mirror of
				https://github.com/spring-projects/spring-security.git
				synced 2025-10-31 06:38:42 +00:00 
			
		
		
		
	Migrate to BDD Mockito
Migrate Mockito imports to use the BDD variant. This aligns better with the "given" / "when" / "then" style used in most tests since the "given" block now uses Mockito `given(...)` calls. The commit also updates a few tests that were accidentally using Power Mockito when regular Mockito could be used. Issue gh-8945
This commit is contained in:
		
							parent
							
								
									c12ced6aaa
								
							
						
					
					
						commit
						db55ef4b3b
					
				| @ -30,10 +30,10 @@ import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -51,8 +51,8 @@ public class AclPermissionCacheOptimizerTests { | ||||
| 		pco.setSidRetrievalStrategy(sidStrat); | ||||
| 		Object[] dos = { new Object(), null, new Object() }; | ||||
| 		ObjectIdentity[] oids = { new ObjectIdentityImpl("A", "1"), new ObjectIdentityImpl("A", "2") }; | ||||
| 		when(oidStrat.getObjectIdentity(dos[0])).thenReturn(oids[0]); | ||||
| 		when(oidStrat.getObjectIdentity(dos[2])).thenReturn(oids[1]); | ||||
| 		given(oidStrat.getObjectIdentity(dos[0])).willReturn(oids[0]); | ||||
| 		given(oidStrat.getObjectIdentity(dos[2])).willReturn(oids[1]); | ||||
| 
 | ||||
| 		pco.cachePermissionsFor(mock(Authentication.class), Arrays.asList(dos)); | ||||
| 
 | ||||
|  | ||||
| @ -30,8 +30,8 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyList; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -45,13 +45,13 @@ public class AclPermissionEvaluatorTests { | ||||
| 		AclPermissionEvaluator pe = new AclPermissionEvaluator(service); | ||||
| 		ObjectIdentity oid = mock(ObjectIdentity.class); | ||||
| 		ObjectIdentityRetrievalStrategy oidStrategy = mock(ObjectIdentityRetrievalStrategy.class); | ||||
| 		when(oidStrategy.getObjectIdentity(any(Object.class))).thenReturn(oid); | ||||
| 		given(oidStrategy.getObjectIdentity(any(Object.class))).willReturn(oid); | ||||
| 		pe.setObjectIdentityRetrievalStrategy(oidStrategy); | ||||
| 		pe.setSidRetrievalStrategy(mock(SidRetrievalStrategy.class)); | ||||
| 		Acl acl = mock(Acl.class); | ||||
| 
 | ||||
| 		when(service.readAclById(any(ObjectIdentity.class), anyList())).thenReturn(acl); | ||||
| 		when(acl.isGranted(anyList(), anyList(), eq(false))).thenReturn(true); | ||||
| 		given(service.readAclById(any(ObjectIdentity.class), anyList())).willReturn(acl); | ||||
| 		given(acl.isGranted(anyList(), anyList(), eq(false))).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(pe.hasPermission(mock(Authentication.class), new Object(), "READ")).isTrue(); | ||||
| 	} | ||||
| @ -65,13 +65,13 @@ public class AclPermissionEvaluatorTests { | ||||
| 		AclPermissionEvaluator pe = new AclPermissionEvaluator(service); | ||||
| 		ObjectIdentity oid = mock(ObjectIdentity.class); | ||||
| 		ObjectIdentityRetrievalStrategy oidStrategy = mock(ObjectIdentityRetrievalStrategy.class); | ||||
| 		when(oidStrategy.getObjectIdentity(any(Object.class))).thenReturn(oid); | ||||
| 		given(oidStrategy.getObjectIdentity(any(Object.class))).willReturn(oid); | ||||
| 		pe.setObjectIdentityRetrievalStrategy(oidStrategy); | ||||
| 		pe.setSidRetrievalStrategy(mock(SidRetrievalStrategy.class)); | ||||
| 		Acl acl = mock(Acl.class); | ||||
| 
 | ||||
| 		when(service.readAclById(any(ObjectIdentity.class), anyList())).thenReturn(acl); | ||||
| 		when(acl.isGranted(anyList(), anyList(), eq(false))).thenReturn(true); | ||||
| 		given(service.readAclById(any(ObjectIdentity.class), anyList())).willReturn(acl); | ||||
| 		given(acl.isGranted(anyList(), anyList(), eq(false))).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(pe.hasPermission(mock(Authentication.class), new Object(), "write")).isTrue(); | ||||
| 
 | ||||
|  | ||||
| @ -35,10 +35,10 @@ import org.springframework.security.core.Authentication; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyBoolean; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -50,8 +50,8 @@ public class AclEntryAfterInvocationCollectionFilteringProviderTests { | ||||
| 	public void objectsAreRemovedIfPermissionDenied() { | ||||
| 		AclService service = mock(AclService.class); | ||||
| 		Acl acl = mock(Acl.class); | ||||
| 		when(acl.isGranted(any(), any(), anyBoolean())).thenReturn(false); | ||||
| 		when(service.readAclById(any(), any())).thenReturn(acl); | ||||
| 		given(acl.isGranted(any(), any(), anyBoolean())).willReturn(false); | ||||
| 		given(service.readAclById(any(), any())).willReturn(acl); | ||||
| 		AclEntryAfterInvocationCollectionFilteringProvider provider = new AclEntryAfterInvocationCollectionFilteringProvider( | ||||
| 				service, Arrays.asList(mock(Permission.class))); | ||||
| 		provider.setObjectIdentityRetrievalStrategy(mock(ObjectIdentityRetrievalStrategy.class)); | ||||
|  | ||||
| @ -38,10 +38,10 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyBoolean; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -64,8 +64,8 @@ public class AclEntryAfterInvocationProviderTests { | ||||
| 	public void accessIsAllowedIfPermissionIsGranted() { | ||||
| 		AclService service = mock(AclService.class); | ||||
| 		Acl acl = mock(Acl.class); | ||||
| 		when(acl.isGranted(any(List.class), any(List.class), anyBoolean())).thenReturn(true); | ||||
| 		when(service.readAclById(any(), any())).thenReturn(acl); | ||||
| 		given(acl.isGranted(any(List.class), any(List.class), anyBoolean())).willReturn(true); | ||||
| 		given(service.readAclById(any(), any())).willReturn(acl); | ||||
| 		AclEntryAfterInvocationProvider provider = new AclEntryAfterInvocationProvider(service, | ||||
| 				Arrays.asList(mock(Permission.class))); | ||||
| 		provider.setMessageSource(new SpringSecurityMessageSource()); | ||||
| @ -104,10 +104,10 @@ public class AclEntryAfterInvocationProviderTests { | ||||
| 	public void accessIsDeniedIfPermissionIsNotGranted() { | ||||
| 		AclService service = mock(AclService.class); | ||||
| 		Acl acl = mock(Acl.class); | ||||
| 		when(acl.isGranted(any(List.class), any(List.class), anyBoolean())).thenReturn(false); | ||||
| 		given(acl.isGranted(any(List.class), any(List.class), anyBoolean())).willReturn(false); | ||||
| 		// Try a second time with no permissions found | ||||
| 		when(acl.isGranted(any(), any(List.class), anyBoolean())).thenThrow(new NotFoundException("")); | ||||
| 		when(service.readAclById(any(), any())).thenReturn(acl); | ||||
| 		given(acl.isGranted(any(), any(List.class), anyBoolean())).willThrow(new NotFoundException("")); | ||||
| 		given(service.readAclById(any(), any())).willReturn(acl); | ||||
| 		AclEntryAfterInvocationProvider provider = new AclEntryAfterInvocationProvider(service, | ||||
| 				Arrays.asList(mock(Permission.class))); | ||||
| 		provider.setProcessConfigAttribute("MY_ATTRIBUTE"); | ||||
|  | ||||
| @ -25,8 +25,8 @@ import org.springframework.security.acls.model.Sid; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link AccessControlEntryImpl}. | ||||
| @ -87,7 +87,7 @@ public class AccessControlImplEntryTests { | ||||
| 		final Acl mockAcl = mock(Acl.class); | ||||
| 		final ObjectIdentity oid = mock(ObjectIdentity.class); | ||||
| 
 | ||||
| 		when(mockAcl.getObjectIdentity()).thenReturn(oid); | ||||
| 		given(mockAcl.getObjectIdentity()).willReturn(oid); | ||||
| 		Sid sid = new PrincipalSid("johndoe"); | ||||
| 
 | ||||
| 		AccessControlEntry ace = new AccessControlEntryImpl(1L, mockAcl, sid, BasePermission.ADMINISTRATION, true, true, | ||||
|  | ||||
| @ -26,8 +26,8 @@ import org.springframework.security.acls.model.AccessControlEntry; | ||||
| import org.springframework.security.acls.model.AuditableAccessControlEntry; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Test class for {@link ConsoleAuditLogger}. | ||||
| @ -67,14 +67,14 @@ public class AuditLoggerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void successIsNotLoggedIfAceDoesntRequireSuccessAudit() { | ||||
| 		when(this.ace.isAuditSuccess()).thenReturn(false); | ||||
| 		given(this.ace.isAuditSuccess()).willReturn(false); | ||||
| 		this.logger.logIfNeeded(true, this.ace); | ||||
| 		assertThat(this.bytes.size()).isZero(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void successIsLoggedIfAceRequiresSuccessAudit() { | ||||
| 		when(this.ace.isAuditSuccess()).thenReturn(true); | ||||
| 		given(this.ace.isAuditSuccess()).willReturn(true); | ||||
| 
 | ||||
| 		this.logger.logIfNeeded(true, this.ace); | ||||
| 		assertThat(this.bytes.toString()).startsWith("GRANTED due to ACE"); | ||||
| @ -82,14 +82,14 @@ public class AuditLoggerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void failureIsntLoggedIfAceDoesntRequireFailureAudit() { | ||||
| 		when(this.ace.isAuditFailure()).thenReturn(false); | ||||
| 		given(this.ace.isAuditFailure()).willReturn(false); | ||||
| 		this.logger.logIfNeeded(false, this.ace); | ||||
| 		assertThat(this.bytes.size()).isZero(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void failureIsLoggedIfAceRequiresFailureAudit() { | ||||
| 		when(this.ace.isAuditFailure()).thenReturn(true); | ||||
| 		given(this.ace.isAuditFailure()).willReturn(true); | ||||
| 		this.logger.logIfNeeded(false, this.ace); | ||||
| 		assertThat(this.bytes.toString()).startsWith("DENIED due to ACE"); | ||||
| 	} | ||||
|  | ||||
| @ -52,9 +52,9 @@ import org.springframework.test.util.ReflectionTestUtils; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link EhCacheBasedAclCache} | ||||
| @ -220,14 +220,14 @@ public class EhCacheBasedAclCacheTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void getFromCacheSerializable() { | ||||
| 		when(this.cache.get(this.acl.getId())).thenReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 		given(this.cache.get(this.acl.getId())).willReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 
 | ||||
| 		assertThat(this.myCache.getFromCache(this.acl.getId())).isEqualTo(this.acl); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void getFromCacheSerializablePopulatesTransient() { | ||||
| 		when(this.cache.get(this.acl.getId())).thenReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 		given(this.cache.get(this.acl.getId())).willReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 
 | ||||
| 		this.myCache.putInCache(this.acl); | ||||
| 
 | ||||
| @ -242,14 +242,14 @@ public class EhCacheBasedAclCacheTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void getFromCacheObjectIdentity() { | ||||
| 		when(this.cache.get(this.acl.getId())).thenReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 		given(this.cache.get(this.acl.getId())).willReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 
 | ||||
| 		assertThat(this.myCache.getFromCache(this.acl.getId())).isEqualTo(this.acl); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void getFromCacheObjectIdentityPopulatesTransient() { | ||||
| 		when(this.cache.get(this.acl.getObjectIdentity())).thenReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 		given(this.cache.get(this.acl.getObjectIdentity())).willReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 
 | ||||
| 		this.myCache.putInCache(this.acl); | ||||
| 
 | ||||
| @ -264,7 +264,7 @@ public class EhCacheBasedAclCacheTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void evictCacheSerializable() { | ||||
| 		when(this.cache.get(this.acl.getObjectIdentity())).thenReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 		given(this.cache.get(this.acl.getObjectIdentity())).willReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 
 | ||||
| 		this.myCache.evictFromCache(this.acl.getObjectIdentity()); | ||||
| 
 | ||||
| @ -274,7 +274,7 @@ public class EhCacheBasedAclCacheTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void evictCacheObjectIdentity() { | ||||
| 		when(this.cache.get(this.acl.getId())).thenReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 		given(this.cache.get(this.acl.getId())).willReturn(new Element(this.acl.getId(), this.acl)); | ||||
| 
 | ||||
| 		this.myCache.evictFromCache(this.acl.getId()); | ||||
| 
 | ||||
|  | ||||
| @ -47,7 +47,7 @@ import static org.mockito.AdditionalMatchers.aryEq; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyList; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| /** | ||||
|  * Unit and Integration tests the ACL JdbcAclService using an in-memory database. | ||||
| @ -93,7 +93,7 @@ public class JdbcAclServiceTests { | ||||
| 	@Test(expected = NotFoundException.class) | ||||
| 	public void readAclByIdMissingAcl() { | ||||
| 		Map<ObjectIdentity, Acl> result = new HashMap<>(); | ||||
| 		when(this.lookupStrategy.readAclsById(anyList(), anyList())).thenReturn(result); | ||||
| 		given(this.lookupStrategy.readAclsById(anyList(), anyList())).willReturn(result); | ||||
| 		ObjectIdentity objectIdentity = new ObjectIdentityImpl(Object.class, 1); | ||||
| 		List<Sid> sids = Arrays.<Sid>asList(new PrincipalSid("user")); | ||||
| 
 | ||||
| @ -105,7 +105,7 @@ public class JdbcAclServiceTests { | ||||
| 		List<ObjectIdentity> result = new ArrayList<>(); | ||||
| 		result.add(new ObjectIdentityImpl(Object.class, "5577")); | ||||
| 		Object[] args = { "1", "org.springframework.security.acls.jdbc.JdbcAclServiceTests$MockLongIdDomainObject" }; | ||||
| 		when(this.jdbcOperations.query(anyString(), aryEq(args), any(RowMapper.class))).thenReturn(result); | ||||
| 		given(this.jdbcOperations.query(anyString(), aryEq(args), any(RowMapper.class))).willReturn(result); | ||||
| 		ObjectIdentity objectIdentity = new ObjectIdentityImpl(MockLongIdDomainObject.class, 1L); | ||||
| 
 | ||||
| 		List<ObjectIdentity> objectIdentities = this.aclService.findChildren(objectIdentity); | ||||
|  | ||||
| @ -55,8 +55,8 @@ import org.springframework.transaction.annotation.Transactional; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Integration tests the ACL system using an in-memory database. | ||||
| @ -537,7 +537,7 @@ public class JdbcMutableAclServiceTests extends AbstractTransactionalJUnit4Sprin | ||||
| 		CustomJdbcMutableAclService customJdbcMutableAclService = spy( | ||||
| 				new CustomJdbcMutableAclService(this.dataSource, this.lookupStrategy, this.aclCache)); | ||||
| 		CustomSid customSid = new CustomSid("Custom sid"); | ||||
| 		when(customJdbcMutableAclService.createOrRetrieveSidPrimaryKey("Custom sid", false, false)).thenReturn(1L); | ||||
| 		given(customJdbcMutableAclService.createOrRetrieveSidPrimaryKey("Custom sid", false, false)).willReturn(1L); | ||||
| 
 | ||||
| 		Long result = customJdbcMutableAclService.createOrRetrieveSidPrimaryKey(customSid, false); | ||||
| 
 | ||||
|  | ||||
| @ -31,8 +31,8 @@ import org.springframework.security.core.authority.AuthorityUtils; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.anyCollection; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link SidRetrievalStrategyImpl} | ||||
| @ -69,7 +69,7 @@ public class SidRetrievalStrategyTests { | ||||
| 	public void roleHierarchyIsUsedWhenSet() { | ||||
| 		RoleHierarchy rh = mock(RoleHierarchy.class); | ||||
| 		List rhAuthorities = AuthorityUtils.createAuthorityList("D"); | ||||
| 		when(rh.getReachableGrantedAuthorities(anyCollection())).thenReturn(rhAuthorities); | ||||
| 		given(rh.getReachableGrantedAuthorities(anyCollection())).willReturn(rhAuthorities); | ||||
| 		SidRetrievalStrategy strat = new SidRetrievalStrategyImpl(rh); | ||||
| 
 | ||||
| 		List<Sid> sids = strat.getSids(this.authentication); | ||||
|  | ||||
| @ -43,10 +43,10 @@ import org.springframework.security.web.authentication.WebAuthenticationDetails; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link CasAuthenticationProvider}. | ||||
| @ -160,9 +160,9 @@ public class CasAuthenticationProviderTests { | ||||
| 	public void authenticateAllNullService() throws Exception { | ||||
| 		String serviceUrl = "https://service/context"; | ||||
| 		ServiceAuthenticationDetails details = mock(ServiceAuthenticationDetails.class); | ||||
| 		when(details.getServiceUrl()).thenReturn(serviceUrl); | ||||
| 		given(details.getServiceUrl()).willReturn(serviceUrl); | ||||
| 		TicketValidator validator = mock(TicketValidator.class); | ||||
| 		when(validator.validate(any(String.class), any(String.class))).thenReturn(new AssertionImpl("rod")); | ||||
| 		given(validator.validate(any(String.class), any(String.class))).willReturn(new AssertionImpl("rod")); | ||||
| 
 | ||||
| 		ServiceProperties serviceProperties = makeServiceProperties(); | ||||
| 		serviceProperties.setAuthenticateAllArtifacts(true); | ||||
| @ -186,9 +186,9 @@ public class CasAuthenticationProviderTests { | ||||
| 	public void authenticateAllAuthenticationIsSuccessful() throws Exception { | ||||
| 		String serviceUrl = "https://service/context"; | ||||
| 		ServiceAuthenticationDetails details = mock(ServiceAuthenticationDetails.class); | ||||
| 		when(details.getServiceUrl()).thenReturn(serviceUrl); | ||||
| 		given(details.getServiceUrl()).willReturn(serviceUrl); | ||||
| 		TicketValidator validator = mock(TicketValidator.class); | ||||
| 		when(validator.validate(any(String.class), any(String.class))).thenReturn(new AssertionImpl("rod")); | ||||
| 		given(validator.validate(any(String.class), any(String.class))).willReturn(new AssertionImpl("rod")); | ||||
| 
 | ||||
| 		ServiceProperties serviceProperties = makeServiceProperties(); | ||||
| 		serviceProperties.setAuthenticateAllArtifacts(true); | ||||
|  | ||||
| @ -29,8 +29,8 @@ import org.springframework.security.core.authority.AuthorityUtils; | ||||
| import org.springframework.security.core.userdetails.UserDetails; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -50,9 +50,9 @@ public class GrantedAuthorityFromAssertionAttributesUserDetailsServiceTests { | ||||
| 		attributes.put("c", "role_c"); | ||||
| 		attributes.put("d", null); | ||||
| 		attributes.put("someother", "unused"); | ||||
| 		when(assertion.getPrincipal()).thenReturn(principal); | ||||
| 		when(principal.getAttributes()).thenReturn(attributes); | ||||
| 		when(principal.getName()).thenReturn("somebody"); | ||||
| 		given(assertion.getPrincipal()).willReturn(principal); | ||||
| 		given(principal.getAttributes()).willReturn(attributes); | ||||
| 		given(principal.getName()).willReturn("somebody"); | ||||
| 		CasAssertionAuthenticationToken token = new CasAssertionAuthenticationToken(assertion, "ticket"); | ||||
| 		UserDetails user = uds.loadUserDetails(token); | ||||
| 		Set<String> roles = AuthorityUtils.authorityListToSet(user.getAuthorities()); | ||||
|  | ||||
| @ -37,11 +37,11 @@ import org.springframework.security.web.authentication.AuthenticationSuccessHand | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyNoMoreInteractions; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link CasAuthenticationFilter}. | ||||
| @ -163,7 +163,7 @@ public class CasAuthenticationFilterTests { | ||||
| 		AuthenticationSuccessHandler successHandler = mock(AuthenticationSuccessHandler.class); | ||||
| 		AuthenticationManager manager = mock(AuthenticationManager.class); | ||||
| 		Authentication authentication = new TestingAuthenticationToken("un", "pwd", "ROLE_USER"); | ||||
| 		when(manager.authenticate(any(Authentication.class))).thenReturn(authentication); | ||||
| 		given(manager.authenticate(any(Authentication.class))).willReturn(authentication); | ||||
| 		ServiceProperties serviceProperties = new ServiceProperties(); | ||||
| 		serviceProperties.setAuthenticateAllArtifacts(true); | ||||
| 		MockHttpServletRequest request = new MockHttpServletRequest(); | ||||
|  | ||||
| @ -54,8 +54,8 @@ import org.springframework.util.MimeTypeUtils; | ||||
| import static io.rsocket.metadata.WellKnownMimeType.MESSAGE_RSOCKET_AUTHENTICATION; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -97,7 +97,7 @@ public class JwtITests { | ||||
| 	@Test | ||||
| 	public void routeWhenBearerThenAuthorized() { | ||||
| 		BearerTokenMetadata credentials = new BearerTokenMetadata("token"); | ||||
| 		when(this.decoder.decode(any())).thenReturn(Mono.just(jwt())); | ||||
| 		given(this.decoder.decode(any())).willReturn(Mono.just(jwt())); | ||||
| 		this.requester = requester() | ||||
| 				.setupMetadata(credentials.getToken(), BearerTokenMetadata.BEARER_AUTHENTICATION_MIME_TYPE) | ||||
| 				.connectTcp(this.server.address().getHostName(), this.server.address().getPort()).block(); | ||||
| @ -112,7 +112,7 @@ public class JwtITests { | ||||
| 		MimeType authenticationMimeType = MimeTypeUtils.parseMimeType(MESSAGE_RSOCKET_AUTHENTICATION.getString()); | ||||
| 
 | ||||
| 		BearerTokenMetadata credentials = new BearerTokenMetadata("token"); | ||||
| 		when(this.decoder.decode(any())).thenReturn(Mono.just(jwt())); | ||||
| 		given(this.decoder.decode(any())).willReturn(Mono.just(jwt())); | ||||
| 		this.requester = requester().setupMetadata(credentials, authenticationMimeType) | ||||
| 				.connectTcp(this.server.address().getHostName(), this.server.address().getPort()).block(); | ||||
| 
 | ||||
|  | ||||
| @ -53,10 +53,10 @@ import org.springframework.test.web.servlet.MockMvc; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.formLogin; | ||||
| import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.authenticated; | ||||
| 
 | ||||
| @ -88,7 +88,7 @@ public class AuthenticationManagerBuilderTests { | ||||
| 	public void customAuthenticationEventPublisherWithWeb() throws Exception { | ||||
| 		ObjectPostProcessor<Object> opp = mock(ObjectPostProcessor.class); | ||||
| 		AuthenticationEventPublisher aep = mock(AuthenticationEventPublisher.class); | ||||
| 		when(opp.postProcess(any())).thenAnswer(a -> a.getArgument(0)); | ||||
| 		given(opp.postProcess(any())).willAnswer(a -> a.getArgument(0)); | ||||
| 		AuthenticationManager am = new AuthenticationManagerBuilder(opp).authenticationEventPublisher(aep) | ||||
| 				.inMemoryAuthentication().and().build(); | ||||
| 
 | ||||
|  | ||||
| @ -66,9 +66,9 @@ import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.ArgumentMatchers.startsWith; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| public class AuthenticationConfigurationTests { | ||||
| 
 | ||||
| @ -150,7 +150,7 @@ public class AuthenticationConfigurationTests { | ||||
| 
 | ||||
| 		AuthenticationManager authentication = this.spring.getContext().getBean(AuthenticationConfiguration.class) | ||||
| 				.getAuthenticationManager(); | ||||
| 		when(authentication.authenticate(token)).thenReturn(TestAuthentication.authenticatedUser()); | ||||
| 		given(authentication.authenticate(token)).willReturn(TestAuthentication.authenticatedUser()); | ||||
| 
 | ||||
| 		assertThat(authentication.authenticate(token).getName()).isEqualTo(token.getName()); | ||||
| 	} | ||||
| @ -196,7 +196,7 @@ public class AuthenticationConfigurationTests { | ||||
| 	public void getAuthenticationManagerWhenPostProcessThenUsesBeanClassLoaderOnProxyFactoryBean() throws Exception { | ||||
| 		this.spring.register(Sec2531Config.class).autowire(); | ||||
| 		ObjectPostProcessor<Object> opp = this.spring.getContext().getBean(ObjectPostProcessor.class); | ||||
| 		when(opp.postProcess(any())).thenAnswer(a -> a.getArgument(0)); | ||||
| 		given(opp.postProcess(any())).willAnswer(a -> a.getArgument(0)); | ||||
| 
 | ||||
| 		AuthenticationConfiguration config = this.spring.getContext().getBean(AuthenticationConfiguration.class); | ||||
| 		config.getAuthenticationManager(); | ||||
| @ -220,7 +220,7 @@ public class AuthenticationConfigurationTests { | ||||
| 		UserDetailsService uds = this.spring.getContext().getBean(UserDetailsService.class); | ||||
| 		AuthenticationManager am = this.spring.getContext().getBean(AuthenticationConfiguration.class) | ||||
| 				.getAuthenticationManager(); | ||||
| 		when(uds.loadUserByUsername("user")).thenReturn(PasswordEncodedUser.user(), PasswordEncodedUser.user()); | ||||
| 		given(uds.loadUserByUsername("user")).willReturn(PasswordEncodedUser.user(), PasswordEncodedUser.user()); | ||||
| 
 | ||||
| 		am.authenticate(new UsernamePasswordAuthenticationToken("user", "password")); | ||||
| 
 | ||||
| @ -236,7 +236,7 @@ public class AuthenticationConfigurationTests { | ||||
| 		UserDetailsService uds = this.spring.getContext().getBean(UserDetailsService.class); | ||||
| 		AuthenticationManager am = this.spring.getContext().getBean(AuthenticationConfiguration.class) | ||||
| 				.getAuthenticationManager(); | ||||
| 		when(uds.loadUserByUsername("user")).thenReturn(User.withUserDetails(user).build(), | ||||
| 		given(uds.loadUserByUsername("user")).willReturn(User.withUserDetails(user).build(), | ||||
| 				User.withUserDetails(user).build()); | ||||
| 
 | ||||
| 		am.authenticate(new UsernamePasswordAuthenticationToken("user", "password")); | ||||
| @ -253,9 +253,9 @@ public class AuthenticationConfigurationTests { | ||||
| 				.getBean(UserDetailsPasswordManagerBeanConfig.Manager.class); | ||||
| 		AuthenticationManager am = this.spring.getContext().getBean(AuthenticationConfiguration.class) | ||||
| 				.getAuthenticationManager(); | ||||
| 		when(manager.loadUserByUsername("user")).thenReturn(User.withUserDetails(user).build(), | ||||
| 		given(manager.loadUserByUsername("user")).willReturn(User.withUserDetails(user).build(), | ||||
| 				User.withUserDetails(user).build()); | ||||
| 		when(manager.updatePassword(any(), any())).thenReturn(user); | ||||
| 		given(manager.updatePassword(any(), any())).willReturn(user); | ||||
| 
 | ||||
| 		am.authenticate(new UsernamePasswordAuthenticationToken("user", "password")); | ||||
| 
 | ||||
| @ -269,8 +269,8 @@ public class AuthenticationConfigurationTests { | ||||
| 		AuthenticationProvider ap = this.spring.getContext().getBean(AuthenticationProvider.class); | ||||
| 		AuthenticationManager am = this.spring.getContext().getBean(AuthenticationConfiguration.class) | ||||
| 				.getAuthenticationManager(); | ||||
| 		when(ap.supports(any())).thenReturn(true); | ||||
| 		when(ap.authenticate(any())).thenReturn(TestAuthentication.authenticatedUser()); | ||||
| 		given(ap.supports(any())).willReturn(true); | ||||
| 		given(ap.authenticate(any())).willReturn(TestAuthentication.authenticatedUser()); | ||||
| 
 | ||||
| 		am.authenticate(new UsernamePasswordAuthenticationToken("user", "password")); | ||||
| 	} | ||||
| @ -282,8 +282,8 @@ public class AuthenticationConfigurationTests { | ||||
| 		AuthenticationProvider ap = this.spring.getContext().getBean(AuthenticationProvider.class); | ||||
| 		AuthenticationManager am = this.spring.getContext().getBean(AuthenticationConfiguration.class) | ||||
| 				.getAuthenticationManager(); | ||||
| 		when(ap.supports(any())).thenReturn(true); | ||||
| 		when(ap.authenticate(any())).thenReturn(TestAuthentication.authenticatedUser()); | ||||
| 		given(ap.supports(any())).willReturn(true); | ||||
| 		given(ap.authenticate(any())).willReturn(TestAuthentication.authenticatedUser()); | ||||
| 
 | ||||
| 		am.authenticate(new UsernamePasswordAuthenticationToken("user", "password")); | ||||
| 	} | ||||
|  | ||||
| @ -36,9 +36,9 @@ import org.springframework.test.context.ContextConfiguration; | ||||
| import org.springframework.test.context.junit4.SpringRunner; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.reset; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -80,7 +80,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoWhenPermitAllThenAopDoesNotSubscribe() { | ||||
| 		when(this.delegate.monoFindById(1L)).thenReturn(Mono.from(this.result)); | ||||
| 		given(this.delegate.monoFindById(1L)).willReturn(Mono.from(this.result)); | ||||
| 
 | ||||
| 		this.delegate.monoFindById(1L); | ||||
| 
 | ||||
| @ -89,14 +89,14 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoWhenPermitAllThenSuccess() { | ||||
| 		when(this.delegate.monoFindById(1L)).thenReturn(Mono.just("success")); | ||||
| 		given(this.delegate.monoFindById(1L)).willReturn(Mono.just("success")); | ||||
| 
 | ||||
| 		StepVerifier.create(this.delegate.monoFindById(1L)).expectNext("success").verifyComplete(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeHasRoleWhenGrantedThenSuccess() { | ||||
| 		when(this.delegate.monoPreAuthorizeHasRoleFindById(1L)).thenReturn(Mono.just("result")); | ||||
| 		given(this.delegate.monoPreAuthorizeHasRoleFindById(1L)).willReturn(Mono.just("result")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeHasRoleFindById(1L) | ||||
| 				.subscriberContext(this.withAdmin); | ||||
| @ -105,7 +105,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeHasRoleWhenNoAuthenticationThenDenied() { | ||||
| 		when(this.delegate.monoPreAuthorizeHasRoleFindById(1L)).thenReturn(Mono.from(this.result)); | ||||
| 		given(this.delegate.monoPreAuthorizeHasRoleFindById(1L)).willReturn(Mono.from(this.result)); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeHasRoleFindById(1L); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -115,7 +115,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeHasRoleWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.monoPreAuthorizeHasRoleFindById(1L)).thenReturn(Mono.from(this.result)); | ||||
| 		given(this.delegate.monoPreAuthorizeHasRoleFindById(1L)).willReturn(Mono.from(this.result)); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeHasRoleFindById(1L) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -126,7 +126,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeBeanWhenGrantedThenSuccess() { | ||||
| 		when(this.delegate.monoPreAuthorizeBeanFindById(2L)).thenReturn(Mono.just("result")); | ||||
| 		given(this.delegate.monoPreAuthorizeBeanFindById(2L)).willReturn(Mono.just("result")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeBeanFindById(2L).subscriberContext(this.withAdmin); | ||||
| 		StepVerifier.create(findById).expectNext("result").verifyComplete(); | ||||
| @ -134,7 +134,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeBeanWhenNotAuthenticatedAndGrantedThenSuccess() { | ||||
| 		when(this.delegate.monoPreAuthorizeBeanFindById(2L)).thenReturn(Mono.just("result")); | ||||
| 		given(this.delegate.monoPreAuthorizeBeanFindById(2L)).willReturn(Mono.just("result")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeBeanFindById(2L); | ||||
| 		StepVerifier.create(findById).expectNext("result").verifyComplete(); | ||||
| @ -142,7 +142,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeBeanWhenNoAuthenticationThenDenied() { | ||||
| 		when(this.delegate.monoPreAuthorizeBeanFindById(1L)).thenReturn(Mono.from(this.result)); | ||||
| 		given(this.delegate.monoPreAuthorizeBeanFindById(1L)).willReturn(Mono.from(this.result)); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeBeanFindById(1L); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -152,7 +152,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPreAuthorizeBeanWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.monoPreAuthorizeBeanFindById(1L)).thenReturn(Mono.from(this.result)); | ||||
| 		given(this.delegate.monoPreAuthorizeBeanFindById(1L)).willReturn(Mono.from(this.result)); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPreAuthorizeBeanFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -162,7 +162,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPostAuthorizeWhenAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.monoPostAuthorizeFindById(1L)).thenReturn(Mono.just("user")); | ||||
| 		given(this.delegate.monoPostAuthorizeFindById(1L)).willReturn(Mono.just("user")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPostAuthorizeFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectNext("user").verifyComplete(); | ||||
| @ -170,7 +170,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPostAuthorizeWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.monoPostAuthorizeBeanFindById(1L)).thenReturn(Mono.just("not-authorized")); | ||||
| 		given(this.delegate.monoPostAuthorizeBeanFindById(1L)).willReturn(Mono.just("not-authorized")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPostAuthorizeBeanFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -178,7 +178,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPostAuthorizeWhenBeanAndAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.monoPostAuthorizeBeanFindById(2L)).thenReturn(Mono.just("user")); | ||||
| 		given(this.delegate.monoPostAuthorizeBeanFindById(2L)).willReturn(Mono.just("user")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPostAuthorizeBeanFindById(2L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectNext("user").verifyComplete(); | ||||
| @ -186,7 +186,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPostAuthorizeWhenBeanAndNotAuthenticatedAndAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.monoPostAuthorizeBeanFindById(2L)).thenReturn(Mono.just("anonymous")); | ||||
| 		given(this.delegate.monoPostAuthorizeBeanFindById(2L)).willReturn(Mono.just("anonymous")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPostAuthorizeBeanFindById(2L); | ||||
| 		StepVerifier.create(findById).expectNext("anonymous").verifyComplete(); | ||||
| @ -194,7 +194,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void monoPostAuthorizeWhenBeanAndNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.monoPostAuthorizeBeanFindById(1L)).thenReturn(Mono.just("not-authorized")); | ||||
| 		given(this.delegate.monoPostAuthorizeBeanFindById(1L)).willReturn(Mono.just("not-authorized")); | ||||
| 
 | ||||
| 		Mono<String> findById = this.messageService.monoPostAuthorizeBeanFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -204,7 +204,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxWhenPermitAllThenAopDoesNotSubscribe() { | ||||
| 		when(this.delegate.fluxFindById(1L)).thenReturn(Flux.from(this.result)); | ||||
| 		given(this.delegate.fluxFindById(1L)).willReturn(Flux.from(this.result)); | ||||
| 
 | ||||
| 		this.delegate.fluxFindById(1L); | ||||
| 
 | ||||
| @ -213,14 +213,14 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxWhenPermitAllThenSuccess() { | ||||
| 		when(this.delegate.fluxFindById(1L)).thenReturn(Flux.just("success")); | ||||
| 		given(this.delegate.fluxFindById(1L)).willReturn(Flux.just("success")); | ||||
| 
 | ||||
| 		StepVerifier.create(this.delegate.fluxFindById(1L)).expectNext("success").verifyComplete(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeHasRoleWhenGrantedThenSuccess() { | ||||
| 		when(this.delegate.fluxPreAuthorizeHasRoleFindById(1L)).thenReturn(Flux.just("result")); | ||||
| 		given(this.delegate.fluxPreAuthorizeHasRoleFindById(1L)).willReturn(Flux.just("result")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeHasRoleFindById(1L) | ||||
| 				.subscriberContext(this.withAdmin); | ||||
| @ -230,7 +230,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeHasRoleWhenNoAuthenticationThenDenied() { | ||||
| 		when(this.delegate.fluxPreAuthorizeHasRoleFindById(1L)).thenReturn(Flux.from(this.result)); | ||||
| 		given(this.delegate.fluxPreAuthorizeHasRoleFindById(1L)).willReturn(Flux.from(this.result)); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeHasRoleFindById(1L); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -240,7 +240,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeHasRoleWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.fluxPreAuthorizeHasRoleFindById(1L)).thenReturn(Flux.from(this.result)); | ||||
| 		given(this.delegate.fluxPreAuthorizeHasRoleFindById(1L)).willReturn(Flux.from(this.result)); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeHasRoleFindById(1L) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -251,7 +251,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeBeanWhenGrantedThenSuccess() { | ||||
| 		when(this.delegate.fluxPreAuthorizeBeanFindById(2L)).thenReturn(Flux.just("result")); | ||||
| 		given(this.delegate.fluxPreAuthorizeBeanFindById(2L)).willReturn(Flux.just("result")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeBeanFindById(2L).subscriberContext(this.withAdmin); | ||||
| 		StepVerifier.create(findById).expectNext("result").verifyComplete(); | ||||
| @ -259,7 +259,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeBeanWhenNotAuthenticatedAndGrantedThenSuccess() { | ||||
| 		when(this.delegate.fluxPreAuthorizeBeanFindById(2L)).thenReturn(Flux.just("result")); | ||||
| 		given(this.delegate.fluxPreAuthorizeBeanFindById(2L)).willReturn(Flux.just("result")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeBeanFindById(2L); | ||||
| 		StepVerifier.create(findById).expectNext("result").verifyComplete(); | ||||
| @ -267,7 +267,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeBeanWhenNoAuthenticationThenDenied() { | ||||
| 		when(this.delegate.fluxPreAuthorizeBeanFindById(1L)).thenReturn(Flux.from(this.result)); | ||||
| 		given(this.delegate.fluxPreAuthorizeBeanFindById(1L)).willReturn(Flux.from(this.result)); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeBeanFindById(1L); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -277,7 +277,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPreAuthorizeBeanWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.fluxPreAuthorizeBeanFindById(1L)).thenReturn(Flux.from(this.result)); | ||||
| 		given(this.delegate.fluxPreAuthorizeBeanFindById(1L)).willReturn(Flux.from(this.result)); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPreAuthorizeBeanFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -287,7 +287,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPostAuthorizeWhenAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.fluxPostAuthorizeFindById(1L)).thenReturn(Flux.just("user")); | ||||
| 		given(this.delegate.fluxPostAuthorizeFindById(1L)).willReturn(Flux.just("user")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPostAuthorizeFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectNext("user").verifyComplete(); | ||||
| @ -295,7 +295,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPostAuthorizeWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.fluxPostAuthorizeBeanFindById(1L)).thenReturn(Flux.just("not-authorized")); | ||||
| 		given(this.delegate.fluxPostAuthorizeBeanFindById(1L)).willReturn(Flux.just("not-authorized")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPostAuthorizeBeanFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -303,7 +303,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPostAuthorizeWhenBeanAndAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.fluxPostAuthorizeBeanFindById(2L)).thenReturn(Flux.just("user")); | ||||
| 		given(this.delegate.fluxPostAuthorizeBeanFindById(2L)).willReturn(Flux.just("user")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPostAuthorizeBeanFindById(2L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectNext("user").verifyComplete(); | ||||
| @ -311,7 +311,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPostAuthorizeWhenBeanAndNotAuthenticatedAndAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.fluxPostAuthorizeBeanFindById(2L)).thenReturn(Flux.just("anonymous")); | ||||
| 		given(this.delegate.fluxPostAuthorizeBeanFindById(2L)).willReturn(Flux.just("anonymous")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPostAuthorizeBeanFindById(2L); | ||||
| 		StepVerifier.create(findById).expectNext("anonymous").verifyComplete(); | ||||
| @ -319,7 +319,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void fluxPostAuthorizeWhenBeanAndNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.fluxPostAuthorizeBeanFindById(1L)).thenReturn(Flux.just("not-authorized")); | ||||
| 		given(this.delegate.fluxPostAuthorizeBeanFindById(1L)).willReturn(Flux.just("not-authorized")); | ||||
| 
 | ||||
| 		Flux<String> findById = this.messageService.fluxPostAuthorizeBeanFindById(1L).subscriberContext(this.withUser); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -329,7 +329,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherWhenPermitAllThenAopDoesNotSubscribe() { | ||||
| 		when(this.delegate.publisherFindById(1L)).thenReturn(this.result); | ||||
| 		given(this.delegate.publisherFindById(1L)).willReturn(this.result); | ||||
| 
 | ||||
| 		this.delegate.publisherFindById(1L); | ||||
| 
 | ||||
| @ -338,14 +338,14 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherWhenPermitAllThenSuccess() { | ||||
| 		when(this.delegate.publisherFindById(1L)).thenReturn(publisherJust("success")); | ||||
| 		given(this.delegate.publisherFindById(1L)).willReturn(publisherJust("success")); | ||||
| 
 | ||||
| 		StepVerifier.create(this.delegate.publisherFindById(1L)).expectNext("success").verifyComplete(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeHasRoleWhenGrantedThenSuccess() { | ||||
| 		when(this.delegate.publisherPreAuthorizeHasRoleFindById(1L)).thenReturn(publisherJust("result")); | ||||
| 		given(this.delegate.publisherPreAuthorizeHasRoleFindById(1L)).willReturn(publisherJust("result")); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPreAuthorizeHasRoleFindById(1L)) | ||||
| 				.subscriberContext(this.withAdmin); | ||||
| @ -355,7 +355,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeHasRoleWhenNoAuthenticationThenDenied() { | ||||
| 		when(this.delegate.publisherPreAuthorizeHasRoleFindById(1L)).thenReturn(this.result); | ||||
| 		given(this.delegate.publisherPreAuthorizeHasRoleFindById(1L)).willReturn(this.result); | ||||
| 
 | ||||
| 		Publisher<String> findById = this.messageService.publisherPreAuthorizeHasRoleFindById(1L); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -365,7 +365,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeHasRoleWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.publisherPreAuthorizeHasRoleFindById(1L)).thenReturn(this.result); | ||||
| 		given(this.delegate.publisherPreAuthorizeHasRoleFindById(1L)).willReturn(this.result); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPreAuthorizeHasRoleFindById(1L)) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -376,7 +376,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeBeanWhenGrantedThenSuccess() { | ||||
| 		when(this.delegate.publisherPreAuthorizeBeanFindById(2L)).thenReturn(publisherJust("result")); | ||||
| 		given(this.delegate.publisherPreAuthorizeBeanFindById(2L)).willReturn(publisherJust("result")); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPreAuthorizeBeanFindById(2L)) | ||||
| 				.subscriberContext(this.withAdmin); | ||||
| @ -385,7 +385,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeBeanWhenNotAuthenticatedAndGrantedThenSuccess() { | ||||
| 		when(this.delegate.publisherPreAuthorizeBeanFindById(2L)).thenReturn(publisherJust("result")); | ||||
| 		given(this.delegate.publisherPreAuthorizeBeanFindById(2L)).willReturn(publisherJust("result")); | ||||
| 
 | ||||
| 		Publisher<String> findById = this.messageService.publisherPreAuthorizeBeanFindById(2L); | ||||
| 		StepVerifier.create(findById).expectNext("result").verifyComplete(); | ||||
| @ -393,7 +393,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeBeanWhenNoAuthenticationThenDenied() { | ||||
| 		when(this.delegate.publisherPreAuthorizeBeanFindById(1L)).thenReturn(this.result); | ||||
| 		given(this.delegate.publisherPreAuthorizeBeanFindById(1L)).willReturn(this.result); | ||||
| 
 | ||||
| 		Publisher<String> findById = this.messageService.publisherPreAuthorizeBeanFindById(1L); | ||||
| 		StepVerifier.create(findById).expectError(AccessDeniedException.class).verify(); | ||||
| @ -403,7 +403,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPreAuthorizeBeanWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.publisherPreAuthorizeBeanFindById(1L)).thenReturn(this.result); | ||||
| 		given(this.delegate.publisherPreAuthorizeBeanFindById(1L)).willReturn(this.result); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPreAuthorizeBeanFindById(1L)) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -414,7 +414,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPostAuthorizeWhenAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.publisherPostAuthorizeFindById(1L)).thenReturn(publisherJust("user")); | ||||
| 		given(this.delegate.publisherPostAuthorizeFindById(1L)).willReturn(publisherJust("user")); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPostAuthorizeFindById(1L)) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -423,7 +423,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPostAuthorizeWhenNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.publisherPostAuthorizeBeanFindById(1L)).thenReturn(publisherJust("not-authorized")); | ||||
| 		given(this.delegate.publisherPostAuthorizeBeanFindById(1L)).willReturn(publisherJust("not-authorized")); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPostAuthorizeBeanFindById(1L)) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -432,7 +432,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPostAuthorizeWhenBeanAndAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.publisherPostAuthorizeBeanFindById(2L)).thenReturn(publisherJust("user")); | ||||
| 		given(this.delegate.publisherPostAuthorizeBeanFindById(2L)).willReturn(publisherJust("user")); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPostAuthorizeBeanFindById(2L)) | ||||
| 				.subscriberContext(this.withUser); | ||||
| @ -441,7 +441,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPostAuthorizeWhenBeanAndNotAuthenticatedAndAuthorizedThenSuccess() { | ||||
| 		when(this.delegate.publisherPostAuthorizeBeanFindById(2L)).thenReturn(publisherJust("anonymous")); | ||||
| 		given(this.delegate.publisherPostAuthorizeBeanFindById(2L)).willReturn(publisherJust("anonymous")); | ||||
| 
 | ||||
| 		Publisher<String> findById = this.messageService.publisherPostAuthorizeBeanFindById(2L); | ||||
| 		StepVerifier.create(findById).expectNext("anonymous").verifyComplete(); | ||||
| @ -449,7 +449,7 @@ public class EnableReactiveMethodSecurityTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void publisherPostAuthorizeWhenBeanAndNotAuthorizedThenDenied() { | ||||
| 		when(this.delegate.publisherPostAuthorizeBeanFindById(1L)).thenReturn(publisherJust("not-authorized")); | ||||
| 		given(this.delegate.publisherPostAuthorizeBeanFindById(1L)).willReturn(publisherJust("not-authorized")); | ||||
| 
 | ||||
| 		Publisher<String> findById = Flux.from(this.messageService.publisherPostAuthorizeBeanFindById(1L)) | ||||
| 				.subscriberContext(this.withUser); | ||||
|  | ||||
| @ -63,10 +63,10 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.atLeastOnce; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -126,7 +126,7 @@ public class GlobalMethodSecurityConfigurationTests { | ||||
| 		this.spring.register(CustomTrustResolverConfig.class).autowire(); | ||||
| 
 | ||||
| 		AuthenticationTrustResolver trustResolver = this.spring.getContext().getBean(AuthenticationTrustResolver.class); | ||||
| 		when(trustResolver.isAnonymous(any())).thenReturn(true, false); | ||||
| 		given(trustResolver.isAnonymous(any())).willReturn(true, false); | ||||
| 
 | ||||
| 		assertThatThrownBy(() -> this.service.preAuthorizeNotAnonymous()).isInstanceOf(AccessDeniedException.class); | ||||
| 
 | ||||
| @ -163,7 +163,7 @@ public class GlobalMethodSecurityConfigurationTests { | ||||
| 	public void globalMethodSecurityConfigurationAutowiresPermissionEvaluator() { | ||||
| 		this.spring.register(AutowirePermissionEvaluatorConfig.class).autowire(); | ||||
| 		PermissionEvaluator permission = this.spring.getContext().getBean(PermissionEvaluator.class); | ||||
| 		when(permission.hasPermission(any(), eq("something"), eq("read"))).thenReturn(true, false); | ||||
| 		given(permission.hasPermission(any(), eq("something"), eq("read"))).willReturn(true, false); | ||||
| 
 | ||||
| 		this.service.hasPermission("something"); | ||||
| 		// no exception | ||||
|  | ||||
| @ -58,10 +58,10 @@ import org.springframework.web.bind.annotation.GetMapping; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyCollection; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.formLogin; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.authentication; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user; | ||||
| @ -89,9 +89,9 @@ public class NamespaceHttpTests { | ||||
| 	@Test // http@access-decision-manager-ref | ||||
| 	public void configureWhenAccessDecisionManagerSetThenVerifyUse() throws Exception { | ||||
| 		AccessDecisionManagerRefConfig.ACCESS_DECISION_MANAGER = mock(AccessDecisionManager.class); | ||||
| 		when(AccessDecisionManagerRefConfig.ACCESS_DECISION_MANAGER.supports(FilterInvocation.class)).thenReturn(true); | ||||
| 		when(AccessDecisionManagerRefConfig.ACCESS_DECISION_MANAGER.supports(any(ConfigAttribute.class))) | ||||
| 				.thenReturn(true); | ||||
| 		given(AccessDecisionManagerRefConfig.ACCESS_DECISION_MANAGER.supports(FilterInvocation.class)).willReturn(true); | ||||
| 		given(AccessDecisionManagerRefConfig.ACCESS_DECISION_MANAGER.supports(any(ConfigAttribute.class))) | ||||
| 				.willReturn(true); | ||||
| 
 | ||||
| 		this.spring.register(AccessDecisionManagerRefConfig.class).autowire(); | ||||
| 
 | ||||
| @ -178,11 +178,11 @@ public class NamespaceHttpTests { | ||||
| 	@Test // http@jaas-api-provision | ||||
| 	public void configureWhenJaasApiIntegrationFilterAddedThenJaasSubjectObtained() throws Exception { | ||||
| 		LoginContext loginContext = mock(LoginContext.class); | ||||
| 		when(loginContext.getSubject()).thenReturn(new Subject()); | ||||
| 		given(loginContext.getSubject()).willReturn(new Subject()); | ||||
| 
 | ||||
| 		JaasAuthenticationToken authenticationToken = mock(JaasAuthenticationToken.class); | ||||
| 		when(authenticationToken.isAuthenticated()).thenReturn(true); | ||||
| 		when(authenticationToken.getLoginContext()).thenReturn(loginContext); | ||||
| 		given(authenticationToken.isAuthenticated()).willReturn(true); | ||||
| 		given(authenticationToken.getLoginContext()).willReturn(loginContext); | ||||
| 
 | ||||
| 		this.spring.register(JaasApiProvisionConfig.class).autowire(); | ||||
| 
 | ||||
|  | ||||
| @ -46,12 +46,12 @@ import org.springframework.web.servlet.config.annotation.EnableWebMvc; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyNoInteractions; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.oauth2.client.registration.TestClientRegistrations.clientCredentials; | ||||
| import static org.springframework.security.oauth2.client.registration.TestClientRegistrations.clientRegistration; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.authentication; | ||||
| @ -80,17 +80,17 @@ public class OAuth2ClientConfigurationTests { | ||||
| 
 | ||||
| 		ClientRegistrationRepository clientRegistrationRepository = mock(ClientRegistrationRepository.class); | ||||
| 		ClientRegistration clientRegistration = clientRegistration().registrationId(clientRegistrationId).build(); | ||||
| 		when(clientRegistrationRepository.findByRegistrationId(eq(clientRegistrationId))) | ||||
| 				.thenReturn(clientRegistration); | ||||
| 		given(clientRegistrationRepository.findByRegistrationId(eq(clientRegistrationId))) | ||||
| 				.willReturn(clientRegistration); | ||||
| 
 | ||||
| 		OAuth2AuthorizedClientRepository authorizedClientRepository = mock(OAuth2AuthorizedClientRepository.class); | ||||
| 		OAuth2AuthorizedClient authorizedClient = mock(OAuth2AuthorizedClient.class); | ||||
| 		when(authorizedClient.getClientRegistration()).thenReturn(clientRegistration); | ||||
| 		when(authorizedClientRepository.loadAuthorizedClient(eq(clientRegistrationId), eq(authentication), | ||||
| 				any(HttpServletRequest.class))).thenReturn(authorizedClient); | ||||
| 		given(authorizedClient.getClientRegistration()).willReturn(clientRegistration); | ||||
| 		given(authorizedClientRepository.loadAuthorizedClient(eq(clientRegistrationId), eq(authentication), | ||||
| 				any(HttpServletRequest.class))).willReturn(authorizedClient); | ||||
| 
 | ||||
| 		OAuth2AccessToken accessToken = mock(OAuth2AccessToken.class); | ||||
| 		when(authorizedClient.getAccessToken()).thenReturn(accessToken); | ||||
| 		given(authorizedClient.getAccessToken()).willReturn(accessToken); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponseClient accessTokenResponseClient = mock(OAuth2AccessTokenResponseClient.class); | ||||
| 
 | ||||
| @ -116,12 +116,12 @@ public class OAuth2ClientConfigurationTests { | ||||
| 		OAuth2AccessTokenResponseClient accessTokenResponseClient = mock(OAuth2AccessTokenResponseClient.class); | ||||
| 
 | ||||
| 		ClientRegistration clientRegistration = clientCredentials().registrationId(clientRegistrationId).build(); | ||||
| 		when(clientRegistrationRepository.findByRegistrationId(clientRegistrationId)).thenReturn(clientRegistration); | ||||
| 		given(clientRegistrationRepository.findByRegistrationId(clientRegistrationId)).willReturn(clientRegistration); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = OAuth2AccessTokenResponse.withToken("access-token-1234") | ||||
| 				.tokenType(OAuth2AccessToken.TokenType.BEARER).expiresIn(300).build(); | ||||
| 		when(accessTokenResponseClient.getTokenResponse(any(OAuth2ClientCredentialsGrantRequest.class))) | ||||
| 				.thenReturn(accessTokenResponse); | ||||
| 		given(accessTokenResponseClient.getTokenResponse(any(OAuth2ClientCredentialsGrantRequest.class))) | ||||
| 				.willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2AuthorizedClientArgumentResolverConfig.CLIENT_REGISTRATION_REPOSITORY = clientRegistrationRepository; | ||||
| 		OAuth2AuthorizedClientArgumentResolverConfig.AUTHORIZED_CLIENT_REPOSITORY = authorizedClientRepository; | ||||
| @ -180,7 +180,7 @@ public class OAuth2ClientConfigurationTests { | ||||
| 		OAuth2AuthorizedClient authorizedClient = new OAuth2AuthorizedClient(clientRegistration, principalName, | ||||
| 				TestOAuth2AccessTokens.noScopes()); | ||||
| 
 | ||||
| 		when(authorizedClientManager.authorize(any())).thenReturn(authorizedClient); | ||||
| 		given(authorizedClientManager.authorize(any())).willReturn(authorizedClient); | ||||
| 
 | ||||
| 		OAuth2AuthorizedClientManagerRegisteredConfig.CLIENT_REGISTRATION_REPOSITORY = clientRegistrationRepository; | ||||
| 		OAuth2AuthorizedClientManagerRegisteredConfig.AUTHORIZED_CLIENT_REPOSITORY = authorizedClientRepository; | ||||
|  | ||||
| @ -61,8 +61,8 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.catchThrowable; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post; | ||||
| import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; | ||||
| @ -162,8 +162,8 @@ public class WebSecurityConfigurationTests { | ||||
| 	@Test | ||||
| 	public void loadConfigWhenSecurityExpressionHandlerSetThenIsRegistered() { | ||||
| 		WebSecurityExpressionHandlerConfig.EXPRESSION_HANDLER = mock(SecurityExpressionHandler.class); | ||||
| 		when(WebSecurityExpressionHandlerConfig.EXPRESSION_HANDLER.getExpressionParser()) | ||||
| 				.thenReturn(mock(ExpressionParser.class)); | ||||
| 		given(WebSecurityExpressionHandlerConfig.EXPRESSION_HANDLER.getExpressionParser()) | ||||
| 				.willReturn(mock(ExpressionParser.class)); | ||||
| 
 | ||||
| 		this.spring.register(WebSecurityExpressionHandlerConfig.class).autowire(); | ||||
| 
 | ||||
|  | ||||
| @ -55,10 +55,10 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.isNull; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.atLeastOnce; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user; | ||||
| @ -209,8 +209,8 @@ public class CsrfConfigurerTests { | ||||
| 	public void loginWhenCsrfEnabledThenDoesNotRedirectToPreviousPostRequest() throws Exception { | ||||
| 		CsrfDisablesPostRequestFromRequestCacheConfig.REPO = mock(CsrfTokenRepository.class); | ||||
| 		DefaultCsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); | ||||
| 		when(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.loadToken(any())).thenReturn(csrfToken); | ||||
| 		when(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.generateToken(any())).thenReturn(csrfToken); | ||||
| 		given(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.loadToken(any())).willReturn(csrfToken); | ||||
| 		given(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.generateToken(any())).willReturn(csrfToken); | ||||
| 		this.spring.register(CsrfDisablesPostRequestFromRequestCacheConfig.class).autowire(); | ||||
| 
 | ||||
| 		MvcResult mvcResult = this.mvc.perform(post("/some-url")).andReturn(); | ||||
| @ -226,8 +226,8 @@ public class CsrfConfigurerTests { | ||||
| 	public void loginWhenCsrfEnabledThenRedirectsToPreviousGetRequest() throws Exception { | ||||
| 		CsrfDisablesPostRequestFromRequestCacheConfig.REPO = mock(CsrfTokenRepository.class); | ||||
| 		DefaultCsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); | ||||
| 		when(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.loadToken(any())).thenReturn(csrfToken); | ||||
| 		when(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.generateToken(any())).thenReturn(csrfToken); | ||||
| 		given(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.loadToken(any())).willReturn(csrfToken); | ||||
| 		given(CsrfDisablesPostRequestFromRequestCacheConfig.REPO.generateToken(any())).willReturn(csrfToken); | ||||
| 		this.spring.register(CsrfDisablesPostRequestFromRequestCacheConfig.class).autowire(); | ||||
| 
 | ||||
| 		MvcResult mvcResult = this.mvc.perform(get("/some-url")).andReturn(); | ||||
| @ -254,7 +254,7 @@ public class CsrfConfigurerTests { | ||||
| 	@Test | ||||
| 	public void requireCsrfProtectionMatcherWhenRequestDoesNotMatchThenRespondsWithOk() throws Exception { | ||||
| 		this.spring.register(RequireCsrfProtectionMatcherConfig.class, BasicController.class).autowire(); | ||||
| 		when(RequireCsrfProtectionMatcherConfig.MATCHER.matches(any())).thenReturn(false); | ||||
| 		given(RequireCsrfProtectionMatcherConfig.MATCHER.matches(any())).willReturn(false); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")).andExpect(status().isOk()); | ||||
| 	} | ||||
| @ -262,7 +262,7 @@ public class CsrfConfigurerTests { | ||||
| 	@Test | ||||
| 	public void requireCsrfProtectionMatcherWhenRequestMatchesThenRespondsWithForbidden() throws Exception { | ||||
| 		RequireCsrfProtectionMatcherConfig.MATCHER = mock(RequestMatcher.class); | ||||
| 		when(RequireCsrfProtectionMatcherConfig.MATCHER.matches(any())).thenReturn(true); | ||||
| 		given(RequireCsrfProtectionMatcherConfig.MATCHER.matches(any())).willReturn(true); | ||||
| 		this.spring.register(RequireCsrfProtectionMatcherConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")).andExpect(status().isForbidden()); | ||||
| @ -272,7 +272,7 @@ public class CsrfConfigurerTests { | ||||
| 	public void requireCsrfProtectionMatcherInLambdaWhenRequestDoesNotMatchThenRespondsWithOk() throws Exception { | ||||
| 		RequireCsrfProtectionMatcherInLambdaConfig.MATCHER = mock(RequestMatcher.class); | ||||
| 		this.spring.register(RequireCsrfProtectionMatcherInLambdaConfig.class, BasicController.class).autowire(); | ||||
| 		when(RequireCsrfProtectionMatcherInLambdaConfig.MATCHER.matches(any())).thenReturn(false); | ||||
| 		given(RequireCsrfProtectionMatcherInLambdaConfig.MATCHER.matches(any())).willReturn(false); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")).andExpect(status().isOk()); | ||||
| 	} | ||||
| @ -280,7 +280,7 @@ public class CsrfConfigurerTests { | ||||
| 	@Test | ||||
| 	public void requireCsrfProtectionMatcherInLambdaWhenRequestMatchesThenRespondsWithForbidden() throws Exception { | ||||
| 		RequireCsrfProtectionMatcherInLambdaConfig.MATCHER = mock(RequestMatcher.class); | ||||
| 		when(RequireCsrfProtectionMatcherInLambdaConfig.MATCHER.matches(any())).thenReturn(true); | ||||
| 		given(RequireCsrfProtectionMatcherInLambdaConfig.MATCHER.matches(any())).willReturn(true); | ||||
| 		this.spring.register(RequireCsrfProtectionMatcherInLambdaConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")).andExpect(status().isForbidden()); | ||||
| @ -289,8 +289,8 @@ public class CsrfConfigurerTests { | ||||
| 	@Test | ||||
| 	public void getWhenCustomCsrfTokenRepositoryThenRepositoryIsUsed() throws Exception { | ||||
| 		CsrfTokenRepositoryConfig.REPO = mock(CsrfTokenRepository.class); | ||||
| 		when(CsrfTokenRepositoryConfig.REPO.loadToken(any())) | ||||
| 				.thenReturn(new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token")); | ||||
| 		given(CsrfTokenRepositoryConfig.REPO.loadToken(any())) | ||||
| 				.willReturn(new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token")); | ||||
| 		this.spring.register(CsrfTokenRepositoryConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")).andExpect(status().isOk()); | ||||
| @ -312,8 +312,8 @@ public class CsrfConfigurerTests { | ||||
| 	public void loginWhenCustomCsrfTokenRepositoryThenCsrfTokenIsCleared() throws Exception { | ||||
| 		CsrfTokenRepositoryConfig.REPO = mock(CsrfTokenRepository.class); | ||||
| 		DefaultCsrfToken csrfToken = new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token"); | ||||
| 		when(CsrfTokenRepositoryConfig.REPO.loadToken(any())).thenReturn(csrfToken); | ||||
| 		when(CsrfTokenRepositoryConfig.REPO.generateToken(any())).thenReturn(csrfToken); | ||||
| 		given(CsrfTokenRepositoryConfig.REPO.loadToken(any())).willReturn(csrfToken); | ||||
| 		given(CsrfTokenRepositoryConfig.REPO.generateToken(any())).willReturn(csrfToken); | ||||
| 		this.spring.register(CsrfTokenRepositoryConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(post("/login").with(csrf()).param("username", "user").param("password", "password")) | ||||
| @ -326,8 +326,8 @@ public class CsrfConfigurerTests { | ||||
| 	@Test | ||||
| 	public void getWhenCustomCsrfTokenRepositoryInLambdaThenRepositoryIsUsed() throws Exception { | ||||
| 		CsrfTokenRepositoryInLambdaConfig.REPO = mock(CsrfTokenRepository.class); | ||||
| 		when(CsrfTokenRepositoryInLambdaConfig.REPO.loadToken(any())) | ||||
| 				.thenReturn(new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token")); | ||||
| 		given(CsrfTokenRepositoryInLambdaConfig.REPO.loadToken(any())) | ||||
| 				.willReturn(new DefaultCsrfToken("X-CSRF-TOKEN", "_csrf", "token")); | ||||
| 		this.spring.register(CsrfTokenRepositoryInLambdaConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")).andExpect(status().isOk()); | ||||
|  | ||||
| @ -39,10 +39,10 @@ import org.springframework.security.web.savedrequest.RequestCache; | ||||
| import org.springframework.test.web.servlet.MockMvc; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.formLogin; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.logout; | ||||
| @ -260,7 +260,7 @@ public class FormLoginConfigurerTests { | ||||
| 	@Test | ||||
| 	public void requestWhenCustomPortMapperThenPortMapperUsed() throws Exception { | ||||
| 		FormLoginUsesPortMapperConfig.PORT_MAPPER = mock(PortMapper.class); | ||||
| 		when(FormLoginUsesPortMapperConfig.PORT_MAPPER.lookupHttpsPort(any())).thenReturn(9443); | ||||
| 		given(FormLoginUsesPortMapperConfig.PORT_MAPPER.lookupHttpsPort(any())).willReturn(9443); | ||||
| 		this.spring.register(FormLoginUsesPortMapperConfig.class).autowire(); | ||||
| 
 | ||||
| 		this.mockMvc.perform(get("http://localhost:9090")).andExpect(status().isFound()) | ||||
|  | ||||
| @ -36,10 +36,10 @@ import org.springframework.security.web.authentication.preauth.j2ee.J2eePreAuthe | ||||
| import org.springframework.test.web.servlet.MockMvc; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.authenticated; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| 
 | ||||
| @ -79,7 +79,7 @@ public class JeeConfigurerTests { | ||||
| 	public void jeeWhenInvokedTwiceThenUsesOriginalMappableRoles() throws Exception { | ||||
| 		this.spring.register(InvokeTwiceDoesNotOverride.class).autowire(); | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		when(user.getName()).thenReturn("user"); | ||||
| 		given(user.getName()).willReturn("user"); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").principal(user).with(request -> { | ||||
| 			request.addUserRole("ROLE_ADMIN"); | ||||
| @ -92,7 +92,7 @@ public class JeeConfigurerTests { | ||||
| 	public void requestWhenJeeMappableRolesInLambdaThenAuthenticatedWithMappableRoles() throws Exception { | ||||
| 		this.spring.register(JeeMappableRolesConfig.class).autowire(); | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		when(user.getName()).thenReturn("user"); | ||||
| 		given(user.getName()).willReturn("user"); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").principal(user).with(request -> { | ||||
| 			request.addUserRole("ROLE_ADMIN"); | ||||
| @ -105,7 +105,7 @@ public class JeeConfigurerTests { | ||||
| 	public void requestWhenJeeMappableAuthoritiesInLambdaThenAuthenticatedWithMappableAuthorities() throws Exception { | ||||
| 		this.spring.register(JeeMappableAuthoritiesConfig.class).autowire(); | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		when(user.getName()).thenReturn("user"); | ||||
| 		given(user.getName()).willReturn("user"); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").principal(user).with(request -> { | ||||
| 			request.addUserRole("ROLE_ADMIN"); | ||||
| @ -121,9 +121,9 @@ public class JeeConfigurerTests { | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		User userDetails = new User("user", "N/A", true, true, true, true, | ||||
| 				AuthorityUtils.createAuthorityList("ROLE_USER")); | ||||
| 		when(user.getName()).thenReturn("user"); | ||||
| 		when(JeeCustomAuthenticatedUserDetailsServiceConfig.authenticationUserDetailsService.loadUserDetails(any())) | ||||
| 				.thenReturn(userDetails); | ||||
| 		given(user.getName()).willReturn("user"); | ||||
| 		given(JeeCustomAuthenticatedUserDetailsServiceConfig.authenticationUserDetailsService.loadUserDetails(any())) | ||||
| 				.willReturn(userDetails); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").principal(user).with(request -> { | ||||
| 			request.addUserRole("ROLE_ADMIN"); | ||||
|  | ||||
| @ -36,9 +36,9 @@ import org.springframework.web.bind.annotation.GetMapping; | ||||
| import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content; | ||||
| import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; | ||||
| @ -63,7 +63,7 @@ public class NamespaceHttpJeeTests { | ||||
| 		this.spring.register(JeeMappableRolesConfig.class, BaseController.class).autowire(); | ||||
| 
 | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		when(user.getName()).thenReturn("joe"); | ||||
| 		given(user.getName()).willReturn("joe"); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/roles").principal(user).with(request -> { | ||||
| 			request.addUserRole("ROLE_admin"); | ||||
| @ -78,12 +78,12 @@ public class NamespaceHttpJeeTests { | ||||
| 		this.spring.register(JeeUserServiceRefConfig.class, BaseController.class).autowire(); | ||||
| 
 | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		when(user.getName()).thenReturn("joe"); | ||||
| 		given(user.getName()).willReturn("joe"); | ||||
| 
 | ||||
| 		User result = new User(user.getName(), "N/A", true, true, true, true, | ||||
| 				AuthorityUtils.createAuthorityList("ROLE_user")); | ||||
| 
 | ||||
| 		when(bean(AuthenticationUserDetailsService.class).loadUserDetails(any())).thenReturn(result); | ||||
| 		given(bean(AuthenticationUserDetailsService.class).loadUserDetails(any())).willReturn(result); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/roles").principal(user)).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string("ROLE_user")); | ||||
|  | ||||
| @ -58,11 +58,11 @@ import org.springframework.test.web.servlet.MvcResult; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyBoolean; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.reset; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.openid4java.discovery.yadis.YadisResolver.YADIS_XRDS_LOCATION; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| @ -97,10 +97,11 @@ public class NamespaceHttpOpenIDLoginTests { | ||||
| 		OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER = mock(ConsumerManager.class); | ||||
| 		AuthRequest mockAuthRequest = mock(AuthRequest.class); | ||||
| 		DiscoveryInformation mockDiscoveryInformation = mock(DiscoveryInformation.class); | ||||
| 		when(mockAuthRequest.getDestinationUrl(anyBoolean())).thenReturn("mockUrl"); | ||||
| 		when(OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER.associate(any())).thenReturn(mockDiscoveryInformation); | ||||
| 		when(OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), | ||||
| 				any())).thenReturn(mockAuthRequest); | ||||
| 		given(mockAuthRequest.getDestinationUrl(anyBoolean())).willReturn("mockUrl"); | ||||
| 		given(OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER.associate(any())) | ||||
| 				.willReturn(mockDiscoveryInformation); | ||||
| 		given(OpenIDLoginAttributeExchangeConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), | ||||
| 				any())).willReturn(mockAuthRequest); | ||||
| 		this.spring.register(OpenIDLoginAttributeExchangeConfig.class).autowire(); | ||||
| 
 | ||||
| 		try (MockWebServer server = new MockWebServer()) { | ||||
| @ -144,20 +145,20 @@ public class NamespaceHttpOpenIDLoginTests { | ||||
| 				"identityUrl", "message", Arrays.asList(new OpenIDAttribute("name", "type"))); | ||||
| 
 | ||||
| 		OpenIDLoginCustomRefsConfig.AUDS = mock(AuthenticationUserDetailsService.class); | ||||
| 		when(OpenIDLoginCustomRefsConfig.AUDS.loadUserDetails(any(Authentication.class))) | ||||
| 				.thenReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER"))); | ||||
| 		given(OpenIDLoginCustomRefsConfig.AUDS.loadUserDetails(any(Authentication.class))) | ||||
| 				.willReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER"))); | ||||
| 		OpenIDLoginCustomRefsConfig.ADS = spy(new WebAuthenticationDetailsSource()); | ||||
| 		OpenIDLoginCustomRefsConfig.CONSUMER = mock(OpenIDConsumer.class); | ||||
| 
 | ||||
| 		this.spring.register(OpenIDLoginCustomRefsConfig.class, UserDetailsServiceConfig.class).autowire(); | ||||
| 
 | ||||
| 		when(OpenIDLoginCustomRefsConfig.CONSUMER.endConsumption(any(HttpServletRequest.class))) | ||||
| 				.thenThrow(new AuthenticationServiceException("boom")); | ||||
| 		given(OpenIDLoginCustomRefsConfig.CONSUMER.endConsumption(any(HttpServletRequest.class))) | ||||
| 				.willThrow(new AuthenticationServiceException("boom")); | ||||
| 		this.mvc.perform(post("/login/openid").with(csrf()).param("openid.identity", "identity")) | ||||
| 				.andExpect(redirectedUrl("/custom/failure")); | ||||
| 		reset(OpenIDLoginCustomRefsConfig.CONSUMER); | ||||
| 
 | ||||
| 		when(OpenIDLoginCustomRefsConfig.CONSUMER.endConsumption(any(HttpServletRequest.class))).thenReturn(token); | ||||
| 		given(OpenIDLoginCustomRefsConfig.CONSUMER.endConsumption(any(HttpServletRequest.class))).willReturn(token); | ||||
| 		this.mvc.perform(post("/login/openid").with(csrf()).param("openid.identity", "identity")) | ||||
| 				.andExpect(redirectedUrl("/custom/targetUrl")); | ||||
| 
 | ||||
|  | ||||
| @ -51,10 +51,10 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post; | ||||
| @ -230,8 +230,8 @@ public class NamespaceRememberMeTests { | ||||
| 		UserServiceRefConfig.USERDETAILS_SERVICE = mock(UserDetailsService.class); | ||||
| 		this.spring.register(UserServiceRefConfig.class).autowire(); | ||||
| 
 | ||||
| 		when(UserServiceRefConfig.USERDETAILS_SERVICE.loadUserByUsername("user")) | ||||
| 				.thenReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER"))); | ||||
| 		given(UserServiceRefConfig.USERDETAILS_SERVICE.loadUserByUsername("user")) | ||||
| 				.willReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER"))); | ||||
| 
 | ||||
| 		this.mvc.perform(post("/login").with(rememberMeLogin())); | ||||
| 
 | ||||
|  | ||||
| @ -56,10 +56,10 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.httpBasic; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.redirectedUrl; | ||||
| @ -110,7 +110,7 @@ public class NamespaceSessionManagementTests { | ||||
| 		SessionInformation sessionInformation = new SessionInformation(new Object(), session.getId(), new Date(0)); | ||||
| 		sessionInformation.expireNow(); | ||||
| 		SessionRegistry sessionRegistry = this.spring.getContext().getBean(SessionRegistry.class); | ||||
| 		when(sessionRegistry.getSessionInformation(session.getId())).thenReturn(sessionInformation); | ||||
| 		given(sessionRegistry.getSessionInformation(session.getId())).willReturn(sessionInformation); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/auth").session(session)).andExpect(redirectedUrl("/expired-session")); | ||||
| 	} | ||||
| @ -133,7 +133,7 @@ public class NamespaceSessionManagementTests { | ||||
| 
 | ||||
| 		MockHttpServletRequest mock = spy(MockHttpServletRequest.class); | ||||
| 		mock.setSession(new MockHttpSession()); | ||||
| 		when(mock.changeSessionId()).thenThrow(SessionAuthenticationException.class); | ||||
| 		given(mock.changeSessionId()).willThrow(SessionAuthenticationException.class); | ||||
| 		mock.setMethod("GET"); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/auth").with(request -> mock).with(httpBasic("user", "password"))) | ||||
|  | ||||
| @ -50,10 +50,10 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.httpBasic; | ||||
| @ -95,8 +95,8 @@ public class RememberMeConfigurerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void rememberMeWhenInvokedTwiceThenUsesOriginalUserDetailsService() throws Exception { | ||||
| 		when(DuplicateDoesNotOverrideConfig.userDetailsService.loadUserByUsername(anyString())) | ||||
| 				.thenReturn(new User("user", "password", Collections.emptyList())); | ||||
| 		given(DuplicateDoesNotOverrideConfig.userDetailsService.loadUserByUsername(anyString())) | ||||
| 				.willReturn(new User("user", "password", Collections.emptyList())); | ||||
| 		this.spring.register(DuplicateDoesNotOverrideConfig.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").with(httpBasic("user", "password")).param("remember-me", "true")); | ||||
|  | ||||
| @ -42,10 +42,10 @@ import org.springframework.test.web.servlet.MvcResult; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestBuilders.formLogin; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| @ -74,7 +74,7 @@ public class SecurityContextConfigurerTests { | ||||
| 	@Test | ||||
| 	public void securityContextWhenInvokedTwiceThenUsesOriginalSecurityContextRepository() throws Exception { | ||||
| 		this.spring.register(DuplicateDoesNotOverrideConfig.class).autowire(); | ||||
| 		when(DuplicateDoesNotOverrideConfig.SCR.loadContext(any())).thenReturn(mock(SecurityContext.class)); | ||||
| 		given(DuplicateDoesNotOverrideConfig.SCR.loadContext(any())).willReturn(mock(SecurityContext.class)); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")); | ||||
| 
 | ||||
|  | ||||
| @ -52,11 +52,11 @@ import org.springframework.test.web.servlet.MvcResult; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyNoInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.httpBasic; | ||||
| @ -93,8 +93,8 @@ public class SessionManagementConfigurerTests { | ||||
| 	@Test | ||||
| 	public void sessionManagementWhenConfiguredThenDoesNotOverrideSecurityContextRepository() throws Exception { | ||||
| 		SessionManagementSecurityContextRepositoryConfig.SECURITY_CONTEXT_REPO = mock(SecurityContextRepository.class); | ||||
| 		when(SessionManagementSecurityContextRepositoryConfig.SECURITY_CONTEXT_REPO | ||||
| 				.loadContext(any(HttpRequestResponseHolder.class))).thenReturn(mock(SecurityContext.class)); | ||||
| 		given(SessionManagementSecurityContextRepositoryConfig.SECURITY_CONTEXT_REPO | ||||
| 				.loadContext(any(HttpRequestResponseHolder.class))).willReturn(mock(SecurityContext.class)); | ||||
| 		this.spring.register(SessionManagementSecurityContextRepositoryConfig.class).autowire(); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/")); | ||||
| @ -243,7 +243,7 @@ public class SessionManagementConfigurerTests { | ||||
| 	public void getWhenAnonymousRequestAndTrustResolverSharedObjectReturnsAnonymousFalseThenSessionIsSaved() | ||||
| 			throws Exception { | ||||
| 		SharedTrustResolverConfig.TR = mock(AuthenticationTrustResolver.class); | ||||
| 		when(SharedTrustResolverConfig.TR.isAnonymous(any())).thenReturn(false); | ||||
| 		given(SharedTrustResolverConfig.TR.isAnonymous(any())).willReturn(false); | ||||
| 		this.spring.register(SharedTrustResolverConfig.class).autowire(); | ||||
| 
 | ||||
| 		MvcResult mvcResult = this.mvc.perform(get("/")).andReturn(); | ||||
|  | ||||
| @ -66,9 +66,9 @@ import org.springframework.web.servlet.config.annotation.EnableWebMvc; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.authentication; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user; | ||||
| @ -123,8 +123,8 @@ public class OAuth2ClientConfigurerTests { | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = OAuth2AccessTokenResponse.withToken("access-token-1234") | ||||
| 				.tokenType(OAuth2AccessToken.TokenType.BEARER).expiresIn(300).build(); | ||||
| 		accessTokenResponseClient = mock(OAuth2AccessTokenResponseClient.class); | ||||
| 		when(accessTokenResponseClient.getTokenResponse(any(OAuth2AuthorizationCodeGrantRequest.class))) | ||||
| 				.thenReturn(accessTokenResponse); | ||||
| 		given(accessTokenResponseClient.getTokenResponse(any(OAuth2AuthorizationCodeGrantRequest.class))) | ||||
| 				.willReturn(accessTokenResponse); | ||||
| 		requestCache = mock(RequestCache.class); | ||||
| 	} | ||||
| 
 | ||||
| @ -231,8 +231,8 @@ public class OAuth2ClientConfigurerTests { | ||||
| 		// Override default resolver | ||||
| 		OAuth2AuthorizationRequestResolver defaultAuthorizationRequestResolver = authorizationRequestResolver; | ||||
| 		authorizationRequestResolver = mock(OAuth2AuthorizationRequestResolver.class); | ||||
| 		when(authorizationRequestResolver.resolve(any())) | ||||
| 				.thenAnswer(invocation -> defaultAuthorizationRequestResolver.resolve(invocation.getArgument(0))); | ||||
| 		given(authorizationRequestResolver.resolve(any())) | ||||
| 				.willAnswer(invocation -> defaultAuthorizationRequestResolver.resolve(invocation.getArgument(0))); | ||||
| 
 | ||||
| 		this.spring.register(OAuth2ClientConfig.class).autowire(); | ||||
| 
 | ||||
|  | ||||
| @ -90,8 +90,8 @@ import org.springframework.web.context.support.AnnotationConfigWebApplicationCon | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.oauth2.core.oidc.TestOidcIdTokens.idToken; | ||||
| import static org.springframework.security.oauth2.jwt.TestJwts.jwt; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.authentication; | ||||
| @ -325,7 +325,7 @@ public class OAuth2LoginConfigurerTests { | ||||
| 				.authorizationRequestUri( | ||||
| 						"https://accounts.google.com/o/oauth2/v2/auth?response_type=code&client_id=clientId&scope=openid+profile+email&state=state&redirect_uri=http%3A%2F%2Flocalhost%2Flogin%2Foauth2%2Fcode%2Fgoogle&custom-param1=custom-value1") | ||||
| 				.build(); | ||||
| 		when(resolver.resolve(any())).thenReturn(result); | ||||
| 		given(resolver.resolve(any())).willReturn(result); | ||||
| 
 | ||||
| 		String requestUri = "/oauth2/authorization/google"; | ||||
| 		this.request = new MockHttpServletRequest("GET", requestUri); | ||||
| @ -348,7 +348,7 @@ public class OAuth2LoginConfigurerTests { | ||||
| 				.authorizationRequestUri( | ||||
| 						"https://accounts.google.com/o/oauth2/v2/auth?response_type=code&client_id=clientId&scope=openid+profile+email&state=state&redirect_uri=http%3A%2F%2Flocalhost%2Flogin%2Foauth2%2Fcode%2Fgoogle&custom-param1=custom-value1") | ||||
| 				.build(); | ||||
| 		when(resolver.resolve(any())).thenReturn(result); | ||||
| 		given(resolver.resolve(any())).willReturn(result); | ||||
| 
 | ||||
| 		String requestUri = "/oauth2/authorization/google"; | ||||
| 		this.request = new MockHttpServletRequest("GET", requestUri); | ||||
| @ -995,7 +995,7 @@ public class OAuth2LoginConfigurerTests { | ||||
| 			claims.put(IdTokenClaimNames.AZP, "clientId"); | ||||
| 			Jwt jwt = jwt().claims(c -> c.putAll(claims)).build(); | ||||
| 			JwtDecoder jwtDecoder = mock(JwtDecoder.class); | ||||
| 			when(jwtDecoder.decode(any())).thenReturn(jwt); | ||||
| 			given(jwtDecoder.decode(any())).willReturn(jwt); | ||||
| 			return jwtDecoder; | ||||
| 		} | ||||
| 
 | ||||
|  | ||||
| @ -135,10 +135,10 @@ import static org.hamcrest.core.StringStartsWith.startsWith; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.oauth2.core.TestOAuth2AccessTokens.noScopes; | ||||
| import static org.springframework.security.oauth2.jwt.JwtClaimNames.ISS; | ||||
| @ -590,7 +590,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 				.autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string(JWT_SUBJECT)); | ||||
| @ -608,7 +608,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 				.autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string(JWT_SUBJECT)); | ||||
| @ -625,7 +625,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 				.autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform( | ||||
| 				post("/authenticated").param("access_token", JWT_TOKEN).with(bearerToken(JWT_TOKEN)).with(csrf())) | ||||
| @ -642,7 +642,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 				.autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken(JWT_TOKEN)).param("access_token", JWT_TOKEN)) | ||||
| 				.andExpect(status().isBadRequest()) | ||||
| @ -707,7 +707,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		CustomJwtDecoderOnDsl config = this.spring.getContext().getBean(CustomJwtDecoderOnDsl.class); | ||||
| 		JwtDecoder decoder = config.decoder(); | ||||
| 
 | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string(JWT_SUBJECT)); | ||||
| @ -721,7 +721,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		CustomJwtDecoderInLambdaOnDsl config = this.spring.getContext().getBean(CustomJwtDecoderInLambdaOnDsl.class); | ||||
| 		JwtDecoder decoder = config.decoder(); | ||||
| 
 | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string(JWT_SUBJECT)); | ||||
| @ -734,7 +734,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 
 | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string(JWT_SUBJECT)); | ||||
| @ -769,7 +769,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		JwtDecoder decoder = mock(JwtDecoder.class); | ||||
| 
 | ||||
| 		ApplicationContext context = mock(ApplicationContext.class); | ||||
| 		when(context.getBean(JwtDecoder.class)).thenReturn(decoderBean); | ||||
| 		given(context.getBean(JwtDecoder.class)).willReturn(decoderBean); | ||||
| 
 | ||||
| 		OAuth2ResourceServerConfigurer.JwtConfigurer jwtConfigurer = new OAuth2ResourceServerConfigurer(context).jwt(); | ||||
| 		jwtConfigurer.decoder(decoder); | ||||
| @ -782,7 +782,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 
 | ||||
| 		JwtDecoder decoder = mock(JwtDecoder.class); | ||||
| 		ApplicationContext context = mock(ApplicationContext.class); | ||||
| 		when(context.getBean(JwtDecoder.class)).thenReturn(decoder); | ||||
| 		given(context.getBean(JwtDecoder.class)).willReturn(decoder); | ||||
| 
 | ||||
| 		OAuth2ResourceServerConfigurer.JwtConfigurer jwtConfigurer = new OAuth2ResourceServerConfigurer(context).jwt(); | ||||
| 
 | ||||
| @ -832,7 +832,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		this.spring.register(RealmNameConfiguredOnEntryPoint.class, JwtDecoderConfig.class).autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenThrow(JwtException.class); | ||||
| 		given(decoder.decode(anyString())).willThrow(JwtException.class); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken("invalid_token"))).andExpect(status().isUnauthorized()) | ||||
| 				.andExpect(header().string(HttpHeaders.WWW_AUTHENTICATE, startsWith("Bearer realm=\"myRealm\""))); | ||||
| @ -844,7 +844,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		this.spring.register(RealmNameConfiguredOnAccessDeniedHandler.class, JwtDecoderConfig.class).autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken("insufficiently_scoped"))) | ||||
| 				.andExpect(status().isForbidden()) | ||||
| @ -879,7 +879,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 
 | ||||
| 		OAuth2Error error = new OAuth2Error("custom-error", "custom-description", "custom-uri"); | ||||
| 
 | ||||
| 		when(jwtValidator.validate(any(Jwt.class))).thenReturn(OAuth2TokenValidatorResult.failure(error)); | ||||
| 		given(jwtValidator.validate(any(Jwt.class))).willReturn(OAuth2TokenValidatorResult.failure(error)); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").with(bearerToken(token))).andExpect(status().isUnauthorized()) | ||||
| 				.andExpect(header().string(HttpHeaders.WWW_AUTHENTICATE, containsString("custom-description"))); | ||||
| @ -918,10 +918,10 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 
 | ||||
| 		Converter<Jwt, JwtAuthenticationToken> jwtAuthenticationConverter = this.spring.getContext() | ||||
| 				.getBean(JwtAuthenticationConverterConfiguredOnDsl.class).getJwtAuthenticationConverter(); | ||||
| 		when(jwtAuthenticationConverter.convert(JWT)).thenReturn(JWT_AUTHENTICATION_TOKEN); | ||||
| 		given(jwtAuthenticationConverter.convert(JWT)).willReturn(JWT_AUTHENTICATION_TOKEN); | ||||
| 
 | ||||
| 		JwtDecoder jwtDecoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(jwtDecoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(jwtDecoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()); | ||||
| 
 | ||||
| @ -936,7 +936,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 				.autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(JWT_TOKEN)).thenReturn(JWT); | ||||
| 		given(decoder.decode(JWT_TOKEN)).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/requires-read-scope").with(bearerToken(JWT_TOKEN))).andExpect(status().isOk()); | ||||
| 	} | ||||
| @ -975,7 +975,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 	public void requestWhenUsingCustomAuthenticationEventPublisherThenUses() throws Exception { | ||||
| 		this.spring.register(CustomAuthenticationEventPublisher.class).autowire(); | ||||
| 
 | ||||
| 		when(bean(JwtDecoder.class).decode(anyString())).thenThrow(new BadJwtException("problem")); | ||||
| 		given(bean(JwtDecoder.class).decode(anyString())).willThrow(new BadJwtException("problem")); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").with(bearerToken("token"))); | ||||
| 
 | ||||
| @ -987,8 +987,8 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 	public void getWhenCustomJwtAuthenticationManagerThenUsed() throws Exception { | ||||
| 		this.spring.register(JwtAuthenticationManagerConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		when(bean(AuthenticationProvider.class).authenticate(any(Authentication.class))) | ||||
| 				.thenReturn(JWT_AUTHENTICATION_TOKEN); | ||||
| 		given(bean(AuthenticationProvider.class).authenticate(any(Authentication.class))) | ||||
| 				.willReturn(JWT_AUTHENTICATION_TOKEN); | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken("token"))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string("mock-test-subject")); | ||||
| 
 | ||||
| @ -1038,8 +1038,8 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 	public void getWhenCustomIntrospectionAuthenticationManagerThenUsed() throws Exception { | ||||
| 		this.spring.register(OpaqueTokenAuthenticationManagerConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		when(bean(AuthenticationProvider.class).authenticate(any(Authentication.class))) | ||||
| 				.thenReturn(INTROSPECTION_AUTHENTICATION_TOKEN); | ||||
| 		given(bean(AuthenticationProvider.class).authenticate(any(Authentication.class))) | ||||
| 				.willReturn(INTROSPECTION_AUTHENTICATION_TOKEN); | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken("token"))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string("mock-test-subject")); | ||||
| 
 | ||||
| @ -1050,8 +1050,8 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 	public void getWhenCustomIntrospectionAuthenticationManagerInLambdaThenUsed() throws Exception { | ||||
| 		this.spring.register(OpaqueTokenAuthenticationManagerInLambdaConfig.class, BasicController.class).autowire(); | ||||
| 
 | ||||
| 		when(bean(AuthenticationProvider.class).authenticate(any(Authentication.class))) | ||||
| 				.thenReturn(INTROSPECTION_AUTHENTICATION_TOKEN); | ||||
| 		given(bean(AuthenticationProvider.class).authenticate(any(Authentication.class))) | ||||
| 				.willReturn(INTROSPECTION_AUTHENTICATION_TOKEN); | ||||
| 		this.mvc.perform(get("/authenticated").with(bearerToken("token"))).andExpect(status().isOk()) | ||||
| 				.andExpect(content().string("mock-test-subject")); | ||||
| 
 | ||||
| @ -1111,7 +1111,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		this.spring.register(BasicAndResourceServerConfig.class, JwtDecoderConfig.class).autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenThrow(JwtException.class); | ||||
| 		given(decoder.decode(anyString())).willThrow(JwtException.class); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(httpBasic("some", "user"))).andExpect(status().isUnauthorized()) | ||||
| 				.andExpect(header().string(HttpHeaders.WWW_AUTHENTICATE, startsWith("Basic"))); | ||||
| @ -1129,7 +1129,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		this.spring.register(FormAndResourceServerConfig.class, JwtDecoderConfig.class).autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenThrow(JwtException.class); | ||||
| 		given(decoder.decode(anyString())).willThrow(JwtException.class); | ||||
| 
 | ||||
| 		MvcResult result = this.mvc.perform(get("/authenticated")).andExpect(status().isFound()) | ||||
| 				.andExpect(redirectedUrl("http://localhost/login")).andReturn(); | ||||
| @ -1150,7 +1150,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 				.autowire(); | ||||
| 
 | ||||
| 		JwtDecoder decoder = this.spring.getContext().getBean(JwtDecoder.class); | ||||
| 		when(decoder.decode(anyString())).thenReturn(JWT); | ||||
| 		given(decoder.decode(anyString())).willReturn(JWT); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authenticated").with(httpBasic("basic-user", "basic-password"))) | ||||
| 				.andExpect(status().isForbidden()).andExpect(header().doesNotExist(HttpHeaders.WWW_AUTHENTICATE)); | ||||
| @ -1380,7 +1380,7 @@ public class OAuth2ResourceServerConfigurerTests { | ||||
| 		HttpHeaders headers = new HttpHeaders(); | ||||
| 		headers.setContentType(MediaType.APPLICATION_JSON); | ||||
| 		ResponseEntity<String> entity = new ResponseEntity<>(response, headers, HttpStatus.OK); | ||||
| 		when(rest.exchange(any(RequestEntity.class), eq(String.class))).thenReturn(entity); | ||||
| 		given(rest.exchange(any(RequestEntity.class), eq(String.class))).willReturn(entity); | ||||
| 	} | ||||
| 
 | ||||
| 	private <T> T bean(Class<T> beanClass) { | ||||
|  | ||||
| @ -43,10 +43,10 @@ import org.springframework.test.web.servlet.MvcResult; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyBoolean; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.openid4java.discovery.yadis.YadisResolver.YADIS_XRDS_LOCATION; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| @ -104,10 +104,10 @@ public class OpenIDLoginConfigurerTests { | ||||
| 		OpenIdAttributesInLambdaConfig.CONSUMER_MANAGER = mock(ConsumerManager.class); | ||||
| 		AuthRequest mockAuthRequest = mock(AuthRequest.class); | ||||
| 		DiscoveryInformation mockDiscoveryInformation = mock(DiscoveryInformation.class); | ||||
| 		when(mockAuthRequest.getDestinationUrl(anyBoolean())).thenReturn("mockUrl"); | ||||
| 		when(OpenIdAttributesInLambdaConfig.CONSUMER_MANAGER.associate(any())).thenReturn(mockDiscoveryInformation); | ||||
| 		when(OpenIdAttributesInLambdaConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), | ||||
| 				any())).thenReturn(mockAuthRequest); | ||||
| 		given(mockAuthRequest.getDestinationUrl(anyBoolean())).willReturn("mockUrl"); | ||||
| 		given(OpenIdAttributesInLambdaConfig.CONSUMER_MANAGER.associate(any())).willReturn(mockDiscoveryInformation); | ||||
| 		given(OpenIdAttributesInLambdaConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), | ||||
| 				any())).willReturn(mockAuthRequest); | ||||
| 		this.spring.register(OpenIdAttributesInLambdaConfig.class).autowire(); | ||||
| 
 | ||||
| 		try (MockWebServer server = new MockWebServer()) { | ||||
| @ -142,10 +142,10 @@ public class OpenIDLoginConfigurerTests { | ||||
| 		OpenIdAttributesNullNameConfig.CONSUMER_MANAGER = mock(ConsumerManager.class); | ||||
| 		AuthRequest mockAuthRequest = mock(AuthRequest.class); | ||||
| 		DiscoveryInformation mockDiscoveryInformation = mock(DiscoveryInformation.class); | ||||
| 		when(mockAuthRequest.getDestinationUrl(anyBoolean())).thenReturn("mockUrl"); | ||||
| 		when(OpenIdAttributesNullNameConfig.CONSUMER_MANAGER.associate(any())).thenReturn(mockDiscoveryInformation); | ||||
| 		when(OpenIdAttributesNullNameConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), | ||||
| 				any())).thenReturn(mockAuthRequest); | ||||
| 		given(mockAuthRequest.getDestinationUrl(anyBoolean())).willReturn("mockUrl"); | ||||
| 		given(OpenIdAttributesNullNameConfig.CONSUMER_MANAGER.associate(any())).willReturn(mockDiscoveryInformation); | ||||
| 		given(OpenIdAttributesNullNameConfig.CONSUMER_MANAGER.authenticate(any(DiscoveryInformation.class), any(), | ||||
| 				any())).willReturn(mockAuthRequest); | ||||
| 		this.spring.register(OpenIdAttributesNullNameConfig.class).autowire(); | ||||
| 
 | ||||
| 		try (MockWebServer server = new MockWebServer()) { | ||||
|  | ||||
| @ -85,9 +85,9 @@ import static java.nio.charset.StandardCharsets.UTF_8; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.security.saml2.core.TestSaml2X509Credentials.relyingPartyVerifyingCredential; | ||||
| import static org.springframework.security.saml2.provider.service.authentication.TestSaml2AuthenticationRequestContexts.authenticationRequestContext; | ||||
| @ -173,7 +173,7 @@ public class Saml2LoginConfigurerTests { | ||||
| 
 | ||||
| 		Saml2AuthenticationRequestContext context = authenticationRequestContext().build(); | ||||
| 		Saml2AuthenticationRequestContextResolver resolver = CustomAuthenticationRequestContextResolver.resolver; | ||||
| 		when(resolver.resolve(any(HttpServletRequest.class))).thenReturn(context); | ||||
| 		given(resolver.resolve(any(HttpServletRequest.class))).willReturn(context); | ||||
| 		this.mvc.perform(get("/saml2/authenticate/registration-id")).andExpect(status().isFound()); | ||||
| 		verify(resolver).resolve(any(HttpServletRequest.class)); | ||||
| 	} | ||||
| @ -198,8 +198,8 @@ public class Saml2LoginConfigurerTests { | ||||
| 						party -> party.verificationX509Credentials(c -> c.add(relyingPartyVerifyingCredential()))) | ||||
| 				.build(); | ||||
| 		String response = new String(samlDecode(SIGNED_RESPONSE)); | ||||
| 		when(CustomAuthenticationConverter.authenticationConverter.convert(any(HttpServletRequest.class))) | ||||
| 				.thenReturn(new Saml2AuthenticationToken(relyingPartyRegistration, response)); | ||||
| 		given(CustomAuthenticationConverter.authenticationConverter.convert(any(HttpServletRequest.class))) | ||||
| 				.willReturn(new Saml2AuthenticationToken(relyingPartyRegistration, response)); | ||||
| 		this.mvc.perform(post("/login/saml2/sso/" + relyingPartyRegistration.getRegistrationId()).param("SAMLResponse", | ||||
| 				SIGNED_RESPONSE)).andExpect(redirectedUrl("/")); | ||||
| 		verify(CustomAuthenticationConverter.authenticationConverter).convert(any(HttpServletRequest.class)); | ||||
| @ -387,7 +387,7 @@ public class Saml2LoginConfigurerTests { | ||||
| 		@Bean | ||||
| 		RelyingPartyRegistrationRepository relyingPartyRegistrationRepository() { | ||||
| 			RelyingPartyRegistrationRepository repository = mock(RelyingPartyRegistrationRepository.class); | ||||
| 			when(repository.findByRegistrationId(anyString())).thenReturn(relyingPartyRegistration().build()); | ||||
| 			given(repository.findByRegistrationId(anyString())).willReturn(relyingPartyRegistration().build()); | ||||
| 			return repository; | ||||
| 		} | ||||
| 
 | ||||
|  | ||||
| @ -33,7 +33,7 @@ import org.springframework.security.messaging.util.matcher.MessageMatcher; | ||||
| import org.springframework.util.AntPathMatcher; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class MessageSecurityMetadataSourceRegistryTests { | ||||
| @ -100,7 +100,7 @@ public class MessageSecurityMetadataSourceRegistryTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchersTrue() { | ||||
| 		when(this.matcher.matches(this.message)).thenReturn(true); | ||||
| 		given(this.matcher.matches(this.message)).willReturn(true); | ||||
| 		this.messages.matchers(this.matcher).permitAll(); | ||||
| 
 | ||||
| 		assertThat(getAttribute()).isEqualTo("permitAll"); | ||||
|  | ||||
| @ -38,9 +38,9 @@ import org.springframework.test.context.ContextConfiguration; | ||||
| import org.springframework.test.context.junit4.SpringJUnit4ClassRunner; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -68,7 +68,7 @@ public class AuthenticationConfigurationGh3935Tests { | ||||
| 	public void delegateUsesExisitingAuthentication() { | ||||
| 		String username = "user"; | ||||
| 		String password = "password"; | ||||
| 		when(this.uds.loadUserByUsername(username)).thenReturn(PasswordEncodedUser.user()); | ||||
| 		given(this.uds.loadUserByUsername(username)).willReturn(PasswordEncodedUser.user()); | ||||
| 
 | ||||
| 		AuthenticationManager authenticationManager = this.adapter.authenticationManager; | ||||
| 		assertThat(authenticationManager).isNotNull(); | ||||
|  | ||||
| @ -55,7 +55,7 @@ import org.springframework.web.servlet.support.RequestDataValueProcessor; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.security.test.web.servlet.setup.SecurityMockMvcConfigurers.springSecurity; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.delete; | ||||
| @ -318,11 +318,11 @@ public class CsrfConfigTests { | ||||
| 		context.autowire(); | ||||
| 
 | ||||
| 		RequestMatcher matcher = context.getContext().getBean(RequestMatcher.class); | ||||
| 		when(matcher.matches(any(HttpServletRequest.class))).thenReturn(false); | ||||
| 		given(matcher.matches(any(HttpServletRequest.class))).willReturn(false); | ||||
| 
 | ||||
| 		this.mvc.perform(post("/ok")).andExpect(status().isOk()); | ||||
| 
 | ||||
| 		when(matcher.matches(any(HttpServletRequest.class))).thenReturn(true); | ||||
| 		given(matcher.matches(any(HttpServletRequest.class))).willReturn(true); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/ok")).andExpect(status().isForbidden()); | ||||
| 	} | ||||
|  | ||||
| @ -40,7 +40,7 @@ import org.springframework.test.util.ReflectionTestUtils; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyObject; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| 
 | ||||
| @ -86,7 +86,7 @@ public class DefaultFilterChainValidatorTests { | ||||
| 	@Test | ||||
| 	public void validateCheckLoginPageIsntProtectedThrowsIllegalArgumentException() { | ||||
| 		IllegalArgumentException toBeThrown = new IllegalArgumentException("failed to eval expression"); | ||||
| 		doThrow(toBeThrown).when(this.accessDecisionManager).decide(any(Authentication.class), anyObject(), | ||||
| 		willThrow(toBeThrown).given(this.accessDecisionManager).decide(any(Authentication.class), anyObject(), | ||||
| 				any(Collection.class)); | ||||
| 		this.validator.validate(this.fcp); | ||||
| 		verify(this.logger).info( | ||||
|  | ||||
| @ -35,9 +35,9 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| import org.springframework.web.context.ConfigurableWebApplicationContext; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.httpBasic; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.patch; | ||||
| @ -212,10 +212,10 @@ public class InterceptUrlConfigTests { | ||||
| 	private MockServletContext mockServletContext(String servletPath) { | ||||
| 		MockServletContext servletContext = spy(new MockServletContext()); | ||||
| 		final ServletRegistration registration = mock(ServletRegistration.class); | ||||
| 		when(registration.getMappings()).thenReturn(Collections.singleton(servletPath)); | ||||
| 		given(registration.getMappings()).willReturn(Collections.singleton(servletPath)); | ||||
| 		Answer<Map<String, ? extends ServletRegistration>> answer = invocation -> Collections.singletonMap("spring", | ||||
| 				registration); | ||||
| 		when(servletContext.getServletRegistrations()).thenAnswer(answer); | ||||
| 		given(servletContext.getServletRegistrations()).willAnswer(answer); | ||||
| 		return servletContext; | ||||
| 	} | ||||
| 
 | ||||
|  | ||||
| @ -112,11 +112,11 @@ import org.springframework.web.context.support.XmlWebApplicationContext; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willAnswer; | ||||
| import static org.mockito.Mockito.atLeastOnce; | ||||
| import static org.mockito.Mockito.doAnswer; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.httpBasic; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.x509; | ||||
| @ -451,7 +451,7 @@ public class MiscHttpConfigTests { | ||||
| 
 | ||||
| 		SecurityContextRepository repository = this.spring.getContext().getBean(SecurityContextRepository.class); | ||||
| 		SecurityContext context = new SecurityContextImpl(new TestingAuthenticationToken("user", "password")); | ||||
| 		when(repository.loadContext(any(HttpRequestResponseHolder.class))).thenReturn(context); | ||||
| 		given(repository.loadContext(any(HttpRequestResponseHolder.class))).willReturn(context); | ||||
| 
 | ||||
| 		MvcResult result = this.mvc.perform(get("/protected").with(httpBasic("user", "password"))) | ||||
| 				.andExpect(status().isOk()).andReturn(); | ||||
| @ -479,8 +479,8 @@ public class MiscHttpConfigTests { | ||||
| 		this.spring.configLocations(xml("ExpressionHandler")).autowire(); | ||||
| 
 | ||||
| 		PermissionEvaluator permissionEvaluator = this.spring.getContext().getBean(PermissionEvaluator.class); | ||||
| 		when(permissionEvaluator.hasPermission(any(Authentication.class), any(Object.class), any(Object.class))) | ||||
| 				.thenReturn(false); | ||||
| 		given(permissionEvaluator.hasPermission(any(Authentication.class), any(Object.class), any(Object.class))) | ||||
| 				.willReturn(false); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/").with(httpBasic("user", "password"))).andExpect(status().isForbidden()); | ||||
| 
 | ||||
| @ -585,7 +585,7 @@ public class MiscHttpConfigTests { | ||||
| 		this.spring.configLocations(xml("JeeFilter")).autowire(); | ||||
| 
 | ||||
| 		Principal user = mock(Principal.class); | ||||
| 		when(user.getName()).thenReturn("joe"); | ||||
| 		given(user.getName()).willReturn("joe"); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/roles").principal(user).with(request -> { | ||||
| 			request.addUserRole("admin"); | ||||
| @ -603,7 +603,7 @@ public class MiscHttpConfigTests { | ||||
| 
 | ||||
| 		Object details = mock(Object.class); | ||||
| 		AuthenticationDetailsSource source = this.spring.getContext().getBean(AuthenticationDetailsSource.class); | ||||
| 		when(source.buildDetails(any(Object.class))).thenReturn(details); | ||||
| 		given(source.buildDetails(any(Object.class))).willReturn(details); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/details").with(httpBasic("user", "password"))) | ||||
| 				.andExpect(content().string(details.getClass().getName())); | ||||
| @ -627,7 +627,7 @@ public class MiscHttpConfigTests { | ||||
| 		this.spring.configLocations(xml("Jaas")).autowire(); | ||||
| 
 | ||||
| 		AuthorityGranter granter = this.spring.getContext().getBean(AuthorityGranter.class); | ||||
| 		when(granter.grant(any(Principal.class))).thenReturn(new HashSet<>(Arrays.asList("USER"))); | ||||
| 		given(granter.grant(any(Principal.class))).willReturn(new HashSet<>(Arrays.asList("USER"))); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/username").with(httpBasic("user", "password"))).andExpect(content().string("user")); | ||||
| 	} | ||||
| @ -644,8 +644,8 @@ public class MiscHttpConfigTests { | ||||
| 		HttpServletResponse response = new MockHttpServletResponse(); | ||||
| 
 | ||||
| 		HttpFirewall firewall = this.spring.getContext().getBean(HttpFirewall.class); | ||||
| 		when(firewall.getFirewalledRequest(any(HttpServletRequest.class))).thenReturn(request); | ||||
| 		when(firewall.getFirewalledResponse(any(HttpServletResponse.class))).thenReturn(response); | ||||
| 		given(firewall.getFirewalledRequest(any(HttpServletRequest.class))).willReturn(request); | ||||
| 		given(firewall.getFirewalledResponse(any(HttpServletResponse.class))).willReturn(response); | ||||
| 		this.mvc.perform(get("/unprotected")); | ||||
| 
 | ||||
| 		verify(firewall).getFirewalledRequest(any(HttpServletRequest.class)); | ||||
| @ -661,7 +661,7 @@ public class MiscHttpConfigTests { | ||||
| 		RequestRejectedException rejected = new RequestRejectedException("failed"); | ||||
| 		HttpFirewall firewall = this.spring.getContext().getBean(HttpFirewall.class); | ||||
| 		RequestRejectedHandler requestRejectedHandler = this.spring.getContext().getBean(RequestRejectedHandler.class); | ||||
| 		when(firewall.getFirewalledRequest(any(HttpServletRequest.class))).thenThrow(rejected); | ||||
| 		given(firewall.getFirewalledRequest(any(HttpServletRequest.class))).willThrow(rejected); | ||||
| 		this.mvc.perform(get("/unprotected")); | ||||
| 
 | ||||
| 		verify(requestRejectedHandler).handle(any(), any(), any()); | ||||
| @ -697,8 +697,8 @@ public class MiscHttpConfigTests { | ||||
| 	private void redirectLogsTo(OutputStream os, Class<?> clazz) { | ||||
| 		Logger logger = (Logger) LoggerFactory.getLogger(clazz); | ||||
| 		Appender<ILoggingEvent> appender = mock(Appender.class); | ||||
| 		when(appender.isStarted()).thenReturn(true); | ||||
| 		doAnswer(writeTo(os)).when(appender).doAppend(any(ILoggingEvent.class)); | ||||
| 		given(appender.isStarted()).willReturn(true); | ||||
| 		willAnswer(writeTo(os)).given(appender).doAppend(any(ILoggingEvent.class)); | ||||
| 		logger.addAppender(appender); | ||||
| 	} | ||||
| 
 | ||||
|  | ||||
| @ -53,8 +53,8 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.oauth2.core.endpoint.TestOAuth2AccessTokenResponses.accessTokenResponse; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content; | ||||
| @ -114,7 +114,7 @@ public class OAuth2ClientBeanDefinitionParserTests { | ||||
| 		ClientRegistration clientRegistration = CommonOAuth2Provider.GOOGLE.getBuilder("google") | ||||
| 				.clientId("google-client-id").clientSecret("google-client-secret") | ||||
| 				.redirectUri("http://localhost/callback/google").scope("scope1", "scope2").build(); | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(any())).thenReturn(clientRegistration); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(any())).willReturn(clientRegistration); | ||||
| 
 | ||||
| 		MvcResult result = this.mvc.perform(get("/oauth2/authorization/google")).andExpect(status().is3xxRedirection()) | ||||
| 				.andReturn(); | ||||
| @ -132,7 +132,7 @@ public class OAuth2ClientBeanDefinitionParserTests { | ||||
| 		ClientRegistration clientRegistration = this.clientRegistrationRepository.findByRegistrationId("google"); | ||||
| 
 | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = createAuthorizationRequest(clientRegistration); | ||||
| 		when(this.authorizationRequestResolver.resolve(any())).thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestResolver.resolve(any())).willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/oauth2/authorization/google")).andExpect(status().is3xxRedirection()) | ||||
| 				.andExpect(redirectedUrl("https://accounts.google.com/o/oauth2/v2/auth?" | ||||
| @ -149,12 +149,12 @@ public class OAuth2ClientBeanDefinitionParserTests { | ||||
| 		ClientRegistration clientRegistration = this.clientRegistrationRepository.findByRegistrationId("google"); | ||||
| 
 | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = createAuthorizationRequest(clientRegistration); | ||||
| 		when(this.authorizationRequestRepository.loadAuthorizationRequest(any())).thenReturn(authorizationRequest); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.loadAuthorizationRequest(any())).willReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -179,12 +179,12 @@ public class OAuth2ClientBeanDefinitionParserTests { | ||||
| 		ClientRegistration clientRegistration = this.clientRegistrationRepository.findByRegistrationId("google"); | ||||
| 
 | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = createAuthorizationRequest(clientRegistration); | ||||
| 		when(this.authorizationRequestRepository.loadAuthorizationRequest(any())).thenReturn(authorizationRequest); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.loadAuthorizationRequest(any())).willReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -204,7 +204,7 @@ public class OAuth2ClientBeanDefinitionParserTests { | ||||
| 
 | ||||
| 		OAuth2AuthorizedClient authorizedClient = new OAuth2AuthorizedClient(clientRegistration, "user", | ||||
| 				TestOAuth2AccessTokens.noScopes()); | ||||
| 		when(this.authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).thenReturn(authorizedClient); | ||||
| 		given(this.authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).willReturn(authorizedClient); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authorized-client")).andExpect(status().isOk()).andExpect(content().string("resolved")); | ||||
| 	} | ||||
|  | ||||
| @ -75,9 +75,9 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.oauth2.core.endpoint.TestOAuth2AccessTokenResponses.accessTokenResponse; | ||||
| import static org.springframework.security.oauth2.core.endpoint.TestOAuth2AccessTokenResponses.oidcAccessTokenResponse; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| @ -211,14 +211,14 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, "github-login"); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -240,14 +240,14 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, "github-login"); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -266,14 +266,14 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, "google-login"); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.oidcRequest() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = oidcAccessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		Jwt jwt = TestJwts.user(); | ||||
| 		when(this.jwtDecoderFactory.createDecoder(any())).thenReturn(token -> jwt); | ||||
| 		given(this.jwtDecoderFactory.createDecoder(any())).willReturn(token -> jwt); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -294,17 +294,17 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, "github-login"); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		when(this.userAuthoritiesMapper.mapAuthorities(any())) | ||||
| 				.thenReturn((Collection) AuthorityUtils.createAuthorityList("ROLE_OAUTH2_USER")); | ||||
| 		given(this.userAuthoritiesMapper.mapAuthorities(any())) | ||||
| 				.willReturn((Collection) AuthorityUtils.createAuthorityList("ROLE_OAUTH2_USER")); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -323,17 +323,17 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		attributes = new HashMap<>(); | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, "google-login"); | ||||
| 		authorizationRequest = TestOAuth2AuthorizationRequests.oidcRequest().attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		accessTokenResponse = oidcAccessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		Jwt jwt = TestJwts.user(); | ||||
| 		when(this.jwtDecoderFactory.createDecoder(any())).thenReturn(token -> jwt); | ||||
| 		given(this.jwtDecoderFactory.createDecoder(any())).willReturn(token -> jwt); | ||||
| 
 | ||||
| 		when(this.userAuthoritiesMapper.mapAuthorities(any())) | ||||
| 				.thenReturn((Collection) AuthorityUtils.createAuthorityList("ROLE_OIDC_USER")); | ||||
| 		given(this.userAuthoritiesMapper.mapAuthorities(any())) | ||||
| 				.willReturn((Collection) AuthorityUtils.createAuthorityList("ROLE_OIDC_USER")); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/login/oauth2/code/google-login").params(params)).andExpect(status().is2xxSuccessful()); | ||||
| 
 | ||||
| @ -356,14 +356,14 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, "github-login"); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -419,20 +419,20 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		this.spring.configLocations(this.xml("WithCustomClientRegistrationRepository")).autowire(); | ||||
| 
 | ||||
| 		ClientRegistration clientRegistration = TestClientRegistrations.clientRegistration().build(); | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(any())).thenReturn(clientRegistration); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(any())).willReturn(clientRegistration); | ||||
| 
 | ||||
| 		Map<String, Object> attributes = new HashMap<>(); | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, clientRegistration.getRegistrationId()); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -447,20 +447,20 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		this.spring.configLocations(this.xml("WithCustomAuthorizedClientRepository")).autowire(); | ||||
| 
 | ||||
| 		ClientRegistration clientRegistration = TestClientRegistrations.clientRegistration().build(); | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(any())).thenReturn(clientRegistration); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(any())).willReturn(clientRegistration); | ||||
| 
 | ||||
| 		Map<String, Object> attributes = new HashMap<>(); | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, clientRegistration.getRegistrationId()); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -475,20 +475,20 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 		this.spring.configLocations(this.xml("WithCustomAuthorizedClientService")).autowire(); | ||||
| 
 | ||||
| 		ClientRegistration clientRegistration = TestClientRegistrations.clientRegistration().build(); | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(any())).thenReturn(clientRegistration); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(any())).willReturn(clientRegistration); | ||||
| 
 | ||||
| 		Map<String, Object> attributes = new HashMap<>(); | ||||
| 		attributes.put(OAuth2ParameterNames.REGISTRATION_ID, clientRegistration.getRegistrationId()); | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request() | ||||
| 				.attributes(attributes).build(); | ||||
| 		when(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.thenReturn(authorizationRequest); | ||||
| 		given(this.authorizationRequestRepository.removeAuthorizationRequest(any(), any())) | ||||
| 				.willReturn(authorizationRequest); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2User oauth2User = TestOAuth2Users.create(); | ||||
| 		when(this.oauth2UserService.loadUser(any())).thenReturn(oauth2User); | ||||
| 		given(this.oauth2UserService.loadUser(any())).willReturn(oauth2User); | ||||
| 
 | ||||
| 		MultiValueMap<String, String> params = new LinkedMultiValueMap<>(); | ||||
| 		params.add("code", "code123"); | ||||
| @ -507,7 +507,7 @@ public class OAuth2LoginBeanDefinitionParserTests { | ||||
| 
 | ||||
| 		OAuth2AuthorizedClient authorizedClient = new OAuth2AuthorizedClient(clientRegistration, "user", | ||||
| 				TestOAuth2AccessTokens.noScopes()); | ||||
| 		when(this.authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).thenReturn(authorizedClient); | ||||
| 		given(this.authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).willReturn(authorizedClient); | ||||
| 
 | ||||
| 		this.mvc.perform(get("/authorized-client")).andExpect(status().isOk()).andExpect(content().string("resolved")); | ||||
| 	} | ||||
|  | ||||
| @ -46,8 +46,8 @@ import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.hamcrest.CoreMatchers.containsString; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.openid4java.discovery.yadis.YadisResolver.YADIS_XRDS_LOCATION; | ||||
| import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; | ||||
| import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content; | ||||
| @ -116,8 +116,8 @@ public class OpenIDConfigTests { | ||||
| 		openIDFilter.setReturnToUrlParameters(returnToUrlParameters); | ||||
| 
 | ||||
| 		OpenIDConsumer consumer = mock(OpenIDConsumer.class); | ||||
| 		when(consumer.beginConsumption(any(HttpServletRequest.class), anyString(), anyString(), anyString())) | ||||
| 				.then(invocation -> openIdEndpointUrl + invocation.getArgument(2)); | ||||
| 		given(consumer.beginConsumption(any(HttpServletRequest.class), anyString(), anyString(), anyString())) | ||||
| 				.will(invocation -> openIdEndpointUrl + invocation.getArgument(2)); | ||||
| 		openIDFilter.setConsumer(consumer); | ||||
| 
 | ||||
| 		String expectedReturnTo = new StringBuilder("http://localhost/login/openid").append("?") | ||||
|  | ||||
| @ -39,9 +39,9 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.atLeastOnce; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; | ||||
| import static org.springframework.security.web.authentication.rememberme.AbstractRememberMeServices.DEFAULT_PARAMETER; | ||||
| import static org.springframework.security.web.authentication.rememberme.AbstractRememberMeServices.SPRING_SECURITY_REMEMBER_ME_COOKIE_KEY; | ||||
| @ -228,8 +228,8 @@ public class RememberMeConfigTests { | ||||
| 		this.spring.configLocations(this.xml("WithUserDetailsService")).autowire(); | ||||
| 
 | ||||
| 		UserDetailsService userDetailsService = this.spring.getContext().getBean(UserDetailsService.class); | ||||
| 		when(userDetailsService.loadUserByUsername("user")) | ||||
| 				.thenAnswer((invocation) -> new User("user", "{noop}password", Collections.emptyList())); | ||||
| 		given(userDetailsService.loadUserByUsername("user")) | ||||
| 				.willAnswer((invocation) -> new User("user", "{noop}password", Collections.emptyList())); | ||||
| 
 | ||||
| 		MvcResult result = this.rememberAuthentication("user", "password").andReturn(); | ||||
| 
 | ||||
|  | ||||
| @ -39,7 +39,7 @@ import org.springframework.web.cors.reactive.CorsConfigurationSource; | ||||
| 
 | ||||
| import static org.assertj.core.api.AssertionsForInterfaceTypes.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -65,7 +65,7 @@ public class CorsSpecTests { | ||||
| 		this.http = new TestingServerHttpSecurity().applicationContext(this.context); | ||||
| 		CorsConfiguration value = new CorsConfiguration(); | ||||
| 		value.setAllowedOrigins(Arrays.asList("*")); | ||||
| 		when(this.source.getCorsConfiguration(any())).thenReturn(value); | ||||
| 		given(this.source.getCorsConfiguration(any())).willReturn(value); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| @ -86,9 +86,9 @@ public class CorsSpecTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void corsWhenCorsConfigurationSourceBeanThenAccessControlAllowOriginAndSecurityHeaders() { | ||||
| 		when(this.context.getBeanNamesForType(any(ResolvableType.class))).thenReturn(new String[] { "source" }, | ||||
| 		given(this.context.getBeanNamesForType(any(ResolvableType.class))).willReturn(new String[] { "source" }, | ||||
| 				new String[0]); | ||||
| 		when(this.context.getBean("source")).thenReturn(this.source); | ||||
| 		given(this.context.getBean("source")).willReturn(this.source); | ||||
| 		this.expectedHeaders.set("Access-Control-Allow-Origin", "*"); | ||||
| 		this.expectedHeaders.set("X-Frame-Options", "DENY"); | ||||
| 		assertHeaders(); | ||||
| @ -96,7 +96,7 @@ public class CorsSpecTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void corsWhenNoConfigurationSourceThenNoCorsHeaders() { | ||||
| 		when(this.context.getBeanNamesForType(any(ResolvableType.class))).thenReturn(new String[0]); | ||||
| 		given(this.context.getBeanNamesForType(any(ResolvableType.class))).willReturn(new String[0]); | ||||
| 		this.headerNamesNotPresent.add("Access-Control-Allow-Origin"); | ||||
| 		assertHeaders(); | ||||
| 	} | ||||
|  | ||||
| @ -31,8 +31,8 @@ import org.springframework.security.web.server.util.matcher.PathPatternParserSer | ||||
| import org.springframework.test.web.reactive.server.WebTestClient; | ||||
| import org.springframework.web.reactive.config.EnableWebFlux; | ||||
| 
 | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| 
 | ||||
| /** | ||||
| @ -100,7 +100,7 @@ public class HttpsRedirectSpecTests { | ||||
| 		this.spring.register(RedirectToHttpsViaCustomPortsConfig.class).autowire(); | ||||
| 
 | ||||
| 		PortMapper portMapper = this.spring.getContext().getBean(PortMapper.class); | ||||
| 		when(portMapper.lookupHttpsPort(4080)).thenReturn(4443); | ||||
| 		given(portMapper.lookupHttpsPort(4080)).willReturn(4443); | ||||
| 
 | ||||
| 		this.client.get().uri("http://localhost:4080").exchange().expectStatus().isFound().expectHeader() | ||||
| 				.valueEquals(HttpHeaders.LOCATION, "https://localhost:4443"); | ||||
| @ -111,7 +111,7 @@ public class HttpsRedirectSpecTests { | ||||
| 		this.spring.register(RedirectToHttpsViaCustomPortsInLambdaConfig.class).autowire(); | ||||
| 
 | ||||
| 		PortMapper portMapper = this.spring.getContext().getBean(PortMapper.class); | ||||
| 		when(portMapper.lookupHttpsPort(4080)).thenReturn(4443); | ||||
| 		given(portMapper.lookupHttpsPort(4080)).willReturn(4443); | ||||
| 
 | ||||
| 		this.client.get().uri("http://localhost:4080").exchange().expectStatus().isFound().expectHeader() | ||||
| 				.valueEquals(HttpHeaders.LOCATION, "https://localhost:4443"); | ||||
|  | ||||
| @ -60,9 +60,9 @@ import org.springframework.web.bind.annotation.RestController; | ||||
| import org.springframework.web.reactive.config.EnableWebFlux; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -93,9 +93,9 @@ public class OAuth2ClientSpecTests { | ||||
| 				.getBean(ReactiveClientRegistrationRepository.class); | ||||
| 		ServerOAuth2AuthorizedClientRepository authorizedClientRepository = this.spring.getContext() | ||||
| 				.getBean(ServerOAuth2AuthorizedClientRepository.class); | ||||
| 		when(repository.findByRegistrationId(any())) | ||||
| 				.thenReturn(Mono.just(TestClientRegistrations.clientRegistration().build())); | ||||
| 		when(authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(repository.findByRegistrationId(any())) | ||||
| 				.willReturn(Mono.just(TestClientRegistrations.clientRegistration().build())); | ||||
| 		given(authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		this.client.get().uri("/").exchange().expectStatus().is3xxRedirection(); | ||||
| 	} | ||||
| @ -107,9 +107,9 @@ public class OAuth2ClientSpecTests { | ||||
| 				.getBean(ReactiveClientRegistrationRepository.class); | ||||
| 		ServerOAuth2AuthorizedClientRepository authorizedClientRepository = this.spring.getContext() | ||||
| 				.getBean(ServerOAuth2AuthorizedClientRepository.class); | ||||
| 		when(repository.findByRegistrationId(any())) | ||||
| 				.thenReturn(Mono.just(TestClientRegistrations.clientRegistration().build())); | ||||
| 		when(authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(repository.findByRegistrationId(any())) | ||||
| 				.willReturn(Mono.just(TestClientRegistrations.clientRegistration().build())); | ||||
| 		given(authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		this.client.get().uri("/").exchange().expectStatus().is3xxRedirection(); | ||||
| 	} | ||||
| @ -137,11 +137,11 @@ public class OAuth2ClientSpecTests { | ||||
| 		OAuth2AuthorizationCodeAuthenticationToken result = new OAuth2AuthorizationCodeAuthenticationToken( | ||||
| 				this.registration, authorizationExchange, accessToken); | ||||
| 
 | ||||
| 		when(authorizationRequestRepository.loadAuthorizationRequest(any())) | ||||
| 				.thenReturn(Mono.just(authorizationRequest)); | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		when(manager.authenticate(any())).thenReturn(Mono.just(result)); | ||||
| 		when(requestCache.getRedirectUri(any())).thenReturn(Mono.just(URI.create("/saved-request"))); | ||||
| 		given(authorizationRequestRepository.loadAuthorizationRequest(any())) | ||||
| 				.willReturn(Mono.just(authorizationRequest)); | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		given(manager.authenticate(any())).willReturn(Mono.just(result)); | ||||
| 		given(requestCache.getRedirectUri(any())).willReturn(Mono.just(URI.create("/saved-request"))); | ||||
| 
 | ||||
| 		this.client.get() | ||||
| 				.uri(uriBuilder -> uriBuilder.path("/authorize/oauth2/code/registration-id") | ||||
| @ -178,11 +178,11 @@ public class OAuth2ClientSpecTests { | ||||
| 		OAuth2AuthorizationCodeAuthenticationToken result = new OAuth2AuthorizationCodeAuthenticationToken( | ||||
| 				this.registration, authorizationExchange, accessToken); | ||||
| 
 | ||||
| 		when(authorizationRequestRepository.loadAuthorizationRequest(any())) | ||||
| 				.thenReturn(Mono.just(authorizationRequest)); | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		when(manager.authenticate(any())).thenReturn(Mono.just(result)); | ||||
| 		when(requestCache.getRedirectUri(any())).thenReturn(Mono.just(URI.create("/saved-request"))); | ||||
| 		given(authorizationRequestRepository.loadAuthorizationRequest(any())) | ||||
| 				.willReturn(Mono.just(authorizationRequest)); | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		given(manager.authenticate(any())).willReturn(Mono.just(result)); | ||||
| 		given(requestCache.getRedirectUri(any())).willReturn(Mono.just(URI.create("/saved-request"))); | ||||
| 
 | ||||
| 		this.client.get() | ||||
| 				.uri(uriBuilder -> uriBuilder.path("/authorize/oauth2/code/registration-id") | ||||
|  | ||||
| @ -104,10 +104,10 @@ import org.springframework.web.server.WebHandler; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.oauth2.jwt.TestJwts.jwt; | ||||
| 
 | ||||
| /** | ||||
| @ -186,10 +186,10 @@ public class OAuth2LoginTests { | ||||
| 		ServerAuthorizationRequestRepository<OAuth2AuthorizationRequest> authorizationRequestRepository = config.authorizationRequestRepository; | ||||
| 		ServerRequestCache requestCache = config.requestCache; | ||||
| 
 | ||||
| 		when(authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).thenReturn(Mono.empty()); | ||||
| 		when(authorizationRequestRepository.saveAuthorizationRequest(any(), any())).thenReturn(Mono.empty()); | ||||
| 		when(requestCache.removeMatchingRequest(any())).thenReturn(Mono.empty()); | ||||
| 		when(requestCache.saveRequest(any())).thenReturn(Mono.empty()); | ||||
| 		given(authorizedClientRepository.loadAuthorizedClient(any(), any(), any())).willReturn(Mono.empty()); | ||||
| 		given(authorizationRequestRepository.saveAuthorizationRequest(any(), any())).willReturn(Mono.empty()); | ||||
| 		given(requestCache.removeMatchingRequest(any())).willReturn(Mono.empty()); | ||||
| 		given(requestCache.saveRequest(any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		this.client.get().uri("/").exchange().expectStatus().is3xxRedirection(); | ||||
| 
 | ||||
| @ -222,11 +222,11 @@ public class OAuth2LoginTests { | ||||
| 		OAuth2LoginAuthenticationToken result = new OAuth2LoginAuthenticationToken(github, exchange, user, | ||||
| 				user.getAuthorities(), accessToken); | ||||
| 
 | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		when(manager.authenticate(any())).thenReturn(Mono.just(result)); | ||||
| 		when(matcher.matches(any())).thenReturn(ServerWebExchangeMatcher.MatchResult.match()); | ||||
| 		when(resolver.resolve(any())).thenReturn(Mono.empty()); | ||||
| 		when(successHandler.onAuthenticationSuccess(any(), any())).thenAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		given(manager.authenticate(any())).willReturn(Mono.just(result)); | ||||
| 		given(matcher.matches(any())).willReturn(ServerWebExchangeMatcher.MatchResult.match()); | ||||
| 		given(resolver.resolve(any())).willReturn(Mono.empty()); | ||||
| 		given(successHandler.onAuthenticationSuccess(any(), any())).willAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 			WebFilterExchange webFilterExchange = invocation.getArgument(0); | ||||
| 			Authentication authentication = invocation.getArgument(1); | ||||
| 
 | ||||
| @ -263,19 +263,19 @@ public class OAuth2LoginTests { | ||||
| 		ServerAuthenticationSuccessHandler successHandler = config.successHandler; | ||||
| 		ServerAuthenticationFailureHandler failureHandler = config.failureHandler; | ||||
| 
 | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		when(manager.authenticate(any())) | ||||
| 				.thenReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("error"), "message"))); | ||||
| 		when(matcher.matches(any())).thenReturn(ServerWebExchangeMatcher.MatchResult.match()); | ||||
| 		when(resolver.resolve(any())).thenReturn(Mono.empty()); | ||||
| 		when(successHandler.onAuthenticationSuccess(any(), any())).thenAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		given(manager.authenticate(any())) | ||||
| 				.willReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("error"), "message"))); | ||||
| 		given(matcher.matches(any())).willReturn(ServerWebExchangeMatcher.MatchResult.match()); | ||||
| 		given(resolver.resolve(any())).willReturn(Mono.empty()); | ||||
| 		given(successHandler.onAuthenticationSuccess(any(), any())).willAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 			WebFilterExchange webFilterExchange = invocation.getArgument(0); | ||||
| 			Authentication authentication = invocation.getArgument(1); | ||||
| 
 | ||||
| 			return new RedirectServerAuthenticationSuccessHandler(redirectLocation) | ||||
| 					.onAuthenticationSuccess(webFilterExchange, authentication); | ||||
| 		}); | ||||
| 		when(failureHandler.onAuthenticationFailure(any(), any())).thenAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 		given(failureHandler.onAuthenticationFailure(any(), any())).willAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 			WebFilterExchange webFilterExchange = invocation.getArgument(0); | ||||
| 			AuthenticationException authenticationException = invocation.getArgument(1); | ||||
| 
 | ||||
| @ -317,11 +317,11 @@ public class OAuth2LoginTests { | ||||
| 		OAuth2LoginAuthenticationToken result = new OAuth2LoginAuthenticationToken(github, exchange, user, | ||||
| 				user.getAuthorities(), accessToken); | ||||
| 
 | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		when(manager.authenticate(any())).thenReturn(Mono.just(result)); | ||||
| 		when(matcher.matches(any())).thenReturn(ServerWebExchangeMatcher.MatchResult.match()); | ||||
| 		when(resolver.resolve(any())).thenReturn(Mono.empty()); | ||||
| 		when(successHandler.onAuthenticationSuccess(any(), any())).thenAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(new TestingAuthenticationToken("a", "b", "c"))); | ||||
| 		given(manager.authenticate(any())).willReturn(Mono.just(result)); | ||||
| 		given(matcher.matches(any())).willReturn(ServerWebExchangeMatcher.MatchResult.match()); | ||||
| 		given(resolver.resolve(any())).willReturn(Mono.empty()); | ||||
| 		given(successHandler.onAuthenticationSuccess(any(), any())).willAnswer((Answer<Mono<Void>>) invocation -> { | ||||
| 			WebFilterExchange webFilterExchange = invocation.getArgument(0); | ||||
| 			Authentication authentication = invocation.getArgument(1); | ||||
| 
 | ||||
| @ -357,11 +357,11 @@ public class OAuth2LoginTests { | ||||
| 				exchange, accessToken); | ||||
| 
 | ||||
| 		ServerAuthenticationConverter converter = config.authenticationConverter; | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(token)); | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(token)); | ||||
| 
 | ||||
| 		ServerSecurityContextRepository securityContextRepository = config.securityContextRepository; | ||||
| 		when(securityContextRepository.save(any(), any())).thenReturn(Mono.empty()); | ||||
| 		when(securityContextRepository.load(any())).thenReturn(authentication(token)); | ||||
| 		given(securityContextRepository.save(any(), any())).willReturn(Mono.empty()); | ||||
| 		given(securityContextRepository.load(any())).willReturn(authentication(token)); | ||||
| 
 | ||||
| 		Map<String, Object> additionalParameters = new HashMap<>(); | ||||
| 		additionalParameters.put(OidcParameterNames.ID_TOKEN, "id-token"); | ||||
| @ -369,11 +369,11 @@ public class OAuth2LoginTests { | ||||
| 				.tokenType(accessToken.getTokenType()).scopes(accessToken.getScopes()) | ||||
| 				.additionalParameters(additionalParameters).build(); | ||||
| 		ReactiveOAuth2AccessTokenResponseClient<OAuth2AuthorizationCodeGrantRequest> tokenResponseClient = config.tokenResponseClient; | ||||
| 		when(tokenResponseClient.getTokenResponse(any())).thenReturn(Mono.just(accessTokenResponse)); | ||||
| 		given(tokenResponseClient.getTokenResponse(any())).willReturn(Mono.just(accessTokenResponse)); | ||||
| 
 | ||||
| 		OidcUser user = TestOidcUsers.create(); | ||||
| 		ReactiveOAuth2UserService<OidcUserRequest, OidcUser> userService = config.userService; | ||||
| 		when(userService.loadUser(any())).thenReturn(Mono.just(user)); | ||||
| 		given(userService.loadUser(any())).willReturn(Mono.just(user)); | ||||
| 
 | ||||
| 		webTestClient.get().uri("/login/oauth2/code/google").exchange().expectStatus().is3xxRedirection(); | ||||
| 
 | ||||
| @ -401,11 +401,11 @@ public class OAuth2LoginTests { | ||||
| 				.getBean(OAuth2LoginWithCustomBeansConfig.class); | ||||
| 
 | ||||
| 		ServerAuthenticationConverter converter = config.authenticationConverter; | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(authenticationToken)); | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(authenticationToken)); | ||||
| 
 | ||||
| 		ReactiveOAuth2AccessTokenResponseClient<OAuth2AuthorizationCodeGrantRequest> tokenResponseClient = config.tokenResponseClient; | ||||
| 		OAuth2Error oauth2Error = new OAuth2Error("invalid_request", "Invalid request", null); | ||||
| 		when(tokenResponseClient.getTokenResponse(any())).thenThrow(new OAuth2AuthenticationException(oauth2Error)); | ||||
| 		given(tokenResponseClient.getTokenResponse(any())).willThrow(new OAuth2AuthenticationException(oauth2Error)); | ||||
| 
 | ||||
| 		webTestClient.get().uri("/login/oauth2/code/google").exchange().expectStatus().is3xxRedirection().expectHeader() | ||||
| 				.valueEquals("Location", "/login?error"); | ||||
| @ -430,7 +430,7 @@ public class OAuth2LoginTests { | ||||
| 				google, exchange, accessToken); | ||||
| 
 | ||||
| 		ServerAuthenticationConverter converter = config.authenticationConverter; | ||||
| 		when(converter.convert(any())).thenReturn(Mono.just(authenticationToken)); | ||||
| 		given(converter.convert(any())).willReturn(Mono.just(authenticationToken)); | ||||
| 
 | ||||
| 		Map<String, Object> additionalParameters = new HashMap<>(); | ||||
| 		additionalParameters.put(OidcParameterNames.ID_TOKEN, "id-token"); | ||||
| @ -438,11 +438,11 @@ public class OAuth2LoginTests { | ||||
| 				.tokenType(accessToken.getTokenType()).scopes(accessToken.getScopes()) | ||||
| 				.additionalParameters(additionalParameters).build(); | ||||
| 		ReactiveOAuth2AccessTokenResponseClient<OAuth2AuthorizationCodeGrantRequest> tokenResponseClient = config.tokenResponseClient; | ||||
| 		when(tokenResponseClient.getTokenResponse(any())).thenReturn(Mono.just(accessTokenResponse)); | ||||
| 		given(tokenResponseClient.getTokenResponse(any())).willReturn(Mono.just(accessTokenResponse)); | ||||
| 
 | ||||
| 		ReactiveJwtDecoderFactory<ClientRegistration> jwtDecoderFactory = config.jwtDecoderFactory; | ||||
| 		OAuth2Error oauth2Error = new OAuth2Error("invalid_id_token", "Invalid ID Token", null); | ||||
| 		when(jwtDecoderFactory.createDecoder(any())).thenReturn(token -> Mono | ||||
| 		given(jwtDecoderFactory.createDecoder(any())).willReturn(token -> Mono | ||||
| 				.error(new JwtValidationException("ID Token validation failed", Collections.singleton(oauth2Error)))); | ||||
| 
 | ||||
| 		webTestClient.get().uri("/login/oauth2/code/google").exchange().expectStatus().is3xxRedirection().expectHeader() | ||||
| @ -457,7 +457,7 @@ public class OAuth2LoginTests { | ||||
| 				AuthorityUtils.NO_AUTHORITIES, getBean(ClientRegistration.class).getRegistrationId()); | ||||
| 
 | ||||
| 		ServerSecurityContextRepository repository = getBean(ServerSecurityContextRepository.class); | ||||
| 		when(repository.load(any())).thenReturn(authentication(token)); | ||||
| 		given(repository.load(any())).willReturn(authentication(token)); | ||||
| 
 | ||||
| 		this.client.post().uri("/logout").exchange().expectHeader().valueEquals("Location", | ||||
| 				"https://logout?id_token_hint=id-token"); | ||||
|  | ||||
| @ -83,9 +83,9 @@ import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.hamcrest.core.StringStartsWith.startsWith; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.oauth2.jwt.TestJwts.jwt; | ||||
| 
 | ||||
| /** | ||||
| @ -196,7 +196,7 @@ public class OAuth2ResourceServerSpecTests { | ||||
| 		this.spring.register(CustomDecoderConfig.class, RootController.class).autowire(); | ||||
| 
 | ||||
| 		ReactiveJwtDecoder jwtDecoder = this.spring.getContext().getBean(ReactiveJwtDecoder.class); | ||||
| 		when(jwtDecoder.decode(anyString())).thenReturn(Mono.just(this.jwt)); | ||||
| 		given(jwtDecoder.decode(anyString())).willReturn(Mono.just(this.jwt)); | ||||
| 
 | ||||
| 		this.client.get().headers(headers -> headers.setBearerAuth("token")).exchange().expectStatus().isOk(); | ||||
| 
 | ||||
| @ -231,8 +231,8 @@ public class OAuth2ResourceServerSpecTests { | ||||
| 
 | ||||
| 		ReactiveAuthenticationManager authenticationManager = this.spring.getContext() | ||||
| 				.getBean(ReactiveAuthenticationManager.class); | ||||
| 		when(authenticationManager.authenticate(any(Authentication.class))) | ||||
| 				.thenReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("mock-failure")))); | ||||
| 		given(authenticationManager.authenticate(any(Authentication.class))) | ||||
| 				.willReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("mock-failure")))); | ||||
| 
 | ||||
| 		this.client.get().headers(headers -> headers.setBearerAuth(this.messageReadToken)).exchange().expectStatus() | ||||
| 				.isUnauthorized().expectHeader() | ||||
| @ -245,8 +245,8 @@ public class OAuth2ResourceServerSpecTests { | ||||
| 
 | ||||
| 		ReactiveAuthenticationManager authenticationManager = this.spring.getContext() | ||||
| 				.getBean(ReactiveAuthenticationManager.class); | ||||
| 		when(authenticationManager.authenticate(any(Authentication.class))) | ||||
| 				.thenReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("mock-failure")))); | ||||
| 		given(authenticationManager.authenticate(any(Authentication.class))) | ||||
| 				.willReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("mock-failure")))); | ||||
| 
 | ||||
| 		this.client.get().headers(headers -> headers.setBearerAuth(this.messageReadToken)).exchange().expectStatus() | ||||
| 				.isUnauthorized().expectHeader() | ||||
| @ -263,10 +263,10 @@ public class OAuth2ResourceServerSpecTests { | ||||
| 		ReactiveAuthenticationManager authenticationManager = this.spring.getContext() | ||||
| 				.getBean(ReactiveAuthenticationManager.class); | ||||
| 
 | ||||
| 		when(authenticationManagerResolver.resolve(any(ServerWebExchange.class))) | ||||
| 				.thenReturn(Mono.just(authenticationManager)); | ||||
| 		when(authenticationManager.authenticate(any(Authentication.class))) | ||||
| 				.thenReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("mock-failure")))); | ||||
| 		given(authenticationManagerResolver.resolve(any(ServerWebExchange.class))) | ||||
| 				.willReturn(Mono.just(authenticationManager)); | ||||
| 		given(authenticationManager.authenticate(any(Authentication.class))) | ||||
| 				.willReturn(Mono.error(new OAuth2AuthenticationException(new OAuth2Error("mock-failure")))); | ||||
| 
 | ||||
| 		this.client.get().headers(headers -> headers.setBearerAuth(this.messageReadToken)).exchange().expectStatus() | ||||
| 				.isUnauthorized().expectHeader() | ||||
|  | ||||
| @ -77,7 +77,6 @@ import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.config.Customizer.withDefaults; | ||||
| import static org.springframework.test.util.ReflectionTestUtils.getField; | ||||
| 
 | ||||
| @ -108,7 +107,7 @@ public class ServerHttpSecurityTests { | ||||
| 	@Test | ||||
| 	public void defaults() { | ||||
| 		TestPublisher<SecurityContext> securityContext = TestPublisher.create(); | ||||
| 		when(this.contextRepository.load(any())).thenReturn(securityContext.mono()); | ||||
| 		given(this.contextRepository.load(any())).willReturn(securityContext.mono()); | ||||
| 		this.http.securityContextRepository(this.contextRepository); | ||||
| 
 | ||||
| 		WebTestClient client = buildClient(); | ||||
| @ -411,7 +410,7 @@ public class ServerHttpSecurityTests { | ||||
| 	@Test | ||||
| 	public void postWhenCustomCsrfTokenRepositoryThenUsed() { | ||||
| 		ServerCsrfTokenRepository customServerCsrfTokenRepository = mock(ServerCsrfTokenRepository.class); | ||||
| 		when(customServerCsrfTokenRepository.loadToken(any(ServerWebExchange.class))).thenReturn(Mono.empty()); | ||||
| 		given(customServerCsrfTokenRepository.loadToken(any(ServerWebExchange.class))).willReturn(Mono.empty()); | ||||
| 		SecurityWebFilterChain securityFilterChain = this.http | ||||
| 				.csrf(csrf -> csrf.csrfTokenRepository(customServerCsrfTokenRepository)).build(); | ||||
| 		WebFilterChainProxy springSecurityFilterChain = new WebFilterChainProxy(securityFilterChain); | ||||
| @ -453,8 +452,8 @@ public class ServerHttpSecurityTests { | ||||
| 
 | ||||
| 		OAuth2AuthorizationRequest authorizationRequest = TestOAuth2AuthorizationRequests.request().build(); | ||||
| 
 | ||||
| 		when(authorizationRequestRepository.removeAuthorizationRequest(any())) | ||||
| 				.thenReturn(Mono.just(authorizationRequest)); | ||||
| 		given(authorizationRequestRepository.removeAuthorizationRequest(any())) | ||||
| 				.willReturn(Mono.just(authorizationRequest)); | ||||
| 
 | ||||
| 		SecurityWebFilterChain securityFilterChain = this.http.oauth2Login() | ||||
| 				.clientRegistrationRepository(clientRegistrationRepository) | ||||
|  | ||||
| @ -24,8 +24,8 @@ import org.springframework.security.core.Authentication; | ||||
| import org.springframework.security.core.authority.AuthorityUtils; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -55,7 +55,7 @@ public class SecurityExpressionRootTests { | ||||
| 	public void rememberMeIsCorrectlyDetected() { | ||||
| 		AuthenticationTrustResolver atr = mock(AuthenticationTrustResolver.class); | ||||
| 		this.root.setTrustResolver(atr); | ||||
| 		when(atr.isRememberMe(JOE)).thenReturn(true); | ||||
| 		given(atr.isRememberMe(JOE)).willReturn(true); | ||||
| 		assertThat(this.root.isRememberMe()).isTrue(); | ||||
| 		assertThat(this.root.isFullyAuthenticated()).isFalse(); | ||||
| 	} | ||||
|  | ||||
| @ -37,10 +37,10 @@ import org.springframework.security.core.context.SecurityContextHolder; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.doReturn; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class DefaultMethodSecurityExpressionHandlerTests { | ||||
| @ -59,8 +59,8 @@ public class DefaultMethodSecurityExpressionHandlerTests { | ||||
| 	@Before | ||||
| 	public void setup() { | ||||
| 		this.handler = new DefaultMethodSecurityExpressionHandler(); | ||||
| 		when(this.methodInvocation.getThis()).thenReturn(new Foo()); | ||||
| 		when(this.methodInvocation.getMethod()).thenReturn(Foo.class.getMethods()[0]); | ||||
| 		given(this.methodInvocation.getThis()).willReturn(new Foo()); | ||||
| 		given(this.methodInvocation.getMethod()).willReturn(Foo.class.getMethods()[0]); | ||||
| 	} | ||||
| 
 | ||||
| 	@After | ||||
|  | ||||
| @ -29,8 +29,8 @@ import org.springframework.security.core.Authentication; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link MethodSecurityExpressionRoot} | ||||
| @ -69,13 +69,13 @@ public class MethodSecurityExpressionRootTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void isAnonymousReturnsTrueIfTrustResolverReportsAnonymous() { | ||||
| 		when(this.trustResolver.isAnonymous(this.user)).thenReturn(true); | ||||
| 		given(this.trustResolver.isAnonymous(this.user)).willReturn(true); | ||||
| 		assertThat(this.root.isAnonymous()).isTrue(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void isAnonymousReturnsFalseIfTrustResolverReportsNonAnonymous() { | ||||
| 		when(this.trustResolver.isAnonymous(this.user)).thenReturn(false); | ||||
| 		given(this.trustResolver.isAnonymous(this.user)).willReturn(false); | ||||
| 		assertThat(this.root.isAnonymous()).isFalse(); | ||||
| 	} | ||||
| 
 | ||||
| @ -85,7 +85,7 @@ public class MethodSecurityExpressionRootTests { | ||||
| 		final PermissionEvaluator pe = mock(PermissionEvaluator.class); | ||||
| 		this.ctx.setVariable("domainObject", dummyDomainObject); | ||||
| 		this.root.setPermissionEvaluator(pe); | ||||
| 		when(pe.hasPermission(this.user, dummyDomainObject, "ignored")).thenReturn(false); | ||||
| 		given(pe.hasPermission(this.user, dummyDomainObject, "ignored")).willReturn(false); | ||||
| 
 | ||||
| 		assertThat(this.root.hasPermission(dummyDomainObject, "ignored")).isFalse(); | ||||
| 
 | ||||
| @ -97,7 +97,7 @@ public class MethodSecurityExpressionRootTests { | ||||
| 		final PermissionEvaluator pe = mock(PermissionEvaluator.class); | ||||
| 		this.ctx.setVariable("domainObject", dummyDomainObject); | ||||
| 		this.root.setPermissionEvaluator(pe); | ||||
| 		when(pe.hasPermission(this.user, dummyDomainObject, "ignored")).thenReturn(true); | ||||
| 		given(pe.hasPermission(this.user, dummyDomainObject, "ignored")).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.root.hasPermission(dummyDomainObject, "ignored")).isTrue(); | ||||
| 	} | ||||
| @ -108,8 +108,7 @@ public class MethodSecurityExpressionRootTests { | ||||
| 		this.ctx.setVariable("domainObject", dummyDomainObject); | ||||
| 		final PermissionEvaluator pe = mock(PermissionEvaluator.class); | ||||
| 		this.root.setPermissionEvaluator(pe); | ||||
| 		when(pe.hasPermission(eq(this.user), eq(dummyDomainObject), any(Integer.class))).thenReturn(true) | ||||
| 				.thenReturn(true).thenReturn(false); | ||||
| 		given(pe.hasPermission(eq(this.user), eq(dummyDomainObject), any(Integer.class))).willReturn(true, true, false); | ||||
| 
 | ||||
| 		Expression e = this.parser.parseExpression("hasPermission(#domainObject, 0xA)"); | ||||
| 		// evaluator returns true | ||||
| @ -133,8 +132,8 @@ public class MethodSecurityExpressionRootTests { | ||||
| 		Integer i = 2; | ||||
| 		PermissionEvaluator pe = mock(PermissionEvaluator.class); | ||||
| 		this.root.setPermissionEvaluator(pe); | ||||
| 		when(pe.hasPermission(this.user, targetObject, i)).thenReturn(true).thenReturn(false); | ||||
| 		when(pe.hasPermission(this.user, "x", i)).thenReturn(true); | ||||
| 		given(pe.hasPermission(this.user, targetObject, i)).willReturn(true, false); | ||||
| 		given(pe.hasPermission(this.user, "x", i)).willReturn(true); | ||||
| 
 | ||||
| 		Expression e = this.parser.parseExpression("hasPermission(this, 2)"); | ||||
| 		assertThat(ExpressionUtils.evaluateAsBoolean(e, this.ctx)).isTrue(); | ||||
|  | ||||
| @ -51,12 +51,12 @@ import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link MethodSecurityInterceptor}. | ||||
| @ -150,21 +150,21 @@ public class MethodSecurityInterceptorTests { | ||||
| 
 | ||||
| 	@Test(expected = IllegalArgumentException.class) | ||||
| 	public void initializationRejectsSecurityMetadataSourceThatDoesNotSupportMethodInvocation() throws Throwable { | ||||
| 		when(this.mds.supports(MethodInvocation.class)).thenReturn(false); | ||||
| 		given(this.mds.supports(MethodInvocation.class)).willReturn(false); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test(expected = IllegalArgumentException.class) | ||||
| 	public void initializationRejectsAccessDecisionManagerThatDoesNotSupportMethodInvocation() throws Exception { | ||||
| 		when(this.mds.supports(MethodInvocation.class)).thenReturn(true); | ||||
| 		when(this.adm.supports(MethodInvocation.class)).thenReturn(false); | ||||
| 		given(this.mds.supports(MethodInvocation.class)).willReturn(true); | ||||
| 		given(this.adm.supports(MethodInvocation.class)).willReturn(false); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test(expected = IllegalArgumentException.class) | ||||
| 	public void intitalizationRejectsRunAsManagerThatDoesNotSupportMethodInvocation() throws Exception { | ||||
| 		final RunAsManager ram = mock(RunAsManager.class); | ||||
| 		when(ram.supports(MethodInvocation.class)).thenReturn(false); | ||||
| 		given(ram.supports(MethodInvocation.class)).willReturn(false); | ||||
| 		this.interceptor.setRunAsManager(ram); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| 	} | ||||
| @ -172,21 +172,21 @@ public class MethodSecurityInterceptorTests { | ||||
| 	@Test(expected = IllegalArgumentException.class) | ||||
| 	public void intitalizationRejectsAfterInvocationManagerThatDoesNotSupportMethodInvocation() throws Exception { | ||||
| 		final AfterInvocationManager aim = mock(AfterInvocationManager.class); | ||||
| 		when(aim.supports(MethodInvocation.class)).thenReturn(false); | ||||
| 		given(aim.supports(MethodInvocation.class)).willReturn(false); | ||||
| 		this.interceptor.setAfterInvocationManager(aim); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test(expected = IllegalArgumentException.class) | ||||
| 	public void initializationFailsIfAccessDecisionManagerRejectsConfigAttributes() throws Exception { | ||||
| 		when(this.adm.supports(any(ConfigAttribute.class))).thenReturn(false); | ||||
| 		given(this.adm.supports(any(ConfigAttribute.class))).willReturn(false); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void validationNotAttemptedIfIsValidateConfigAttributesSetToFalse() throws Exception { | ||||
| 		when(this.adm.supports(MethodInvocation.class)).thenReturn(true); | ||||
| 		when(this.mds.supports(MethodInvocation.class)).thenReturn(true); | ||||
| 		given(this.adm.supports(MethodInvocation.class)).willReturn(true); | ||||
| 		given(this.mds.supports(MethodInvocation.class)).willReturn(true); | ||||
| 		this.interceptor.setValidateConfigAttributes(false); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| 		verify(this.mds, never()).getAllConfigAttributes(); | ||||
| @ -195,9 +195,9 @@ public class MethodSecurityInterceptorTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void validationNotAttemptedIfMethodSecurityMetadataSourceReturnsNullForAttributes() throws Exception { | ||||
| 		when(this.adm.supports(MethodInvocation.class)).thenReturn(true); | ||||
| 		when(this.mds.supports(MethodInvocation.class)).thenReturn(true); | ||||
| 		when(this.mds.getAllConfigAttributes()).thenReturn(null); | ||||
| 		given(this.adm.supports(MethodInvocation.class)).willReturn(true); | ||||
| 		given(this.mds.supports(MethodInvocation.class)).willReturn(true); | ||||
| 		given(this.mds.getAllConfigAttributes()).willReturn(null); | ||||
| 
 | ||||
| 		this.interceptor.setValidateConfigAttributes(true); | ||||
| 		this.interceptor.afterPropertiesSet(); | ||||
| @ -226,7 +226,7 @@ public class MethodSecurityInterceptorTests { | ||||
| 		SecurityContextHolder.getContext().setAuthentication(token); | ||||
| 
 | ||||
| 		mdsReturnsUserRole(); | ||||
| 		when(this.authman.authenticate(token)).thenThrow(new BadCredentialsException("rejected")); | ||||
| 		given(this.authman.authenticate(token)).willThrow(new BadCredentialsException("rejected")); | ||||
| 
 | ||||
| 		this.advisedTarget.makeLowerCase("HELLO"); | ||||
| 	} | ||||
| @ -253,8 +253,8 @@ public class MethodSecurityInterceptorTests { | ||||
| 		// so test would fail) | ||||
| 		createTarget(true); | ||||
| 		mdsReturnsUserRole(); | ||||
| 		when(this.authman.authenticate(this.token)).thenReturn(this.token); | ||||
| 		doThrow(new AccessDeniedException("rejected")).when(this.adm).decide(any(Authentication.class), | ||||
| 		given(this.authman.authenticate(this.token)).willReturn(this.token); | ||||
| 		willThrow(new AccessDeniedException("rejected")).given(this.adm).decide(any(Authentication.class), | ||||
| 				any(MethodInvocation.class), any(List.class)); | ||||
| 
 | ||||
| 		try { | ||||
| @ -281,7 +281,7 @@ public class MethodSecurityInterceptorTests { | ||||
| 				TestingAuthenticationToken.class); | ||||
| 		this.interceptor.setRunAsManager(runAs); | ||||
| 		mdsReturnsUserRole(); | ||||
| 		when(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).thenReturn(runAsToken); | ||||
| 		given(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).willReturn(runAsToken); | ||||
| 
 | ||||
| 		String result = this.advisedTarget.makeUpperCase("hello"); | ||||
| 		assertThat(result).isEqualTo("HELLO org.springframework.security.access.intercept.RunAsUserToken true"); | ||||
| @ -294,7 +294,7 @@ public class MethodSecurityInterceptorTests { | ||||
| 	@Test | ||||
| 	public void runAsReplacementCleansAfterException() { | ||||
| 		createTarget(true); | ||||
| 		when(this.realTarget.makeUpperCase(anyString())).thenThrow(new RuntimeException()); | ||||
| 		given(this.realTarget.makeUpperCase(anyString())).willThrow(new RuntimeException()); | ||||
| 		SecurityContext ctx = SecurityContextHolder.getContext(); | ||||
| 		ctx.setAuthentication(this.token); | ||||
| 		this.token.setAuthenticated(true); | ||||
| @ -303,7 +303,7 @@ public class MethodSecurityInterceptorTests { | ||||
| 				TestingAuthenticationToken.class); | ||||
| 		this.interceptor.setRunAsManager(runAs); | ||||
| 		mdsReturnsUserRole(); | ||||
| 		when(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).thenReturn(runAsToken); | ||||
| 		given(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).willReturn(runAsToken); | ||||
| 
 | ||||
| 		try { | ||||
| 			this.advisedTarget.makeUpperCase("hello"); | ||||
| @ -333,7 +333,7 @@ public class MethodSecurityInterceptorTests { | ||||
| 		AfterInvocationManager aim = mock(AfterInvocationManager.class); | ||||
| 		this.interceptor.setAfterInvocationManager(aim); | ||||
| 
 | ||||
| 		when(mi.proceed()).thenThrow(new Throwable()); | ||||
| 		given(mi.proceed()).willThrow(new Throwable()); | ||||
| 
 | ||||
| 		try { | ||||
| 			this.interceptor.invoke(mi); | ||||
| @ -346,11 +346,11 @@ public class MethodSecurityInterceptorTests { | ||||
| 	} | ||||
| 
 | ||||
| 	void mdsReturnsNull() { | ||||
| 		when(this.mds.getAttributes(any(MethodInvocation.class))).thenReturn(null); | ||||
| 		given(this.mds.getAttributes(any(MethodInvocation.class))).willReturn(null); | ||||
| 	} | ||||
| 
 | ||||
| 	void mdsReturnsUserRole() { | ||||
| 		when(this.mds.getAttributes(any(MethodInvocation.class))).thenReturn(SecurityConfig.createList("ROLE_USER")); | ||||
| 		given(this.mds.getAttributes(any(MethodInvocation.class))).willReturn(SecurityConfig.createList("ROLE_USER")); | ||||
| 	} | ||||
| 
 | ||||
| } | ||||
|  | ||||
| @ -25,8 +25,8 @@ import org.springframework.security.access.SecurityConfig; | ||||
| import org.springframework.security.access.method.MethodSecurityMetadataSource; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link MethodSecurityMetadataSourceAdvisor}. | ||||
| @ -41,7 +41,7 @@ public class MethodSecurityMetadataSourceAdvisorTests { | ||||
| 		Method method = clazz.getMethod("makeLowerCase", new Class[] { String.class }); | ||||
| 
 | ||||
| 		MethodSecurityMetadataSource mds = mock(MethodSecurityMetadataSource.class); | ||||
| 		when(mds.getAttributes(method, clazz)).thenReturn(null); | ||||
| 		given(mds.getAttributes(method, clazz)).willReturn(null); | ||||
| 		MethodSecurityMetadataSourceAdvisor advisor = new MethodSecurityMetadataSourceAdvisor("", mds, ""); | ||||
| 		assertThat(advisor.getPointcut().getMethodMatcher().matches(method, clazz)).isFalse(); | ||||
| 	} | ||||
| @ -52,7 +52,7 @@ public class MethodSecurityMetadataSourceAdvisorTests { | ||||
| 		Method method = clazz.getMethod("countLength", new Class[] { String.class }); | ||||
| 
 | ||||
| 		MethodSecurityMetadataSource mds = mock(MethodSecurityMetadataSource.class); | ||||
| 		when(mds.getAttributes(method, clazz)).thenReturn(SecurityConfig.createList("ROLE_A")); | ||||
| 		given(mds.getAttributes(method, clazz)).willReturn(SecurityConfig.createList("ROLE_A")); | ||||
| 		MethodSecurityMetadataSourceAdvisor advisor = new MethodSecurityMetadataSourceAdvisor("", mds, ""); | ||||
| 		assertThat(advisor.getPointcut().getMethodMatcher().matches(method, clazz)).isTrue(); | ||||
| 	} | ||||
|  | ||||
| @ -48,12 +48,12 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link AspectJMethodSecurityInterceptor}. | ||||
| @ -91,17 +91,17 @@ public class AspectJMethodSecurityInterceptorTests { | ||||
| 		this.joinPoint = mock(ProceedingJoinPoint.class); // new MockJoinPoint(new | ||||
| 															// TargetObject(), method); | ||||
| 		Signature sig = mock(Signature.class); | ||||
| 		when(sig.getDeclaringType()).thenReturn(TargetObject.class); | ||||
| 		given(sig.getDeclaringType()).willReturn(TargetObject.class); | ||||
| 		JoinPoint.StaticPart staticPart = mock(JoinPoint.StaticPart.class); | ||||
| 		when(this.joinPoint.getSignature()).thenReturn(sig); | ||||
| 		when(this.joinPoint.getStaticPart()).thenReturn(staticPart); | ||||
| 		given(this.joinPoint.getSignature()).willReturn(sig); | ||||
| 		given(this.joinPoint.getStaticPart()).willReturn(staticPart); | ||||
| 		CodeSignature codeSig = mock(CodeSignature.class); | ||||
| 		when(codeSig.getName()).thenReturn("countLength"); | ||||
| 		when(codeSig.getDeclaringType()).thenReturn(TargetObject.class); | ||||
| 		when(codeSig.getParameterTypes()).thenReturn(new Class[] { String.class }); | ||||
| 		when(staticPart.getSignature()).thenReturn(codeSig); | ||||
| 		when(this.mds.getAttributes(any())).thenReturn(SecurityConfig.createList("ROLE_USER")); | ||||
| 		when(this.authman.authenticate(this.token)).thenReturn(this.token); | ||||
| 		given(codeSig.getName()).willReturn("countLength"); | ||||
| 		given(codeSig.getDeclaringType()).willReturn(TargetObject.class); | ||||
| 		given(codeSig.getParameterTypes()).willReturn(new Class[] { String.class }); | ||||
| 		given(staticPart.getSignature()).willReturn(codeSig); | ||||
| 		given(this.mds.getAttributes(any())).willReturn(SecurityConfig.createList("ROLE_USER")); | ||||
| 		given(this.authman.authenticate(this.token)).willReturn(this.token); | ||||
| 	} | ||||
| 
 | ||||
| 	@After | ||||
| @ -122,7 +122,7 @@ public class AspectJMethodSecurityInterceptorTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void callbackIsNotInvokedWhenPermissionDenied() { | ||||
| 		doThrow(new AccessDeniedException("denied")).when(this.adm).decide(any(), any(), any()); | ||||
| 		willThrow(new AccessDeniedException("denied")).given(this.adm).decide(any(), any(), any()); | ||||
| 
 | ||||
| 		SecurityContextHolder.getContext().setAuthentication(this.token); | ||||
| 		try { | ||||
| @ -139,8 +139,8 @@ public class AspectJMethodSecurityInterceptorTests { | ||||
| 		TargetObject to = new TargetObject(); | ||||
| 		Method m = ClassUtils.getMethodIfAvailable(TargetObject.class, "countLength", new Class[] { String.class }); | ||||
| 
 | ||||
| 		when(this.joinPoint.getTarget()).thenReturn(to); | ||||
| 		when(this.joinPoint.getArgs()).thenReturn(new Object[] { "Hi" }); | ||||
| 		given(this.joinPoint.getTarget()).willReturn(to); | ||||
| 		given(this.joinPoint.getArgs()).willReturn(new Object[] { "Hi" }); | ||||
| 		MethodInvocationAdapter mia = new MethodInvocationAdapter(this.joinPoint); | ||||
| 		assertThat(mia.getArguments()[0]).isEqualTo("Hi"); | ||||
| 		assertThat(mia.getStaticPart()).isEqualTo(m); | ||||
| @ -156,7 +156,7 @@ public class AspectJMethodSecurityInterceptorTests { | ||||
| 		AfterInvocationManager aim = mock(AfterInvocationManager.class); | ||||
| 		this.interceptor.setAfterInvocationManager(aim); | ||||
| 
 | ||||
| 		when(this.aspectJCallback.proceedWithObject()).thenThrow(new RuntimeException()); | ||||
| 		given(this.aspectJCallback.proceedWithObject()).willThrow(new RuntimeException()); | ||||
| 
 | ||||
| 		try { | ||||
| 			this.interceptor.invoke(this.joinPoint, this.aspectJCallback); | ||||
| @ -179,8 +179,8 @@ public class AspectJMethodSecurityInterceptorTests { | ||||
| 		final RunAsUserToken runAsToken = new RunAsUserToken("key", "someone", "creds", this.token.getAuthorities(), | ||||
| 				TestingAuthenticationToken.class); | ||||
| 		this.interceptor.setRunAsManager(runAs); | ||||
| 		when(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).thenReturn(runAsToken); | ||||
| 		when(this.aspectJCallback.proceedWithObject()).thenThrow(new RuntimeException()); | ||||
| 		given(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).willReturn(runAsToken); | ||||
| 		given(this.aspectJCallback.proceedWithObject()).willThrow(new RuntimeException()); | ||||
| 
 | ||||
| 		try { | ||||
| 			this.interceptor.invoke(this.joinPoint, this.aspectJCallback); | ||||
| @ -205,8 +205,8 @@ public class AspectJMethodSecurityInterceptorTests { | ||||
| 		final RunAsUserToken runAsToken = new RunAsUserToken("key", "someone", "creds", this.token.getAuthorities(), | ||||
| 				TestingAuthenticationToken.class); | ||||
| 		this.interceptor.setRunAsManager(runAs); | ||||
| 		when(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).thenReturn(runAsToken); | ||||
| 		when(this.joinPoint.proceed()).thenThrow(new RuntimeException()); | ||||
| 		given(runAs.buildRunAs(eq(this.token), any(MethodInvocation.class), any(List.class))).willReturn(runAsToken); | ||||
| 		given(this.joinPoint.proceed()).willThrow(new RuntimeException()); | ||||
| 
 | ||||
| 		try { | ||||
| 			this.interceptor.invoke(this.joinPoint); | ||||
|  | ||||
| @ -38,9 +38,9 @@ import org.springframework.security.core.context.SecurityContextHolder; | ||||
| import org.springframework.security.util.MethodInvocationUtils; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests | ||||
| @ -80,7 +80,7 @@ public class MethodInvocationPrivilegeEvaluatorTests { | ||||
| 		final MethodInvocation mi = MethodInvocationUtils.create(object, "makeLowerCase", "foobar"); | ||||
| 
 | ||||
| 		MethodInvocationPrivilegeEvaluator mipe = new MethodInvocationPrivilegeEvaluator(); | ||||
| 		when(this.mds.getAttributes(mi)).thenReturn(this.role); | ||||
| 		given(this.mds.getAttributes(mi)).willReturn(this.role); | ||||
| 
 | ||||
| 		mipe.setSecurityInterceptor(this.interceptor); | ||||
| 		mipe.afterPropertiesSet(); | ||||
| @ -94,7 +94,7 @@ public class MethodInvocationPrivilegeEvaluatorTests { | ||||
| 				"makeLowerCase", new Class[] { String.class }, new Object[] { "Hello world" }); | ||||
| 		MethodInvocationPrivilegeEvaluator mipe = new MethodInvocationPrivilegeEvaluator(); | ||||
| 		mipe.setSecurityInterceptor(this.interceptor); | ||||
| 		when(this.mds.getAttributes(mi)).thenReturn(this.role); | ||||
| 		given(this.mds.getAttributes(mi)).willReturn(this.role); | ||||
| 
 | ||||
| 		assertThat(mipe.isAllowed(mi, this.token)).isTrue(); | ||||
| 	} | ||||
| @ -105,8 +105,8 @@ public class MethodInvocationPrivilegeEvaluatorTests { | ||||
| 		final MethodInvocation mi = MethodInvocationUtils.create(object, "makeLowerCase", "foobar"); | ||||
| 		MethodInvocationPrivilegeEvaluator mipe = new MethodInvocationPrivilegeEvaluator(); | ||||
| 		mipe.setSecurityInterceptor(this.interceptor); | ||||
| 		when(this.mds.getAttributes(mi)).thenReturn(this.role); | ||||
| 		doThrow(new AccessDeniedException("rejected")).when(this.adm).decide(this.token, mi, this.role); | ||||
| 		given(this.mds.getAttributes(mi)).willReturn(this.role); | ||||
| 		willThrow(new AccessDeniedException("rejected")).given(this.adm).decide(this.token, mi, this.role); | ||||
| 
 | ||||
| 		assertThat(mipe.isAllowed(mi, this.token)).isFalse(); | ||||
| 	} | ||||
| @ -118,8 +118,8 @@ public class MethodInvocationPrivilegeEvaluatorTests { | ||||
| 
 | ||||
| 		MethodInvocationPrivilegeEvaluator mipe = new MethodInvocationPrivilegeEvaluator(); | ||||
| 		mipe.setSecurityInterceptor(this.interceptor); | ||||
| 		when(this.mds.getAttributes(mi)).thenReturn(this.role); | ||||
| 		doThrow(new AccessDeniedException("rejected")).when(this.adm).decide(this.token, mi, this.role); | ||||
| 		given(this.mds.getAttributes(mi)).willReturn(this.role); | ||||
| 		willThrow(new AccessDeniedException("rejected")).given(this.adm).decide(this.token, mi, this.role); | ||||
| 
 | ||||
| 		assertThat(mipe.isAllowed(mi, this.token)).isFalse(); | ||||
| 	} | ||||
|  | ||||
| @ -29,8 +29,8 @@ import org.springframework.security.access.ConfigAttribute; | ||||
| import org.springframework.security.util.SimpleMethodInvocation; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -44,8 +44,8 @@ public class DelegatingMethodSecurityMetadataSourceTests { | ||||
| 	public void returnsEmptyListIfDelegateReturnsNull() throws Exception { | ||||
| 		List sources = new ArrayList(); | ||||
| 		MethodSecurityMetadataSource delegate = mock(MethodSecurityMetadataSource.class); | ||||
| 		when(delegate.getAttributes(ArgumentMatchers.<Method>any(), ArgumentMatchers.any(Class.class))) | ||||
| 				.thenReturn(null); | ||||
| 		given(delegate.getAttributes(ArgumentMatchers.<Method>any(), ArgumentMatchers.any(Class.class))) | ||||
| 				.willReturn(null); | ||||
| 		sources.add(delegate); | ||||
| 		this.mds = new DelegatingMethodSecurityMetadataSource(sources); | ||||
| 		assertThat(this.mds.getMethodSecurityMetadataSources()).isSameAs(sources); | ||||
| @ -63,7 +63,7 @@ public class DelegatingMethodSecurityMetadataSourceTests { | ||||
| 		ConfigAttribute ca = mock(ConfigAttribute.class); | ||||
| 		List attributes = Arrays.asList(ca); | ||||
| 		Method toString = String.class.getMethod("toString"); | ||||
| 		when(delegate.getAttributes(toString, String.class)).thenReturn(attributes); | ||||
| 		given(delegate.getAttributes(toString, String.class)).willReturn(attributes); | ||||
| 		sources.add(delegate); | ||||
| 		this.mds = new DelegatingMethodSecurityMetadataSource(sources); | ||||
| 		assertThat(this.mds.getMethodSecurityMetadataSources()).isSameAs(sources); | ||||
|  | ||||
| @ -31,8 +31,8 @@ import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link AffirmativeBased}. | ||||
| @ -61,12 +61,12 @@ public class AffirmativeBasedTests { | ||||
| 		this.abstain = mock(AccessDecisionVoter.class); | ||||
| 		this.deny = mock(AccessDecisionVoter.class); | ||||
| 
 | ||||
| 		when(this.grant.vote(any(Authentication.class), any(Object.class), any(List.class))) | ||||
| 				.thenReturn(AccessDecisionVoter.ACCESS_GRANTED); | ||||
| 		when(this.abstain.vote(any(Authentication.class), any(Object.class), any(List.class))) | ||||
| 				.thenReturn(AccessDecisionVoter.ACCESS_ABSTAIN); | ||||
| 		when(this.deny.vote(any(Authentication.class), any(Object.class), any(List.class))) | ||||
| 				.thenReturn(AccessDecisionVoter.ACCESS_DENIED); | ||||
| 		given(this.grant.vote(any(Authentication.class), any(Object.class), any(List.class))) | ||||
| 				.willReturn(AccessDecisionVoter.ACCESS_GRANTED); | ||||
| 		given(this.abstain.vote(any(Authentication.class), any(Object.class), any(List.class))) | ||||
| 				.willReturn(AccessDecisionVoter.ACCESS_ABSTAIN); | ||||
| 		given(this.deny.vote(any(Authentication.class), any(Object.class), any(List.class))) | ||||
| 				.willReturn(AccessDecisionVoter.ACCESS_DENIED); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
|  | ||||
| @ -27,10 +27,10 @@ import org.springframework.security.core.authority.AuthorityUtils; | ||||
| import org.springframework.security.core.authority.SimpleGrantedAuthority; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link AbstractAuthenticationToken}. | ||||
| @ -128,7 +128,7 @@ public class AbstractAuthenticationTokenTests { | ||||
| 		String principalName = "test"; | ||||
| 
 | ||||
| 		AuthenticatedPrincipal principal = mock(AuthenticatedPrincipal.class); | ||||
| 		when(principal.getName()).thenReturn(principalName); | ||||
| 		given(principal.getName()).willReturn(principalName); | ||||
| 
 | ||||
| 		MockAuthenticationImpl token = new MockAuthenticationImpl(principal, "Password", this.authorities); | ||||
| 		assertThat(token.getName()).isEqualTo(principalName); | ||||
|  | ||||
| @ -29,7 +29,7 @@ import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -49,8 +49,8 @@ public class DelegatingReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenEmptyAndNotThenReturnsNotEmpty() { | ||||
| 		when(this.delegate1.authenticate(any())).thenReturn(Mono.empty()); | ||||
| 		when(this.delegate2.authenticate(any())).thenReturn(Mono.just(this.authentication)); | ||||
| 		given(this.delegate1.authenticate(any())).willReturn(Mono.empty()); | ||||
| 		given(this.delegate2.authenticate(any())).willReturn(Mono.just(this.authentication)); | ||||
| 
 | ||||
| 		DelegatingReactiveAuthenticationManager manager = new DelegatingReactiveAuthenticationManager(this.delegate1, | ||||
| 				this.delegate2); | ||||
| @ -62,8 +62,8 @@ public class DelegatingReactiveAuthenticationManagerTests { | ||||
| 	public void authenticateWhenNotEmptyThenOtherDelegatesNotSubscribed() { | ||||
| 		// delay to try and force delegate2 to finish (i.e. make sure we didn't use | ||||
| 		// flatMap) | ||||
| 		when(this.delegate1.authenticate(any())) | ||||
| 				.thenReturn(Mono.just(this.authentication).delayElement(Duration.ofMillis(100))); | ||||
| 		given(this.delegate1.authenticate(any())) | ||||
| 				.willReturn(Mono.just(this.authentication).delayElement(Duration.ofMillis(100))); | ||||
| 
 | ||||
| 		DelegatingReactiveAuthenticationManager manager = new DelegatingReactiveAuthenticationManager(this.delegate1, | ||||
| 				this.delegate2); | ||||
| @ -73,7 +73,7 @@ public class DelegatingReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenBadCredentialsThenDelegate2NotInvokedAndError() { | ||||
| 		when(this.delegate1.authenticate(any())).thenReturn(Mono.error(new BadCredentialsException("Test"))); | ||||
| 		given(this.delegate1.authenticate(any())).willReturn(Mono.error(new BadCredentialsException("Test"))); | ||||
| 
 | ||||
| 		DelegatingReactiveAuthenticationManager manager = new DelegatingReactiveAuthenticationManager(this.delegate1, | ||||
| 				this.delegate2); | ||||
|  | ||||
| @ -31,12 +31,12 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyNoInteractions; | ||||
| import static org.mockito.Mockito.verifyNoMoreInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link ProviderManager}. | ||||
| @ -121,7 +121,7 @@ public class ProviderManagerTests { | ||||
| 	public void constructorWhenUsingListOfThenNoException() { | ||||
| 		List<AuthenticationProvider> providers = spy(ArrayList.class); | ||||
| 		// List.of(null) in JDK 9 throws a NullPointerException | ||||
| 		when(providers.contains(eq(null))).thenThrow(NullPointerException.class); | ||||
| 		given(providers.contains(eq(null))).willThrow(NullPointerException.class); | ||||
| 		providers.add(mock(AuthenticationProvider.class)); | ||||
| 		new ProviderManager(providers); | ||||
| 	} | ||||
| @ -211,7 +211,7 @@ public class ProviderManagerTests { | ||||
| 	public void parentAuthenticationIsUsedIfProvidersDontAuthenticate() { | ||||
| 		AuthenticationManager parent = mock(AuthenticationManager.class); | ||||
| 		Authentication authReq = mock(Authentication.class); | ||||
| 		when(parent.authenticate(authReq)).thenReturn(authReq); | ||||
| 		given(parent.authenticate(authReq)).willReturn(authReq); | ||||
| 		ProviderManager mgr = new ProviderManager(Collections.singletonList(mock(AuthenticationProvider.class)), | ||||
| 				parent); | ||||
| 		assertThat(mgr.authenticate(authReq)).isSameAs(authReq); | ||||
| @ -238,7 +238,7 @@ public class ProviderManagerTests { | ||||
| 		final Authentication authReq = mock(Authentication.class); | ||||
| 		AuthenticationEventPublisher publisher = mock(AuthenticationEventPublisher.class); | ||||
| 		AuthenticationManager parent = mock(AuthenticationManager.class); | ||||
| 		when(parent.authenticate(authReq)).thenThrow(new ProviderNotFoundException("")); | ||||
| 		given(parent.authenticate(authReq)).willThrow(new ProviderNotFoundException("")); | ||||
| 
 | ||||
| 		// Set a provider that throws an exception - this is the exception we expect to be | ||||
| 		// propagated | ||||
| @ -266,7 +266,7 @@ public class ProviderManagerTests { | ||||
| 		// Set a provider that throws an exception - this is the exception we expect to be | ||||
| 		// propagated | ||||
| 		final BadCredentialsException expected = new BadCredentialsException("I'm the one from the parent"); | ||||
| 		when(parent.authenticate(authReq)).thenThrow(expected); | ||||
| 		given(parent.authenticate(authReq)).willThrow(expected); | ||||
| 		try { | ||||
| 			mgr.authenticate(authReq); | ||||
| 			fail("Expected exception"); | ||||
| @ -339,16 +339,16 @@ public class ProviderManagerTests { | ||||
| 
 | ||||
| 	private AuthenticationProvider createProviderWhichThrows(final AuthenticationException e) { | ||||
| 		AuthenticationProvider provider = mock(AuthenticationProvider.class); | ||||
| 		when(provider.supports(any(Class.class))).thenReturn(true); | ||||
| 		when(provider.authenticate(any(Authentication.class))).thenThrow(e); | ||||
| 		given(provider.supports(any(Class.class))).willReturn(true); | ||||
| 		given(provider.authenticate(any(Authentication.class))).willThrow(e); | ||||
| 
 | ||||
| 		return provider; | ||||
| 	} | ||||
| 
 | ||||
| 	private AuthenticationProvider createProviderWhichReturns(final Authentication a) { | ||||
| 		AuthenticationProvider provider = mock(AuthenticationProvider.class); | ||||
| 		when(provider.supports(any(Class.class))).thenReturn(true); | ||||
| 		when(provider.authenticate(any(Authentication.class))).thenReturn(a); | ||||
| 		given(provider.supports(any(Class.class))).willReturn(true); | ||||
| 		given(provider.authenticate(any(Authentication.class))).willReturn(a); | ||||
| 
 | ||||
| 		return provider; | ||||
| 	} | ||||
|  | ||||
| @ -28,7 +28,7 @@ import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -62,8 +62,8 @@ public class ReactiveAuthenticationManagerAdapterTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenSuccessThenSuccess() { | ||||
| 		when(this.delegate.authenticate(any())).thenReturn(this.authentication); | ||||
| 		when(this.authentication.isAuthenticated()).thenReturn(true); | ||||
| 		given(this.delegate.authenticate(any())).willReturn(this.authentication); | ||||
| 		given(this.authentication.isAuthenticated()).willReturn(true); | ||||
| 
 | ||||
| 		Authentication result = this.manager.authenticate(this.authentication).block(); | ||||
| 
 | ||||
| @ -72,7 +72,7 @@ public class ReactiveAuthenticationManagerAdapterTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenReturnNotAuthenticatedThenError() { | ||||
| 		when(this.delegate.authenticate(any())).thenReturn(this.authentication); | ||||
| 		given(this.delegate.authenticate(any())).willReturn(this.authentication); | ||||
| 
 | ||||
| 		Authentication result = this.manager.authenticate(this.authentication).block(); | ||||
| 
 | ||||
| @ -81,7 +81,7 @@ public class ReactiveAuthenticationManagerAdapterTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenBadCredentialsThenError() { | ||||
| 		when(this.delegate.authenticate(any())).thenThrow(new BadCredentialsException("Failed")); | ||||
| 		given(this.delegate.authenticate(any())).willThrow(new BadCredentialsException("Failed")); | ||||
| 
 | ||||
| 		Mono<Authentication> result = this.manager.authenticate(this.authentication); | ||||
| 
 | ||||
|  | ||||
| @ -33,7 +33,7 @@ import org.springframework.security.crypto.password.PasswordEncoder; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -69,7 +69,7 @@ public class ReactiveUserDetailsServiceAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenUserNotFoundThenBadCredentials() { | ||||
| 		when(this.repository.findByUsername(this.username)).thenReturn(Mono.empty()); | ||||
| 		given(this.repository.findByUsername(this.username)).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.username, | ||||
| 				this.password); | ||||
| @ -86,7 +86,7 @@ public class ReactiveUserDetailsServiceAuthenticationManagerTests { | ||||
| 			.roles("USER") | ||||
| 			.build(); | ||||
| 		// @formatter:on | ||||
| 		when(this.repository.findByUsername(user.getUsername())).thenReturn(Mono.just(user)); | ||||
| 		given(this.repository.findByUsername(user.getUsername())).willReturn(Mono.just(user)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.username, | ||||
| 				this.password + "INVALID"); | ||||
| @ -103,7 +103,7 @@ public class ReactiveUserDetailsServiceAuthenticationManagerTests { | ||||
| 			.roles("USER") | ||||
| 			.build(); | ||||
| 		// @formatter:on | ||||
| 		when(this.repository.findByUsername(user.getUsername())).thenReturn(Mono.just(user)); | ||||
| 		given(this.repository.findByUsername(user.getUsername())).willReturn(Mono.just(user)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.username, | ||||
| 				this.password); | ||||
| @ -115,9 +115,9 @@ public class ReactiveUserDetailsServiceAuthenticationManagerTests { | ||||
| 	@Test | ||||
| 	public void authenticateWhenPasswordEncoderAndSuccessThenSuccess() { | ||||
| 		this.manager.setPasswordEncoder(this.passwordEncoder); | ||||
| 		when(this.passwordEncoder.matches(any(), any())).thenReturn(true); | ||||
| 		given(this.passwordEncoder.matches(any(), any())).willReturn(true); | ||||
| 		User user = new User(this.username, this.password, AuthorityUtils.createAuthorityList("ROLE_USER")); | ||||
| 		when(this.repository.findByUsername(user.getUsername())).thenReturn(Mono.just(user)); | ||||
| 		given(this.repository.findByUsername(user.getUsername())).willReturn(Mono.just(user)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.username, | ||||
| 				this.password); | ||||
| @ -129,9 +129,9 @@ public class ReactiveUserDetailsServiceAuthenticationManagerTests { | ||||
| 	@Test | ||||
| 	public void authenticateWhenPasswordEncoderAndFailThenFail() { | ||||
| 		this.manager.setPasswordEncoder(this.passwordEncoder); | ||||
| 		when(this.passwordEncoder.matches(any(), any())).thenReturn(false); | ||||
| 		given(this.passwordEncoder.matches(any(), any())).willReturn(false); | ||||
| 		User user = new User(this.username, this.password, AuthorityUtils.createAuthorityList("ROLE_USER")); | ||||
| 		when(this.repository.findByUsername(user.getUsername())).thenReturn(Mono.just(user)); | ||||
| 		given(this.repository.findByUsername(user.getUsername())).willReturn(Mono.just(user)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.username, | ||||
| 				this.password); | ||||
|  | ||||
| @ -38,10 +38,10 @@ import static org.assertj.core.api.Assertions.assertThatExceptionOfType; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -78,7 +78,7 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 	@Before | ||||
| 	public void setup() { | ||||
| 		this.manager = new UserDetailsRepositoryReactiveAuthenticationManager(this.userDetailsService); | ||||
| 		when(this.scheduler.schedule(any())).thenAnswer(a -> { | ||||
| 		given(this.scheduler.schedule(any())).willAnswer(a -> { | ||||
| 			Runnable r = a.getArgument(0); | ||||
| 			return Schedulers.immediate().schedule(r); | ||||
| 		}); | ||||
| @ -91,8 +91,8 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authentiateWhenCustomSchedulerThenUsed() { | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(this.user)); | ||||
| 		when(this.encoder.matches(any(), any())).thenReturn(true); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(this.user)); | ||||
| 		given(this.encoder.matches(any(), any())).willReturn(true); | ||||
| 		this.manager.setScheduler(this.scheduler); | ||||
| 		this.manager.setPasswordEncoder(this.encoder); | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.user, | ||||
| @ -106,11 +106,11 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 	@Test | ||||
| 	public void authenticateWhenPasswordServiceThenUpdated() { | ||||
| 		String encodedPassword = "encoded"; | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(this.user)); | ||||
| 		when(this.encoder.matches(any(), any())).thenReturn(true); | ||||
| 		when(this.encoder.upgradeEncoding(any())).thenReturn(true); | ||||
| 		when(this.encoder.encode(any())).thenReturn(encodedPassword); | ||||
| 		when(this.userDetailsPasswordService.updatePassword(any(), any())).thenReturn(Mono.just(this.user)); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(this.user)); | ||||
| 		given(this.encoder.matches(any(), any())).willReturn(true); | ||||
| 		given(this.encoder.upgradeEncoding(any())).willReturn(true); | ||||
| 		given(this.encoder.encode(any())).willReturn(encodedPassword); | ||||
| 		given(this.userDetailsPasswordService.updatePassword(any(), any())).willReturn(Mono.just(this.user)); | ||||
| 		this.manager.setPasswordEncoder(this.encoder); | ||||
| 		this.manager.setUserDetailsPasswordService(this.userDetailsPasswordService); | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.user, | ||||
| @ -124,8 +124,8 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenPasswordServiceAndBadCredentialsThenNotUpdated() { | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(this.user)); | ||||
| 		when(this.encoder.matches(any(), any())).thenReturn(false); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(this.user)); | ||||
| 		given(this.encoder.matches(any(), any())).willReturn(false); | ||||
| 		this.manager.setPasswordEncoder(this.encoder); | ||||
| 		this.manager.setUserDetailsPasswordService(this.userDetailsPasswordService); | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.user, | ||||
| @ -138,9 +138,9 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenPasswordServiceAndUpgradeFalseThenNotUpdated() { | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(this.user)); | ||||
| 		when(this.encoder.matches(any(), any())).thenReturn(true); | ||||
| 		when(this.encoder.upgradeEncoding(any())).thenReturn(false); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(this.user)); | ||||
| 		given(this.encoder.matches(any(), any())).willReturn(true); | ||||
| 		given(this.encoder.upgradeEncoding(any())).willReturn(false); | ||||
| 		this.manager.setPasswordEncoder(this.encoder); | ||||
| 		this.manager.setUserDetailsPasswordService(this.userDetailsPasswordService); | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.user, | ||||
| @ -153,9 +153,9 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenPostAuthenticationChecksFail() { | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(this.user)); | ||||
| 		doThrow(new LockedException("account is locked")).when(this.postAuthenticationChecks).check(any()); | ||||
| 		when(this.encoder.matches(any(), any())).thenReturn(true); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(this.user)); | ||||
| 		willThrow(new LockedException("account is locked")).given(this.postAuthenticationChecks).check(any()); | ||||
| 		given(this.encoder.matches(any(), any())).willReturn(true); | ||||
| 		this.manager.setPasswordEncoder(this.encoder); | ||||
| 		this.manager.setPostAuthenticationChecks(this.postAuthenticationChecks); | ||||
| 
 | ||||
| @ -168,8 +168,8 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authenticateWhenPostAuthenticationChecksNotSet() { | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(this.user)); | ||||
| 		when(this.encoder.matches(any(), any())).thenReturn(true); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(this.user)); | ||||
| 		given(this.encoder.matches(any(), any())).willReturn(true); | ||||
| 		this.manager.setPasswordEncoder(this.encoder); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(this.user, | ||||
| @ -190,7 +190,7 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 				.accountExpired(true) | ||||
| 				.build(); | ||||
| 		// @formatter:on | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(expiredUser)); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(expiredUser)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(expiredUser, | ||||
| 				expiredUser.getPassword()); | ||||
| @ -208,7 +208,7 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 				.accountLocked(true) | ||||
| 				.build(); | ||||
| 		// @formatter:on | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(lockedUser)); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(lockedUser)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(lockedUser, | ||||
| 				lockedUser.getPassword()); | ||||
| @ -227,7 +227,7 @@ public class UserDetailsRepositoryReactiveAuthenticationManagerTests { | ||||
| 				.disabled(true) | ||||
| 				.build(); | ||||
| 		// @formatter:on | ||||
| 		when(this.userDetailsService.findByUsername(any())).thenReturn(Mono.just(disabledUser)); | ||||
| 		given(this.userDetailsService.findByUsername(any())).willReturn(Mono.just(disabledUser)); | ||||
| 
 | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(disabledUser, | ||||
| 				disabledUser.getPassword()); | ||||
|  | ||||
| @ -55,11 +55,11 @@ import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.ArgumentMatchers.isA; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.times; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link DaoAuthenticationProvider}. | ||||
| @ -398,11 +398,11 @@ public class DaoAuthenticationProviderTests { | ||||
| 		provider.setUserDetailsPasswordService(passwordManager); | ||||
| 
 | ||||
| 		UserDetails user = PasswordEncodedUser.user(); | ||||
| 		when(encoder.matches(any(), any())).thenReturn(true); | ||||
| 		when(encoder.upgradeEncoding(any())).thenReturn(true); | ||||
| 		when(encoder.encode(any())).thenReturn(encodedPassword); | ||||
| 		when(userDetailsService.loadUserByUsername(any())).thenReturn(user); | ||||
| 		when(passwordManager.updatePassword(any(), any())).thenReturn(user); | ||||
| 		given(encoder.matches(any(), any())).willReturn(true); | ||||
| 		given(encoder.upgradeEncoding(any())).willReturn(true); | ||||
| 		given(encoder.encode(any())).willReturn(encodedPassword); | ||||
| 		given(userDetailsService.loadUserByUsername(any())).willReturn(user); | ||||
| 		given(passwordManager.updatePassword(any(), any())).willReturn(user); | ||||
| 
 | ||||
| 		Authentication result = provider.authenticate(token); | ||||
| 
 | ||||
| @ -423,8 +423,8 @@ public class DaoAuthenticationProviderTests { | ||||
| 		provider.setUserDetailsPasswordService(passwordManager); | ||||
| 
 | ||||
| 		UserDetails user = PasswordEncodedUser.user(); | ||||
| 		when(encoder.matches(any(), any())).thenReturn(false); | ||||
| 		when(userDetailsService.loadUserByUsername(any())).thenReturn(user); | ||||
| 		given(encoder.matches(any(), any())).willReturn(false); | ||||
| 		given(userDetailsService.loadUserByUsername(any())).willReturn(user); | ||||
| 
 | ||||
| 		assertThatThrownBy(() -> provider.authenticate(token)).isInstanceOf(BadCredentialsException.class); | ||||
| 
 | ||||
| @ -444,9 +444,9 @@ public class DaoAuthenticationProviderTests { | ||||
| 		provider.setUserDetailsPasswordService(passwordManager); | ||||
| 
 | ||||
| 		UserDetails user = PasswordEncodedUser.user(); | ||||
| 		when(encoder.matches(any(), any())).thenReturn(true); | ||||
| 		when(encoder.upgradeEncoding(any())).thenReturn(false); | ||||
| 		when(userDetailsService.loadUserByUsername(any())).thenReturn(user); | ||||
| 		given(encoder.matches(any(), any())).willReturn(true); | ||||
| 		given(encoder.upgradeEncoding(any())).willReturn(false); | ||||
| 		given(userDetailsService.loadUserByUsername(any())).willReturn(user); | ||||
| 
 | ||||
| 		Authentication result = provider.authenticate(token); | ||||
| 
 | ||||
| @ -564,7 +564,7 @@ public class DaoAuthenticationProviderTests { | ||||
| 	public void testUserNotFoundEncodesPassword() throws Exception { | ||||
| 		UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken("missing", "koala"); | ||||
| 		PasswordEncoder encoder = mock(PasswordEncoder.class); | ||||
| 		when(encoder.encode(anyString())).thenReturn("koala"); | ||||
| 		given(encoder.encode(anyString())).willReturn("koala"); | ||||
| 		DaoAuthenticationProvider provider = new DaoAuthenticationProvider(); | ||||
| 		provider.setHideUserNotFoundExceptions(false); | ||||
| 		provider.setPasswordEncoder(encoder); | ||||
|  | ||||
| @ -47,11 +47,11 @@ import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.anyString; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.ArgumentMatchers.isA; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyNoMoreInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| public class DefaultJaasAuthenticationProviderTests { | ||||
| 
 | ||||
| @ -76,7 +76,7 @@ public class DefaultJaasAuthenticationProviderTests { | ||||
| 		AppConfigurationEntry[] aces = new AppConfigurationEntry[] { | ||||
| 				new AppConfigurationEntry(TestLoginModule.class.getName(), LoginModuleControlFlag.REQUIRED, | ||||
| 						Collections.<String, Object>emptyMap()) }; | ||||
| 		when(configuration.getAppConfigurationEntry(this.provider.getLoginContextName())).thenReturn(aces); | ||||
| 		given(configuration.getAppConfigurationEntry(this.provider.getLoginContextName())).willReturn(aces); | ||||
| 		this.token = new UsernamePasswordAuthenticationToken("user", "password"); | ||||
| 		ReflectionTestUtils.setField(this.provider, "log", this.log); | ||||
| 
 | ||||
| @ -141,9 +141,9 @@ public class DefaultJaasAuthenticationProviderTests { | ||||
| 		JaasAuthenticationToken token = mock(JaasAuthenticationToken.class); | ||||
| 		LoginContext context = mock(LoginContext.class); | ||||
| 
 | ||||
| 		when(event.getSecurityContexts()).thenReturn(Arrays.asList(securityContext)); | ||||
| 		when(securityContext.getAuthentication()).thenReturn(token); | ||||
| 		when(token.getLoginContext()).thenReturn(context); | ||||
| 		given(event.getSecurityContexts()).willReturn(Arrays.asList(securityContext)); | ||||
| 		given(securityContext.getAuthentication()).willReturn(token); | ||||
| 		given(token.getLoginContext()).willReturn(context); | ||||
| 
 | ||||
| 		this.provider.onApplicationEvent(event); | ||||
| 
 | ||||
| @ -170,7 +170,7 @@ public class DefaultJaasAuthenticationProviderTests { | ||||
| 		SessionDestroyedEvent event = mock(SessionDestroyedEvent.class); | ||||
| 		SecurityContext securityContext = mock(SecurityContext.class); | ||||
| 
 | ||||
| 		when(event.getSecurityContexts()).thenReturn(Arrays.asList(securityContext)); | ||||
| 		given(event.getSecurityContexts()).willReturn(Arrays.asList(securityContext)); | ||||
| 
 | ||||
| 		this.provider.handleLogout(event); | ||||
| 
 | ||||
| @ -185,8 +185,8 @@ public class DefaultJaasAuthenticationProviderTests { | ||||
| 		SessionDestroyedEvent event = mock(SessionDestroyedEvent.class); | ||||
| 		SecurityContext securityContext = mock(SecurityContext.class); | ||||
| 
 | ||||
| 		when(event.getSecurityContexts()).thenReturn(Arrays.asList(securityContext)); | ||||
| 		when(securityContext.getAuthentication()).thenReturn(this.token); | ||||
| 		given(event.getSecurityContexts()).willReturn(Arrays.asList(securityContext)); | ||||
| 		given(securityContext.getAuthentication()).willReturn(this.token); | ||||
| 
 | ||||
| 		this.provider.handleLogout(event); | ||||
| 
 | ||||
| @ -202,8 +202,8 @@ public class DefaultJaasAuthenticationProviderTests { | ||||
| 		SecurityContext securityContext = mock(SecurityContext.class); | ||||
| 		JaasAuthenticationToken token = mock(JaasAuthenticationToken.class); | ||||
| 
 | ||||
| 		when(event.getSecurityContexts()).thenReturn(Arrays.asList(securityContext)); | ||||
| 		when(securityContext.getAuthentication()).thenReturn(token); | ||||
| 		given(event.getSecurityContexts()).willReturn(Arrays.asList(securityContext)); | ||||
| 		given(securityContext.getAuthentication()).willReturn(token); | ||||
| 
 | ||||
| 		this.provider.onApplicationEvent(event); | ||||
| 		verify(event).getSecurityContexts(); | ||||
| @ -221,10 +221,10 @@ public class DefaultJaasAuthenticationProviderTests { | ||||
| 		LoginContext context = mock(LoginContext.class); | ||||
| 		LoginException loginException = new LoginException("Failed Login"); | ||||
| 
 | ||||
| 		when(event.getSecurityContexts()).thenReturn(Arrays.asList(securityContext)); | ||||
| 		when(securityContext.getAuthentication()).thenReturn(token); | ||||
| 		when(token.getLoginContext()).thenReturn(context); | ||||
| 		doThrow(loginException).when(context).logout(); | ||||
| 		given(event.getSecurityContexts()).willReturn(Arrays.asList(securityContext)); | ||||
| 		given(securityContext.getAuthentication()).willReturn(token); | ||||
| 		given(token.getLoginContext()).willReturn(context); | ||||
| 		willThrow(loginException).given(context).logout(); | ||||
| 
 | ||||
| 		this.provider.onApplicationEvent(event); | ||||
| 
 | ||||
|  | ||||
| @ -47,8 +47,8 @@ import org.springframework.security.core.session.SessionDestroyedEvent; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for the JaasAuthenticationProvider | ||||
| @ -258,7 +258,7 @@ public class JaasAuthenticationProviderTests { | ||||
| 		context.setAuthentication(token); | ||||
| 
 | ||||
| 		SessionDestroyedEvent event = mock(SessionDestroyedEvent.class); | ||||
| 		when(event.getSecurityContexts()).thenReturn(Arrays.asList(context)); | ||||
| 		given(event.getSecurityContexts()).willReturn(Arrays.asList(context)); | ||||
| 
 | ||||
| 		this.jaasProvider.handleLogout(event); | ||||
| 
 | ||||
|  | ||||
| @ -25,8 +25,8 @@ import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link RemoteAuthenticationManagerImpl}. | ||||
| @ -39,7 +39,7 @@ public class RemoteAuthenticationManagerImplTests { | ||||
| 	public void testFailedAuthenticationReturnsRemoteAuthenticationException() { | ||||
| 		RemoteAuthenticationManagerImpl manager = new RemoteAuthenticationManagerImpl(); | ||||
| 		AuthenticationManager am = mock(AuthenticationManager.class); | ||||
| 		when(am.authenticate(any(Authentication.class))).thenThrow(new BadCredentialsException("")); | ||||
| 		given(am.authenticate(any(Authentication.class))).willThrow(new BadCredentialsException("")); | ||||
| 		manager.setAuthenticationManager(am); | ||||
| 
 | ||||
| 		manager.attemptAuthentication("rod", "password"); | ||||
| @ -65,7 +65,7 @@ public class RemoteAuthenticationManagerImplTests { | ||||
| 	public void testSuccessfulAuthentication() { | ||||
| 		RemoteAuthenticationManagerImpl manager = new RemoteAuthenticationManagerImpl(); | ||||
| 		AuthenticationManager am = mock(AuthenticationManager.class); | ||||
| 		when(am.authenticate(any(Authentication.class))).thenReturn(new TestingAuthenticationToken("u", "p", "A")); | ||||
| 		given(am.authenticate(any(Authentication.class))).willReturn(new TestingAuthenticationToken("u", "p", "A")); | ||||
| 		manager.setAuthenticationManager(am); | ||||
| 
 | ||||
| 		manager.attemptAuthentication("rod", "password"); | ||||
|  | ||||
| @ -27,8 +27,8 @@ import org.springframework.security.authentication.AnonymousAuthenticationToken; | ||||
| import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -45,7 +45,7 @@ public class AuthenticatedReactiveAuthorizationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void checkWhenAuthenticatedThenReturnTrue() { | ||||
| 		when(this.authentication.isAuthenticated()).thenReturn(true); | ||||
| 		given(this.authentication.isAuthenticated()).willReturn(true); | ||||
| 
 | ||||
| 		boolean granted = this.manager.check(Mono.just(this.authentication), null).block().isGranted(); | ||||
| 
 | ||||
|  | ||||
| @ -29,7 +29,7 @@ import org.springframework.security.authentication.TestingAuthenticationToken; | ||||
| import org.springframework.security.core.Authentication; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -66,8 +66,8 @@ public class AuthorityReactiveAuthorizationManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void checkWhenHasAuthorityAndAuthenticatedAndNoAuthoritiesThenReturnFalse() { | ||||
| 		when(this.authentication.isAuthenticated()).thenReturn(true); | ||||
| 		when(this.authentication.getAuthorities()).thenReturn(Collections.emptyList()); | ||||
| 		given(this.authentication.isAuthenticated()).willReturn(true); | ||||
| 		given(this.authentication.getAuthorities()).willReturn(Collections.emptyList()); | ||||
| 
 | ||||
| 		boolean granted = this.manager.check(Mono.just(this.authentication), null).block().isGranted(); | ||||
| 
 | ||||
|  | ||||
| @ -26,8 +26,8 @@ import org.junit.Test; | ||||
| import org.mockito.Mock; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Abstract class for testing {@link DelegatingSecurityContextExecutorService} which | ||||
| @ -97,7 +97,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void submitCallable() { | ||||
| 		when(this.delegate.submit(this.wrappedCallable)).thenReturn(this.expectedFutureObject); | ||||
| 		given(this.delegate.submit(this.wrappedCallable)).willReturn(this.expectedFutureObject); | ||||
| 		Future<Object> result = this.executor.submit(this.callable); | ||||
| 		verify(this.delegate).submit(this.wrappedCallable); | ||||
| 		assertThat(result).isEqualTo(this.expectedFutureObject); | ||||
| @ -105,7 +105,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void submitRunnableWithResult() { | ||||
| 		when(this.delegate.submit(this.wrappedRunnable, this.resultArg)).thenReturn(this.expectedFutureObject); | ||||
| 		given(this.delegate.submit(this.wrappedRunnable, this.resultArg)).willReturn(this.expectedFutureObject); | ||||
| 		Future<Object> result = this.executor.submit(this.runnable, this.resultArg); | ||||
| 		verify(this.delegate).submit(this.wrappedRunnable, this.resultArg); | ||||
| 		assertThat(result).isEqualTo(this.expectedFutureObject); | ||||
| @ -114,7 +114,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 	@Test | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	public void submitRunnable() { | ||||
| 		when((Future<Object>) this.delegate.submit(this.wrappedRunnable)).thenReturn(this.expectedFutureObject); | ||||
| 		given((Future<Object>) this.delegate.submit(this.wrappedRunnable)).willReturn(this.expectedFutureObject); | ||||
| 		Future<?> result = this.executor.submit(this.runnable); | ||||
| 		verify(this.delegate).submit(this.wrappedRunnable); | ||||
| 		assertThat(result).isEqualTo(this.expectedFutureObject); | ||||
| @ -125,7 +125,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 	public void invokeAll() throws Exception { | ||||
| 		List<Future<Object>> exectedResult = Arrays.asList(this.expectedFutureObject); | ||||
| 		List<Callable<Object>> wrappedCallables = Arrays.asList(this.wrappedCallable); | ||||
| 		when(this.delegate.invokeAll(wrappedCallables)).thenReturn(exectedResult); | ||||
| 		given(this.delegate.invokeAll(wrappedCallables)).willReturn(exectedResult); | ||||
| 		List<Future<Object>> result = this.executor.invokeAll(Arrays.asList(this.callable)); | ||||
| 		verify(this.delegate).invokeAll(wrappedCallables); | ||||
| 		assertThat(result).isEqualTo(exectedResult); | ||||
| @ -136,7 +136,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 	public void invokeAllTimeout() throws Exception { | ||||
| 		List<Future<Object>> exectedResult = Arrays.asList(this.expectedFutureObject); | ||||
| 		List<Callable<Object>> wrappedCallables = Arrays.asList(this.wrappedCallable); | ||||
| 		when(this.delegate.invokeAll(wrappedCallables, 1, TimeUnit.SECONDS)).thenReturn(exectedResult); | ||||
| 		given(this.delegate.invokeAll(wrappedCallables, 1, TimeUnit.SECONDS)).willReturn(exectedResult); | ||||
| 		List<Future<Object>> result = this.executor.invokeAll(Arrays.asList(this.callable), 1, TimeUnit.SECONDS); | ||||
| 		verify(this.delegate).invokeAll(wrappedCallables, 1, TimeUnit.SECONDS); | ||||
| 		assertThat(result).isEqualTo(exectedResult); | ||||
| @ -147,7 +147,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 	public void invokeAny() throws Exception { | ||||
| 		List<Future<Object>> exectedResult = Arrays.asList(this.expectedFutureObject); | ||||
| 		List<Callable<Object>> wrappedCallables = Arrays.asList(this.wrappedCallable); | ||||
| 		when(this.delegate.invokeAny(wrappedCallables)).thenReturn(exectedResult); | ||||
| 		given(this.delegate.invokeAny(wrappedCallables)).willReturn(exectedResult); | ||||
| 		Object result = this.executor.invokeAny(Arrays.asList(this.callable)); | ||||
| 		verify(this.delegate).invokeAny(wrappedCallables); | ||||
| 		assertThat(result).isEqualTo(exectedResult); | ||||
| @ -158,7 +158,7 @@ public abstract class AbstractDelegatingSecurityContextExecutorServiceTests | ||||
| 	public void invokeAnyTimeout() throws Exception { | ||||
| 		List<Future<Object>> exectedResult = Arrays.asList(this.expectedFutureObject); | ||||
| 		List<Callable<Object>> wrappedCallables = Arrays.asList(this.wrappedCallable); | ||||
| 		when(this.delegate.invokeAny(wrappedCallables, 1, TimeUnit.SECONDS)).thenReturn(exectedResult); | ||||
| 		given(this.delegate.invokeAny(wrappedCallables, 1, TimeUnit.SECONDS)).willReturn(exectedResult); | ||||
| 		Object result = this.executor.invokeAny(Arrays.asList(this.callable), 1, TimeUnit.SECONDS); | ||||
| 		verify(this.delegate).invokeAny(wrappedCallables, 1, TimeUnit.SECONDS); | ||||
| 		assertThat(result).isEqualTo(exectedResult); | ||||
|  | ||||
| @ -23,8 +23,8 @@ import org.junit.Test; | ||||
| import org.mockito.Mock; | ||||
| 
 | ||||
| import static org.assertj.core.api.AssertionsForClassTypes.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Abstract class for testing {@link DelegatingSecurityContextScheduledExecutorService} | ||||
| @ -52,8 +52,8 @@ public abstract class AbstractDelegatingSecurityContextScheduledExecutorServiceT | ||||
| 	@Test | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	public void scheduleRunnable() { | ||||
| 		when((ScheduledFuture<Object>) this.delegate.schedule(this.wrappedRunnable, 1, TimeUnit.SECONDS)) | ||||
| 				.thenReturn(this.expectedResult); | ||||
| 		given((ScheduledFuture<Object>) this.delegate.schedule(this.wrappedRunnable, 1, TimeUnit.SECONDS)) | ||||
| 				.willReturn(this.expectedResult); | ||||
| 		ScheduledFuture<?> result = this.executor.schedule(this.runnable, 1, TimeUnit.SECONDS); | ||||
| 		assertThat(result).isEqualTo(this.expectedResult); | ||||
| 		verify(this.delegate).schedule(this.wrappedRunnable, 1, TimeUnit.SECONDS); | ||||
| @ -61,7 +61,7 @@ public abstract class AbstractDelegatingSecurityContextScheduledExecutorServiceT | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void scheduleCallable() { | ||||
| 		when(this.delegate.schedule(this.wrappedCallable, 1, TimeUnit.SECONDS)).thenReturn(this.expectedResult); | ||||
| 		given(this.delegate.schedule(this.wrappedCallable, 1, TimeUnit.SECONDS)).willReturn(this.expectedResult); | ||||
| 		ScheduledFuture<Object> result = this.executor.schedule(this.callable, 1, TimeUnit.SECONDS); | ||||
| 		assertThat(result).isEqualTo(this.expectedResult); | ||||
| 		verify(this.delegate).schedule(this.wrappedCallable, 1, TimeUnit.SECONDS); | ||||
| @ -70,8 +70,8 @@ public abstract class AbstractDelegatingSecurityContextScheduledExecutorServiceT | ||||
| 	@Test | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	public void scheduleAtFixedRate() { | ||||
| 		when((ScheduledFuture<Object>) this.delegate.scheduleAtFixedRate(this.wrappedRunnable, 1, 2, TimeUnit.SECONDS)) | ||||
| 				.thenReturn(this.expectedResult); | ||||
| 		given((ScheduledFuture<Object>) this.delegate.scheduleAtFixedRate(this.wrappedRunnable, 1, 2, TimeUnit.SECONDS)) | ||||
| 				.willReturn(this.expectedResult); | ||||
| 		ScheduledFuture<?> result = this.executor.scheduleAtFixedRate(this.runnable, 1, 2, TimeUnit.SECONDS); | ||||
| 		assertThat(result).isEqualTo(this.expectedResult); | ||||
| 		verify(this.delegate).scheduleAtFixedRate(this.wrappedRunnable, 1, 2, TimeUnit.SECONDS); | ||||
| @ -80,8 +80,8 @@ public abstract class AbstractDelegatingSecurityContextScheduledExecutorServiceT | ||||
| 	@Test | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	public void scheduleWithFixedDelay() { | ||||
| 		when((ScheduledFuture<Object>) this.delegate.scheduleWithFixedDelay(this.wrappedRunnable, 1, 2, | ||||
| 				TimeUnit.SECONDS)).thenReturn(this.expectedResult); | ||||
| 		given((ScheduledFuture<Object>) this.delegate.scheduleWithFixedDelay(this.wrappedRunnable, 1, 2, | ||||
| 				TimeUnit.SECONDS)).willReturn(this.expectedResult); | ||||
| 		ScheduledFuture<?> result = this.executor.scheduleWithFixedDelay(this.runnable, 1, 2, TimeUnit.SECONDS); | ||||
| 		assertThat(result).isEqualTo(this.expectedResult); | ||||
| 		verify(this.delegate).scheduleWithFixedDelay(this.wrappedRunnable, 1, 2, TimeUnit.SECONDS); | ||||
|  | ||||
| @ -33,8 +33,8 @@ import org.springframework.security.core.context.SecurityContext; | ||||
| import org.springframework.security.core.context.SecurityContextHolder; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -62,7 +62,7 @@ public class DelegatingSecurityContextCallableTests { | ||||
| 	@SuppressWarnings("serial") | ||||
| 	public void setUp() throws Exception { | ||||
| 		this.originalSecurityContext = SecurityContextHolder.createEmptyContext(); | ||||
| 		when(this.delegate.call()).thenAnswer(new Returns(this.callableResult) { | ||||
| 		given(this.delegate.call()).willAnswer(new Returns(this.callableResult) { | ||||
| 			@Override | ||||
| 			public Object answer(InvocationOnMock invocation) throws Throwable { | ||||
| 				assertThat(SecurityContextHolder.getContext()) | ||||
|  | ||||
| @ -33,7 +33,7 @@ import org.springframework.security.core.context.SecurityContext; | ||||
| import org.springframework.security.core.context.SecurityContextHolder; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.doAnswer; | ||||
| import static org.mockito.BDDMockito.willAnswer; | ||||
| import static org.mockito.Mockito.verify; | ||||
| 
 | ||||
| /** | ||||
| @ -61,10 +61,10 @@ public class DelegatingSecurityContextRunnableTests { | ||||
| 	@Before | ||||
| 	public void setUp() { | ||||
| 		this.originalSecurityContext = SecurityContextHolder.createEmptyContext(); | ||||
| 		doAnswer((Answer<Object>) invocation -> { | ||||
| 		willAnswer((Answer<Object>) invocation -> { | ||||
| 			assertThat(SecurityContextHolder.getContext()).isEqualTo(this.securityContext); | ||||
| 			return null; | ||||
| 		}).when(this.delegate).run(); | ||||
| 		}).given(this.delegate).run(); | ||||
| 
 | ||||
| 		this.executor = Executors.newFixedThreadPool(1); | ||||
| 	} | ||||
|  | ||||
| @ -25,9 +25,9 @@ import org.springframework.context.ApplicationEvent; | ||||
| import org.springframework.context.event.SmartApplicationListener; | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class DelegatingApplicationListenerTests { | ||||
| @ -56,8 +56,8 @@ public class DelegatingApplicationListenerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void processEventSuccess() { | ||||
| 		when(this.delegate.supportsEventType(this.event.getClass())).thenReturn(true); | ||||
| 		when(this.delegate.supportsSourceType(this.event.getSource().getClass())).thenReturn(true); | ||||
| 		given(this.delegate.supportsEventType(this.event.getClass())).willReturn(true); | ||||
| 		given(this.delegate.supportsSourceType(this.event.getSource().getClass())).willReturn(true); | ||||
| 		this.listener.onApplicationEvent(this.event); | ||||
| 
 | ||||
| 		verify(this.delegate).onApplicationEvent(this.event); | ||||
| @ -72,7 +72,7 @@ public class DelegatingApplicationListenerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void processEventSourceTypeNotSupported() { | ||||
| 		when(this.delegate.supportsEventType(this.event.getClass())).thenReturn(true); | ||||
| 		given(this.delegate.supportsEventType(this.event.getClass())).willReturn(true); | ||||
| 		this.listener.onApplicationEvent(this.event); | ||||
| 
 | ||||
| 		verify(this.delegate, never()).onApplicationEvent(any(ApplicationEvent.class)); | ||||
|  | ||||
| @ -45,8 +45,8 @@ import org.springframework.security.core.userdetails.UserDetails; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link JdbcUserDetailsManager} | ||||
| @ -225,7 +225,7 @@ public class JdbcUserDetailsManagerTests { | ||||
| 		insertJoe(); | ||||
| 		Authentication currentAuth = authenticateJoe(); | ||||
| 		AuthenticationManager am = mock(AuthenticationManager.class); | ||||
| 		when(am.authenticate(currentAuth)).thenReturn(currentAuth); | ||||
| 		given(am.authenticate(currentAuth)).willReturn(currentAuth); | ||||
| 
 | ||||
| 		this.manager.setAuthenticationManager(am); | ||||
| 		this.manager.changePassword("password", "newPassword"); | ||||
| @ -245,7 +245,7 @@ public class JdbcUserDetailsManagerTests { | ||||
| 		insertJoe(); | ||||
| 		authenticateJoe(); | ||||
| 		AuthenticationManager am = mock(AuthenticationManager.class); | ||||
| 		when(am.authenticate(any(Authentication.class))).thenThrow(new BadCredentialsException("")); | ||||
| 		given(am.authenticate(any(Authentication.class))).willThrow(new BadCredentialsException("")); | ||||
| 
 | ||||
| 		this.manager.setAuthenticationManager(am); | ||||
| 
 | ||||
|  | ||||
| @ -26,8 +26,8 @@ import org.springframework.security.crypto.codec.Hex; | ||||
| import org.springframework.security.crypto.keygen.BytesKeyGenerator; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.crypto.encrypt.AesBytesEncryptor.CipherAlgorithm.GCM; | ||||
| import static org.springframework.security.crypto.encrypt.CipherUtils.newSecretKey; | ||||
| import static org.springframework.security.crypto.password.Pbkdf2PasswordEncoder.SecretKeyFactoryAlgorithm.PBKDF2WithHmacSHA1; | ||||
| @ -48,8 +48,8 @@ public class AesBytesEncryptorTests { | ||||
| 	@Before | ||||
| 	public void setUp() { | ||||
| 		this.generator = mock(BytesKeyGenerator.class); | ||||
| 		when(this.generator.generateKey()).thenReturn(Hex.decode("4b0febebd439db7ca77153cb254520c3")); | ||||
| 		when(this.generator.getKeyLength()).thenReturn(16); | ||||
| 		given(this.generator.generateKey()).willReturn(Hex.decode("4b0febebd439db7ca77153cb254520c3")); | ||||
| 		given(this.generator.getKeyLength()).willReturn(16); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
|  | ||||
| @ -29,9 +29,9 @@ import org.mockito.junit.MockitoJUnitRunner; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyZeroInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Rob Winch | ||||
| @ -101,14 +101,14 @@ public class DelegatingPasswordEncoderTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void encodeWhenValidThenUsesIdForEncode() { | ||||
| 		when(this.bcrypt.encode(this.rawPassword)).thenReturn(this.encodedPassword); | ||||
| 		given(this.bcrypt.encode(this.rawPassword)).willReturn(this.encodedPassword); | ||||
| 
 | ||||
| 		assertThat(this.passwordEncoder.encode(this.rawPassword)).isEqualTo(this.bcryptEncodedPassword); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesWhenBCryptThenDelegatesToBCrypt() { | ||||
| 		when(this.bcrypt.matches(this.rawPassword, this.encodedPassword)).thenReturn(true); | ||||
| 		given(this.bcrypt.matches(this.rawPassword, this.encodedPassword)).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.passwordEncoder.matches(this.rawPassword, this.bcryptEncodedPassword)).isTrue(); | ||||
| 
 | ||||
| @ -118,7 +118,7 @@ public class DelegatingPasswordEncoderTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesWhenNoopThenDelegatesToNoop() { | ||||
| 		when(this.noop.matches(this.rawPassword, this.encodedPassword)).thenReturn(true); | ||||
| 		given(this.noop.matches(this.rawPassword, this.encodedPassword)).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.passwordEncoder.matches(this.rawPassword, this.noopEncodedPassword)).isTrue(); | ||||
| 
 | ||||
| @ -188,7 +188,7 @@ public class DelegatingPasswordEncoderTests { | ||||
| 	public void matchesWhenNullIdThenDelegatesToInvalidId() { | ||||
| 		this.delegates.put(null, this.invalidId); | ||||
| 		this.passwordEncoder = new DelegatingPasswordEncoder(this.bcryptId, this.delegates); | ||||
| 		when(this.invalidId.matches(this.rawPassword, this.encodedPassword)).thenReturn(true); | ||||
| 		given(this.invalidId.matches(this.rawPassword, this.encodedPassword)).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.passwordEncoder.matches(this.rawPassword, this.encodedPassword)).isTrue(); | ||||
| 
 | ||||
| @ -225,7 +225,7 @@ public class DelegatingPasswordEncoderTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void upgradeEncodingWhenSameIdAndEncoderTrueThenEncoderDecidesTrue() { | ||||
| 		when(this.bcrypt.upgradeEncoding(any())).thenReturn(true); | ||||
| 		given(this.bcrypt.upgradeEncoding(any())).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.passwordEncoder.upgradeEncoding(this.bcryptEncodedPassword)).isTrue(); | ||||
| 
 | ||||
|  | ||||
| @ -3,7 +3,6 @@ | ||||
| 		"-//Checkstyle//DTD SuppressionFilter Configuration 1.2//EN" | ||||
| 		"https://checkstyle.org/dtds/suppressions_1_2.dtd"> | ||||
| <suppressions> | ||||
| 	<suppress files=".*" checks="RegexpSinglelineJava" /> | ||||
| 	<suppress files=".*" checks="SimplifyBooleanExpression" /> | ||||
| 	<suppress files=".*" checks="SimplifyBooleanReturn" /> | ||||
| 	<suppress files=".*" checks="SpringAvoidStaticImport" /> | ||||
|  | ||||
| @ -22,9 +22,9 @@ import javax.naming.directory.DirContext; | ||||
| import org.junit.Test; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link LdapUtils} | ||||
| @ -36,7 +36,7 @@ public class LdapUtilsTests { | ||||
| 	@Test | ||||
| 	public void testCloseContextSwallowsNamingException() throws Exception { | ||||
| 		final DirContext dirCtx = mock(DirContext.class); | ||||
| 		doThrow(new NamingException()).when(dirCtx).close(); | ||||
| 		willThrow(new NamingException()).given(dirCtx).close(); | ||||
| 
 | ||||
| 		LdapUtils.closeContext(dirCtx); | ||||
| 	} | ||||
| @ -45,7 +45,7 @@ public class LdapUtilsTests { | ||||
| 	public void testGetRelativeNameReturnsEmptyStringForDnEqualToBaseName() throws Exception { | ||||
| 		final DirContext mockCtx = mock(DirContext.class); | ||||
| 
 | ||||
| 		when(mockCtx.getNameInNamespace()).thenReturn("dc=springframework,dc=org"); | ||||
| 		given(mockCtx.getNameInNamespace()).willReturn("dc=springframework,dc=org"); | ||||
| 
 | ||||
| 		assertThat(LdapUtils.getRelativeName("dc=springframework,dc=org", mockCtx)).isEqualTo(""); | ||||
| 	} | ||||
| @ -53,7 +53,7 @@ public class LdapUtilsTests { | ||||
| 	@Test | ||||
| 	public void testGetRelativeNameReturnsFullDnWithEmptyBaseName() throws Exception { | ||||
| 		final DirContext mockCtx = mock(DirContext.class); | ||||
| 		when(mockCtx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(mockCtx.getNameInNamespace()).willReturn(""); | ||||
| 
 | ||||
| 		assertThat(LdapUtils.getRelativeName("cn=jane,dc=springframework,dc=org", mockCtx)) | ||||
| 				.isEqualTo("cn=jane,dc=springframework,dc=org"); | ||||
| @ -62,7 +62,7 @@ public class LdapUtilsTests { | ||||
| 	@Test | ||||
| 	public void testGetRelativeNameWorksWithArbitrarySpaces() throws Exception { | ||||
| 		final DirContext mockCtx = mock(DirContext.class); | ||||
| 		when(mockCtx.getNameInNamespace()).thenReturn("dc=springsecurity,dc = org"); | ||||
| 		given(mockCtx.getNameInNamespace()).willReturn("dc=springsecurity,dc = org"); | ||||
| 
 | ||||
| 		assertThat(LdapUtils.getRelativeName("cn=jane smith, dc = springsecurity , dc=org", mockCtx)) | ||||
| 				.isEqualTo("cn=jane smith"); | ||||
|  | ||||
| @ -33,8 +33,8 @@ import org.springframework.ldap.core.DistinguishedName; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class SpringSecurityLdapTemplateTests { | ||||
| @ -60,11 +60,11 @@ public class SpringSecurityLdapTemplateTests { | ||||
| 		Object[] params = new Object[] {}; | ||||
| 		DirContextAdapter searchResultObject = mock(DirContextAdapter.class); | ||||
| 
 | ||||
| 		when(this.ctx.search(any(DistinguishedName.class), eq(filter), eq(params), this.searchControls.capture())) | ||||
| 				.thenReturn(this.resultsEnum); | ||||
| 		when(this.resultsEnum.hasMore()).thenReturn(true, false); | ||||
| 		when(this.resultsEnum.next()).thenReturn(this.searchResult); | ||||
| 		when(this.searchResult.getObject()).thenReturn(searchResultObject); | ||||
| 		given(this.ctx.search(any(DistinguishedName.class), eq(filter), eq(params), this.searchControls.capture())) | ||||
| 				.willReturn(this.resultsEnum); | ||||
| 		given(this.resultsEnum.hasMore()).willReturn(true, false); | ||||
| 		given(this.resultsEnum.next()).willReturn(this.searchResult); | ||||
| 		given(this.searchResult.getObject()).willReturn(searchResultObject); | ||||
| 
 | ||||
| 		SpringSecurityLdapTemplate.searchForSingleEntryInternal(this.ctx, mock(SearchControls.class), base, filter, | ||||
| 				params); | ||||
|  | ||||
| @ -37,8 +37,8 @@ import org.springframework.security.ldap.userdetails.LdapUserDetailsMapper; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests {@link LdapAuthenticationProvider}. | ||||
| @ -89,7 +89,7 @@ public class LdapAuthenticationProviderTests { | ||||
| 	public void usernameNotFoundExceptionIsHiddenByDefault() { | ||||
| 		final LdapAuthenticator authenticator = mock(LdapAuthenticator.class); | ||||
| 		final UsernamePasswordAuthenticationToken joe = new UsernamePasswordAuthenticationToken("joe", "password"); | ||||
| 		when(authenticator.authenticate(joe)).thenThrow(new UsernameNotFoundException("nobody")); | ||||
| 		given(authenticator.authenticate(joe)).willThrow(new UsernameNotFoundException("nobody")); | ||||
| 
 | ||||
| 		LdapAuthenticationProvider provider = new LdapAuthenticationProvider(authenticator); | ||||
| 		provider.authenticate(joe); | ||||
| @ -99,7 +99,7 @@ public class LdapAuthenticationProviderTests { | ||||
| 	public void usernameNotFoundExceptionIsNotHiddenIfConfigured() { | ||||
| 		final LdapAuthenticator authenticator = mock(LdapAuthenticator.class); | ||||
| 		final UsernamePasswordAuthenticationToken joe = new UsernamePasswordAuthenticationToken("joe", "password"); | ||||
| 		when(authenticator.authenticate(joe)).thenThrow(new UsernameNotFoundException("nobody")); | ||||
| 		given(authenticator.authenticate(joe)).willThrow(new UsernameNotFoundException("nobody")); | ||||
| 
 | ||||
| 		LdapAuthenticationProvider provider = new LdapAuthenticationProvider(authenticator); | ||||
| 		provider.setHideUserNotFoundExceptions(false); | ||||
| @ -165,7 +165,7 @@ public class LdapAuthenticationProviderTests { | ||||
| 				"benspassword"); | ||||
| 		LdapAuthenticator mockAuthenticator = mock(LdapAuthenticator.class); | ||||
| 		CommunicationException expectedCause = new CommunicationException(new javax.naming.CommunicationException()); | ||||
| 		when(mockAuthenticator.authenticate(authRequest)).thenThrow(expectedCause); | ||||
| 		given(mockAuthenticator.authenticate(authRequest)).willThrow(expectedCause); | ||||
| 
 | ||||
| 		LdapAuthenticationProvider ldapProvider = new LdapAuthenticationProvider(mockAuthenticator); | ||||
| 		try { | ||||
|  | ||||
| @ -29,8 +29,8 @@ import org.springframework.security.authentication.UsernamePasswordAuthenticatio | ||||
| 
 | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -49,15 +49,15 @@ public class PasswordComparisonAuthenticatorMockTests { | ||||
| 		authenticator.setUserDnPatterns(new String[] { "cn={0},ou=people" }); | ||||
| 
 | ||||
| 		// Get the mock to return an empty attribute set | ||||
| 		when(source.getReadOnlyContext()).thenReturn(dirCtx); | ||||
| 		when(dirCtx.getAttributes(eq("cn=Bob,ou=people"), any(String[].class))).thenReturn(attrs); | ||||
| 		when(dirCtx.getNameInNamespace()).thenReturn("dc=springframework,dc=org"); | ||||
| 		given(source.getReadOnlyContext()).willReturn(dirCtx); | ||||
| 		given(dirCtx.getAttributes(eq("cn=Bob,ou=people"), any(String[].class))).willReturn(attrs); | ||||
| 		given(dirCtx.getNameInNamespace()).willReturn("dc=springframework,dc=org"); | ||||
| 
 | ||||
| 		// Setup a single return value (i.e. success) | ||||
| 		final NamingEnumeration searchResults = new BasicAttributes("", null).getAll(); | ||||
| 
 | ||||
| 		when(dirCtx.search(eq("cn=Bob,ou=people"), eq("(userPassword={0})"), any(Object[].class), | ||||
| 				any(SearchControls.class))).thenReturn(searchResults); | ||||
| 		given(dirCtx.search(eq("cn=Bob,ou=people"), eq("(userPassword={0})"), any(Object[].class), | ||||
| 				any(SearchControls.class))).willReturn(searchResults); | ||||
| 
 | ||||
| 		authenticator.authenticate(new UsernamePasswordAuthenticationToken("Bob", "bobspassword")); | ||||
| 	} | ||||
|  | ||||
| @ -56,9 +56,9 @@ import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.fail; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -100,12 +100,12 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 		String customSearchFilter = "(&(objectClass=user)(sAMAccountName={0}))"; | ||||
| 
 | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 
 | ||||
| 		DirContextAdapter dca = new DirContextAdapter(); | ||||
| 		SearchResult sr = new SearchResult("CN=Joe Jannsen,CN=Users", dca, dca.getAttributes()); | ||||
| 		when(ctx.search(any(Name.class), eq(customSearchFilter), any(Object[].class), any(SearchControls.class))) | ||||
| 				.thenReturn(new MockNamingEnumeration(sr)); | ||||
| 		given(ctx.search(any(Name.class), eq(customSearchFilter), any(Object[].class), any(SearchControls.class))) | ||||
| 				.willReturn(new MockNamingEnumeration(sr)); | ||||
| 
 | ||||
| 		ActiveDirectoryLdapAuthenticationProvider customProvider = new ActiveDirectoryLdapAuthenticationProvider( | ||||
| 				"mydomain.eu", "ldap://192.168.1.200/"); | ||||
| @ -125,12 +125,12 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 		final String defaultSearchFilter = "(&(objectClass=user)(userPrincipalName={0}))"; | ||||
| 
 | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 
 | ||||
| 		DirContextAdapter dca = new DirContextAdapter(); | ||||
| 		SearchResult sr = new SearchResult("CN=Joe Jannsen,CN=Users", dca, dca.getAttributes()); | ||||
| 		when(ctx.search(any(Name.class), eq(defaultSearchFilter), any(Object[].class), any(SearchControls.class))) | ||||
| 				.thenReturn(new MockNamingEnumeration(sr)); | ||||
| 		given(ctx.search(any(Name.class), eq(defaultSearchFilter), any(Object[].class), any(SearchControls.class))) | ||||
| 				.willReturn(new MockNamingEnumeration(sr)); | ||||
| 
 | ||||
| 		ActiveDirectoryLdapAuthenticationProvider customProvider = new ActiveDirectoryLdapAuthenticationProvider( | ||||
| 				"mydomain.eu", "ldap://192.168.1.200/"); | ||||
| @ -153,12 +153,12 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 		ArgumentCaptor<Object[]> captor = ArgumentCaptor.forClass(Object[].class); | ||||
| 
 | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 
 | ||||
| 		DirContextAdapter dca = new DirContextAdapter(); | ||||
| 		SearchResult sr = new SearchResult("CN=Joe Jannsen,CN=Users", dca, dca.getAttributes()); | ||||
| 		when(ctx.search(any(Name.class), eq(defaultSearchFilter), captor.capture(), any(SearchControls.class))) | ||||
| 				.thenReturn(new MockNamingEnumeration(sr)); | ||||
| 		given(ctx.search(any(Name.class), eq(defaultSearchFilter), captor.capture(), any(SearchControls.class))) | ||||
| 				.willReturn(new MockNamingEnumeration(sr)); | ||||
| 
 | ||||
| 		ActiveDirectoryLdapAuthenticationProvider customProvider = new ActiveDirectoryLdapAuthenticationProvider( | ||||
| 				"mydomain.eu", "ldap://192.168.1.200/"); | ||||
| @ -186,12 +186,12 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 	public void nullDomainIsSupportedIfAuthenticatingWithFullUserPrincipal() throws Exception { | ||||
| 		this.provider = new ActiveDirectoryLdapAuthenticationProvider(null, "ldap://192.168.1.200/"); | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 
 | ||||
| 		DirContextAdapter dca = new DirContextAdapter(); | ||||
| 		SearchResult sr = new SearchResult("CN=Joe Jannsen,CN=Users", dca, dca.getAttributes()); | ||||
| 		when(ctx.search(eq(new DistinguishedName("DC=mydomain,DC=eu")), any(String.class), any(Object[].class), | ||||
| 				any(SearchControls.class))).thenReturn(new MockNamingEnumeration(sr)); | ||||
| 		given(ctx.search(eq(new DistinguishedName("DC=mydomain,DC=eu")), any(String.class), any(Object[].class), | ||||
| 				any(SearchControls.class))).willReturn(new MockNamingEnumeration(sr)); | ||||
| 		this.provider.contextFactory = createContextFactoryReturning(ctx); | ||||
| 
 | ||||
| 		try { | ||||
| @ -207,9 +207,9 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 	@Test(expected = BadCredentialsException.class) | ||||
| 	public void failedUserSearchCausesBadCredentials() throws Exception { | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		when(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.thenThrow(new NameNotFoundException()); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 		given(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.willThrow(new NameNotFoundException()); | ||||
| 
 | ||||
| 		this.provider.contextFactory = createContextFactoryReturning(ctx); | ||||
| 
 | ||||
| @ -220,9 +220,9 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 	@Test(expected = BadCredentialsException.class) | ||||
| 	public void noUserSearchCausesUsernameNotFound() throws Exception { | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		when(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.thenReturn(new EmptyEnumeration<>()); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 		given(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.willReturn(new EmptyEnumeration<>()); | ||||
| 
 | ||||
| 		this.provider.contextFactory = createContextFactoryReturning(ctx); | ||||
| 
 | ||||
| @ -239,14 +239,14 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 	@Test(expected = IncorrectResultSizeDataAccessException.class) | ||||
| 	public void duplicateUserSearchCausesError() throws Exception { | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 		NamingEnumeration<SearchResult> searchResults = mock(NamingEnumeration.class); | ||||
| 		when(searchResults.hasMore()).thenReturn(true, true, false); | ||||
| 		given(searchResults.hasMore()).willReturn(true, true, false); | ||||
| 		SearchResult searchResult = mock(SearchResult.class); | ||||
| 		when(searchResult.getObject()).thenReturn(new DirContextAdapter("ou=1"), new DirContextAdapter("ou=2")); | ||||
| 		when(searchResults.next()).thenReturn(searchResult); | ||||
| 		when(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.thenReturn(searchResults); | ||||
| 		given(searchResult.getObject()).willReturn(new DirContextAdapter("ou=1"), new DirContextAdapter("ou=2")); | ||||
| 		given(searchResults.next()).willReturn(searchResult); | ||||
| 		given(ctx.search(any(Name.class), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.willReturn(searchResults); | ||||
| 
 | ||||
| 		this.provider.contextFactory = createContextFactoryReturning(ctx); | ||||
| 
 | ||||
| @ -440,14 +440,14 @@ public class ActiveDirectoryLdapAuthenticationProviderTests { | ||||
| 	private void checkAuthentication(String rootDn, ActiveDirectoryLdapAuthenticationProvider provider) | ||||
| 			throws NamingException { | ||||
| 		DirContext ctx = mock(DirContext.class); | ||||
| 		when(ctx.getNameInNamespace()).thenReturn(""); | ||||
| 		given(ctx.getNameInNamespace()).willReturn(""); | ||||
| 
 | ||||
| 		DirContextAdapter dca = new DirContextAdapter(); | ||||
| 		SearchResult sr = new SearchResult("CN=Joe Jannsen,CN=Users", dca, dca.getAttributes()); | ||||
| 		@SuppressWarnings("deprecation") | ||||
| 		DistinguishedName searchBaseDn = new DistinguishedName(rootDn); | ||||
| 		when(ctx.search(eq(searchBaseDn), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.thenReturn(new MockNamingEnumeration(sr)).thenReturn(new MockNamingEnumeration(sr)); | ||||
| 		given(ctx.search(eq(searchBaseDn), any(String.class), any(Object[].class), any(SearchControls.class))) | ||||
| 				.willReturn(new MockNamingEnumeration(sr)).willReturn(new MockNamingEnumeration(sr)); | ||||
| 
 | ||||
| 		provider.contextFactory = createContextFactoryReturning(ctx); | ||||
| 
 | ||||
|  | ||||
| @ -30,10 +30,10 @@ import org.springframework.ldap.UncategorizedLdapException; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.reset; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -69,17 +69,17 @@ public class PasswordPolicyAwareContextSourceTests { | ||||
| 
 | ||||
| 	@Test(expected = UncategorizedLdapException.class) | ||||
| 	public void standardExceptionIsPropagatedWhenExceptionRaisedAndNoControlsAreSet() throws Exception { | ||||
| 		doThrow(new NamingException("some LDAP exception")).when(this.ctx).reconnect(any(Control[].class)); | ||||
| 		willThrow(new NamingException("some LDAP exception")).given(this.ctx).reconnect(any(Control[].class)); | ||||
| 
 | ||||
| 		this.ctxSource.getContext("user", "ignored"); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test(expected = PasswordPolicyException.class) | ||||
| 	public void lockedPasswordPolicyControlRaisesPasswordPolicyException() throws Exception { | ||||
| 		when(this.ctx.getResponseControls()).thenReturn(new Control[] { | ||||
| 		given(this.ctx.getResponseControls()).willReturn(new Control[] { | ||||
| 				new PasswordPolicyResponseControl(PasswordPolicyResponseControlTests.OPENLDAP_LOCKED_CTRL) }); | ||||
| 
 | ||||
| 		doThrow(new NamingException("locked message")).when(this.ctx).reconnect(any(Control[].class)); | ||||
| 		willThrow(new NamingException("locked message")).given(this.ctx).reconnect(any(Control[].class)); | ||||
| 
 | ||||
| 		this.ctxSource.getContext("user", "ignored"); | ||||
| 	} | ||||
|  | ||||
| @ -20,8 +20,8 @@ import javax.naming.ldap.Control; | ||||
| import org.junit.Test; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -33,7 +33,7 @@ public class PasswordPolicyControlFactoryTests { | ||||
| 		PasswordPolicyControlFactory ctrlFactory = new PasswordPolicyControlFactory(); | ||||
| 		Control wrongCtrl = mock(Control.class); | ||||
| 
 | ||||
| 		when(wrongCtrl.getID()).thenReturn("wrongId"); | ||||
| 		given(wrongCtrl.getID()).willReturn("wrongId"); | ||||
| 		assertThat(ctrlFactory.getControlInstance(wrongCtrl)).isNull(); | ||||
| 	} | ||||
| 
 | ||||
| @ -42,8 +42,8 @@ public class PasswordPolicyControlFactoryTests { | ||||
| 		PasswordPolicyControlFactory ctrlFactory = new PasswordPolicyControlFactory(); | ||||
| 		Control control = mock(Control.class); | ||||
| 
 | ||||
| 		when(control.getID()).thenReturn(PasswordPolicyControl.OID); | ||||
| 		when(control.getEncodedValue()).thenReturn(PasswordPolicyResponseControlTests.OPENLDAP_LOCKED_CTRL); | ||||
| 		given(control.getID()).willReturn(PasswordPolicyControl.OID); | ||||
| 		given(control.getEncodedValue()).willReturn(PasswordPolicyResponseControlTests.OPENLDAP_LOCKED_CTRL); | ||||
| 		Control result = ctrlFactory.getControlInstance(control); | ||||
| 		assertThat(result).isNotNull(); | ||||
| 		assertThat(PasswordPolicyResponseControlTests.OPENLDAP_LOCKED_CTRL).isEqualTo(result.getEncodedValue()); | ||||
|  | ||||
| @ -28,8 +28,8 @@ import org.springframework.security.core.userdetails.UserDetailsService; | ||||
| import org.springframework.security.ldap.authentication.UserDetailsServiceLdapAuthoritiesPopulator; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * @author Luke Taylor | ||||
| @ -40,9 +40,9 @@ public class UserDetailsServiceLdapAuthoritiesPopulatorTests { | ||||
| 	public void delegationToUserDetailsServiceReturnsCorrectRoles() { | ||||
| 		UserDetailsService uds = mock(UserDetailsService.class); | ||||
| 		UserDetails user = mock(UserDetails.class); | ||||
| 		when(uds.loadUserByUsername("joe")).thenReturn(user); | ||||
| 		given(uds.loadUserByUsername("joe")).willReturn(user); | ||||
| 		List authorities = AuthorityUtils.createAuthorityList("ROLE_USER"); | ||||
| 		when(user.getAuthorities()).thenReturn(authorities); | ||||
| 		given(user.getAuthorities()).willReturn(authorities); | ||||
| 
 | ||||
| 		UserDetailsServiceLdapAuthoritiesPopulator populator = new UserDetailsServiceLdapAuthoritiesPopulator(uds); | ||||
| 		Collection<? extends GrantedAuthority> auths = populator.getGrantedAuthorities(new DirContextAdapter(), "joe"); | ||||
|  | ||||
| @ -35,7 +35,7 @@ import org.springframework.security.core.Authentication; | ||||
| import org.springframework.security.core.authority.AuthorityUtils; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class DefaultMessageSecurityExpressionHandlerTests { | ||||
| @ -80,7 +80,7 @@ public class DefaultMessageSecurityExpressionHandlerTests { | ||||
| 		this.handler.setTrustResolver(this.trustResolver); | ||||
| 		EvaluationContext context = this.handler.createEvaluationContext(this.authentication, this.message); | ||||
| 		Expression expression = this.handler.getExpressionParser().parseExpression("authenticated"); | ||||
| 		when(this.trustResolver.isAnonymous(this.authentication)).thenReturn(false); | ||||
| 		given(this.trustResolver.isAnonymous(this.authentication)).willReturn(false); | ||||
| 
 | ||||
| 		assertThat(ExpressionUtils.evaluateAsBoolean(expression, context)).isTrue(); | ||||
| 	} | ||||
| @ -102,7 +102,7 @@ public class DefaultMessageSecurityExpressionHandlerTests { | ||||
| 		this.handler.setPermissionEvaluator(this.permissionEvaluator); | ||||
| 		EvaluationContext context = this.handler.createEvaluationContext(this.authentication, this.message); | ||||
| 		Expression expression = this.handler.getExpressionParser().parseExpression("hasPermission(message, 'read')"); | ||||
| 		when(this.permissionEvaluator.hasPermission(this.authentication, this.message, "read")).thenReturn(true); | ||||
| 		given(this.permissionEvaluator.hasPermission(this.authentication, this.message, "read")).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(ExpressionUtils.evaluateAsBoolean(expression, context)).isTrue(); | ||||
| 	} | ||||
|  | ||||
| @ -30,9 +30,9 @@ import org.springframework.security.messaging.util.matcher.MessageMatcher; | ||||
| import org.springframework.security.messaging.util.matcher.SimpDestinationMessageMatcher; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class MessageExpressionConfigAttributeTests { | ||||
| @ -72,7 +72,7 @@ public class MessageExpressionConfigAttributeTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void toStringUsesExpressionString() { | ||||
| 		when(this.expression.getExpressionString()).thenReturn("toString"); | ||||
| 		given(this.expression.getExpressionString()).willReturn("toString"); | ||||
| 
 | ||||
| 		assertThat(this.attribute.toString()).isEqualTo(this.expression.getExpressionString()); | ||||
| 	} | ||||
|  | ||||
| @ -36,9 +36,9 @@ import org.springframework.security.messaging.util.matcher.MessageMatcher; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.springframework.security.access.AccessDecisionVoter.ACCESS_ABSTAIN; | ||||
| import static org.springframework.security.access.AccessDecisionVoter.ACCESS_DENIED; | ||||
| import static org.springframework.security.access.AccessDecisionVoter.ACCESS_GRANTED; | ||||
| @ -78,13 +78,13 @@ public class MessageExpressionVoterTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void voteGranted() { | ||||
| 		when(this.expression.getValue(any(EvaluationContext.class), eq(Boolean.class))).thenReturn(true); | ||||
| 		given(this.expression.getValue(any(EvaluationContext.class), eq(Boolean.class))).willReturn(true); | ||||
| 		assertThat(this.voter.vote(this.authentication, this.message, this.attributes)).isEqualTo(ACCESS_GRANTED); | ||||
| 	} | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void voteDenied() { | ||||
| 		when(this.expression.getValue(any(EvaluationContext.class), eq(Boolean.class))).thenReturn(false); | ||||
| 		given(this.expression.getValue(any(EvaluationContext.class), eq(Boolean.class))).willReturn(false); | ||||
| 		assertThat(this.voter.vote(this.authentication, this.message, this.attributes)).isEqualTo(ACCESS_DENIED); | ||||
| 	} | ||||
| 
 | ||||
| @ -122,9 +122,9 @@ public class MessageExpressionVoterTests { | ||||
| 	@Test | ||||
| 	public void customExpressionHandler() { | ||||
| 		this.voter.setExpressionHandler(this.expressionHandler); | ||||
| 		when(this.expressionHandler.createEvaluationContext(this.authentication, this.message)) | ||||
| 				.thenReturn(this.evaluationContext); | ||||
| 		when(this.expression.getValue(this.evaluationContext, Boolean.class)).thenReturn(true); | ||||
| 		given(this.expressionHandler.createEvaluationContext(this.authentication, this.message)) | ||||
| 				.willReturn(this.evaluationContext); | ||||
| 		given(this.expression.getValue(this.evaluationContext, Boolean.class)).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.voter.vote(this.authentication, this.message, this.attributes)).isEqualTo(ACCESS_GRANTED); | ||||
| 
 | ||||
| @ -135,12 +135,12 @@ public class MessageExpressionVoterTests { | ||||
| 	public void postProcessEvaluationContext() { | ||||
| 		final MessageExpressionConfigAttribute configAttribute = mock(MessageExpressionConfigAttribute.class); | ||||
| 		this.voter.setExpressionHandler(this.expressionHandler); | ||||
| 		when(this.expressionHandler.createEvaluationContext(this.authentication, this.message)) | ||||
| 				.thenReturn(this.evaluationContext); | ||||
| 		when(configAttribute.getAuthorizeExpression()).thenReturn(this.expression); | ||||
| 		given(this.expressionHandler.createEvaluationContext(this.authentication, this.message)) | ||||
| 				.willReturn(this.evaluationContext); | ||||
| 		given(configAttribute.getAuthorizeExpression()).willReturn(this.expression); | ||||
| 		this.attributes = Arrays.<ConfigAttribute>asList(configAttribute); | ||||
| 		when(configAttribute.postProcess(this.evaluationContext, this.message)).thenReturn(this.evaluationContext); | ||||
| 		when(this.expression.getValue(any(EvaluationContext.class), eq(Boolean.class))).thenReturn(true); | ||||
| 		given(configAttribute.postProcess(this.evaluationContext, this.message)).willReturn(this.evaluationContext); | ||||
| 		given(this.expression.getValue(any(EvaluationContext.class), eq(Boolean.class))).willReturn(true); | ||||
| 
 | ||||
| 		assertThat(this.voter.vote(this.authentication, this.message, this.attributes)).isEqualTo(ACCESS_GRANTED); | ||||
| 		verify(configAttribute).postProcess(this.evaluationContext, this.message); | ||||
|  | ||||
| @ -40,8 +40,8 @@ import org.springframework.security.core.context.SecurityContextHolder; | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.Mockito.doThrow; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.BDDMockito.willThrow; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class ChannelSecurityInterceptorTests { | ||||
| @ -108,7 +108,7 @@ public class ChannelSecurityInterceptorTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void preSendGrant() { | ||||
| 		when(this.source.getAttributes(this.message)).thenReturn(this.attrs); | ||||
| 		given(this.source.getAttributes(this.message)).willReturn(this.attrs); | ||||
| 
 | ||||
| 		Message<?> result = this.interceptor.preSend(this.message, this.channel); | ||||
| 
 | ||||
| @ -117,8 +117,8 @@ public class ChannelSecurityInterceptorTests { | ||||
| 
 | ||||
| 	@Test(expected = AccessDeniedException.class) | ||||
| 	public void preSendDeny() { | ||||
| 		when(this.source.getAttributes(this.message)).thenReturn(this.attrs); | ||||
| 		doThrow(new AccessDeniedException("")).when(this.accessDecisionManager).decide(any(Authentication.class), | ||||
| 		given(this.source.getAttributes(this.message)).willReturn(this.attrs); | ||||
| 		willThrow(new AccessDeniedException("")).given(this.accessDecisionManager).decide(any(Authentication.class), | ||||
| 				eq(this.message), eq(this.attrs)); | ||||
| 
 | ||||
| 		this.interceptor.preSend(this.message, this.channel); | ||||
| @ -127,9 +127,9 @@ public class ChannelSecurityInterceptorTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void preSendPostSendRunAs() { | ||||
| 		when(this.source.getAttributes(this.message)).thenReturn(this.attrs); | ||||
| 		when(this.runAsManager.buildRunAs(any(Authentication.class), any(), any(Collection.class))) | ||||
| 				.thenReturn(this.runAs); | ||||
| 		given(this.source.getAttributes(this.message)).willReturn(this.attrs); | ||||
| 		given(this.runAsManager.buildRunAs(any(Authentication.class), any(), any(Collection.class))) | ||||
| 				.willReturn(this.runAs); | ||||
| 
 | ||||
| 		Message<?> preSend = this.interceptor.preSend(this.message, this.channel); | ||||
| 
 | ||||
| @ -148,9 +148,9 @@ public class ChannelSecurityInterceptorTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void preSendFinallySendRunAs() { | ||||
| 		when(this.source.getAttributes(this.message)).thenReturn(this.attrs); | ||||
| 		when(this.runAsManager.buildRunAs(any(Authentication.class), any(), any(Collection.class))) | ||||
| 				.thenReturn(this.runAs); | ||||
| 		given(this.source.getAttributes(this.message)).willReturn(this.attrs); | ||||
| 		given(this.runAsManager.buildRunAs(any(Authentication.class), any(), any(Collection.class))) | ||||
| 				.willReturn(this.runAs); | ||||
| 
 | ||||
| 		Message<?> preSend = this.interceptor.preSend(this.message, this.channel); | ||||
| 
 | ||||
|  | ||||
| @ -27,7 +27,7 @@ import org.mockito.junit.MockitoJUnitRunner; | ||||
| import org.springframework.messaging.Message; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class AndMessageMatcherTests { | ||||
| @ -76,7 +76,7 @@ public class AndMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesSingleTrue() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(true); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(true); | ||||
| 		this.matcher = new AndMessageMatcher<>(this.delegate); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isTrue(); | ||||
| @ -84,8 +84,8 @@ public class AndMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesMultiTrue() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(true); | ||||
| 		when(this.delegate2.matches(this.message)).thenReturn(true); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(true); | ||||
| 		given(this.delegate2.matches(this.message)).willReturn(true); | ||||
| 		this.matcher = new AndMessageMatcher<>(this.delegate, this.delegate2); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isTrue(); | ||||
| @ -93,7 +93,7 @@ public class AndMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesSingleFalse() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(false); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(false); | ||||
| 		this.matcher = new AndMessageMatcher<>(this.delegate); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isFalse(); | ||||
| @ -101,7 +101,7 @@ public class AndMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesMultiBothFalse() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(false); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(false); | ||||
| 		this.matcher = new AndMessageMatcher<>(this.delegate, this.delegate2); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isFalse(); | ||||
| @ -109,8 +109,8 @@ public class AndMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesMultiSingleFalse() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(true); | ||||
| 		when(this.delegate2.matches(this.message)).thenReturn(false); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(true); | ||||
| 		given(this.delegate2.matches(this.message)).willReturn(false); | ||||
| 		this.matcher = new AndMessageMatcher<>(this.delegate, this.delegate2); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isFalse(); | ||||
|  | ||||
| @ -27,7 +27,7 @@ import org.mockito.junit.MockitoJUnitRunner; | ||||
| import org.springframework.messaging.Message; | ||||
| 
 | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.mockito.Mockito.when; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| 
 | ||||
| @RunWith(MockitoJUnitRunner.class) | ||||
| public class OrMessageMatcherTests { | ||||
| @ -76,7 +76,7 @@ public class OrMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesSingleTrue() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(true); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(true); | ||||
| 		this.matcher = new OrMessageMatcher<>(this.delegate); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isTrue(); | ||||
| @ -84,7 +84,7 @@ public class OrMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesMultiTrue() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(true); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(true); | ||||
| 		this.matcher = new OrMessageMatcher<>(this.delegate, this.delegate2); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isTrue(); | ||||
| @ -92,7 +92,7 @@ public class OrMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesSingleFalse() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(false); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(false); | ||||
| 		this.matcher = new OrMessageMatcher<>(this.delegate); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isFalse(); | ||||
| @ -100,8 +100,8 @@ public class OrMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesMultiBothFalse() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(false); | ||||
| 		when(this.delegate2.matches(this.message)).thenReturn(false); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(false); | ||||
| 		given(this.delegate2.matches(this.message)).willReturn(false); | ||||
| 		this.matcher = new OrMessageMatcher<>(this.delegate, this.delegate2); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isFalse(); | ||||
| @ -109,7 +109,7 @@ public class OrMessageMatcherTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void matchesMultiSingleFalse() { | ||||
| 		when(this.delegate.matches(this.message)).thenReturn(true); | ||||
| 		given(this.delegate.matches(this.message)).willReturn(true); | ||||
| 		this.matcher = new OrMessageMatcher<>(this.delegate, this.delegate2); | ||||
| 
 | ||||
| 		assertThat(this.matcher.matches(this.message)).isTrue(); | ||||
|  | ||||
| @ -38,12 +38,12 @@ import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.spy; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.verifyNoInteractions; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link AuthorizedClientServiceOAuth2AuthorizedClientManager}. | ||||
| @ -163,8 +163,8 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenNotAuthorizedAndUnsupportedProviderThenNotAuthorized() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(this.clientRegistration); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(this.clientRegistration); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -187,11 +187,11 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenNotAuthorizedAndSupportedProviderThenAuthorized() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(this.clientRegistration); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(this.clientRegistration); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(this.authorizedClient); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(this.authorizedClient); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -215,16 +215,16 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenAuthorizedAndSupportedProviderThenReauthorized() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(this.clientRegistration); | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(eq(this.clientRegistration.getRegistrationId()), | ||||
| 				eq(this.principal.getName()))).thenReturn(this.authorizedClient); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(this.clientRegistration); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(eq(this.clientRegistration.getRegistrationId()), | ||||
| 				eq(this.principal.getName()))).willReturn(this.authorizedClient); | ||||
| 
 | ||||
| 		OAuth2AuthorizedClient reauthorizedClient = new OAuth2AuthorizedClient(this.clientRegistration, | ||||
| 				this.principal.getName(), TestOAuth2AccessTokens.noScopes(), TestOAuth2RefreshTokens.refreshToken()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(reauthorizedClient); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(reauthorizedClient); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -271,8 +271,8 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 		OAuth2AuthorizedClient reauthorizedClient = new OAuth2AuthorizedClient(this.clientRegistration, | ||||
| 				this.principal.getName(), TestOAuth2AccessTokens.noScopes(), TestOAuth2RefreshTokens.refreshToken()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(reauthorizedClient); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(reauthorizedClient); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest reauthorizeRequest = OAuth2AuthorizeRequest.withAuthorizedClient(this.authorizedClient) | ||||
| 				.principal(this.principal).build(); | ||||
| @ -298,8 +298,8 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 		OAuth2AuthorizedClient reauthorizedClient = new OAuth2AuthorizedClient(this.clientRegistration, | ||||
| 				this.principal.getName(), TestOAuth2AccessTokens.noScopes(), TestOAuth2RefreshTokens.refreshToken()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(reauthorizedClient); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(reauthorizedClient); | ||||
| 
 | ||||
| 		// Override the mock with the default | ||||
| 		this.authorizedClientManager.setContextAttributesMapper( | ||||
| @ -333,8 +333,8 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 				new OAuth2Error(OAuth2ErrorCodes.INVALID_GRANT, null, null), | ||||
| 				this.clientRegistration.getRegistrationId()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenThrow(authorizationException); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willThrow(authorizationException); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest reauthorizeRequest = OAuth2AuthorizeRequest.withAuthorizedClient(this.authorizedClient) | ||||
| 				.principal(this.principal).build(); | ||||
| @ -353,8 +353,8 @@ public class AuthorizedClientServiceOAuth2AuthorizedClientManagerTests { | ||||
| 		ClientAuthorizationException authorizationException = new ClientAuthorizationException( | ||||
| 				new OAuth2Error("non-matching-error-code", null, null), this.clientRegistration.getRegistrationId()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenThrow(authorizationException); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willThrow(authorizationException); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest reauthorizeRequest = OAuth2AuthorizeRequest.withAuthorizedClient(this.authorizedClient) | ||||
| 				.principal(this.principal).build(); | ||||
|  | ||||
| @ -42,10 +42,10 @@ import static org.assertj.core.api.Assertions.assertThatCode; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.ArgumentMatchers.eq; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.never; | ||||
| import static org.mockito.Mockito.verify; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager}. | ||||
| @ -83,14 +83,14 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 		this.clientRegistrationRepository = mock(ReactiveClientRegistrationRepository.class); | ||||
| 		this.authorizedClientService = mock(ReactiveOAuth2AuthorizedClientService.class); | ||||
| 		this.saveAuthorizedClientProbe = PublisherProbe.empty(); | ||||
| 		when(this.authorizedClientService.saveAuthorizedClient(any(), any())) | ||||
| 				.thenReturn(this.saveAuthorizedClientProbe.mono()); | ||||
| 		given(this.authorizedClientService.saveAuthorizedClient(any(), any())) | ||||
| 				.willReturn(this.saveAuthorizedClientProbe.mono()); | ||||
| 		this.removeAuthorizedClientProbe = PublisherProbe.empty(); | ||||
| 		when(this.authorizedClientService.removeAuthorizedClient(any(), any())) | ||||
| 				.thenReturn(this.removeAuthorizedClientProbe.mono()); | ||||
| 		given(this.authorizedClientService.removeAuthorizedClient(any(), any())) | ||||
| 				.willReturn(this.removeAuthorizedClientProbe.mono()); | ||||
| 		this.authorizedClientProvider = mock(ReactiveOAuth2AuthorizedClientProvider.class); | ||||
| 		this.contextAttributesMapper = mock(Function.class); | ||||
| 		when(this.contextAttributesMapper.apply(any())).thenReturn(Mono.empty()); | ||||
| 		given(this.contextAttributesMapper.apply(any())).willReturn(Mono.empty()); | ||||
| 		this.authorizedClientManager = new AuthorizedClientServiceReactiveOAuth2AuthorizedClientManager( | ||||
| 				this.clientRegistrationRepository, this.authorizedClientService); | ||||
| 		this.authorizedClientManager.setAuthorizedClientProvider(this.authorizedClientProvider); | ||||
| @ -151,7 +151,7 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 		String clientRegistrationId = "invalid-registration-id"; | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest.withClientRegistrationId(clientRegistrationId) | ||||
| 				.principal(this.principal).build(); | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(clientRegistrationId)).thenReturn(Mono.empty()); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(clientRegistrationId)).willReturn(Mono.empty()); | ||||
| 		StepVerifier.create(this.authorizedClientManager.authorize(authorizeRequest)) | ||||
| 				.verifyError(IllegalArgumentException.class); | ||||
| 
 | ||||
| @ -160,11 +160,11 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenNotAuthorizedAndUnsupportedProviderThenNotAuthorized() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientProvider.authorize(any())).willReturn(Mono.empty()); | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| 				.build(); | ||||
| @ -187,13 +187,13 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenNotAuthorizedAndSupportedProviderThenAuthorized() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.just(this.authorizedClient)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.just(this.authorizedClient)); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -218,13 +218,13 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenNotAuthorizedAndSupportedProviderAndCustomSuccessHandlerThenInvokeCustomSuccessHandler() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.just(this.authorizedClient)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.just(this.authorizedClient)); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -252,10 +252,10 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authorizeWhenInvalidTokenThenRemoveAuthorizedClient() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -265,8 +265,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 				new OAuth2Error(OAuth2ErrorCodes.INVALID_TOKEN, null, null), | ||||
| 				this.clientRegistration.getRegistrationId()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.error(exception)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.error(exception)); | ||||
| 
 | ||||
| 		assertThatCode(() -> this.authorizedClientManager.authorize(authorizeRequest).block()).isEqualTo(exception); | ||||
| 
 | ||||
| @ -286,10 +286,10 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authorizeWhenInvalidGrantThenRemoveAuthorizedClient() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -299,8 +299,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 				new OAuth2Error(OAuth2ErrorCodes.INVALID_GRANT, null, null), | ||||
| 				this.clientRegistration.getRegistrationId()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.error(exception)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.error(exception)); | ||||
| 
 | ||||
| 		assertThatCode(() -> this.authorizedClientManager.authorize(authorizeRequest).block()).isEqualTo(exception); | ||||
| 
 | ||||
| @ -320,10 +320,10 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authorizeWhenServerErrorThenDoNotRemoveAuthorizedClient() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -333,8 +333,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 				new OAuth2Error(OAuth2ErrorCodes.SERVER_ERROR, null, null), | ||||
| 				this.clientRegistration.getRegistrationId()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.error(exception)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.error(exception)); | ||||
| 
 | ||||
| 		assertThatCode(() -> this.authorizedClientManager.authorize(authorizeRequest).block()).isEqualTo(exception); | ||||
| 
 | ||||
| @ -352,10 +352,10 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authorizeWhenOAuth2AuthorizationExceptionThenDoNotRemoveAuthorizedClient() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -364,8 +364,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 		OAuth2AuthorizationException exception = new OAuth2AuthorizationException( | ||||
| 				new OAuth2Error(OAuth2ErrorCodes.INVALID_GRANT, null, null)); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.error(exception)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.error(exception)); | ||||
| 
 | ||||
| 		assertThatCode(() -> this.authorizedClientManager.authorize(authorizeRequest).block()).isEqualTo(exception); | ||||
| 
 | ||||
| @ -383,10 +383,10 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 
 | ||||
| 	@Test | ||||
| 	public void authorizeWhenOAuth2AuthorizationExceptionAndCustomFailureHandlerThenInvokeCustomFailureHandler() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 
 | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(any(), any())).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(any(), any())).willReturn(Mono.empty()); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -395,8 +395,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 		OAuth2AuthorizationException exception = new OAuth2AuthorizationException( | ||||
| 				new OAuth2Error(OAuth2ErrorCodes.INVALID_GRANT, null, null)); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.error(exception)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.error(exception)); | ||||
| 
 | ||||
| 		PublisherProbe<Void> authorizationFailureHandlerProbe = PublisherProbe.empty(); | ||||
| 		this.authorizedClientManager.setAuthorizationFailureHandler( | ||||
| @ -420,16 +420,16 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void authorizeWhenAuthorizedAndSupportedProviderThenReauthorized() { | ||||
| 		when(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.thenReturn(Mono.just(this.clientRegistration)); | ||||
| 		when(this.authorizedClientService.loadAuthorizedClient(eq(this.clientRegistration.getRegistrationId()), | ||||
| 				eq(this.principal.getName()))).thenReturn(Mono.just(this.authorizedClient)); | ||||
| 		given(this.clientRegistrationRepository.findByRegistrationId(eq(this.clientRegistration.getRegistrationId()))) | ||||
| 				.willReturn(Mono.just(this.clientRegistration)); | ||||
| 		given(this.authorizedClientService.loadAuthorizedClient(eq(this.clientRegistration.getRegistrationId()), | ||||
| 				eq(this.principal.getName()))).willReturn(Mono.just(this.authorizedClient)); | ||||
| 
 | ||||
| 		OAuth2AuthorizedClient reauthorizedClient = new OAuth2AuthorizedClient(this.clientRegistration, | ||||
| 				this.principal.getName(), TestOAuth2AccessTokens.noScopes(), TestOAuth2RefreshTokens.refreshToken()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.just(reauthorizedClient)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.just(reauthorizedClient)); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest authorizeRequest = OAuth2AuthorizeRequest | ||||
| 				.withClientRegistrationId(this.clientRegistration.getRegistrationId()).principal(this.principal) | ||||
| @ -453,7 +453,7 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 	@SuppressWarnings("unchecked") | ||||
| 	@Test | ||||
| 	public void reauthorizeWhenUnsupportedProviderThenNotReauthorized() { | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))).thenReturn(Mono.empty()); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))).willReturn(Mono.empty()); | ||||
| 		OAuth2AuthorizeRequest reauthorizeRequest = OAuth2AuthorizeRequest.withAuthorizedClient(this.authorizedClient) | ||||
| 				.principal(this.principal).build(); | ||||
| 		Mono<OAuth2AuthorizedClient> authorizedClient = this.authorizedClientManager.authorize(reauthorizeRequest); | ||||
| @ -477,8 +477,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 		OAuth2AuthorizedClient reauthorizedClient = new OAuth2AuthorizedClient(this.clientRegistration, | ||||
| 				this.principal.getName(), TestOAuth2AccessTokens.noScopes(), TestOAuth2RefreshTokens.refreshToken()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.just(reauthorizedClient)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.just(reauthorizedClient)); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest reauthorizeRequest = OAuth2AuthorizeRequest.withAuthorizedClient(this.authorizedClient) | ||||
| 				.principal(this.principal).build(); | ||||
| @ -505,8 +505,8 @@ public class AuthorizedClientServiceReactiveOAuth2AuthorizedClientManagerTests { | ||||
| 		OAuth2AuthorizedClient reauthorizedClient = new OAuth2AuthorizedClient(this.clientRegistration, | ||||
| 				this.principal.getName(), TestOAuth2AccessTokens.noScopes(), TestOAuth2RefreshTokens.refreshToken()); | ||||
| 
 | ||||
| 		when(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.thenReturn(Mono.just(reauthorizedClient)); | ||||
| 		given(this.authorizedClientProvider.authorize(any(OAuth2AuthorizationContext.class))) | ||||
| 				.willReturn(Mono.just(reauthorizedClient)); | ||||
| 
 | ||||
| 		OAuth2AuthorizeRequest reauthorizeRequest = OAuth2AuthorizeRequest.withAuthorizedClient(this.authorizedClient) | ||||
| 				.principal(this.principal).attribute(OAuth2ParameterNames.SCOPE, "read write").build(); | ||||
|  | ||||
| @ -35,8 +35,8 @@ import org.springframework.security.oauth2.core.endpoint.TestOAuth2AccessTokenRe | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link ClientCredentialsOAuth2AuthorizedClientProvider}. | ||||
| @ -104,7 +104,7 @@ public class ClientCredentialsOAuth2AuthorizedClientProviderTests { | ||||
| 	@Test | ||||
| 	public void authorizeWhenClientCredentialsAndNotAuthorizedThenAuthorize() { | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = TestOAuth2AccessTokenResponses.accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2AuthorizationContext authorizationContext = OAuth2AuthorizationContext | ||||
| 				.withClientRegistration(this.clientRegistration).principal(this.principal).build(); | ||||
| @ -125,7 +125,7 @@ public class ClientCredentialsOAuth2AuthorizedClientProviderTests { | ||||
| 				this.principal.getName(), accessToken); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = TestOAuth2AccessTokenResponses.accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2AuthorizationContext authorizationContext = OAuth2AuthorizationContext | ||||
| 				.withAuthorizedClient(authorizedClient).principal(this.principal).build(); | ||||
| @ -162,7 +162,7 @@ public class ClientCredentialsOAuth2AuthorizedClientProviderTests { | ||||
| 		this.authorizedClientProvider.setClockSkew(Duration.ofSeconds(90)); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = TestOAuth2AccessTokenResponses.accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(accessTokenResponse); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(accessTokenResponse); | ||||
| 
 | ||||
| 		OAuth2AuthorizationContext authorizationContext = OAuth2AuthorizationContext | ||||
| 				.withAuthorizedClient(authorizedClient).principal(this.principal).build(); | ||||
|  | ||||
| @ -36,8 +36,8 @@ import org.springframework.security.oauth2.core.endpoint.TestOAuth2AccessTokenRe | ||||
| import static org.assertj.core.api.Assertions.assertThat; | ||||
| import static org.assertj.core.api.Assertions.assertThatThrownBy; | ||||
| import static org.mockito.ArgumentMatchers.any; | ||||
| import static org.mockito.BDDMockito.given; | ||||
| import static org.mockito.Mockito.mock; | ||||
| import static org.mockito.Mockito.when; | ||||
| 
 | ||||
| /** | ||||
|  * Tests for {@link ClientCredentialsReactiveOAuth2AuthorizedClientProvider}. | ||||
| @ -105,7 +105,7 @@ public class ClientCredentialsReactiveOAuth2AuthorizedClientProviderTests { | ||||
| 	@Test | ||||
| 	public void authorizeWhenClientCredentialsAndNotAuthorizedThenAuthorize() { | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = TestOAuth2AccessTokenResponses.accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(Mono.just(accessTokenResponse)); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(Mono.just(accessTokenResponse)); | ||||
| 
 | ||||
| 		OAuth2AuthorizationContext authorizationContext = OAuth2AuthorizationContext | ||||
| 				.withClientRegistration(this.clientRegistration).principal(this.principal).build(); | ||||
| @ -126,7 +126,7 @@ public class ClientCredentialsReactiveOAuth2AuthorizedClientProviderTests { | ||||
| 				this.principal.getName(), accessToken); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = TestOAuth2AccessTokenResponses.accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(Mono.just(accessTokenResponse)); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(Mono.just(accessTokenResponse)); | ||||
| 
 | ||||
| 		OAuth2AuthorizationContext authorizationContext = OAuth2AuthorizationContext | ||||
| 				.withAuthorizedClient(authorizedClient).principal(this.principal).build(); | ||||
| @ -163,7 +163,7 @@ public class ClientCredentialsReactiveOAuth2AuthorizedClientProviderTests { | ||||
| 		this.authorizedClientProvider.setClockSkew(Duration.ofSeconds(90)); | ||||
| 
 | ||||
| 		OAuth2AccessTokenResponse accessTokenResponse = TestOAuth2AccessTokenResponses.accessTokenResponse().build(); | ||||
| 		when(this.accessTokenResponseClient.getTokenResponse(any())).thenReturn(Mono.just(accessTokenResponse)); | ||||
| 		given(this.accessTokenResponseClient.getTokenResponse(any())).willReturn(Mono.just(accessTokenResponse)); | ||||
| 
 | ||||
| 		OAuth2AuthorizationContext authorizationContext = OAuth2AuthorizationContext | ||||
| 				.withAuthorizedClient(authorizedClient).principal(this.principal).build(); | ||||
|  | ||||
Some files were not shown because too many files have changed in this diff Show More
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user