authorities(new MyConverter()))
 
- 	.get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockJwt().authorities(MyConverter()))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- You can also specify a complete `Jwt`, for which javadoc:org.springframework.security.oauth2.jwt.Jwt$Builder[] is quite handy:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- Jwt jwt = Jwt.withTokenValue("token")
 
-     .header("alg", "none")
 
-     .claim("sub", "user")
 
-     .claim("scope", "read")
 
-     .build();
 
- client
 
- 	.mutateWith(mockJwt().jwt(jwt))
 
- 	.get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val jwt: Jwt = Jwt.withTokenValue("token")
 
-     .header("alg", "none")
 
-     .claim("sub", "user")
 
-     .claim("scope", "read")
 
-     .build()
 
- client
 
-     .mutateWith(mockJwt().jwt(jwt))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- === `authentication()` and `WebTestClientConfigurer`
 
- The second way is by using the `authentication()` `Mutator`.
 
- You can instantiate your own `JwtAuthenticationToken` and provide it in your test:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- Jwt jwt = Jwt.withTokenValue("token")
 
-     .header("alg", "none")
 
-     .claim("sub", "user")
 
-     .build();
 
- Collection<GrantedAuthority> authorities = AuthorityUtils.createAuthorityList("SCOPE_read");
 
- JwtAuthenticationToken token = new JwtAuthenticationToken(jwt, authorities);
 
- client
 
- 	.mutateWith(mockAuthentication(token))
 
- 	.get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val jwt = Jwt.withTokenValue("token")
 
-     .header("alg", "none")
 
-     .claim("sub", "user")
 
-     .build()
 
- val authorities: Collection<GrantedAuthority> = AuthorityUtils.createAuthorityList("SCOPE_read")
 
- val token = JwtAuthenticationToken(jwt, authorities)
 
- client
 
-     .mutateWith(mockAuthentication<JwtMutator>(token))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- Note that, as an alternative to these, you can also mock the `ReactiveJwtDecoder` bean itself with a `@MockBean` annotation.
 
- [[webflux-testing-opaque-token]]
 
- == Testing Opaque Token Authentication
 
- Similar to <<webflux-testing-jwt,JWTs>>, opaque tokens require an authorization server in order to verify their validity, which can make testing more difficult.
 
- To help with that, Spring Security has test support for opaque tokens.
 
- Suppose you have a controller that retrieves the authentication as a `BearerTokenAuthentication`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(BearerTokenAuthentication authentication) {
 
-     return Mono.just((String) authentication.getTokenAttributes().get("sub"));
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(authentication: BearerTokenAuthentication): Mono<String?> {
 
-     return Mono.just(authentication.tokenAttributes["sub"] as String?)
 
- }
 
- ----
 
- ======
 
- In that case, you can tell Spring Security to include a default `BearerTokenAuthentication` by using the `SecurityMockServerConfigurers#opaqueToken` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOpaqueToken())
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOpaqueToken())
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- This example configures the associated `MockHttpServletRequest` with a `BearerTokenAuthentication` that includes a simple `OAuth2AuthenticatedPrincipal`, a `Map` of attributes, and a `Collection` of granted authorities.
 
- Specifically, it includes a `Map` with a key/value pair of `sub`/`user`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat((String) token.getTokenAttributes().get("sub")).isEqualTo("user");
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(token.tokenAttributes["sub"] as String?).isEqualTo("user")
 
- ----
 
- ======
 
- It also includes a `Collection` of authorities with just one authority, `SCOPE_read`:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- assertThat(token.getAuthorities()).hasSize(1);
 
- assertThat(token.getAuthorities()).containsExactly(new SimpleGrantedAuthority("SCOPE_read"));
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- assertThat(token.authorities).hasSize(1)
 
- assertThat(token.authorities).containsExactly(SimpleGrantedAuthority("SCOPE_read"))
 
- ----
 
- ======
 
- Spring Security does the necessary work to make sure that the `BearerTokenAuthentication` instance is available for your controller methods.
 
- [[webflux-testing-opaque-token-authorities]]
 
- === Configuring Authorities
 
- In many circumstances, your method is protected by filter or method security and needs your `Authentication` to have certain granted authorities to allow the request.
 
- In this case, you can supply what granted authorities you need using the `authorities()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOpaqueToken()
 
-         .authorities(new SimpleGrantedAuthority("SCOPE_message:read"))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOpaqueToken()
 
-         .authorities(SimpleGrantedAuthority("SCOPE_message:read"))
 
-     )
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-opaque-token-attributes]]
 
- === Configuring Claims
 
- While granted authorities are quite common across all of Spring Security, we also have attributes in the case of OAuth 2.0.
 
- Suppose, for example, that you have a `user_id` attribute that indicates the user's ID in your system.
 
- You might access it as follows in a controller:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- public Mono<String> foo(BearerTokenAuthentication authentication) {
 
-     String userId = (String) authentication.getTokenAttributes().get("user_id");
 
-     // ...
 
- }
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- @GetMapping("/endpoint")
 
- fun foo(authentication: BearerTokenAuthentication): Mono<String?> {
 
-     val userId = authentication.tokenAttributes["user_id"] as String?
 
-     // ...
 
- }
 
- ----
 
- ======
 
- In that case, you can specify that attribute with the `attributes()` method:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- client
 
-     .mutateWith(mockOpaqueToken()
 
-         .attributes(attrs -> attrs.put("user_id", "1234"))
 
-     )
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- client
 
-     .mutateWith(mockOpaqueToken()
 
-         .attributes { attrs -> attrs["user_id"] = "1234" }
 
-     )
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- [[webflux-testing-opaque-token-principal]]
 
- === Additional Configurations
 
- You can also use additional methods to further configure the authentication, depending on what data your controller expects.
 
- One such method is `principal(OAuth2AuthenticatedPrincipal)`, which you can use to configure the complete `OAuth2AuthenticatedPrincipal` instance that underlies the `BearerTokenAuthentication`.
 
- It is handy if you:
 
- * Have your own implementation of `OAuth2AuthenticatedPrincipal` or
 
- * Want to specify a different principal name
 
- For example, suppose that your authorization server sends the principal name in the `user_name` attribute instead of the `sub` attribute.
 
- In that case, you can configure an `OAuth2AuthenticatedPrincipal` by hand:
 
- [tabs]
 
- ======
 
- Java::
 
- +
 
- [source,java,role="primary"]
 
- ----
 
- Map<String, Object> attributes = Collections.singletonMap("user_name", "foo_user");
 
- OAuth2AuthenticatedPrincipal principal = new DefaultOAuth2AuthenticatedPrincipal(
 
-         (String) attributes.get("user_name"),
 
-         attributes,
 
-         AuthorityUtils.createAuthorityList("SCOPE_message:read"));
 
- client
 
-     .mutateWith(mockOpaqueToken().principal(principal))
 
-     .get().uri("/endpoint").exchange();
 
- ----
 
- Kotlin::
 
- +
 
- [source,kotlin,role="secondary"]
 
- ----
 
- val attributes: Map<String, Any> = mapOf(Pair("user_name", "foo_user"))
 
- val principal: OAuth2AuthenticatedPrincipal = DefaultOAuth2AuthenticatedPrincipal(
 
-     attributes["user_name"] as String?,
 
-     attributes,
 
-     AuthorityUtils.createAuthorityList("SCOPE_message:read")
 
- )
 
- client
 
-     .mutateWith(mockOpaqueToken().principal(principal))
 
-     .get().uri("/endpoint").exchange()
 
- ----
 
- ======
 
- Note that, as an alternative to using `mockOpaqueToken()` test support, you can also mock the `OpaqueTokenIntrospector` bean itself with a `@MockBean` annotation.
 
 
  |