|
| 1 | +package org.springframework.security.oauth2.server.authorization.config.annotation.web.configurers; |
| 2 | + |
| 3 | +import org.junit.Rule; |
| 4 | +import org.junit.Test; |
| 5 | +import org.springframework.beans.factory.annotation.Autowired; |
| 6 | +import org.springframework.context.annotation.Bean; |
| 7 | +import org.springframework.security.config.Customizer; |
| 8 | +import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
| 9 | +import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
| 10 | +import org.springframework.security.oauth2.server.authorization.client.InMemoryRegisteredClientRepository; |
| 11 | +import org.springframework.security.oauth2.server.authorization.client.RegisteredClient; |
| 12 | +import org.springframework.security.oauth2.server.authorization.client.RegisteredClientRepository; |
| 13 | +import org.springframework.security.oauth2.server.authorization.client.TestRegisteredClients; |
| 14 | +import org.springframework.security.oauth2.server.authorization.config.annotation.web.configuration.OAuth2AuthorizationServerConfiguration; |
| 15 | +import org.springframework.security.oauth2.server.authorization.settings.AuthorizationServerSettings; |
| 16 | +import org.springframework.security.oauth2.server.authorization.test.SpringTestRule; |
| 17 | +import org.springframework.security.web.SecurityFilterChain; |
| 18 | +import org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint; |
| 19 | +import org.springframework.test.web.servlet.MockMvc; |
| 20 | +import org.springframework.test.web.servlet.ResultMatcher; |
| 21 | + |
| 22 | +import static org.springframework.test.web.servlet.ResultMatcher.matchAll; |
| 23 | +import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; |
| 24 | +import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.jsonPath; |
| 25 | +import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; |
| 26 | + |
| 27 | +/** |
| 28 | + * Integration tests for OpenID Provider Configuration Endpoint. |
| 29 | + * |
| 30 | + * @author Sahariar Alam Khandoker |
| 31 | + */ |
| 32 | +public class OidcProviderConfigurationMetaDataTests { |
| 33 | + private static final String DEFAULT_OAUTH2_PROVIDER_CONFIGURATION_METADATA_ENDPOINT_URI = "/.well-known/openid-configuration"; |
| 34 | + private static final String issuerUrl = "https://example.com/issuer1"; |
| 35 | + |
| 36 | + @Rule |
| 37 | + public final SpringTestRule spring = new SpringTestRule(); |
| 38 | + |
| 39 | + @Autowired |
| 40 | + private MockMvc mvc; |
| 41 | + |
| 42 | + @Test |
| 43 | + public void requestWhenProviderConfigurationRequestGetTheProviderConfigurationResponseWithoutRegistrationEndpoint() throws Exception { |
| 44 | + this.spring.register(AuthorizationServerConfiguration.class).autowire(); |
| 45 | + |
| 46 | + this.mvc.perform(get(DEFAULT_OAUTH2_PROVIDER_CONFIGURATION_METADATA_ENDPOINT_URI)) |
| 47 | + .andExpect(status().is2xxSuccessful()) |
| 48 | + .andExpect(providerConfigurationResponse()) |
| 49 | + .andExpect(jsonPath("$.registration_endpoint").doesNotExist()) |
| 50 | + .andReturn(); |
| 51 | + } |
| 52 | + |
| 53 | + @Test |
| 54 | + public void requestWhenProviderConfigurationWithClientRegistrationEnabledRequestGetTheProviderConfigurationResponseWithRegistrationEndpoint() throws Exception { |
| 55 | + this.spring.register(AuthorizationServerConfigurationWithClientRegistrationEnabled.class).autowire(); |
| 56 | + |
| 57 | + this.mvc.perform(get(DEFAULT_OAUTH2_PROVIDER_CONFIGURATION_METADATA_ENDPOINT_URI)) |
| 58 | + .andExpect(status().is2xxSuccessful()) |
| 59 | + .andExpect(providerConfigurationResponse()) |
| 60 | + .andExpect(jsonPath("$.registration_endpoint").value("https://example.com/issuer1/connect/register")) |
| 61 | + .andReturn(); |
| 62 | + } |
| 63 | + |
| 64 | + private static ResultMatcher providerConfigurationResponse() { |
| 65 | + // @formatter:off |
| 66 | + return matchAll( |
| 67 | + jsonPath("issuer").value("https://example.com/issuer1"), |
| 68 | + jsonPath("authorization_endpoint").value("https://example.com/issuer1/oauth2/authorize"), |
| 69 | + jsonPath("token_endpoint").value("https://example.com/issuer1/oauth2/token"), |
| 70 | + jsonPath("jwks_uri").value("https://example.com/issuer1/oauth2/jwks"), |
| 71 | + jsonPath("scopes_supported").value("openid"), |
| 72 | + jsonPath("response_types_supported").value("code"), |
| 73 | + jsonPath("$.grant_types_supported[0]").value("authorization_code"), |
| 74 | + jsonPath("$.grant_types_supported[1]").value("client_credentials"), |
| 75 | + jsonPath("$.grant_types_supported[2]").value("refresh_token"), |
| 76 | + jsonPath("revocation_endpoint").value("https://example.com/issuer1/oauth2/revoke"), |
| 77 | + jsonPath("$.revocation_endpoint_auth_methods_supported[0]").value("client_secret_basic"), |
| 78 | + jsonPath("$.revocation_endpoint_auth_methods_supported[1]").value("client_secret_post"), |
| 79 | + jsonPath("$.revocation_endpoint_auth_methods_supported[2]").value("client_secret_jwt"), |
| 80 | + jsonPath("$.revocation_endpoint_auth_methods_supported[3]").value("private_key_jwt"), |
| 81 | + jsonPath("introspection_endpoint").value("https://example.com/issuer1/oauth2/introspect"), |
| 82 | + jsonPath("$.introspection_endpoint_auth_methods_supported[0]").value("client_secret_basic"), |
| 83 | + jsonPath("$.introspection_endpoint_auth_methods_supported[1]").value("client_secret_post"), |
| 84 | + jsonPath("$.introspection_endpoint_auth_methods_supported[2]").value("client_secret_jwt"), |
| 85 | + jsonPath("$.introspection_endpoint_auth_methods_supported[3]").value("private_key_jwt"), |
| 86 | + jsonPath("subject_types_supported").value("public"), |
| 87 | + jsonPath("id_token_signing_alg_values_supported").value("RS256"), |
| 88 | + jsonPath("userinfo_endpoint").value("https://example.com/issuer1/userinfo"), |
| 89 | + jsonPath("$.token_endpoint_auth_methods_supported[0]").value("client_secret_basic"), |
| 90 | + jsonPath("$.token_endpoint_auth_methods_supported[1]").value("client_secret_post"), |
| 91 | + jsonPath("$.token_endpoint_auth_methods_supported[2]").value("client_secret_jwt"), |
| 92 | + jsonPath("$.token_endpoint_auth_methods_supported[3]").value("private_key_jwt") |
| 93 | + ); |
| 94 | + // @formatter:on |
| 95 | + } |
| 96 | + |
| 97 | + |
| 98 | + @EnableWebSecurity |
| 99 | + static class AuthorizationServerConfigurationWithClientRegistrationEnabled extends AuthorizationServerConfiguration { |
| 100 | + @Bean |
| 101 | + SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception { |
| 102 | + OAuth2AuthorizationServerConfigurer authorizationServerConfigurer = |
| 103 | + new OAuth2AuthorizationServerConfigurer(); |
| 104 | + http.apply(authorizationServerConfigurer); |
| 105 | + |
| 106 | + authorizationServerConfigurer |
| 107 | + .oidc(oidc -> |
| 108 | + oidc |
| 109 | + .clientRegistrationEndpoint(Customizer.withDefaults()) |
| 110 | + ); |
| 111 | + |
| 112 | + return http.build(); |
| 113 | + } |
| 114 | + } |
| 115 | + |
| 116 | + @EnableWebSecurity |
| 117 | + static class AuthorizationServerConfiguration { |
| 118 | + |
| 119 | + @Bean |
| 120 | + SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http) throws Exception { |
| 121 | + OAuth2AuthorizationServerConfiguration.applyDefaultSecurity(http); |
| 122 | + // @formatter:off |
| 123 | + http |
| 124 | + .exceptionHandling(exceptions -> |
| 125 | + exceptions.authenticationEntryPoint(new LoginUrlAuthenticationEntryPoint("/login")) |
| 126 | + ); |
| 127 | + // @formatter:on |
| 128 | + return http.build(); |
| 129 | + } |
| 130 | + |
| 131 | + @Bean |
| 132 | + RegisteredClientRepository registeredClientRepository() { |
| 133 | + RegisteredClient registeredClient = TestRegisteredClients.registeredClient().build(); |
| 134 | + return new InMemoryRegisteredClientRepository(registeredClient); |
| 135 | + } |
| 136 | + |
| 137 | + @Bean |
| 138 | + AuthorizationServerSettings authorizationServerSettings() { |
| 139 | + return AuthorizationServerSettings.builder() |
| 140 | + .issuer(issuerUrl) |
| 141 | + .build(); |
| 142 | + } |
| 143 | + |
| 144 | + } |
| 145 | + |
| 146 | +} |
0 commit comments