Add ":servlet:spring-boot:java:oauth2:resource-server:multi-tenancy"
This commit is contained in:
parent
dd926e9139
commit
14b32590e9
|
@ -0,0 +1,155 @@
|
||||||
|
= OAuth 2.0 Resource Server Sample
|
||||||
|
|
||||||
|
This sample demonstrates integrating Resource Server with a mock Authorization Server, though it can be modified to integrate
|
||||||
|
with your favorite Authorization Server.
|
||||||
|
|
||||||
|
With it, you can run the integration tests or run the application as a stand-alone service to explore how you can
|
||||||
|
secure your own service with OAuth 2.0 Bearer Tokens using Spring Security.
|
||||||
|
|
||||||
|
== 1. Running the tests
|
||||||
|
|
||||||
|
To run the tests, do:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
./gradlew integrationTest
|
||||||
|
```
|
||||||
|
|
||||||
|
Or import the project into your IDE and run `OAuth2ResourceServerApplicationTests` from there.
|
||||||
|
|
||||||
|
=== What is it doing?
|
||||||
|
|
||||||
|
By default, the tests are pointing at a mock Authorization Server instance.
|
||||||
|
|
||||||
|
The tests are configured with a set of hard-coded tokens originally obtained from the mock Authorization Server,
|
||||||
|
and each makes a query to the Resource Server with their corresponding token.
|
||||||
|
|
||||||
|
The Resource Server subsequently verifies with the Authorization Server and authorizes the request, returning either the
|
||||||
|
phrase
|
||||||
|
|
||||||
|
```bash
|
||||||
|
Hello, subject for tenantOne!
|
||||||
|
```
|
||||||
|
|
||||||
|
where "subject" is the value of the `sub` field in the JWT sent in the `Authorization` header,
|
||||||
|
|
||||||
|
or the phrase
|
||||||
|
```bash
|
||||||
|
Hello, subject for tenantTwo!
|
||||||
|
```
|
||||||
|
where "subject" is the value of the `sub` field in the Introspection response from the Authorization Server.
|
||||||
|
|
||||||
|
|
||||||
|
== 2. Running the app
|
||||||
|
|
||||||
|
To run as a stand-alone application, do:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
./gradlew bootRun
|
||||||
|
```
|
||||||
|
|
||||||
|
Or import the project into your IDE and run `OAuth2ResourceServerApplication` from there.
|
||||||
|
|
||||||
|
=== Authorizing with tenantOne (JWT)
|
||||||
|
|
||||||
|
Once it is up, you can use the following token:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
export TOKEN=eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJzdWJqZWN0IiwiZXhwIjo0NjgzODA1MTI4fQ.ULEPdHG-MK5GlrTQMhgqcyug2brTIZaJIrahUeq9zaiwUSdW83fJ7W1IDd2Z3n4a25JY2uhEcoV95lMfccHR6y_2DLrNvfta22SumY9PEDF2pido54LXG6edIGgarnUbJdR4rpRe_5oRGVa8gDx8FnuZsNv6StSZHAzw5OsuevSTJ1UbJm4UfX3wiahFOQ2OI6G-r5TB2rQNdiPHuNyzG5yznUqRIZ7-GCoMqHMaC-1epKxiX8gYXRROuUYTtcMNa86wh7OVDmvwVmFioRcR58UWBRoO1XQexTtOQq_t8KYsrPZhb9gkyW8x2bAQF-d0J0EJY8JslaH6n4RBaZISww
|
||||||
|
```
|
||||||
|
|
||||||
|
And then make this request:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
curl -H "Authorization: Bearer $TOKEN" localhost:8080/tenantOne
|
||||||
|
```
|
||||||
|
|
||||||
|
Which will respond with the phrase:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
Hello, subject for tenantOne!
|
||||||
|
```
|
||||||
|
|
||||||
|
where `subject` is the value of the `sub` field in the JWT sent in the `Authorization` header.
|
||||||
|
|
||||||
|
Or this:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
export TOKEN=eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJzdWJqZWN0Iiwic2NvcGUiOiJtZXNzYWdlOnJlYWQiLCJleHAiOjQ2ODM4MDUxNDF9.h-j6FKRFdnTdmAueTZCdep45e6DPwqM68ZQ8doIJ1exi9YxAlbWzOwId6Bd0L5YmCmp63gGQgsBUBLzwnZQ8kLUgUOBEC3UzSWGRqMskCY9_k9pX0iomX6IfF3N0PaYs0WPC4hO1s8wfZQ-6hKQ4KigFi13G9LMLdH58PRMK0pKEvs3gCbHJuEPw-K5ORlpdnleUTQIwINafU57cmK3KocTeknPAM_L716sCuSYGvDl6xUTXO7oPdrXhS_EhxLP6KxrpI1uD4Ea_5OWTh7S0Wx5LLDfU6wBG1DowN20d374zepOIEkR-Jnmr_QlR44vmRqS5ncrF-1R0EGcPX49U6A
|
||||||
|
|
||||||
|
curl -H "Authorization: Bearer $TOKEN" localhost:8080/tenantOne/message
|
||||||
|
```
|
||||||
|
|
||||||
|
Will respond with:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
secret message for tenantOne
|
||||||
|
```
|
||||||
|
|
||||||
|
=== Authorizing with tenantTwo (Opaque token)
|
||||||
|
|
||||||
|
Once it is up, you can use the following token:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
export TOKEN=00ed5855-1869-47a0-b0c9-0f3ce520aee7
|
||||||
|
```
|
||||||
|
|
||||||
|
And then make this request:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
curl -H "Authorization: Bearer $TOKEN" localhost:8080/tenantTwo
|
||||||
|
```
|
||||||
|
|
||||||
|
Which will respond with the phrase:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
Hello, subject for tenantTwo!
|
||||||
|
```
|
||||||
|
|
||||||
|
where `subject` is the value of the `sub` field in the Introspection response from the Authorization Server.
|
||||||
|
|
||||||
|
Or this:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
export TOKEN=b43d1500-c405-4dc9-b9c9-6cfd966c34c9
|
||||||
|
|
||||||
|
curl -H "Authorization: Bearer $TOKEN" localhost:8080/tenantTwo/message
|
||||||
|
```
|
||||||
|
|
||||||
|
Will respond with:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
secret message for tenantTwo
|
||||||
|
```
|
||||||
|
|
||||||
|
== 2. Testing against other Authorization Servers
|
||||||
|
|
||||||
|
_In order to use this sample, your Authorization Server must support JWTs that either use the "scope" or "scp" attribute._
|
||||||
|
|
||||||
|
To change the sample to point at your Authorization Server, simply find these properties in the `application.yml`:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
tenantOne.jwk-set-uri: ${mockwebserver.url}/.well-known/jwks.json
|
||||||
|
tenantTwo.introspection-uri: ${mockwebserver.url}/introspect
|
||||||
|
tenantTwo.introspection-client-id: client
|
||||||
|
tenantTwo.introspection-client-secret: secret
|
||||||
|
```
|
||||||
|
|
||||||
|
And change the properties to your Authorization Server's JWK set endpoint and
|
||||||
|
introspection endpoint, including its client id and secret
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
tenantOne.jwk-set-uri: https://dev-123456.oktapreview.com/oauth2/default/v1/keys
|
||||||
|
tenantTwo.introspection-uri: https://dev-123456.oktapreview.com/oauth2/default/v1/introspect
|
||||||
|
tenantTwo.introspection-client-id: client
|
||||||
|
tenantTwo.introspection-client-secret: secret
|
||||||
|
```
|
||||||
|
|
||||||
|
And then you can run the app the same as before:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
./gradlew bootRun
|
||||||
|
```
|
||||||
|
|
||||||
|
Make sure to obtain valid tokens from your Authorization Server in order to play with the sample Resource Server.
|
||||||
|
To use the `/` endpoint, any valid token from your Authorization Server will do.
|
||||||
|
To use the `/message` endpoint, the token should have the `message:read` scope.
|
|
@ -0,0 +1,41 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
plugins {
|
||||||
|
id 'org.springframework.boot' version '2.2.6.RELEASE'
|
||||||
|
id 'io.spring.dependency-management' version '1.0.9.RELEASE'
|
||||||
|
id "nebula.integtest" version "7.0.9"
|
||||||
|
id 'java'
|
||||||
|
}
|
||||||
|
|
||||||
|
repositories {
|
||||||
|
mavenCentral()
|
||||||
|
maven { url "https://repo.spring.io/snapshot" }
|
||||||
|
}
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation 'com.squareup.okhttp3:mockwebserver'
|
||||||
|
implementation 'org.springframework.boot:spring-boot-starter-oauth2-resource-server'
|
||||||
|
implementation 'org.springframework.boot:spring-boot-starter-web'
|
||||||
|
implementation 'com.nimbusds:oauth2-oidc-sdk:7.4'
|
||||||
|
|
||||||
|
testImplementation 'org.springframework.boot:spring-boot-starter-test'
|
||||||
|
testImplementation 'org.springframework.security:spring-security-test'
|
||||||
|
}
|
||||||
|
|
||||||
|
tasks.withType(Test).configureEach {
|
||||||
|
useJUnitPlatform()
|
||||||
|
}
|
|
@ -0,0 +1 @@
|
||||||
|
spring-security.version=5.4.0.BUILD-SNAPSHOT
|
BIN
servlet/spring-boot/java/oauth2/resource-server/multi-tenancy/gradle/wrapper/gradle-wrapper.jar
vendored
Normal file
BIN
servlet/spring-boot/java/oauth2/resource-server/multi-tenancy/gradle/wrapper/gradle-wrapper.jar
vendored
Normal file
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
distributionBase=GRADLE_USER_HOME
|
||||||
|
distributionPath=wrapper/dists
|
||||||
|
distributionUrl=https\://services.gradle.org/distributions/gradle-6.2.2-bin.zip
|
||||||
|
zipStoreBase=GRADLE_USER_HOME
|
||||||
|
zipStorePath=wrapper/dists
|
|
@ -0,0 +1,183 @@
|
||||||
|
#!/usr/bin/env sh
|
||||||
|
|
||||||
|
#
|
||||||
|
# Copyright 2015 the original author or authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
|
||||||
|
##############################################################################
|
||||||
|
##
|
||||||
|
## Gradle start up script for UN*X
|
||||||
|
##
|
||||||
|
##############################################################################
|
||||||
|
|
||||||
|
# Attempt to set APP_HOME
|
||||||
|
# Resolve links: $0 may be a link
|
||||||
|
PRG="$0"
|
||||||
|
# Need this for relative symlinks.
|
||||||
|
while [ -h "$PRG" ] ; do
|
||||||
|
ls=`ls -ld "$PRG"`
|
||||||
|
link=`expr "$ls" : '.*-> \(.*\)$'`
|
||||||
|
if expr "$link" : '/.*' > /dev/null; then
|
||||||
|
PRG="$link"
|
||||||
|
else
|
||||||
|
PRG=`dirname "$PRG"`"/$link"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
SAVED="`pwd`"
|
||||||
|
cd "`dirname \"$PRG\"`/" >/dev/null
|
||||||
|
APP_HOME="`pwd -P`"
|
||||||
|
cd "$SAVED" >/dev/null
|
||||||
|
|
||||||
|
APP_NAME="Gradle"
|
||||||
|
APP_BASE_NAME=`basename "$0"`
|
||||||
|
|
||||||
|
# Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
|
||||||
|
DEFAULT_JVM_OPTS='"-Xmx64m" "-Xms64m"'
|
||||||
|
|
||||||
|
# Use the maximum available, or set MAX_FD != -1 to use that value.
|
||||||
|
MAX_FD="maximum"
|
||||||
|
|
||||||
|
warn () {
|
||||||
|
echo "$*"
|
||||||
|
}
|
||||||
|
|
||||||
|
die () {
|
||||||
|
echo
|
||||||
|
echo "$*"
|
||||||
|
echo
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
|
# OS specific support (must be 'true' or 'false').
|
||||||
|
cygwin=false
|
||||||
|
msys=false
|
||||||
|
darwin=false
|
||||||
|
nonstop=false
|
||||||
|
case "`uname`" in
|
||||||
|
CYGWIN* )
|
||||||
|
cygwin=true
|
||||||
|
;;
|
||||||
|
Darwin* )
|
||||||
|
darwin=true
|
||||||
|
;;
|
||||||
|
MINGW* )
|
||||||
|
msys=true
|
||||||
|
;;
|
||||||
|
NONSTOP* )
|
||||||
|
nonstop=true
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar
|
||||||
|
|
||||||
|
# Determine the Java command to use to start the JVM.
|
||||||
|
if [ -n "$JAVA_HOME" ] ; then
|
||||||
|
if [ -x "$JAVA_HOME/jre/sh/java" ] ; then
|
||||||
|
# IBM's JDK on AIX uses strange locations for the executables
|
||||||
|
JAVACMD="$JAVA_HOME/jre/sh/java"
|
||||||
|
else
|
||||||
|
JAVACMD="$JAVA_HOME/bin/java"
|
||||||
|
fi
|
||||||
|
if [ ! -x "$JAVACMD" ] ; then
|
||||||
|
die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME
|
||||||
|
|
||||||
|
Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
location of your Java installation."
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
JAVACMD="java"
|
||||||
|
which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
|
||||||
|
|
||||||
|
Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
location of your Java installation."
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Increase the maximum file descriptors if we can.
|
||||||
|
if [ "$cygwin" = "false" -a "$darwin" = "false" -a "$nonstop" = "false" ] ; then
|
||||||
|
MAX_FD_LIMIT=`ulimit -H -n`
|
||||||
|
if [ $? -eq 0 ] ; then
|
||||||
|
if [ "$MAX_FD" = "maximum" -o "$MAX_FD" = "max" ] ; then
|
||||||
|
MAX_FD="$MAX_FD_LIMIT"
|
||||||
|
fi
|
||||||
|
ulimit -n $MAX_FD
|
||||||
|
if [ $? -ne 0 ] ; then
|
||||||
|
warn "Could not set maximum file descriptor limit: $MAX_FD"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
warn "Could not query maximum file descriptor limit: $MAX_FD_LIMIT"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# For Darwin, add options to specify how the application appears in the dock
|
||||||
|
if $darwin; then
|
||||||
|
GRADLE_OPTS="$GRADLE_OPTS \"-Xdock:name=$APP_NAME\" \"-Xdock:icon=$APP_HOME/media/gradle.icns\""
|
||||||
|
fi
|
||||||
|
|
||||||
|
# For Cygwin or MSYS, switch paths to Windows format before running java
|
||||||
|
if [ "$cygwin" = "true" -o "$msys" = "true" ] ; then
|
||||||
|
APP_HOME=`cygpath --path --mixed "$APP_HOME"`
|
||||||
|
CLASSPATH=`cygpath --path --mixed "$CLASSPATH"`
|
||||||
|
JAVACMD=`cygpath --unix "$JAVACMD"`
|
||||||
|
|
||||||
|
# We build the pattern for arguments to be converted via cygpath
|
||||||
|
ROOTDIRSRAW=`find -L / -maxdepth 1 -mindepth 1 -type d 2>/dev/null`
|
||||||
|
SEP=""
|
||||||
|
for dir in $ROOTDIRSRAW ; do
|
||||||
|
ROOTDIRS="$ROOTDIRS$SEP$dir"
|
||||||
|
SEP="|"
|
||||||
|
done
|
||||||
|
OURCYGPATTERN="(^($ROOTDIRS))"
|
||||||
|
# Add a user-defined pattern to the cygpath arguments
|
||||||
|
if [ "$GRADLE_CYGPATTERN" != "" ] ; then
|
||||||
|
OURCYGPATTERN="$OURCYGPATTERN|($GRADLE_CYGPATTERN)"
|
||||||
|
fi
|
||||||
|
# Now convert the arguments - kludge to limit ourselves to /bin/sh
|
||||||
|
i=0
|
||||||
|
for arg in "$@" ; do
|
||||||
|
CHECK=`echo "$arg"|egrep -c "$OURCYGPATTERN" -`
|
||||||
|
CHECK2=`echo "$arg"|egrep -c "^-"` ### Determine if an option
|
||||||
|
|
||||||
|
if [ $CHECK -ne 0 ] && [ $CHECK2 -eq 0 ] ; then ### Added a condition
|
||||||
|
eval `echo args$i`=`cygpath --path --ignore --mixed "$arg"`
|
||||||
|
else
|
||||||
|
eval `echo args$i`="\"$arg\""
|
||||||
|
fi
|
||||||
|
i=`expr $i + 1`
|
||||||
|
done
|
||||||
|
case $i in
|
||||||
|
0) set -- ;;
|
||||||
|
1) set -- "$args0" ;;
|
||||||
|
2) set -- "$args0" "$args1" ;;
|
||||||
|
3) set -- "$args0" "$args1" "$args2" ;;
|
||||||
|
4) set -- "$args0" "$args1" "$args2" "$args3" ;;
|
||||||
|
5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;;
|
||||||
|
6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;;
|
||||||
|
7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;;
|
||||||
|
8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;;
|
||||||
|
9) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" "$args8" ;;
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Escape application args
|
||||||
|
save () {
|
||||||
|
for i do printf %s\\n "$i" | sed "s/'/'\\\\''/g;1s/^/'/;\$s/\$/' \\\\/" ; done
|
||||||
|
echo " "
|
||||||
|
}
|
||||||
|
APP_ARGS=`save "$@"`
|
||||||
|
|
||||||
|
# Collect all arguments for the java command, following the shell quoting and substitution rules
|
||||||
|
eval set -- $DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS "\"-Dorg.gradle.appname=$APP_BASE_NAME\"" -classpath "\"$CLASSPATH\"" org.gradle.wrapper.GradleWrapperMain "$APP_ARGS"
|
||||||
|
|
||||||
|
exec "$JAVACMD" "$@"
|
|
@ -0,0 +1,103 @@
|
||||||
|
@rem
|
||||||
|
@rem Copyright 2015 the original author or authors.
|
||||||
|
@rem
|
||||||
|
@rem Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
@rem you may not use this file except in compliance with the License.
|
||||||
|
@rem You may obtain a copy of the License at
|
||||||
|
@rem
|
||||||
|
@rem https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
@rem
|
||||||
|
@rem Unless required by applicable law or agreed to in writing, software
|
||||||
|
@rem distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
@rem WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
@rem See the License for the specific language governing permissions and
|
||||||
|
@rem limitations under the License.
|
||||||
|
@rem
|
||||||
|
|
||||||
|
@if "%DEBUG%" == "" @echo off
|
||||||
|
@rem ##########################################################################
|
||||||
|
@rem
|
||||||
|
@rem Gradle startup script for Windows
|
||||||
|
@rem
|
||||||
|
@rem ##########################################################################
|
||||||
|
|
||||||
|
@rem Set local scope for the variables with windows NT shell
|
||||||
|
if "%OS%"=="Windows_NT" setlocal
|
||||||
|
|
||||||
|
set DIRNAME=%~dp0
|
||||||
|
if "%DIRNAME%" == "" set DIRNAME=.
|
||||||
|
set APP_BASE_NAME=%~n0
|
||||||
|
set APP_HOME=%DIRNAME%
|
||||||
|
|
||||||
|
@rem Resolve any "." and ".." in APP_HOME to make it shorter.
|
||||||
|
for %%i in ("%APP_HOME%") do set APP_HOME=%%~fi
|
||||||
|
|
||||||
|
@rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
|
||||||
|
set DEFAULT_JVM_OPTS="-Xmx64m" "-Xms64m"
|
||||||
|
|
||||||
|
@rem Find java.exe
|
||||||
|
if defined JAVA_HOME goto findJavaFromJavaHome
|
||||||
|
|
||||||
|
set JAVA_EXE=java.exe
|
||||||
|
%JAVA_EXE% -version >NUL 2>&1
|
||||||
|
if "%ERRORLEVEL%" == "0" goto init
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
|
||||||
|
echo.
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
echo location of your Java installation.
|
||||||
|
|
||||||
|
goto fail
|
||||||
|
|
||||||
|
:findJavaFromJavaHome
|
||||||
|
set JAVA_HOME=%JAVA_HOME:"=%
|
||||||
|
set JAVA_EXE=%JAVA_HOME%/bin/java.exe
|
||||||
|
|
||||||
|
if exist "%JAVA_EXE%" goto init
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME%
|
||||||
|
echo.
|
||||||
|
echo Please set the JAVA_HOME variable in your environment to match the
|
||||||
|
echo location of your Java installation.
|
||||||
|
|
||||||
|
goto fail
|
||||||
|
|
||||||
|
:init
|
||||||
|
@rem Get command-line arguments, handling Windows variants
|
||||||
|
|
||||||
|
if not "%OS%" == "Windows_NT" goto win9xME_args
|
||||||
|
|
||||||
|
:win9xME_args
|
||||||
|
@rem Slurp the command line arguments.
|
||||||
|
set CMD_LINE_ARGS=
|
||||||
|
set _SKIP=2
|
||||||
|
|
||||||
|
:win9xME_args_slurp
|
||||||
|
if "x%~1" == "x" goto execute
|
||||||
|
|
||||||
|
set CMD_LINE_ARGS=%*
|
||||||
|
|
||||||
|
:execute
|
||||||
|
@rem Setup the command line
|
||||||
|
|
||||||
|
set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar
|
||||||
|
|
||||||
|
@rem Execute Gradle
|
||||||
|
"%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %CMD_LINE_ARGS%
|
||||||
|
|
||||||
|
:end
|
||||||
|
@rem End local scope for the variables with windows NT shell
|
||||||
|
if "%ERRORLEVEL%"=="0" goto mainEnd
|
||||||
|
|
||||||
|
:fail
|
||||||
|
rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of
|
||||||
|
rem the _cmd.exe /c_ return code!
|
||||||
|
if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1
|
||||||
|
exit /b 1
|
||||||
|
|
||||||
|
:mainEnd
|
||||||
|
if "%OS%"=="Windows_NT" endlocal
|
||||||
|
|
||||||
|
:omega
|
|
@ -0,0 +1 @@
|
||||||
|
|
|
@ -0,0 +1,170 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package example;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.boot.test.autoconfigure.web.servlet.AutoConfigureMockMvc;
|
||||||
|
import org.springframework.boot.test.context.SpringBootTest;
|
||||||
|
import org.springframework.http.HttpHeaders;
|
||||||
|
import org.springframework.mock.web.MockHttpServletRequest;
|
||||||
|
import org.springframework.test.context.ActiveProfiles;
|
||||||
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
import org.springframework.test.web.servlet.request.RequestPostProcessor;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;
|
||||||
|
import static org.hamcrest.Matchers.containsString;
|
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.header;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Integration tests for {@link OAuth2ResourceServerApplication}.
|
||||||
|
*
|
||||||
|
* @author Josh Cummings
|
||||||
|
*/
|
||||||
|
@SpringBootTest
|
||||||
|
@AutoConfigureMockMvc
|
||||||
|
@ActiveProfiles("test")
|
||||||
|
public class OAuth2ResourceServerApplicationITests {
|
||||||
|
|
||||||
|
String tenantOneNoScopesToken = "eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJzdWJqZWN0IiwiZXhwIjo0NjgzODA1MTI4fQ.ULEPdHG-MK5GlrTQMhgqcyug2brTIZaJIrahUeq9zaiwUSdW83fJ7W1IDd2Z3n4a25JY2uhEcoV95lMfccHR6y_2DLrNvfta22SumY9PEDF2pido54LXG6edIGgarnUbJdR4rpRe_5oRGVa8gDx8FnuZsNv6StSZHAzw5OsuevSTJ1UbJm4UfX3wiahFOQ2OI6G-r5TB2rQNdiPHuNyzG5yznUqRIZ7-GCoMqHMaC-1epKxiX8gYXRROuUYTtcMNa86wh7OVDmvwVmFioRcR58UWBRoO1XQexTtOQq_t8KYsrPZhb9gkyW8x2bAQF-d0J0EJY8JslaH6n4RBaZISww";
|
||||||
|
|
||||||
|
String tenantOneMessageReadToken = "eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJzdWJqZWN0Iiwic2NvcGUiOiJtZXNzYWdlOnJlYWQiLCJleHAiOjQ2ODM4MDUxNDF9.h-j6FKRFdnTdmAueTZCdep45e6DPwqM68ZQ8doIJ1exi9YxAlbWzOwId6Bd0L5YmCmp63gGQgsBUBLzwnZQ8kLUgUOBEC3UzSWGRqMskCY9_k9pX0iomX6IfF3N0PaYs0WPC4hO1s8wfZQ-6hKQ4KigFi13G9LMLdH58PRMK0pKEvs3gCbHJuEPw-K5ORlpdnleUTQIwINafU57cmK3KocTeknPAM_L716sCuSYGvDl6xUTXO7oPdrXhS_EhxLP6KxrpI1uD4Ea_5OWTh7S0Wx5LLDfU6wBG1DowN20d374zepOIEkR-Jnmr_QlR44vmRqS5ncrF-1R0EGcPX49U6A";
|
||||||
|
|
||||||
|
String tenantTwoNoScopesToken = "00ed5855-1869-47a0-b0c9-0f3ce520aee7";
|
||||||
|
|
||||||
|
String tenantTwoMessageReadToken = "b43d1500-c405-4dc9-b9c9-6cfd966c34c9";
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
MockMvc mvc;
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantOnePerformWhenValidBearerTokenThenAllows()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantOne").with(bearerToken(this.tenantOneNoScopesToken)))
|
||||||
|
.andExpect(status().isOk())
|
||||||
|
.andExpect(content().string(containsString("Hello, subject for tenantOne!")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantOnePerformWhenValidBearerTokenWithServletPathThenAllows()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantOne").servletPath("/tenantOne").with(bearerToken(this.tenantOneNoScopesToken)))
|
||||||
|
.andExpect(status().isOk())
|
||||||
|
.andExpect(content().string(containsString("Hello, subject for tenantOne!")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
// -- tests with scopes
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantOnePerformWhenValidBearerTokenThenScopedRequestsAlsoWork()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantOne/message").with(bearerToken(this.tenantOneMessageReadToken)))
|
||||||
|
.andExpect(status().isOk())
|
||||||
|
.andExpect(content().string(containsString("secret message for tenantOne")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantOnePerformWhenInsufficientlyScopedBearerTokenThenDeniesScopedMethodAccess()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantOne/message").with(bearerToken(this.tenantOneNoScopesToken)))
|
||||||
|
.andExpect(status().isForbidden())
|
||||||
|
.andExpect(header().string(HttpHeaders.WWW_AUTHENTICATE,
|
||||||
|
containsString("Bearer error=\"insufficient_scope\"")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantTwoPerformWhenValidBearerTokenThenAllows()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantTwo").with(bearerToken(this.tenantTwoNoScopesToken)))
|
||||||
|
.andExpect(status().isOk())
|
||||||
|
.andExpect(content().string(containsString("Hello, subject for tenantTwo!")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
// -- tests with scopes
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantTwoPerformWhenValidBearerTokenThenScopedRequestsAlsoWork()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantTwo/message").with(bearerToken(this.tenantTwoMessageReadToken)))
|
||||||
|
.andExpect(status().isOk())
|
||||||
|
.andExpect(content().string(containsString("secret message for tenantTwo")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void tenantTwoPerformWhenInsufficientlyScopedBearerTokenThenDeniesScopedMethodAccess()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
this.mvc.perform(get("/tenantTwo/message").with(bearerToken(this.tenantTwoNoScopesToken)))
|
||||||
|
.andExpect(status().isForbidden())
|
||||||
|
.andExpect(header().string(HttpHeaders.WWW_AUTHENTICATE,
|
||||||
|
containsString("Bearer error=\"insufficient_scope\"")));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void invalidTenantPerformWhenValidBearerTokenThenThrowsException()
|
||||||
|
throws Exception {
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
assertThatIllegalArgumentException()
|
||||||
|
.isThrownBy(() ->
|
||||||
|
this.mvc.perform(get("/tenantThree")
|
||||||
|
.with(bearerToken(this.tenantOneNoScopesToken)))
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
private static BearerTokenRequestPostProcessor bearerToken(String token) {
|
||||||
|
return new BearerTokenRequestPostProcessor(token);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static class BearerTokenRequestPostProcessor implements RequestPostProcessor {
|
||||||
|
private String token;
|
||||||
|
|
||||||
|
BearerTokenRequestPostProcessor(String token) {
|
||||||
|
this.token = token;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public MockHttpServletRequest postProcessRequest(MockHttpServletRequest request) {
|
||||||
|
request.addHeader("Authorization", "Bearer " + this.token);
|
||||||
|
return request;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,31 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package example;
|
||||||
|
|
||||||
|
import org.springframework.boot.SpringApplication;
|
||||||
|
import org.springframework.boot.autoconfigure.SpringBootApplication;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* OAuth Resource Server application.
|
||||||
|
* @author Josh Cummings
|
||||||
|
*/
|
||||||
|
@SpringBootApplication
|
||||||
|
public class OAuth2ResourceServerApplication {
|
||||||
|
|
||||||
|
public static void main(String[] args) {
|
||||||
|
SpringApplication.run(OAuth2ResourceServerApplication.class, args);
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,41 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package example;
|
||||||
|
|
||||||
|
import org.springframework.security.core.annotation.AuthenticationPrincipal;
|
||||||
|
import org.springframework.security.oauth2.core.OAuth2AuthenticatedPrincipal;
|
||||||
|
import org.springframework.web.bind.annotation.GetMapping;
|
||||||
|
import org.springframework.web.bind.annotation.PathVariable;
|
||||||
|
import org.springframework.web.bind.annotation.RestController;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A controller demonstrating OAuth2 Resource server.
|
||||||
|
* @author Josh Cummings
|
||||||
|
*/
|
||||||
|
@RestController
|
||||||
|
public class OAuth2ResourceServerController {
|
||||||
|
|
||||||
|
@GetMapping("/{tenantId}")
|
||||||
|
public String index(@AuthenticationPrincipal OAuth2AuthenticatedPrincipal token, @PathVariable("tenantId") String tenantId) {
|
||||||
|
String subject = token.getAttribute("sub");
|
||||||
|
return String.format("Hello, %s for %s!", subject, tenantId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@GetMapping("/{tenantId}/message")
|
||||||
|
public String message(@PathVariable("tenantId") String tenantId) {
|
||||||
|
return String.format("secret message for %s", tenantId);
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,101 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package example;
|
||||||
|
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Optional;
|
||||||
|
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.security.authentication.AuthenticationManager;
|
||||||
|
import org.springframework.security.authentication.AuthenticationManagerResolver;
|
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
||||||
|
import org.springframework.security.oauth2.jwt.JwtDecoder;
|
||||||
|
import org.springframework.security.oauth2.jwt.NimbusJwtDecoder;
|
||||||
|
import org.springframework.security.oauth2.server.resource.authentication.JwtAuthenticationProvider;
|
||||||
|
import org.springframework.security.oauth2.server.resource.authentication.JwtBearerTokenAuthenticationConverter;
|
||||||
|
import org.springframework.security.oauth2.server.resource.authentication.OpaqueTokenAuthenticationProvider;
|
||||||
|
import org.springframework.security.oauth2.server.resource.introspection.NimbusOpaqueTokenIntrospector;
|
||||||
|
import org.springframework.security.oauth2.server.resource.introspection.OpaqueTokenIntrospector;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* OAuth Resource Security configuration.
|
||||||
|
* @author Josh Cummings
|
||||||
|
*/
|
||||||
|
@EnableWebSecurity
|
||||||
|
public class OAuth2ResourceServerSecurityConfiguration extends WebSecurityConfigurerAdapter {
|
||||||
|
|
||||||
|
@Value("${tenantOne.jwk-set-uri}")
|
||||||
|
String jwkSetUri;
|
||||||
|
|
||||||
|
@Value("${tenantTwo.introspection-uri}")
|
||||||
|
String introspectionUri;
|
||||||
|
|
||||||
|
@Value("${tenantTwo.introspection-client-id}")
|
||||||
|
String introspectionClientId;
|
||||||
|
|
||||||
|
@Value("${tenantTwo.introspection-client-secret}")
|
||||||
|
String introspectionClientSecret;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.authorizeRequests((requests) -> requests
|
||||||
|
.mvcMatchers("/**/message/**").hasAuthority("SCOPE_message:read")
|
||||||
|
.anyRequest().authenticated()
|
||||||
|
)
|
||||||
|
.oauth2ResourceServer((resourceServer) -> resourceServer
|
||||||
|
.authenticationManagerResolver(multitenantAuthenticationManager())
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
AuthenticationManagerResolver<HttpServletRequest> multitenantAuthenticationManager() {
|
||||||
|
Map<String, AuthenticationManager> authenticationManagers = new HashMap<>();
|
||||||
|
authenticationManagers.put("tenantOne", jwt());
|
||||||
|
authenticationManagers.put("tenantTwo", opaque());
|
||||||
|
return (request) -> {
|
||||||
|
String[] pathParts = request.getRequestURI().split("/");
|
||||||
|
String tenantId = (pathParts.length > 0) ? pathParts[1] : null;
|
||||||
|
// @formatter:off
|
||||||
|
return Optional.ofNullable(tenantId)
|
||||||
|
.map(authenticationManagers::get)
|
||||||
|
.orElseThrow(() -> new IllegalArgumentException("unknown tenant"));
|
||||||
|
// @formatter:on
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
AuthenticationManager jwt() {
|
||||||
|
JwtDecoder jwtDecoder = NimbusJwtDecoder.withJwkSetUri(this.jwkSetUri).build();
|
||||||
|
JwtAuthenticationProvider authenticationProvider = new JwtAuthenticationProvider(jwtDecoder);
|
||||||
|
authenticationProvider.setJwtAuthenticationConverter(new JwtBearerTokenAuthenticationConverter());
|
||||||
|
return authenticationProvider::authenticate;
|
||||||
|
}
|
||||||
|
|
||||||
|
AuthenticationManager opaque() {
|
||||||
|
OpaqueTokenIntrospector introspectionClient =
|
||||||
|
new NimbusOpaqueTokenIntrospector(this.introspectionUri,
|
||||||
|
this.introspectionClientId, this.introspectionClientSecret);
|
||||||
|
return new OpaqueTokenAuthenticationProvider(introspectionClient)::authenticate;
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,42 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2002-2019 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.springframework.boot.env;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.DisposableBean;
|
||||||
|
import org.springframework.boot.SpringApplication;
|
||||||
|
import org.springframework.core.env.ConfigurableEnvironment;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds {@link MockWebServerPropertySource} to the environment.
|
||||||
|
* @author Rob Winch
|
||||||
|
*/
|
||||||
|
public class MockWebServerEnvironmentPostProcessor
|
||||||
|
implements EnvironmentPostProcessor, DisposableBean {
|
||||||
|
|
||||||
|
private final MockWebServerPropertySource propertySource = new MockWebServerPropertySource();
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void postProcessEnvironment(ConfigurableEnvironment environment,
|
||||||
|
SpringApplication application) {
|
||||||
|
environment.getPropertySources().addFirst(this.propertySource);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void destroy() throws Exception {
|
||||||
|
this.propertySource.destroy();
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,217 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2002-2019 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.springframework.boot.env;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.Base64;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Optional;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
import java.util.stream.Stream;
|
||||||
|
|
||||||
|
import okhttp3.mockwebserver.Dispatcher;
|
||||||
|
import okhttp3.mockwebserver.MockResponse;
|
||||||
|
import okhttp3.mockwebserver.MockWebServer;
|
||||||
|
import okhttp3.mockwebserver.RecordedRequest;
|
||||||
|
import okio.Buffer;
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.DisposableBean;
|
||||||
|
import org.springframework.core.env.PropertySource;
|
||||||
|
import org.springframework.http.HttpHeaders;
|
||||||
|
import org.springframework.http.MediaType;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds the mock server url.
|
||||||
|
* @author Rob Winch
|
||||||
|
*/
|
||||||
|
public class MockWebServerPropertySource extends PropertySource<MockWebServer> implements
|
||||||
|
DisposableBean {
|
||||||
|
|
||||||
|
// introspection endpoint
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final MockResponse NO_SCOPES_RESPONSE = response(
|
||||||
|
"{\n" +
|
||||||
|
" \"active\": true,\n" +
|
||||||
|
" \"sub\": \"subject\"\n" +
|
||||||
|
" }",
|
||||||
|
200
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final MockResponse MESSASGE_READ_SCOPE_RESPONSE = response(
|
||||||
|
"{\n" +
|
||||||
|
" \"active\": true,\n" +
|
||||||
|
" \"scope\" : \"message:read\"," +
|
||||||
|
" \"sub\": \"subject\"\n" +
|
||||||
|
" }",
|
||||||
|
200
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final MockResponse INACTIVE_RESPONSE = response(
|
||||||
|
"{\n" +
|
||||||
|
" \"active\": false,\n" +
|
||||||
|
" }",
|
||||||
|
200
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final MockResponse BAD_REQUEST_RESPONSE = response(
|
||||||
|
"{ \"message\" : \"This mock authorization server requires a username and password of " +
|
||||||
|
"client/secret and a POST body of token=${token}\" }",
|
||||||
|
400
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final MockResponse NOT_FOUND_RESPONSE = response(
|
||||||
|
"{ \"message\" : \"This mock authorization server responds to just two requests: POST /introspect" +
|
||||||
|
" and GET /.well-known/jwks.json.\" }",
|
||||||
|
404
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
|
// jwks endpoint
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
private static final MockResponse JWKS_RESPONSE = response(
|
||||||
|
"{\"keys\":[{\"p\":\"2p-ViY7DE9ZrdWQb544m0Jp7Cv03YCSljqfim9pD4ALhObX0OrAznOiowTjwBky9JGffMwDBVSfJSD9TSU7aH2sbbfi0bZLMdekKAuimudXwUqPDxrrg0BCyvCYgLmKjbVT3zcdylWSog93CNTxGDPzauu-oc0XPNKCXnaDpNvE\",\"kty\":\"RSA\",\"q\":\"sP_QYavrpBvSJ86uoKVGj2AGl78CSsAtpf1ybSY5TwUlorXSdqapRbY69Y271b0aMLzlleUn9ZTBO1dlKV2_dw_lPADHVia8z3pxL-8sUhIXLsgj4acchMk4c9YX-sFh07xENnyZ-_TXm3llPLuL67HUfBC2eKe800TmCYVWc9U\",\"d\":\"bn1nFxCQT4KLTHqo8mo9HvHD0cRNRNdWcKNnnEQkCF6tKbt-ILRyQGP8O40axLd7CoNVG9c9p_-g4-2kwCtLJNv_STLtwfpCY7VN5o6-ZIpfTjiW6duoPrLWq64Hm_4LOBQTiZfUPcLhsuJRHbWqakj-kV_YbUyC2Ocf_dd8IAQcSrAU2SCcDebhDCWwRUFvaa9V5eq0851S9goaA-AJz-JXyePH6ZFr8JxmWkWxYZ5kdcMD-sm9ZbxE0CaEk32l4fE4hR-L8x2dDtjWA-ahKCZ091z-gV3HWtR2JOjvxoNRjxUo3UxaGiFJHWNIl0EYUJZu1Cb-5wIlEI7wPx5mwQ\",\"e\":\"AQAB\",\"use\":\"sig\",\"kid\":\"one\",\"qi\":\"qS0OK48M2CIAA6_4Wdw4EbCaAfcTLf5Oy9t5BOF_PFUKqoSpZ6JsT5H0a_4zkjt-oI969v78OTlvBKbmEyKO-KeytzHBAA5CsLmVcz0THrMSg6oXZqu66MPnvWoZN9FEN5TklPOvBFm8Bg1QZ3k-YMVaM--DLvhaYR95_mqaz50\",\"dp\":\"Too2NozLGD1XrXyhabZvy1E0EuaVFj0UHQPDLSpkZ_2g3BK6Art6T0xmE8RYtmqrKIEIdlI3IliAvyvAx_1D7zWTTRaj-xlZyqJFrnXWL7zj8UxT8PkB-r2E-ILZ3NAi1gxIWezlBTZ8M6NfObDFmbTc_3tJkN_raISo8z_ziIE\",\"dq\":\"U0yhSkY5yOsa9YcMoigGVBWSJLpNHtbg5NypjHrPv8OhWbkOSq7WvSstBkFk5AtyFvvfZLMLIkWWxxGzV0t6f1MoxBtttLrYYyCxwihiiGFhLbAdSuZ1wnxcqA9bC7UVECvrQmVTpsMs8UupfHKbQBpZ8OWAqrnuYNNtG4_4Bt0\",\"n\":\"lygtuZj0lJjqOqIWocF8Bb583QDdq-aaFg8PesOp2-EDda6GqCpL-_NZVOflNGX7XIgjsWHcPsQHsV9gWuOzSJ0iEuWvtQ6eGBP5M6m7pccLNZfwUse8Cb4Ngx3XiTlyuqM7pv0LPyppZusfEHVEdeelou7Dy9k0OQ_nJTI3b2E1WBoHC58CJ453lo4gcBm1efURN3LIVc1V9NQY_ESBKVdwqYyoJPEanURLVGRd6cQKn6YrCbbIRHjqAyqOE-z3KmgDJnPriljfR5XhSGyM9eqD9Xpy6zu_MAeMJJfSArp857zLPk-Wf5VP9STAcjyfdBIybMKnwBYr2qHMT675hQ\"}]}",
|
||||||
|
200
|
||||||
|
);
|
||||||
|
// @formatter:on
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Name of the random {@link PropertySource}.
|
||||||
|
*/
|
||||||
|
public static final String MOCK_WEB_SERVER_PROPERTY_SOURCE_NAME = "mockwebserver";
|
||||||
|
|
||||||
|
private static final String NAME = "mockwebserver.url";
|
||||||
|
|
||||||
|
private static final Log logger = LogFactory.getLog(MockWebServerPropertySource.class);
|
||||||
|
|
||||||
|
private boolean started;
|
||||||
|
|
||||||
|
public MockWebServerPropertySource() {
|
||||||
|
super(MOCK_WEB_SERVER_PROPERTY_SOURCE_NAME, new MockWebServer());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Object getProperty(String name) {
|
||||||
|
if (!name.equals(NAME)) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
if (logger.isTraceEnabled()) {
|
||||||
|
logger.trace("Looking up the url for '" + name + "'");
|
||||||
|
}
|
||||||
|
String url = getUrl();
|
||||||
|
return url;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void destroy() throws Exception {
|
||||||
|
getSource().shutdown();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get's the URL (i.e. "http://localhost:123456")
|
||||||
|
* @return the mock server URL.
|
||||||
|
*/
|
||||||
|
private String getUrl() {
|
||||||
|
MockWebServer mockWebServer = getSource();
|
||||||
|
if (!this.started) {
|
||||||
|
intializeMockWebServer(mockWebServer);
|
||||||
|
}
|
||||||
|
String url = mockWebServer.url("").url().toExternalForm();
|
||||||
|
return url.substring(0, url.length() - 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void intializeMockWebServer(MockWebServer mockWebServer) {
|
||||||
|
Dispatcher dispatcher = new Dispatcher() {
|
||||||
|
@Override
|
||||||
|
public MockResponse dispatch(RecordedRequest request) {
|
||||||
|
return doDispatch(request);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
mockWebServer.setDispatcher(dispatcher);
|
||||||
|
try {
|
||||||
|
mockWebServer.start();
|
||||||
|
this.started = true;
|
||||||
|
}
|
||||||
|
catch (IOException ex) {
|
||||||
|
throw new RuntimeException("Could not start " + mockWebServer, ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private MockResponse doDispatch(RecordedRequest request) {
|
||||||
|
if ("/.well-known/jwks.json".equals(request.getPath())) {
|
||||||
|
return JWKS_RESPONSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ("/introspect".equals(request.getPath())) {
|
||||||
|
// @formatter:off
|
||||||
|
return Optional.ofNullable(request.getHeader(HttpHeaders.AUTHORIZATION))
|
||||||
|
.filter((authorization) -> isAuthorized(authorization, "client", "secret"))
|
||||||
|
.map((authorization) -> parseBody(request.getBody()))
|
||||||
|
.map((parameters) -> parameters.get("token"))
|
||||||
|
.map((token) -> {
|
||||||
|
if ("00ed5855-1869-47a0-b0c9-0f3ce520aee7".equals(token)) {
|
||||||
|
return NO_SCOPES_RESPONSE;
|
||||||
|
}
|
||||||
|
else if ("b43d1500-c405-4dc9-b9c9-6cfd966c34c9".equals(token)) {
|
||||||
|
return MESSASGE_READ_SCOPE_RESPONSE;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
return INACTIVE_RESPONSE;
|
||||||
|
}
|
||||||
|
})
|
||||||
|
.orElse(BAD_REQUEST_RESPONSE);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
return NOT_FOUND_RESPONSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean isAuthorized(String authorization, String username, String password) {
|
||||||
|
String[] values = new String(Base64.getDecoder().decode(authorization.substring(6))).split(":");
|
||||||
|
return username.equals(values[0]) && password.equals(values[1]);
|
||||||
|
}
|
||||||
|
|
||||||
|
private Map<String, Object> parseBody(Buffer body) {
|
||||||
|
// @formatter:off
|
||||||
|
return Stream.of(body.readUtf8().split("&"))
|
||||||
|
.map((parameter) -> parameter.split("="))
|
||||||
|
.collect(Collectors.toMap((parts) -> parts[0], (parts) -> parts[1]));
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
private static MockResponse response(String body, int status) {
|
||||||
|
// @formatter:off
|
||||||
|
return new MockResponse()
|
||||||
|
.setHeader(HttpHeaders.CONTENT_TYPE, MediaType.APPLICATION_JSON_VALUE)
|
||||||
|
.setResponseCode(status)
|
||||||
|
.setBody(body);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,22 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2002-2019 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This provides integration of a {@link okhttp3.mockwebserver.MockWebServer} and the
|
||||||
|
* {@link org.springframework.core.env.Environment}.
|
||||||
|
* @author Rob Winch
|
||||||
|
*/
|
||||||
|
package org.springframework.boot.env;
|
|
@ -0,0 +1 @@
|
||||||
|
org.springframework.boot.env.EnvironmentPostProcessor=org.springframework.boot.env.MockWebServerEnvironmentPostProcessor
|
|
@ -0,0 +1,4 @@
|
||||||
|
tenantOne.jwk-set-uri: ${mockwebserver.url}/.well-known/jwks.json
|
||||||
|
tenantTwo.introspection-uri: ${mockwebserver.url}/introspect
|
||||||
|
tenantTwo.introspection-client-id: client
|
||||||
|
tenantTwo.introspection-client-secret: secret
|
|
@ -32,6 +32,7 @@ include ":servlet:spring-boot:java:hello-security-explicit"
|
||||||
include ":servlet:spring-boot:java:oauth2:login"
|
include ":servlet:spring-boot:java:oauth2:login"
|
||||||
include ":servlet:spring-boot:java:oauth2:resource-server:hello-security"
|
include ":servlet:spring-boot:java:oauth2:resource-server:hello-security"
|
||||||
include ":servlet:spring-boot:java:oauth2:resource-server:jwe"
|
include ":servlet:spring-boot:java:oauth2:resource-server:jwe"
|
||||||
|
include ":servlet:spring-boot:java:oauth2:resource-server:multi-tenancy"
|
||||||
include ":servlet:spring-boot:java:oauth2:resource-server:opaque"
|
include ":servlet:spring-boot:java:oauth2:resource-server:opaque"
|
||||||
include ":servlet:spring-boot:java:oauth2:resource-server:static"
|
include ":servlet:spring-boot:java:oauth2:resource-server:static"
|
||||||
include ":servlet:spring-boot:java:oauth2:webclient"
|
include ":servlet:spring-boot:java:oauth2:webclient"
|
||||||
|
|
Loading…
Reference in New Issue