Package org.springframework.security.oauth2.config.annotation

Source Code of org.springframework.security.oauth2.config.annotation.AuthorizationServerConfigurationTests$AuthorizationServerVanilla

/*
* Copyright 2006-2011 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on
* an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package org.springframework.security.oauth2.config.annotation;

import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;

import java.util.Arrays;
import java.util.List;
import java.util.Map;

import javax.sql.DataSource;

import org.junit.After;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.ExpectedException;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
import org.junit.runners.Parameterized.Parameters;
import org.mockito.Mockito;
import org.springframework.beans.factory.BeanCreationException;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.ApplicationContext;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.mock.web.MockServletContext;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.config.annotation.web.servlet.configuration.EnableWebMvcSecurity;
import org.springframework.security.oauth2.config.annotation.configurers.ClientDetailsServiceConfigurer;
import org.springframework.security.oauth2.config.annotation.web.configuration.AuthorizationServerConfigurerAdapter;
import org.springframework.security.oauth2.config.annotation.web.configuration.EnableAuthorizationServer;
import org.springframework.security.oauth2.config.annotation.web.configurers.AuthorizationServerEndpointsConfigurer;
import org.springframework.security.oauth2.config.annotation.web.configurers.AuthorizationServerSecurityConfigurer;
import org.springframework.security.oauth2.provider.AuthorizationRequest;
import org.springframework.security.oauth2.provider.ClientDetailsService;
import org.springframework.security.oauth2.provider.OAuth2RequestFactory;
import org.springframework.security.oauth2.provider.approval.DefaultUserApprovalHandler;
import org.springframework.security.oauth2.provider.approval.TokenApprovalStore;
import org.springframework.security.oauth2.provider.approval.UserApprovalHandler;
import org.springframework.security.oauth2.provider.client.ClientCredentialsTokenGranter;
import org.springframework.security.oauth2.provider.endpoint.AuthorizationEndpoint;
import org.springframework.security.oauth2.provider.token.AuthorizationServerTokenServices;
import org.springframework.security.oauth2.provider.token.DefaultTokenServices;
import org.springframework.security.oauth2.provider.token.TokenStore;
import org.springframework.security.oauth2.provider.token.store.InMemoryTokenStore;
import org.springframework.security.oauth2.provider.token.store.JdbcTokenStore;
import org.springframework.security.oauth2.provider.token.store.JwtAccessTokenConverter;
import org.springframework.security.oauth2.provider.token.store.JwtTokenStore;
import org.springframework.test.util.ReflectionTestUtils;
import org.springframework.web.context.support.AnnotationConfigWebApplicationContext;
import org.springframework.web.servlet.handler.HandlerInterceptorAdapter;

/**
* @author Dave Syer
*
*/
@RunWith(Parameterized.class)
public class AuthorizationServerConfigurationTests {

  private AnnotationConfigWebApplicationContext context;

  @Rule
  public ExpectedException expected = ExpectedException.none();

  private Class<?>[] resources;

  @Parameters
  public static List<Object[]> parameters() {
    return Arrays.asList( // @formatter:off
        new Object[] { BeanCreationException.class,  new Class<?>[] { AuthorizationServerUnconfigured.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerCycle.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerVanilla.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerDisableApproval.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerExtras.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerJdbc.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerJwt.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerWithTokenServices.class } },
        new Object[] { null, new Class<?>[] { AuthorizationServerApproval.class } },
        new Object[] { BeanCreationException.class,  new Class<?>[] { AuthorizationServerTypes.class } } 
        // @formatter:on
        );
  }

  public AuthorizationServerConfigurationTests(Class<? extends Exception> error, Class<?>... resource) {
    if (error != null) {
      expected.expect(error);
    }
    this.resources = resource;
    context = new AnnotationConfigWebApplicationContext();
    context.setServletContext(new MockServletContext());
    context.register(resource);
  }

  @After
  public void close() {
    if (context != null) {
      context.close();
    }
  }

  @Test
  public void testDefaults() {
    context.refresh();
    assertTrue(context.containsBeanDefinition("authorizationEndpoint"));
    assertNotNull(context.getBean("authorizationEndpoint", AuthorizationEndpoint.class));
    for (Class<?> resource : resources) {
      if (Runnable.class.isAssignableFrom(resource)) {
        ((Runnable) context.getBean(resource)).run();
      }
    }
  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerUnconfigured {
  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerVanilla extends AuthorizationServerConfigurerAdapter implements Runnable {
    @Autowired
    private AuthorizationEndpoint endpoint;

    @Autowired
    private ClientDetailsService clientDetailsService;

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password", "authorization_code", "refresh_token", "implicit")
                .authorities("ROLE_CLIENT", "ROLE_TRUSTED_CLIENT")
                .scopes("read", "write", "trust")
                .accessTokenValiditySeconds(60)
                .additionalInformation("foo:bar", "spam:bucket", "crap", "bad:");
       // @formatter:on
    }

    @Override
    public void run() {
      // With no explicit approval store we still expect to see scopes in the user approval model
      UserApprovalHandler handler = (UserApprovalHandler) ReflectionTestUtils.getField(endpoint,
          "userApprovalHandler");
      AuthorizationRequest authorizationRequest = new AuthorizationRequest();
      authorizationRequest.setScope(Arrays.asList("read"));
      Map<String, Object> request = handler.getUserApprovalRequest(authorizationRequest,
          new UsernamePasswordAuthenticationToken("user", "password"));
      assertTrue(request.containsKey("scopes"));

      Map<String,Object> information = clientDetailsService.loadClientByClientId("my-trusted-client")
          .getAdditionalInformation();

      assertTrue(information.containsKey("foo"));
      assertTrue(information.get("foo").equals("bar"));
      assertTrue(information.get("spam").equals("bucket"));
      assertTrue(information.get("crap") == null);
      assertTrue(information.get("bad").equals(""));
    }
  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerCycle extends AuthorizationServerConfigurerAdapter implements Runnable {
    @Autowired
    private AuthorizationServerTokenServices tokenServices;

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenServices(tokenServices); // cycle can lead to null here
    }

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password");
       // @formatter:on
    }

    @Override
    public void run() {
      assertNotNull(tokenServices);
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerDisableApproval extends AuthorizationServerConfigurerAdapter implements
      Runnable {

    @Autowired
    private AuthorizationEndpoint endpoint;

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password");
       // @formatter:on
    }

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.approvalStoreDisabled();
    }

    @Override
    public void run() {
      // There should be no scopes in the approval model
      UserApprovalHandler handler = (UserApprovalHandler) ReflectionTestUtils.getField(endpoint,
          "userApprovalHandler");
      AuthorizationRequest authorizationRequest = new AuthorizationRequest();
      authorizationRequest.setScope(Arrays.asList("read"));
      Map<String, Object> request = handler.getUserApprovalRequest(authorizationRequest,
          new UsernamePasswordAuthenticationToken("user", "password"));
      assertFalse(request.containsKey("scopes"));
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerExtras extends AuthorizationServerConfigurerAdapter implements Runnable {

    private TokenStore tokenStore = new InMemoryTokenStore();

    @Autowired
    private ApplicationContext context;

    @Bean
    public DefaultUserApprovalHandler userApprovalHandler() {
      return new DefaultUserApprovalHandler();
    }

    @Bean
    public TokenApprovalStore approvalStore() {
      return new TokenApprovalStore();
    }

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenStore(tokenStore).approvalStore(approvalStore()).userApprovalHandler(userApprovalHandler())
          .addInterceptor(new HandlerInterceptorAdapter() {
          });
    }

    @Override
    public void configure(AuthorizationServerSecurityConfigurer oauthServer) throws Exception {
      oauthServer.realm("oauth/sparklr");
    }

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password", "authorization_code", "refresh_token", "implicit")
                .authorities("ROLE_CLIENT", "ROLE_TRUSTED_CLIENT")
                .scopes("read", "write", "trust")
                .accessTokenValiditySeconds(60);
       // @formatter:on
    }

    @Override
    public void run() {
      assertNotNull(context.getBean("clientDetailsService", ClientDetailsService.class).loadClientByClientId(
          "my-trusted-client"));
      assertNotNull(ReflectionTestUtils.getField(context.getBean(AuthorizationEndpoint.class),
          "userApprovalHandler"));
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerJdbc extends AuthorizationServerConfigurerAdapter {

    @Autowired
    private ApplicationContext context;

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenStore(new JdbcTokenStore(dataSource()));
    }

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.jdbc(dataSource())
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password");
       // @formatter:on
    }

    @Bean
    public DataSource dataSource() {
      return Mockito.mock(DataSource.class);
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerJwt extends AuthorizationServerConfigurerAdapter {

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenStore(tokenStore()).tokenEnhancer(jwtTokenEnhancer());
    }

    @Bean
    public TokenStore tokenStore() {
      return new JwtTokenStore(jwtTokenEnhancer());
    }

    @Bean
    protected JwtAccessTokenConverter jwtTokenEnhancer() {
      return new JwtAccessTokenConverter();
    }

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password");
       // @formatter:on
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerWithTokenServices extends AuthorizationServerConfigurerAdapter {
   
    @Autowired
    private ClientDetailsService clientDetailsService;

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenServices(tokenServices()).tokenStore(tokenStore());
    }

    @Bean
    public DefaultTokenServices tokenServices() {
      DefaultTokenServices tokenServices = new DefaultTokenServices();
      tokenServices.setTokenStore(tokenStore());
      tokenServices.setAccessTokenValiditySeconds(300);
      tokenServices.setRefreshTokenValiditySeconds(30000);
      tokenServices.setClientDetailsService(clientDetailsService);
      return tokenServices;
    }

    @Bean
    public TokenStore tokenStore() {
      return new InMemoryTokenStore();
    }

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password");
       // @formatter:on
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  @EnableAuthorizationServer
  protected static class AuthorizationServerApproval extends AuthorizationServerConfigurerAdapter implements Runnable {

    private TokenStore tokenStore = new InMemoryTokenStore();

    @Autowired
    private ApplicationContext context;

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenStore(tokenStore);
    }

    @Override
    public void configure(ClientDetailsServiceConfigurer clients) throws Exception {
      // @formatter:off
       clients.inMemory()
            .withClient("my-trusted-client")
                .authorizedGrantTypes("password");
       // @formatter:on
    }

    @Override
    public void run() {
      assertNotNull(ReflectionTestUtils.getField(context.getBean(AuthorizationEndpoint.class),
          "userApprovalHandler"));
    }

  }

  @Configuration
  @EnableWebMvcSecurity
  protected static class AuthorizationServerTypes extends AuthorizationServerConfigurerAdapter {

    @Autowired
    private AuthorizationServerTokenServices tokenServices;

    @Autowired
    private ClientDetailsService clientDetailsService;

    @Autowired
    private OAuth2RequestFactory requestFactory;

    @Override
    public void configure(AuthorizationServerEndpointsConfigurer endpoints) throws Exception {
      endpoints.tokenGranter(new ClientCredentialsTokenGranter(tokenServices, clientDetailsService,
          requestFactory));
    }

  }

}
TOP

Related Classes of org.springframework.security.oauth2.config.annotation.AuthorizationServerConfigurationTests$AuthorizationServerVanilla

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.