/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2013-2017 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* http://glassfish.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package org.glassfish.jersey.tests.e2e.oauth;
import java.net.URI;
import java.security.Principal;
import java.util.Arrays;
import java.util.Collections;
import java.util.logging.Logger;
import java.util.stream.Collectors;
import javax.ws.rs.GET;
import javax.ws.rs.Path;
import javax.ws.rs.QueryParam;
import javax.ws.rs.client.Client;
import javax.ws.rs.client.ClientBuilder;
import javax.ws.rs.client.WebTarget;
import javax.ws.rs.core.Application;
import javax.ws.rs.core.Context;
import javax.ws.rs.core.Feature;
import javax.ws.rs.core.MultivaluedHashMap;
import javax.ws.rs.core.Response;
import javax.ws.rs.core.SecurityContext;
import javax.ws.rs.core.UriBuilder;
import javax.inject.Inject;
import org.glassfish.jersey.client.oauth1.AccessToken;
import org.glassfish.jersey.client.oauth1.ConsumerCredentials;
import org.glassfish.jersey.client.oauth1.OAuth1AuthorizationFlow;
import org.glassfish.jersey.client.oauth1.OAuth1ClientSupport;
import org.glassfish.jersey.logging.LoggingFeature;
import org.glassfish.jersey.server.ResourceConfig;
import org.glassfish.jersey.server.oauth1.DefaultOAuth1Provider;
import org.glassfish.jersey.server.oauth1.OAuth1Provider;
import org.glassfish.jersey.server.oauth1.OAuth1ServerFeature;
import org.glassfish.jersey.server.oauth1.OAuth1ServerProperties;
import org.glassfish.jersey.test.JerseyTest;
import org.junit.Test;
import static org.junit.Assert.assertEquals;
import com.sun.security.auth.UserPrincipal;
/**
* Tests client and server OAuth 1 functionality.
*
* @author Miroslav Fuksa
*/
public class OAuthClientServerTest extends JerseyTest {
private static final String SECRET_CONSUMER_KEY = "secret-consumer-key";
private static final String CONSUMER_KEY = "my-consumer-key";
private static final String CONSUMER_NAME = "my-consumer";
private static final String PROMETHEUS_TOKEN = "prometheus-token";
private static final String PROMETHEUS_SECRET = "prometheus-secret";
@Override
protected Application configure() {
final DefaultOAuth1Provider oAuthProvider = new DefaultOAuth1Provider();
oAuthProvider.registerConsumer(CONSUMER_NAME, CONSUMER_KEY,
SECRET_CONSUMER_KEY, new MultivaluedHashMap<String, String>());
final Principal prometheusPrincipal = new Principal() {
@Override
public String getName() {
return "prometheus";
}
};
oAuthProvider.addAccessToken(PROMETHEUS_TOKEN, PROMETHEUS_SECRET, CONSUMER_KEY,
"http://callback.url", prometheusPrincipal,
Arrays.asList("admin", "user").stream().collect(Collectors.toSet()),
new MultivaluedHashMap<String, String>());
final OAuth1ServerFeature oAuth1ServerFeature = new OAuth1ServerFeature(oAuthProvider,
"requestTokenSpecialUri", "accessTokenSpecialUri");
final ResourceConfig resourceConfig = new ResourceConfig();
resourceConfig.register(oAuth1ServerFeature);
resourceConfig.register(MyProtectedResource.class);
resourceConfig.register(new LoggingFeature(Logger.getLogger(OAuthClientServerTest.class.getName()),
LoggingFeature.Verbosity.PAYLOAD_ANY));
resourceConfig.register(OAuthAuthorizationResource.class);
resourceConfig.property(OAuth1ServerProperties.TIMESTAMP_UNIT, "SECONDS");
resourceConfig.property(OAuth1ServerProperties.MAX_NONCE_CACHE_SIZE, 20);
return resourceConfig;
}
@Path("resource")
public static class MyProtectedResource {
@Context
private SecurityContext securityContext;
@GET
public String get() {
return securityContext.getUserPrincipal().getName();
}
@Path("admin")
@GET
public boolean getFoo() {
return securityContext.isUserInRole("admin");
}
}
@Path("user-authorization")
public static class OAuthAuthorizationResource {
@Inject
private OAuth1Provider provider;
@GET
public String mustBeGetMethod(@QueryParam("oauth_token") String token) {
System.out.println("Token received from user: " + token);
final DefaultOAuth1Provider defProvider = (DefaultOAuth1Provider) provider;
assertEquals("http://consumer/callback/homer", defProvider.getRequestToken(token).getCallbackUrl());
return defProvider.authorizeToken(
defProvider.getRequestToken(token),
new UserPrincipal("homer"),
Collections.singleton("user"));
}
}
/**
* Tests client and server OAuth.
* <p/>
* Tests authorization flow including the request to a protected resource. The test uses {@link OAuth1AuthorizationFlow}
* to perform user authorization and uses authorized client for requesting protected resource.
* <p/>
* The resource {@link OAuthAuthorizationResource} is used to perform user authorization (this is done
* programmatically from the test). Finally, the Access Token is retrieved and used to request the
* protected resource. In this resource the user principal is used to return the name of the user stored
* in {@link SecurityContext}.
*/
@Test
public void testAuthorizationFlow() {
String tempCredUri = UriBuilder.fromUri(getBaseUri()).path("requestTokenSpecialUri").build().toString();
String accessTokenUri = UriBuilder.fromUri(getBaseUri()).path("accessTokenSpecialUri").build().toString();
final String userAuthorizationUri = UriBuilder.fromUri(getBaseUri()).path("user-authorization").build().toString();
final OAuth1AuthorizationFlow authFlow = OAuth1ClientSupport
.builder(new ConsumerCredentials(CONSUMER_KEY, SECRET_CONSUMER_KEY))
.authorizationFlow(tempCredUri, accessTokenUri, userAuthorizationUri)
.callbackUri("http://consumer/callback/homer").build();
final String authUri = authFlow.start();
// authorize by a request to authorization URI
final Response userAuthResponse = ClientBuilder.newClient().target(authUri).request().get();
assertEquals(200, userAuthResponse.getStatus());
final String verifier = userAuthResponse.readEntity(String.class);
System.out.println("Verifier: " + verifier);
authFlow.finish(verifier);
final Client authorizedClient = authFlow.getAuthorizedClient();
Response response = authorizedClient.target(getBaseUri()).path("resource")
.request().get();
assertEquals(200, response.getStatus());
assertEquals("homer", response.readEntity(String.class));
response = authorizedClient.target(getBaseUri()).path("resource").path("admin").request().get();
assertEquals(200, response.getStatus());
assertEquals(false, response.readEntity(boolean.class));
}
/**
* Tests {@link org.glassfish.jersey.client.oauth1.OAuth1ClientFilter} already configured with Access Token for signature
* purposes only.
*/
@Test
public void testRequestSigning() {
final Feature filterFeature = OAuth1ClientSupport.builder(
new ConsumerCredentials(CONSUMER_KEY, SECRET_CONSUMER_KEY)).feature()
.accessToken(new AccessToken(PROMETHEUS_TOKEN, PROMETHEUS_SECRET)).build();
final Client client = ClientBuilder.newBuilder()
.register(filterFeature).build();
final URI resourceUri = UriBuilder.fromUri(getBaseUri()).path("resource").build();
final WebTarget target = client.target(resourceUri);
Response response;
for (int i = 0; i < 15; i++) {
System.out.println("request: " + i);
response = target.request().get();
assertEquals(200, response.getStatus());
assertEquals("prometheus", response.readEntity(String.class));
i++;
response = target.path("admin").request().get();
assertEquals(200, response.getStatus());
assertEquals(true, response.readEntity(boolean.class));
}
}
/**
* Tests configuration of the nonce cache on the server side.
*/
@Test
public void testRequestSigningWithExceedingCache() {
final Feature filterFeature = OAuth1ClientSupport.builder(
new ConsumerCredentials(CONSUMER_KEY, SECRET_CONSUMER_KEY)).feature()
.accessToken(new AccessToken(PROMETHEUS_TOKEN, PROMETHEUS_SECRET)).build();
final Client client = ClientBuilder.newBuilder()
.register(filterFeature).build();
final URI resourceUri = UriBuilder.fromUri(getBaseUri()).path("resource").build();
final WebTarget target = client.target(resourceUri);
Response response;
for (int i = 0; i < 20; i++) {
System.out.println("request: " + i);
response = target.request().get();
assertEquals(200, response.getStatus());
assertEquals("prometheus", response.readEntity(String.class));
i++;
response = target.path("admin").request().get();
assertEquals(200, response.getStatus());
assertEquals(true, response.readEntity(boolean.class));
}
// now the nonce cache is full
response = target.request().get();
assertEquals(401, response.getStatus());
}
}