2015-02-21 15:58:13 +01:00
|
|
|
/**
|
|
|
|
|
* Copyright (c) 2014, Sebastian Sdorra
|
|
|
|
|
* All rights reserved.
|
|
|
|
|
*
|
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
|
*
|
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
|
* 3. Neither the name of SCM-Manager; nor the names of its
|
|
|
|
|
* contributors may be used to endorse or promote products derived from this
|
|
|
|
|
* software without specific prior written permission.
|
|
|
|
|
*
|
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
|
|
|
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
|
|
|
|
|
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
*
|
|
|
|
|
* http://bitbucket.org/sdorra/scm-manager
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
package sonia.scm.security;
|
|
|
|
|
|
|
|
|
|
import org.apache.shiro.authc.AuthenticationInfo;
|
|
|
|
|
import org.apache.shiro.authc.UsernamePasswordToken;
|
2018-12-21 08:35:18 +01:00
|
|
|
import org.junit.jupiter.api.BeforeEach;
|
|
|
|
|
import org.junit.jupiter.api.Test;
|
|
|
|
|
import org.junit.jupiter.api.extension.ExtendWith;
|
2018-08-08 09:20:08 +02:00
|
|
|
import org.mockito.InjectMocks;
|
2015-02-21 15:58:13 +01:00
|
|
|
import org.mockito.Mock;
|
2018-12-21 08:35:18 +01:00
|
|
|
import org.mockito.junit.jupiter.MockitoExtension;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
import java.util.HashMap;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
import static org.assertj.core.api.Assertions.assertThat;
|
|
|
|
|
import static org.junit.jupiter.api.Assertions.assertThrows;
|
|
|
|
|
import static org.mockito.ArgumentMatchers.any;
|
|
|
|
|
import static org.mockito.Mockito.mock;
|
2018-08-08 09:20:08 +02:00
|
|
|
import static org.mockito.Mockito.when;
|
|
|
|
|
|
2015-02-21 15:58:13 +01:00
|
|
|
/**
|
2017-01-13 20:22:49 +01:00
|
|
|
* Unit tests for {@link BearerRealm}.
|
2019-11-13 14:03:48 +01:00
|
|
|
*
|
2015-02-21 15:58:13 +01:00
|
|
|
* @author Sebastian Sdorra
|
|
|
|
|
*/
|
2018-12-21 08:35:18 +01:00
|
|
|
@ExtendWith(MockitoExtension.class)
|
|
|
|
|
class BearerRealmTest {
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@Mock
|
|
|
|
|
private DAORealmHelperFactory realmHelperFactory;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@Mock
|
|
|
|
|
private DAORealmHelper realmHelper;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2019-01-21 14:27:14 +01:00
|
|
|
@Mock
|
|
|
|
|
private DAORealmHelper.AuthenticationInfoBuilder builder;
|
|
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@Mock
|
|
|
|
|
private AccessTokenResolver accessTokenResolver;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@InjectMocks
|
|
|
|
|
private BearerRealm realm;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@Mock
|
|
|
|
|
private AuthenticationInfo authenticationInfo;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@BeforeEach
|
|
|
|
|
void prepareObjectUnderTest() {
|
|
|
|
|
when(realmHelperFactory.create(BearerRealm.REALM)).thenReturn(realmHelper);
|
|
|
|
|
realm = new BearerRealm(realmHelperFactory, accessTokenResolver);
|
2017-01-16 15:04:44 +01:00
|
|
|
}
|
|
|
|
|
|
2017-01-12 22:04:19 +01:00
|
|
|
@Test
|
2018-12-21 08:35:18 +01:00
|
|
|
void shouldDoGetAuthentication() {
|
2020-03-20 11:10:05 +01:00
|
|
|
BearerToken bearerToken = BearerToken.create(SessionId.valueOf("__session__"), "__bearer__");
|
2018-12-21 08:35:18 +01:00
|
|
|
AccessToken accessToken = mock(AccessToken.class);
|
2019-01-21 14:27:14 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
when(accessToken.getSubject()).thenReturn("trillian");
|
|
|
|
|
when(accessToken.getClaims()).thenReturn(new HashMap<>());
|
|
|
|
|
when(accessTokenResolver.resolve(bearerToken)).thenReturn(accessToken);
|
2017-01-12 22:04:19 +01:00
|
|
|
|
2019-01-21 14:27:14 +01:00
|
|
|
when(realmHelper.authenticationInfoBuilder("trillian")).thenReturn(builder);
|
|
|
|
|
when(builder.withCredentials("__bearer__")).thenReturn(builder);
|
|
|
|
|
when(builder.withScope(any(Scope.class))).thenReturn(builder);
|
2019-11-13 14:03:48 +01:00
|
|
|
when(builder.withSessionId(any(SessionId.class))).thenReturn(builder);
|
2019-01-21 14:27:14 +01:00
|
|
|
when(builder.build()).thenReturn(authenticationInfo);
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
AuthenticationInfo result = realm.doGetAuthenticationInfo(bearerToken);
|
|
|
|
|
assertThat(result).isSameAs(authenticationInfo);
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
|
2018-12-21 08:35:18 +01:00
|
|
|
@Test
|
|
|
|
|
void shouldThrowIllegalArgumentExceptionForWrongTypeOfToken() {
|
|
|
|
|
assertThrows(IllegalArgumentException.class, () -> realm.doGetAuthenticationInfo(new UsernamePasswordToken()));
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
}
|