Browse Source
Added some unit tests around some untested parts of the code that I will be touching for this issue. Issue: gh-5720pull/5730/head
1 changed files with 197 additions and 0 deletions
@ -0,0 +1,197 @@
@@ -0,0 +1,197 @@
|
||||
/* |
||||
* Copyright 2002-2018 the original author or authors. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.springframework.security.config.web.server; |
||||
|
||||
import java.io.IOException; |
||||
import java.math.BigInteger; |
||||
import java.security.KeyFactory; |
||||
import java.security.NoSuchAlgorithmException; |
||||
import java.security.interfaces.RSAPublicKey; |
||||
import java.security.spec.InvalidKeySpecException; |
||||
import java.security.spec.RSAPublicKeySpec; |
||||
import java.time.Instant; |
||||
import java.util.Collections; |
||||
import javax.annotation.PreDestroy; |
||||
|
||||
import okhttp3.mockwebserver.MockResponse; |
||||
import okhttp3.mockwebserver.MockWebServer; |
||||
import org.apache.http.HttpHeaders; |
||||
import org.junit.Rule; |
||||
import org.junit.Test; |
||||
import org.junit.runner.RunWith; |
||||
import reactor.core.publisher.Mono; |
||||
|
||||
import org.springframework.beans.factory.annotation.Autowired; |
||||
import org.springframework.context.ApplicationContext; |
||||
import org.springframework.context.annotation.Bean; |
||||
import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity; |
||||
import org.springframework.security.config.test.SpringTestRule; |
||||
import org.springframework.security.oauth2.jose.jws.JwsAlgorithms; |
||||
import org.springframework.security.oauth2.jwt.Jwt; |
||||
import org.springframework.security.web.server.SecurityWebFilterChain; |
||||
import org.springframework.test.context.junit4.SpringRunner; |
||||
import org.springframework.test.web.reactive.server.WebTestClient; |
||||
import org.springframework.web.bind.annotation.GetMapping; |
||||
import org.springframework.web.bind.annotation.RestController; |
||||
import org.springframework.web.reactive.config.EnableWebFlux; |
||||
|
||||
/** |
||||
* Tests for {@link org.springframework.security.config.web.server.ServerHttpSecurity.OAuth2ResourceServerSpec} |
||||
*/ |
||||
@RunWith(SpringRunner.class) |
||||
public class OAuth2ResourceServerSpecTests { |
||||
private String expired = "eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE1MzUwMzc4OTd9.jqZDDjfc2eysX44lHXEIr9XFd2S8vjIZHCccZU-dRWMRJNsQ1QN5VNnJGklqJBXJR4qgla6cmVqPOLkUHDb0sL0nxM5XuzQaG5ZzKP81RV88shFyAiT0fD-6nl1k-Fai-Fu-VkzSpNXgeONoTxDaYhdB-yxmgrgsApgmbOTE_9AcMk-FQDXQ-pL9kynccFGV0lZx4CA7cyknKN7KBxUilfIycvXODwgKCjj_1WddLTCNGYogJJSg__7NoxzqbyWd3udbHVjqYq7GsMMrGB4_2kBD4CkghOSNcRHbT_DIXowxfAVT7PAg7Q0E5ruZsr2zPZacEUDhJ6-wbvlA0FAOUg"; |
||||
|
||||
private String messageReadToken = "eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtb2NrLXN1YmplY3QiLCJzY29wZSI6Im1lc3NhZ2U6cmVhZCIsImV4cCI6NDY4ODY0MTQxM30.cRl1bv_dDYcAN5U4NlIVKj8uu4mLMwjABF93P4dShiq-GQ-owzaqTSlB4YarNFgV3PKQvT9wxN1jBpGribvISljakoC0E8wDV-saDi8WxN-qvImYsn1zLzYFiZXCfRIxCmonJpydeiAPRxMTPtwnYDS9Ib0T_iA80TBGd-INhyxUUfrwRW5sqKRbjUciRJhpp7fW2ZYXmi9iPt3HDjRQA4IloJZ7f4-spt5Q9wl5HcQTv1t4XrX4eqhVbE5cCoIkFQnKPOc-jhVM44_eazLU6Xk-CCXP8C_UT5pX0luRS2cJrVFfHp2IR_AWxC-shItg6LNEmNFD4Zc-JLZcr0Q86Q"; |
||||
|
||||
private String messageReadTokenWithKid = "eyJraWQiOiJvbmUiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtb2NrLXN1YmplY3QiLCJzY29wZSI6Im1lc3NhZ2U6cmVhZCIsImV4cCI6NDY4ODY0MTQ2MX0.Arg3IjlNb_nkEIZpcWAQquvoiaeF_apJzO5ZxSzUQEWixH1Y7yrsW2uco452a7OtAKDNT09IplK8126z_hdI_RRk0CXVsGZYe1qppNIVLEPGv4rHxND4bPv1YA91Q8vG-vDk9rod7EvAuZU1tEP_pWkSkZVAmfuP43bP5FQcO6Q31Aba7Yb7O5qWn9U2MjruPSFvTsIx3hSXgTuJxhNCKeHnTCmv2WdjYWatR7-VujBlHd-ZolysXm7-JPz3kI75omnomG2UqnKkI76sczIpm4ieOp3fSyv-QR-i-3Z_eJ9hS3Ox46Y9NJS6Z-y1g3X0fjVyhLiIJkFV3VA5HrSf_A"; |
||||
|
||||
private String unsignedToken = "eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJleHAiOi0yMDMzMjI0OTcsImp0aSI6IjEyMyIsInR5cCI6IkpXVCJ9."; |
||||
|
||||
private String jwkSet = "{\n" + |
||||
" \"keys\":[\n" + |
||||
" {\n" + |
||||
" \"kty\":\"RSA\",\n" + |
||||
" \"e\":\"AQAB\",\n" + |
||||
" \"use\":\"sig\",\n" + |
||||
" \"kid\":\"one\",\n" + |
||||
" \"n\":\"0IUjrPZDz-3z0UE4ppcKU36v7hnh8FJjhu3lbJYj0qj9eZiwEJxi9HHUfSK1DhUQG7mJBbYTK1tPYCgre5EkfKh-64VhYUa-vz17zYCmuB8fFj4XHE3MLkWIG-AUn8hNbPzYYmiBTjfGnMKxLHjsbdTiF4mtn-85w366916R6midnAuiPD4HjZaZ1PAsuY60gr8bhMEDtJ8unz81hoQrozpBZJ6r8aR1PrsWb1OqPMloK9kAIutJNvWYKacp8WYAp2WWy72PxQ7Fb0eIA1br3A5dnp-Cln6JROJcZUIRJ-QvS6QONWeS2407uQmS-i-lybsqaH0ldYC7NBEBA5inPQ\"\n" + |
||||
" }\n" + |
||||
" ]\n" + |
||||
"}\n"; |
||||
|
||||
private Jwt jwt = new Jwt("token", Instant.MIN, Instant.MAX, |
||||
Collections.singletonMap("alg", JwsAlgorithms.RS256), |
||||
Collections.singletonMap("sub", "user")); |
||||
|
||||
@Rule |
||||
public final SpringTestRule spring = new SpringTestRule(); |
||||
|
||||
WebTestClient client; |
||||
|
||||
@Autowired |
||||
public void setApplicationContext(ApplicationContext context) { |
||||
this.client = WebTestClient.bindToApplicationContext(context).build(); |
||||
} |
||||
|
||||
@Test |
||||
public void getWhenValidThenReturnsOk() { |
||||
this.spring.register(PublicKeyConfig.class, RootController.class).autowire(); |
||||
|
||||
this.client.get() |
||||
.headers(headers -> headers.setBearerAuth(this.messageReadToken)) |
||||
.exchange() |
||||
.expectStatus().isOk(); |
||||
} |
||||
|
||||
@Test |
||||
public void getWhenExpiredThenReturnsInvalidToken() { |
||||
this.spring.register(PublicKeyConfig.class).autowire(); |
||||
|
||||
this.client.get() |
||||
.headers(headers -> headers.setBearerAuth(this.expired)) |
||||
.exchange() |
||||
.expectStatus().isUnauthorized() |
||||
.expectHeader().exists(HttpHeaders.WWW_AUTHENTICATE); |
||||
} |
||||
|
||||
@Test |
||||
public void getWhenUnsignedThenReturnsInvalidToken() { |
||||
this.spring.register(PublicKeyConfig.class).autowire(); |
||||
|
||||
this.client.get() |
||||
.headers(headers -> headers.setBearerAuth(this.unsignedToken)) |
||||
.exchange() |
||||
.expectStatus().isUnauthorized() |
||||
.expectHeader().exists(HttpHeaders.WWW_AUTHENTICATE); |
||||
} |
||||
|
||||
@Test |
||||
public void getWhenUsingJwkSetUriThenConsultsAccordingly() { |
||||
this.spring.register(JwkSetUriConfig.class, RootController.class).autowire(); |
||||
|
||||
MockWebServer mockWebServer = this.spring.getContext().getBean(MockWebServer.class); |
||||
mockWebServer.enqueue(new MockResponse().setBody(this.jwkSet)); |
||||
|
||||
this.client.get() |
||||
.headers(headers -> headers.setBearerAuth(this.messageReadTokenWithKid)) |
||||
.exchange() |
||||
.expectStatus().isOk(); |
||||
} |
||||
|
||||
@EnableWebFlux |
||||
@EnableWebFluxSecurity |
||||
static class PublicKeyConfig { |
||||
@Bean |
||||
SecurityWebFilterChain springSecurity(ServerHttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.oauth2ResourceServer() |
||||
.jwt() |
||||
.publicKey(this.publicKey()); |
||||
// @formatter:on
|
||||
|
||||
return http.build(); |
||||
} |
||||
|
||||
RSAPublicKey publicKey() throws NoSuchAlgorithmException, InvalidKeySpecException { |
||||
String modulus = "26323220897278656456354815752829448539647589990395639665273015355787577386000316054335559633864476469390247312823732994485311378484154955583861993455004584140858982659817218753831620205191028763754231454775026027780771426040997832758235764611119743390612035457533732596799927628476322029280486807310749948064176545712270582940917249337311592011920620009965129181413510845780806191965771671528886508636605814099711121026468495328702234901200169245493126030184941412539949521815665744267183140084667383643755535107759061065656273783542590997725982989978433493861515415520051342321336460543070448417126615154138673620797"; |
||||
String exponent = "65537"; |
||||
|
||||
RSAPublicKeySpec spec = new RSAPublicKeySpec(new BigInteger(modulus), new BigInteger(exponent)); |
||||
KeyFactory factory = KeyFactory.getInstance("RSA"); |
||||
return (RSAPublicKey) factory.generatePublic(spec); |
||||
} |
||||
} |
||||
|
||||
@EnableWebFlux |
||||
@EnableWebFluxSecurity |
||||
static class JwkSetUriConfig { |
||||
private MockWebServer mockWebServer = new MockWebServer(); |
||||
|
||||
@Bean |
||||
SecurityWebFilterChain springSecurity(ServerHttpSecurity http) { |
||||
String jwkSetUri = mockWebServer().url("/.well-known/jwks.json").toString(); |
||||
|
||||
// @formatter:off
|
||||
http |
||||
.oauth2ResourceServer() |
||||
.jwt() |
||||
.jwkSetUri(jwkSetUri); |
||||
// @formatter:on
|
||||
|
||||
return http.build(); |
||||
} |
||||
|
||||
@Bean |
||||
MockWebServer mockWebServer() { |
||||
return this.mockWebServer; |
||||
} |
||||
|
||||
@PreDestroy |
||||
void shutdown() throws IOException { |
||||
this.mockWebServer.shutdown(); |
||||
} |
||||
} |
||||
|
||||
@RestController |
||||
static class RootController { |
||||
@GetMapping |
||||
Mono<String> root() { |
||||
return Mono.just("ok"); |
||||
} |
||||
} |
||||
} |
||||
Loading…
Reference in new issue