Simplify hellowebflux
This sample should be absolute minimal example.
This commit is contained in:
parent
7bb4367cf1
commit
164404c7d3
|
@ -15,13 +15,14 @@
|
|||
*/
|
||||
package sample;
|
||||
|
||||
import java.time.Duration;
|
||||
|
||||
import org.junit.Before;
|
||||
import org.junit.Test;
|
||||
import org.junit.runner.RunWith;
|
||||
|
||||
import org.springframework.beans.factory.annotation.Value;
|
||||
import org.springframework.http.HttpHeaders;
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.security.web.server.header.ContentTypeOptionsHttpHeadersWriter;
|
||||
import org.springframework.http.ResponseCookie;
|
||||
import org.springframework.test.context.ContextConfiguration;
|
||||
import org.springframework.test.context.TestPropertySource;
|
||||
import org.springframework.test.context.junit4.SpringRunner;
|
||||
|
@ -29,10 +30,6 @@ import org.springframework.test.web.reactive.server.ExchangeResult;
|
|||
import org.springframework.test.web.reactive.server.WebTestClient;
|
||||
import org.springframework.web.reactive.function.client.ExchangeFilterFunction;
|
||||
|
||||
import java.nio.charset.Charset;
|
||||
import java.time.Duration;
|
||||
import java.util.Base64;
|
||||
|
||||
import static org.springframework.web.reactive.function.client.ExchangeFilterFunctions.basicAuthentication;
|
||||
|
||||
/**
|
||||
|
@ -56,188 +53,69 @@ public class HelloWebfluxApplicationITests {
|
|||
.build();
|
||||
}
|
||||
|
||||
|
||||
@Test
|
||||
public void basicRequired() throws Exception {
|
||||
public void basicWhenNoCredentialsThenUnauthorized() throws Exception {
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/users")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicWorks() throws Exception {
|
||||
public void basicWhenValidCredentialsThenOk() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.filter(userCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\":\"rob\"}");
|
||||
.expectBody().json("{\"message\":\"Hello user!\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicWhenPasswordInvalid401() throws Exception {
|
||||
public void basicWhenInvalidCredentialsThenUnauthorized() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(invalidPassword())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized()
|
||||
.expectBody().isEmpty();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void authorizationAdmin403() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isEqualTo(HttpStatus.FORBIDDEN)
|
||||
.expectBody().isEmpty();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void authorizationAdmin200() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(adminCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isOk();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicMissingUser401() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(basicAuthentication("missing-user", "password"))
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicInvalidPassword401() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(invalidPassword())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicInvalidParts401() throws Exception {
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.header("Authorization", "Basic " + base64Encode("no colon"))
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void sessionWorks() throws Exception {
|
||||
ExchangeResult result = this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.exchange()
|
||||
.returnResult(String.class);
|
||||
.mutate()
|
||||
.filter(userCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.returnResult(String.class);
|
||||
|
||||
String session = result.getResponseHeaders().getFirst("Set-Cookie");
|
||||
ResponseCookie session = result.getResponseCookies().getFirst("SESSION");
|
||||
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.header("Cookie", session)
|
||||
.uri("/")
|
||||
.cookie(session.getName(), session.getValue())
|
||||
.exchange()
|
||||
.expectStatus().isOk();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void me() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/me")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\" : \"rob\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void monoMe() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/mono/me")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\" : \"rob\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void principal() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\" : \"rob\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void headers() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.exchange()
|
||||
.expectHeader().valueEquals(HttpHeaders.CACHE_CONTROL, "no-cache, no-store, max-age=0, must-revalidate")
|
||||
.expectHeader().valueEquals(HttpHeaders.EXPIRES, "0")
|
||||
.expectHeader().valueEquals(HttpHeaders.PRAGMA, "no-cache")
|
||||
.expectHeader().valueEquals(ContentTypeOptionsHttpHeadersWriter.X_CONTENT_OPTIONS, ContentTypeOptionsHttpHeadersWriter.NOSNIFF);
|
||||
}
|
||||
|
||||
private ExchangeFilterFunction robsCredentials() {
|
||||
return basicAuthentication("rob","rob");
|
||||
private ExchangeFilterFunction userCredentials() {
|
||||
return basicAuthentication("user","user");
|
||||
}
|
||||
|
||||
private ExchangeFilterFunction invalidPassword() {
|
||||
return basicAuthentication("rob","INVALID");
|
||||
}
|
||||
|
||||
private ExchangeFilterFunction adminCredentials() {
|
||||
return basicAuthentication("admin","admin");
|
||||
}
|
||||
|
||||
private String base64Encode(String value) {
|
||||
return Base64.getEncoder().encodeToString(value.getBytes(Charset.defaultCharset()));
|
||||
return basicAuthentication("user","INVALID");
|
||||
}
|
||||
}
|
||||
|
|
|
@ -0,0 +1,44 @@
|
|||
/*
|
||||
* Copyright 2002-2017 the original author or authors.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package sample;
|
||||
|
||||
import java.security.Principal;
|
||||
import java.util.Collections;
|
||||
import java.util.Map;
|
||||
|
||||
import org.springframework.web.bind.annotation.GetMapping;
|
||||
import org.springframework.web.bind.annotation.RestController;
|
||||
import reactor.core.publisher.Mono;
|
||||
|
||||
/**
|
||||
* @author Rob Winch
|
||||
* @since 5.0
|
||||
*/
|
||||
@RestController
|
||||
public class HelloUserController {
|
||||
|
||||
@GetMapping("/")
|
||||
public Mono<Map<String,String>> hello(Mono<Principal> principal) {
|
||||
return principal
|
||||
.map(Principal::getName)
|
||||
.map(this::helloMessage);
|
||||
}
|
||||
|
||||
private Map<String,String> helloMessage(String username) {
|
||||
return Collections.singletonMap("message", "Hello " + username + "!");
|
||||
}
|
||||
}
|
|
@ -0,0 +1,42 @@
|
|||
/*
|
||||
*
|
||||
* * Copyright 2002-2017 the original author or authors.
|
||||
* *
|
||||
* * Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* * you may not use this file except in compliance with the License.
|
||||
* * You may obtain a copy of the License at
|
||||
* *
|
||||
* * http://www.apache.org/licenses/LICENSE-2.0
|
||||
* *
|
||||
* * Unless required by applicable law or agreed to in writing, software
|
||||
* * distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* * See the License for the specific language governing permissions and
|
||||
* * limitations under the License.
|
||||
*
|
||||
*/
|
||||
|
||||
package sample;
|
||||
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity;
|
||||
import org.springframework.security.core.userdetails.MapUserDetailsRepository;
|
||||
import org.springframework.security.core.userdetails.User;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
|
||||
/**
|
||||
* @author Rob Winch
|
||||
* @since 5.0
|
||||
*/
|
||||
@EnableWebFluxSecurity
|
||||
public class HelloWebfluxSecurityConfig {
|
||||
|
||||
@Bean
|
||||
public MapUserDetailsRepository userDetailsRepository() {
|
||||
UserDetails user = User.withUsername("user")
|
||||
.password("user")
|
||||
.roles("USER")
|
||||
.build();
|
||||
return new MapUserDetailsRepository(user);
|
||||
}
|
||||
}
|
|
@ -1,64 +0,0 @@
|
|||
/*
|
||||
*
|
||||
* * Copyright 2002-2017 the original author or authors.
|
||||
* *
|
||||
* * Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* * you may not use this file except in compliance with the License.
|
||||
* * You may obtain a copy of the License at
|
||||
* *
|
||||
* * http://www.apache.org/licenses/LICENSE-2.0
|
||||
* *
|
||||
* * Unless required by applicable law or agreed to in writing, software
|
||||
* * distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* * See the License for the specific language governing permissions and
|
||||
* * limitations under the License.
|
||||
*
|
||||
*/
|
||||
|
||||
package sample;
|
||||
|
||||
import org.springframework.context.annotation.Bean;
|
||||
import org.springframework.security.core.userdetails.MapUserDetailsRepository;
|
||||
import org.springframework.security.authorization.AuthorizationDecision;
|
||||
import org.springframework.security.config.annotation.web.reactive.EnableWebFluxSecurity;
|
||||
import org.springframework.security.config.web.server.HttpSecurity;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.security.core.userdetails.User;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
import org.springframework.security.web.server.SecurityWebFilterChain;
|
||||
import org.springframework.security.web.server.authorization.AuthorizationContext;
|
||||
import reactor.core.publisher.Mono;
|
||||
|
||||
/**
|
||||
* @author Rob Winch
|
||||
* @since 5.0
|
||||
*/
|
||||
@EnableWebFluxSecurity
|
||||
public class SecurityConfig {
|
||||
|
||||
@Bean
|
||||
SecurityWebFilterChain springWebFilterChain(HttpSecurity http) throws Exception {
|
||||
return http
|
||||
.authorizeExchange()
|
||||
.pathMatchers("/admin/**").hasRole("ADMIN")
|
||||
.pathMatchers("/users/{user}/**").access(this::currentUserMatchesPath)
|
||||
.anyExchange().authenticated()
|
||||
.and()
|
||||
.build();
|
||||
}
|
||||
|
||||
private Mono<AuthorizationDecision> currentUserMatchesPath(Mono<Authentication> authentication, AuthorizationContext context) {
|
||||
return authentication
|
||||
.map( a -> context.getVariables().get("user").equals(a.getName()))
|
||||
.map( granted -> new AuthorizationDecision(granted));
|
||||
}
|
||||
|
||||
@Bean
|
||||
public MapUserDetailsRepository userDetailsRepository() {
|
||||
UserDetails rob = User.withUsername("rob").password("rob").roles("USER").build();
|
||||
UserDetails admin = User.withUsername("admin").password("admin").roles("USER","ADMIN").build();
|
||||
return new MapUserDetailsRepository(rob, admin);
|
||||
}
|
||||
|
||||
}
|
|
@ -1,66 +0,0 @@
|
|||
/*
|
||||
* Copyright 2002-2017 the original author or authors.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package sample;
|
||||
|
||||
import org.springframework.security.core.annotation.AuthenticationPrincipal;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
import org.springframework.web.bind.annotation.GetMapping;
|
||||
import org.springframework.web.bind.annotation.RestController;
|
||||
import org.springframework.web.server.WebSession;
|
||||
import reactor.core.publisher.Mono;
|
||||
|
||||
import java.security.Principal;
|
||||
import java.util.Collections;
|
||||
import java.util.Map;
|
||||
|
||||
/**
|
||||
* @author Rob Winch
|
||||
* @since 5.0
|
||||
*/
|
||||
@RestController
|
||||
public class UserController {
|
||||
|
||||
@GetMapping("/me")
|
||||
public Mono<Map<String,String>> me(@AuthenticationPrincipal UserDetails user) {
|
||||
return me(Mono.just(user));
|
||||
}
|
||||
|
||||
@GetMapping("/mono/me")
|
||||
public Mono<Map<String,String>> me(@AuthenticationPrincipal Mono<UserDetails> user) {
|
||||
return user.flatMap( u -> Mono.just(Collections.singletonMap("username", u.getUsername())));
|
||||
}
|
||||
|
||||
@GetMapping("/mono/session")
|
||||
public Mono<Map<String,Object>> Session(Mono<WebSession> session) {
|
||||
return session.flatMap( s -> Mono.just(s.getAttributes()));
|
||||
}
|
||||
|
||||
@GetMapping("/principal")
|
||||
public Mono<Map<String,String>> principal(Principal principal) {
|
||||
return principal(Mono.just(principal));
|
||||
}
|
||||
|
||||
@GetMapping("/mono/principal")
|
||||
public Mono<Map<String,String>> principal(Mono<Principal> principal) {
|
||||
return principal.flatMap( p -> Mono.just(Collections.singletonMap("username", p.getName())));
|
||||
}
|
||||
|
||||
@GetMapping("/admin")
|
||||
public Map<String,String> admin() {
|
||||
return Collections.singletonMap("isadmin", "true");
|
||||
}
|
||||
}
|
|
@ -20,13 +20,10 @@ package sample;
|
|||
import org.junit.Before;
|
||||
import org.junit.Test;
|
||||
import org.junit.runner.RunWith;
|
||||
|
||||
import org.springframework.beans.factory.annotation.Autowired;
|
||||
import org.springframework.context.ApplicationContext;
|
||||
import org.springframework.http.HttpHeaders;
|
||||
import org.springframework.http.HttpStatus;
|
||||
import org.springframework.http.ResponseCookie;
|
||||
import org.springframework.security.test.web.reactive.server.SecurityMockServerConfigurers;
|
||||
import org.springframework.security.web.server.header.ContentTypeOptionsHttpHeadersWriter;
|
||||
import org.springframework.test.context.ActiveProfiles;
|
||||
import org.springframework.test.context.ContextConfiguration;
|
||||
import org.springframework.test.context.junit4.SpringRunner;
|
||||
|
@ -34,9 +31,7 @@ import org.springframework.test.web.reactive.server.ExchangeResult;
|
|||
import org.springframework.test.web.reactive.server.WebTestClient;
|
||||
import org.springframework.web.reactive.function.client.ExchangeFilterFunction;
|
||||
|
||||
import java.nio.charset.Charset;
|
||||
import java.util.Base64;
|
||||
|
||||
import static org.springframework.security.test.web.reactive.server.SecurityMockServerConfigurers.mockUser;
|
||||
import static org.springframework.security.test.web.reactive.server.SecurityMockServerConfigurers.springSecurity;
|
||||
import static org.springframework.web.reactive.function.client.ExchangeFilterFunctions.basicAuthentication;
|
||||
|
||||
|
@ -55,213 +50,91 @@ public class HelloWebfluxApplicationTests {
|
|||
|
||||
@Before
|
||||
public void setup() {
|
||||
this.rest = WebTestClient.bindToApplicationContext(context).build();
|
||||
this.rest = WebTestClient
|
||||
.bindToApplicationContext(this.context)
|
||||
.apply(springSecurity())
|
||||
.build();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicRequired() throws Exception {
|
||||
public void basicWhenNoCredentialsThenUnauthorized() throws Exception {
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicWorks() throws Exception {
|
||||
public void basicWhenValidCredentialsThenOk() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.filter(userCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\":\"rob\"}");
|
||||
.expectBody().json("{\"message\":\"Hello user!\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicWhenPasswordInvalid401() throws Exception {
|
||||
public void basicWhenInvalidCredentialsThenUnauthorized() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(invalidPassword())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized()
|
||||
.expectBody().isEmpty();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void authorizationAdmin403() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isEqualTo(HttpStatus.FORBIDDEN)
|
||||
.expectBody().isEmpty();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void authorizationAdmin200() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(adminCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isOk();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicMissingUser401() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(basicAuthentication("missing-user", "password"))
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicInvalidPassword401() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(invalidPassword())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void basicInvalidParts401() throws Exception {
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/admin")
|
||||
.header("Authorization", "Basic " + base64Encode("no colon"))
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void sessionWorks() throws Exception {
|
||||
ExchangeResult result = this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.filter(userCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.returnResult(String.class);
|
||||
|
||||
ResponseCookie session = result.getResponseCookies().getFirst("SESSION");
|
||||
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.cookie(session.getName(), session.getValue())
|
||||
.exchange()
|
||||
.expectStatus().isOk();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void mockSupport() throws Exception {
|
||||
WebTestClient mockRest = WebTestClient
|
||||
.bindToApplicationContext(this.context)
|
||||
.apply(springSecurity())
|
||||
.build();
|
||||
|
||||
mockRest
|
||||
.mutateWith(SecurityMockServerConfigurers.mockUser())
|
||||
public void mockSupportWhenValidMockUserThenOk() throws Exception {
|
||||
this.rest
|
||||
.mutateWith(mockUser())
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody(String.class).isEqualTo("{\"username\":\"user\"}");
|
||||
.expectBody().json("{\"message\":\"Hello user!\"}");
|
||||
|
||||
mockRest
|
||||
this.rest
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.uri("/")
|
||||
.exchange()
|
||||
.expectStatus().isUnauthorized();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void me() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/me")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\" : \"rob\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void monoMe() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/mono/me")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\" : \"rob\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void principal() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.exchange()
|
||||
.expectStatus().isOk()
|
||||
.expectBody().json("{\"username\" : \"rob\"}");
|
||||
}
|
||||
|
||||
@Test
|
||||
public void headers() throws Exception {
|
||||
this.rest
|
||||
.mutate()
|
||||
.filter(robsCredentials())
|
||||
.build()
|
||||
.get()
|
||||
.uri("/principal")
|
||||
.exchange()
|
||||
.expectHeader().valueEquals(HttpHeaders.CACHE_CONTROL, "no-cache, no-store, max-age=0, must-revalidate")
|
||||
.expectHeader().valueEquals(HttpHeaders.EXPIRES, "0")
|
||||
.expectHeader().valueEquals(HttpHeaders.PRAGMA, "no-cache")
|
||||
.expectHeader().valueEquals(ContentTypeOptionsHttpHeadersWriter.X_CONTENT_OPTIONS, ContentTypeOptionsHttpHeadersWriter.NOSNIFF);
|
||||
}
|
||||
|
||||
private ExchangeFilterFunction robsCredentials() {
|
||||
return basicAuthentication("rob","rob");
|
||||
private ExchangeFilterFunction userCredentials() {
|
||||
return basicAuthentication("user","user");
|
||||
}
|
||||
|
||||
private ExchangeFilterFunction invalidPassword() {
|
||||
return basicAuthentication("rob","INVALID");
|
||||
}
|
||||
|
||||
private ExchangeFilterFunction adminCredentials() {
|
||||
return basicAuthentication("admin","admin");
|
||||
}
|
||||
|
||||
private String base64Encode(String value) {
|
||||
return Base64.getEncoder().encodeToString(value.getBytes(Charset.defaultCharset()));
|
||||
return basicAuthentication("user","INVALID");
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue