2 changed files with 304 additions and 228 deletions
@ -1,228 +0,0 @@ |
|||||||
|
|
||||||
|
|
||||||
/* |
|
||||||
* Copyright 2002-2013 the original author or authors. |
|
||||||
* |
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
|
||||||
* you may not use this file except in compliance with the License. |
|
||||||
* You may obtain a copy of the License at |
|
||||||
* |
|
||||||
* https://www.apache.org/licenses/LICENSE-2.0 |
|
||||||
* |
|
||||||
* Unless required by applicable law or agreed to in writing, software |
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS, |
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|
||||||
* See the License for the specific language governing permissions and |
|
||||||
* limitations under the License. |
|
||||||
*/ |
|
||||||
package org.springframework.security.config.annotation.web.configurers |
|
||||||
|
|
||||||
import org.springframework.context.annotation.Bean |
|
||||||
import org.springframework.context.annotation.Configuration |
|
||||||
import org.springframework.mock.web.MockFilterChain |
|
||||||
import org.springframework.mock.web.MockHttpServletRequest |
|
||||||
import org.springframework.mock.web.MockHttpServletResponse |
|
||||||
import org.springframework.security.authentication.AuthenticationManager |
|
||||||
import org.springframework.security.config.annotation.BaseSpringSpec |
|
||||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
|
||||||
import org.springframework.security.config.annotation.web.configuration.BaseWebConfig; |
|
||||||
import org.springframework.security.core.userdetails.AuthenticationUserDetailsService |
|
||||||
import org.springframework.security.core.userdetails.UserDetailsByNameServiceWrapper; |
|
||||||
import org.springframework.security.openid.OpenID4JavaConsumer |
|
||||||
import org.springframework.security.openid.OpenIDAuthenticationFilter |
|
||||||
import org.springframework.security.openid.OpenIDAuthenticationProvider |
|
||||||
import org.springframework.security.openid.OpenIDAuthenticationToken; |
|
||||||
import org.springframework.security.web.FilterChainProxy |
|
||||||
import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler |
|
||||||
import org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler |
|
||||||
import org.springframework.security.web.authentication.WebAuthenticationDetailsSource |
|
||||||
|
|
||||||
/** |
|
||||||
* Tests to verify that all the functionality of <openid-login> attributes is present |
|
||||||
* |
|
||||||
* @author Rob Winch |
|
||||||
* |
|
||||||
*/ |
|
||||||
public class NamespaceHttpOpenIDLoginTests extends BaseSpringSpec { |
|
||||||
def "http/openid-login"() { |
|
||||||
when: |
|
||||||
loadConfig(OpenIDLoginConfig) |
|
||||||
then: |
|
||||||
findFilter(OpenIDAuthenticationFilter).consumer.class == OpenID4JavaConsumer |
|
||||||
when: |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: |
|
||||||
response.getRedirectedUrl() == "http://localhost/login" |
|
||||||
when: "fail to log in" |
|
||||||
super.setup() |
|
||||||
request.servletPath = "/login/openid" |
|
||||||
request.method = "POST" |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: "sent to login error page" |
|
||||||
response.getRedirectedUrl() == "/login?error" |
|
||||||
} |
|
||||||
|
|
||||||
@Configuration |
|
||||||
static class OpenIDLoginConfig extends BaseWebConfig { |
|
||||||
protected void configure(HttpSecurity http) { |
|
||||||
http |
|
||||||
.authorizeRequests() |
|
||||||
.anyRequest().hasRole("USER") |
|
||||||
.and() |
|
||||||
.openidLogin() |
|
||||||
.permitAll(); |
|
||||||
} |
|
||||||
} |
|
||||||
|
|
||||||
def "http/openid-login/attribute-exchange"() { |
|
||||||
when: |
|
||||||
loadConfig(OpenIDLoginAttributeExchangeConfig) |
|
||||||
OpenID4JavaConsumer consumer = findFilter(OpenIDAuthenticationFilter).consumer |
|
||||||
then: |
|
||||||
consumer.class == OpenID4JavaConsumer |
|
||||||
|
|
||||||
def googleAttrs = consumer.attributesToFetchFactory.createAttributeList("https://www.google.com/1") |
|
||||||
googleAttrs[0].name == "email" |
|
||||||
googleAttrs[0].type == "https://axschema.org/contact/email" |
|
||||||
googleAttrs[0].required |
|
||||||
googleAttrs[1].name == "firstname" |
|
||||||
googleAttrs[1].type == "https://axschema.org/namePerson/first" |
|
||||||
googleAttrs[1].required |
|
||||||
googleAttrs[2].name == "lastname" |
|
||||||
googleAttrs[2].type == "https://axschema.org/namePerson/last" |
|
||||||
googleAttrs[2].required |
|
||||||
|
|
||||||
def yahooAttrs = consumer.attributesToFetchFactory.createAttributeList("https://rwinch.yahoo.com/rwinch/id") |
|
||||||
yahooAttrs[0].name == "email" |
|
||||||
yahooAttrs[0].type == "https://schema.openid.net/contact/email" |
|
||||||
yahooAttrs[0].required |
|
||||||
yahooAttrs[1].name == "fullname" |
|
||||||
yahooAttrs[1].type == "https://axschema.org/namePerson" |
|
||||||
yahooAttrs[1].required |
|
||||||
when: |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: |
|
||||||
response.getRedirectedUrl() == "http://localhost/login" |
|
||||||
when: "fail to log in" |
|
||||||
super.setup() |
|
||||||
request.servletPath = "/login/openid" |
|
||||||
request.method = "POST" |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: "sent to login error page" |
|
||||||
response.getRedirectedUrl() == "/login?error" |
|
||||||
} |
|
||||||
|
|
||||||
@Configuration |
|
||||||
static class OpenIDLoginAttributeExchangeConfig extends BaseWebConfig { |
|
||||||
protected void configure(HttpSecurity http) { |
|
||||||
http |
|
||||||
.authorizeRequests() |
|
||||||
.anyRequest().hasRole("USER") |
|
||||||
.and() |
|
||||||
.openidLogin() |
|
||||||
.attributeExchange("https://www.google.com/.*") // attribute-exchange@identifier-match |
|
||||||
.attribute("email") // openid-attribute@name |
|
||||||
.type("https://axschema.org/contact/email") // openid-attribute@type |
|
||||||
.required(true) // openid-attribute@required |
|
||||||
.count(1) // openid-attribute@count |
|
||||||
.and() |
|
||||||
.attribute("firstname") |
|
||||||
.type("https://axschema.org/namePerson/first") |
|
||||||
.required(true) |
|
||||||
.and() |
|
||||||
.attribute("lastname") |
|
||||||
.type("https://axschema.org/namePerson/last") |
|
||||||
.required(true) |
|
||||||
.and() |
|
||||||
.and() |
|
||||||
.attributeExchange(".*yahoo.com.*") |
|
||||||
.attribute("email") |
|
||||||
.type("https://schema.openid.net/contact/email") |
|
||||||
.required(true) |
|
||||||
.and() |
|
||||||
.attribute("fullname") |
|
||||||
.type("https://axschema.org/namePerson") |
|
||||||
.required(true) |
|
||||||
.and() |
|
||||||
.and() |
|
||||||
.permitAll(); |
|
||||||
} |
|
||||||
} |
|
||||||
|
|
||||||
def "http/openid-login custom"() { |
|
||||||
setup: |
|
||||||
loadConfig(OpenIDLoginCustomConfig) |
|
||||||
when: |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: |
|
||||||
response.getRedirectedUrl() == "http://localhost/authentication/login" |
|
||||||
when: "fail to log in" |
|
||||||
super.setup() |
|
||||||
request.servletPath = "/authentication/login/process" |
|
||||||
request.method = "POST" |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: "sent to login error page" |
|
||||||
response.getRedirectedUrl() == "/authentication/login?failed" |
|
||||||
} |
|
||||||
|
|
||||||
@Configuration |
|
||||||
static class OpenIDLoginCustomConfig extends BaseWebConfig { |
|
||||||
protected void configure(HttpSecurity http) throws Exception { |
|
||||||
boolean alwaysUseDefaultSuccess = true; |
|
||||||
http |
|
||||||
.authorizeRequests() |
|
||||||
.anyRequest().hasRole("USER") |
|
||||||
.and() |
|
||||||
.openidLogin() |
|
||||||
.permitAll() |
|
||||||
.loginPage("/authentication/login") // openid-login@login-page |
|
||||||
.failureUrl("/authentication/login?failed") // openid-login@authentication-failure-url |
|
||||||
.loginProcessingUrl("/authentication/login/process") // openid-login@login-processing-url |
|
||||||
.defaultSuccessUrl("/default", alwaysUseDefaultSuccess) // openid-login@default-target-url / openid-login@always-use-default-target |
|
||||||
} |
|
||||||
} |
|
||||||
|
|
||||||
def "http/openid-login custom refs"() { |
|
||||||
when: |
|
||||||
OpenIDLoginCustomRefsConfig.AUDS = Mock(AuthenticationUserDetailsService) |
|
||||||
loadConfig(OpenIDLoginCustomRefsConfig) |
|
||||||
then: "CustomWebAuthenticationDetailsSource is used" |
|
||||||
findFilter(OpenIDAuthenticationFilter).authenticationDetailsSource.class == CustomWebAuthenticationDetailsSource |
|
||||||
findAuthenticationProvider(OpenIDAuthenticationProvider).userDetailsService == OpenIDLoginCustomRefsConfig.AUDS |
|
||||||
when: "fail to log in" |
|
||||||
request.servletPath = "/login/openid" |
|
||||||
request.method = "POST" |
|
||||||
springSecurityFilterChain.doFilter(request,response,chain) |
|
||||||
then: "sent to login error page" |
|
||||||
response.getRedirectedUrl() == "/custom/failure" |
|
||||||
} |
|
||||||
|
|
||||||
@Configuration |
|
||||||
static class OpenIDLoginCustomRefsConfig extends BaseWebConfig { |
|
||||||
static AuthenticationUserDetailsService AUDS |
|
||||||
|
|
||||||
protected void configure(HttpSecurity http) throws Exception { |
|
||||||
http |
|
||||||
.authorizeRequests() |
|
||||||
.anyRequest().hasRole("USER") |
|
||||||
.and() |
|
||||||
.openidLogin() |
|
||||||
// if using UserDetailsService wrap with new UserDetailsByNameServiceWrapper<OpenIDAuthenticationToken>() |
|
||||||
.authenticationUserDetailsService(AUDS) // openid-login@user-service-ref |
|
||||||
.failureHandler(new SimpleUrlAuthenticationFailureHandler("/custom/failure")) // openid-login@authentication-failure-handler-ref |
|
||||||
.successHandler(new SavedRequestAwareAuthenticationSuccessHandler( defaultTargetUrl : "/custom/targetUrl" )) // openid-login@authentication-success-handler-ref |
|
||||||
.authenticationDetailsSource(new CustomWebAuthenticationDetailsSource()); // openid-login@authentication-details-source-ref |
|
||||||
} |
|
||||||
|
|
||||||
// only necessary to have easy access to the AuthenticationManager for testing/verification |
|
||||||
@Bean |
|
||||||
@Override |
|
||||||
public AuthenticationManager authenticationManagerBean() |
|
||||||
throws Exception { |
|
||||||
return super.authenticationManagerBean(); |
|
||||||
} |
|
||||||
|
|
||||||
} |
|
||||||
|
|
||||||
static class CustomWebAuthenticationDetailsSource extends WebAuthenticationDetailsSource {} |
|
||||||
} |
|
||||||
@ -0,0 +1,304 @@ |
|||||||
|
/* |
||||||
|
* Copyright 2002-2019 the original author or authors. |
||||||
|
* |
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||||
|
* you may not use this file except in compliance with the License. |
||||||
|
* You may obtain a copy of the License at |
||||||
|
* |
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* |
||||||
|
* Unless required by applicable law or agreed to in writing, software |
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS, |
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||||
|
* See the License for the specific language governing permissions and |
||||||
|
* limitations under the License. |
||||||
|
*/ |
||||||
|
package org.springframework.security.config.annotation.web.configurers; |
||||||
|
|
||||||
|
import java.util.Arrays; |
||||||
|
import java.util.List; |
||||||
|
import javax.servlet.http.HttpServletRequest; |
||||||
|
|
||||||
|
import okhttp3.mockwebserver.MockResponse; |
||||||
|
import okhttp3.mockwebserver.MockWebServer; |
||||||
|
import org.junit.Rule; |
||||||
|
import org.junit.Test; |
||||||
|
import org.openid4java.consumer.ConsumerManager; |
||||||
|
import org.openid4java.discovery.DiscoveryInformation; |
||||||
|
import org.openid4java.message.AuthRequest; |
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired; |
||||||
|
import org.springframework.context.annotation.Bean; |
||||||
|
import org.springframework.context.annotation.Configuration; |
||||||
|
import org.springframework.security.authentication.AuthenticationDetailsSource; |
||||||
|
import org.springframework.security.authentication.AuthenticationServiceException; |
||||||
|
import org.springframework.security.config.annotation.ObjectPostProcessor; |
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; |
||||||
|
import org.springframework.security.config.test.SpringTestRule; |
||||||
|
import org.springframework.security.core.Authentication; |
||||||
|
import org.springframework.security.core.authority.AuthorityUtils; |
||||||
|
import org.springframework.security.core.userdetails.AuthenticationUserDetailsService; |
||||||
|
import org.springframework.security.core.userdetails.User; |
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService; |
||||||
|
import org.springframework.security.openid.OpenIDAttribute; |
||||||
|
import org.springframework.security.openid.OpenIDAuthenticationFilter; |
||||||
|
import org.springframework.security.openid.OpenIDAuthenticationStatus; |
||||||
|
import org.springframework.security.openid.OpenIDAuthenticationToken; |
||||||
|
import org.springframework.security.openid.OpenIDConsumer; |
||||||
|
import org.springframework.security.provisioning.InMemoryUserDetailsManager; |
||||||
|
import org.springframework.security.web.authentication.SavedRequestAwareAuthenticationSuccessHandler; |
||||||
|
import org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler; |
||||||
|
import org.springframework.security.web.authentication.WebAuthenticationDetailsSource; |
||||||
|
import org.springframework.test.web.servlet.MockMvc; |
||||||
|
import org.springframework.test.web.servlet.MvcResult; |
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThat; |
||||||
|
import static org.mockito.ArgumentMatchers.any; |
||||||
|
import static org.mockito.ArgumentMatchers.anyBoolean; |
||||||
|
import static org.mockito.Mockito.mock; |
||||||
|
import static org.mockito.Mockito.reset; |
||||||
|
import static org.mockito.Mockito.spy; |
||||||
|
import static org.mockito.Mockito.verify; |
||||||
|
import static org.mockito.Mockito.when; |
||||||
|
import static org.openid4java.discovery.yadis.YadisResolver.YADIS_XRDS_LOCATION; |
||||||
|
import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; |
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; |
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post; |
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.redirectedUrl; |
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; |
||||||
|
|
||||||
|
/** |
||||||
|
* Tests to verify that all the functionality of <openid-login> attributes is present |
||||||
|
* |
||||||
|
* @author Rob Winch |
||||||
|
* @author Josh Cummings |
||||||
|
*/ |
||||||
|
public class NamespaceHttpOpenIDLoginTests { |
||||||
|
|
||||||
|
@Rule |
||||||
|
public final SpringTestRule spring = new SpringTestRule(); |
||||||
|
|
||||||
|
@Autowired |
||||||
|
MockMvc mvc; |
||||||
|
|
||||||
|
@Test |
||||||
|
public void openidLoginWhenUsingDefaultsThenMatchesNamespace() throws Exception { |
||||||
|
this.spring.register(OpenIDLoginConfig.class).autowire(); |
||||||
|
this.mvc.perform(get("/")) |
||||||
|
.andExpect(redirectedUrl("http://localhost/login")); |
||||||
|
this.mvc.perform(post("/login/openid").with(csrf())) |
||||||
|
.andExpect(redirectedUrl("/login?error")); |
||||||
|
} |
||||||
|
|
||||||
|
@Configuration |
||||||
|
@EnableWebSecurity |
||||||
|
static class OpenIDLoginConfig extends WebSecurityConfigurerAdapter { |
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
http |
||||||
|
.authorizeRequests() |
||||||
|
.anyRequest().hasRole("USER") |
||||||
|
.and() |
||||||
|
.openidLogin() |
||||||
|
.permitAll(); |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@Test |
||||||
|
public void openidLoginWhenAttributeExchangeConfiguredThenFetchAttributesMatchAttributeList() throws Exception { |
||||||
|
OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER = mock(ConsumerManager.class); |
||||||
|
AuthRequest mockAuthRequest = mock(AuthRequest.class); |
||||||
|
DiscoveryInformation mockDiscoveryInformation = mock(DiscoveryInformation.class); |
||||||
|
when(mockAuthRequest.getDestinationUrl(anyBoolean())).thenReturn("mockUrl"); |
||||||
|
when(OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER.associate(any())) |
||||||
|
.thenReturn(mockDiscoveryInformation); |
||||||
|
when(OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), any())) |
||||||
|
.thenReturn(mockAuthRequest); |
||||||
|
this.spring.register(OpenIDLoginAttributeExchangeConfig.class).autowire(); |
||||||
|
|
||||||
|
try (MockWebServer server = new MockWebServer()) { |
||||||
|
String endpoint = server.url("/").toString(); |
||||||
|
|
||||||
|
server.enqueue(new MockResponse() |
||||||
|
.addHeader(YADIS_XRDS_LOCATION, endpoint)); |
||||||
|
server.enqueue(new MockResponse() |
||||||
|
.setBody(String.format("<XRDS><XRD><Service><URI>%s</URI></Service></XRD></XRDS>", endpoint))); |
||||||
|
|
||||||
|
MvcResult mvcResult = this.mvc.perform(get("/login/openid") |
||||||
|
.param(OpenIDAuthenticationFilter.DEFAULT_CLAIMED_IDENTITY_FIELD, "https://www.google.com/1")) |
||||||
|
.andExpect(status().isFound()) |
||||||
|
.andReturn(); |
||||||
|
|
||||||
|
Object attributeObject = mvcResult.getRequest().getSession().getAttribute("SPRING_SECURITY_OPEN_ID_ATTRIBUTES_FETCH_LIST"); |
||||||
|
assertThat(attributeObject).isInstanceOf(List.class); |
||||||
|
List<OpenIDAttribute> attributeList = (List<OpenIDAttribute>) attributeObject; |
||||||
|
assertThat(attributeList.stream().anyMatch(attribute -> |
||||||
|
"firstname".equals(attribute.getName()) |
||||||
|
&& "https://axschema.org/namePerson/first".equals(attribute.getType()) |
||||||
|
&& attribute.isRequired())) |
||||||
|
.isTrue(); |
||||||
|
assertThat(attributeList.stream().anyMatch(attribute -> |
||||||
|
"lastname".equals(attribute.getName()) |
||||||
|
&& "https://axschema.org/namePerson/last".equals(attribute.getType()) |
||||||
|
&& attribute.isRequired())) |
||||||
|
.isTrue(); |
||||||
|
assertThat(attributeList.stream().anyMatch(attribute -> |
||||||
|
"email".equals(attribute.getName()) |
||||||
|
&& "https://axschema.org/contact/email".equals(attribute.getType()) |
||||||
|
&& attribute.isRequired())) |
||||||
|
.isTrue(); |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@Configuration |
||||||
|
@EnableWebSecurity |
||||||
|
static class OpenIDLoginAttributeExchangeConfig extends WebSecurityConfigurerAdapter { |
||||||
|
static ConsumerManager CONSUMER_MANAGER; |
||||||
|
|
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
http |
||||||
|
.authorizeRequests() |
||||||
|
.anyRequest().hasRole("USER") |
||||||
|
.and() |
||||||
|
.openidLogin() |
||||||
|
.consumerManager(CONSUMER_MANAGER) |
||||||
|
.attributeExchange("https://www.google.com/.*") // attribute-exchange@identifier-match
|
||||||
|
.attribute("email") // openid-attribute@name
|
||||||
|
.type("https://axschema.org/contact/email") // openid-attribute@type
|
||||||
|
.required(true) // openid-attribute@required
|
||||||
|
.count(1) // openid-attribute@count
|
||||||
|
.and() |
||||||
|
.attribute("firstname") |
||||||
|
.type("https://axschema.org/namePerson/first") |
||||||
|
.required(true) |
||||||
|
.and() |
||||||
|
.attribute("lastname") |
||||||
|
.type("https://axschema.org/namePerson/last") |
||||||
|
.required(true) |
||||||
|
.and() |
||||||
|
.and() |
||||||
|
.attributeExchange(".*yahoo.com.*") |
||||||
|
.attribute("email") |
||||||
|
.type("https://schema.openid.net/contact/email") |
||||||
|
.required(true) |
||||||
|
.and() |
||||||
|
.attribute("fullname") |
||||||
|
.type("https://axschema.org/namePerson") |
||||||
|
.required(true) |
||||||
|
.and() |
||||||
|
.and() |
||||||
|
.permitAll(); |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@Test |
||||||
|
public void openidLoginWhenUsingCustomEndpointsThenMatchesNamespace() throws Exception { |
||||||
|
this.spring.register(OpenIDLoginCustomConfig.class).autowire(); |
||||||
|
this.mvc.perform(get("/")) |
||||||
|
.andExpect(redirectedUrl("http://localhost/authentication/login")); |
||||||
|
this.mvc.perform(post("/authentication/login/process").with(csrf())) |
||||||
|
.andExpect(redirectedUrl("/authentication/login?failed")); |
||||||
|
} |
||||||
|
|
||||||
|
@Configuration |
||||||
|
@EnableWebSecurity |
||||||
|
static class OpenIDLoginCustomConfig extends WebSecurityConfigurerAdapter { |
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
boolean alwaysUseDefaultSuccess = true; |
||||||
|
http |
||||||
|
.authorizeRequests() |
||||||
|
.anyRequest().hasRole("USER") |
||||||
|
.and() |
||||||
|
.openidLogin() |
||||||
|
.permitAll() |
||||||
|
.loginPage("/authentication/login") // openid-login@login-page
|
||||||
|
.failureUrl("/authentication/login?failed") // openid-login@authentication-failure-url
|
||||||
|
.loginProcessingUrl("/authentication/login/process") // openid-login@login-processing-url
|
||||||
|
.defaultSuccessUrl("/default", alwaysUseDefaultSuccess); // openid-login@default-target-url / openid-login@always-use-default-target
|
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@Test |
||||||
|
public void openidLoginWithCustomHandlersThenBehaviorMatchesNamespace() throws Exception { |
||||||
|
OpenIDAuthenticationToken token = new OpenIDAuthenticationToken( |
||||||
|
OpenIDAuthenticationStatus.SUCCESS, |
||||||
|
"identityUrl", |
||||||
|
"message", |
||||||
|
Arrays.asList(new OpenIDAttribute("name", "type"))); |
||||||
|
|
||||||
|
OpenIDLoginCustomRefsConfig.AUDS = mock(AuthenticationUserDetailsService.class); |
||||||
|
when(OpenIDLoginCustomRefsConfig.AUDS.loadUserDetails(any(Authentication.class))) |
||||||
|
.thenReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER"))); |
||||||
|
OpenIDLoginCustomRefsConfig.ADS = spy(new WebAuthenticationDetailsSource()); |
||||||
|
OpenIDLoginCustomRefsConfig.CONSUMER = mock(OpenIDConsumer.class); |
||||||
|
|
||||||
|
this.spring.register(OpenIDLoginCustomRefsConfig.class, UserDetailsServiceConfig.class).autowire(); |
||||||
|
|
||||||
|
when(OpenIDLoginCustomRefsConfig.CONSUMER.endConsumption(any(HttpServletRequest.class))) |
||||||
|
.thenThrow(new AuthenticationServiceException("boom")); |
||||||
|
this.mvc.perform(post("/login/openid").with(csrf()) |
||||||
|
.param("openid.identity", "identity")) |
||||||
|
.andExpect(redirectedUrl("/custom/failure")); |
||||||
|
reset(OpenIDLoginCustomRefsConfig.CONSUMER); |
||||||
|
|
||||||
|
when(OpenIDLoginCustomRefsConfig.CONSUMER.endConsumption(any(HttpServletRequest.class))) |
||||||
|
.thenReturn(token); |
||||||
|
this.mvc.perform(post("/login/openid").with(csrf()) |
||||||
|
.param("openid.identity", "identity")) |
||||||
|
.andExpect(redirectedUrl("/custom/targetUrl")); |
||||||
|
|
||||||
|
verify(OpenIDLoginCustomRefsConfig.AUDS).loadUserDetails(any(Authentication.class)); |
||||||
|
verify(OpenIDLoginCustomRefsConfig.ADS).buildDetails(any(Object.class)); |
||||||
|
} |
||||||
|
|
||||||
|
@Configuration |
||||||
|
@EnableWebSecurity |
||||||
|
static class OpenIDLoginCustomRefsConfig extends WebSecurityConfigurerAdapter { |
||||||
|
static AuthenticationUserDetailsService AUDS; |
||||||
|
static AuthenticationDetailsSource ADS; |
||||||
|
static OpenIDConsumer CONSUMER; |
||||||
|
|
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
SavedRequestAwareAuthenticationSuccessHandler handler = |
||||||
|
new SavedRequestAwareAuthenticationSuccessHandler(); |
||||||
|
handler.setDefaultTargetUrl("/custom/targetUrl"); |
||||||
|
|
||||||
|
http |
||||||
|
.authorizeRequests() |
||||||
|
.anyRequest().hasRole("USER") |
||||||
|
.and() |
||||||
|
.openidLogin() |
||||||
|
// if using UserDetailsService wrap with new UserDetailsByNameServiceWrapper<OpenIDAuthenticationToken>()
|
||||||
|
.authenticationUserDetailsService(AUDS) // openid-login@user-service-ref
|
||||||
|
.failureHandler(new SimpleUrlAuthenticationFailureHandler("/custom/failure")) // openid-login@authentication-failure-handler-ref
|
||||||
|
.successHandler(handler) // openid-login@authentication-success-handler-ref
|
||||||
|
.authenticationDetailsSource(ADS) // openid-login@authentication-details-source-ref
|
||||||
|
.withObjectPostProcessor(new ObjectPostProcessor<OpenIDAuthenticationFilter>() { |
||||||
|
@Override |
||||||
|
public <O extends OpenIDAuthenticationFilter> O postProcess(O filter) { |
||||||
|
filter.setConsumer(CONSUMER); |
||||||
|
return filter; |
||||||
|
} |
||||||
|
}); |
||||||
|
|
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
@Configuration |
||||||
|
static class UserDetailsServiceConfig { |
||||||
|
@Bean |
||||||
|
public UserDetailsService userDetailsService() { |
||||||
|
return new InMemoryUserDetailsManager( |
||||||
|
User.withDefaultPasswordEncoder() |
||||||
|
.username("user") |
||||||
|
.password("password") |
||||||
|
.roles("USER") |
||||||
|
.build()); |
||||||
|
} |
||||||
|
} |
||||||
|
} |
||||||
Loading…
Reference in new issue