140 lines
6.8 KiB
Java
140 lines
6.8 KiB
Java
/*
|
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
|
* and other contributors as indicated by the @author tags.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package org.keycloak.adapters;
|
|
|
|
import org.apache.http.client.HttpClient;
|
|
import org.apache.http.client.methods.Configurable;
|
|
import org.apache.http.impl.conn.PoolingHttpClientConnectionManager;
|
|
import org.hamcrest.CoreMatchers;
|
|
import org.junit.Test;
|
|
import org.keycloak.adapters.rotation.HardcodedPublicKeyLocator;
|
|
import org.keycloak.adapters.rotation.JWKPublicKeyLocator;
|
|
import org.keycloak.common.enums.RelativeUrlsUsed;
|
|
import org.keycloak.common.enums.SslRequired;
|
|
import org.keycloak.common.util.PemUtils;
|
|
import org.keycloak.enums.TokenStore;
|
|
import org.keycloak.protocol.oidc.client.authentication.ClientIdAndSecretCredentialsProvider;
|
|
import org.keycloak.protocol.oidc.client.authentication.JWTClientCredentialsProvider;
|
|
import org.keycloak.protocol.oidc.client.authentication.JWTClientSecretCredentialsProvider;
|
|
|
|
import static org.hamcrest.MatcherAssert.assertThat;
|
|
import static org.junit.Assert.assertEquals;
|
|
import static org.junit.Assert.assertFalse;
|
|
import static org.junit.Assert.assertTrue;
|
|
|
|
import java.lang.reflect.Field;
|
|
|
|
/**
|
|
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
|
* @author <a href="mailto:brad.culley@spartasystems.com">Brad Culley</a>
|
|
* @author <a href="mailto:john.ament@spartasystems.com">John D. Ament</a>
|
|
*/
|
|
public class KeycloakDeploymentBuilderTest {
|
|
|
|
@Test
|
|
public void load() {
|
|
KeycloakDeployment deployment = KeycloakDeploymentBuilder.build(getClass().getResourceAsStream("/keycloak.json"));
|
|
assertEquals("demo", deployment.getRealm());
|
|
assertEquals("customer-portal", deployment.getResourceName());
|
|
|
|
assertTrue(deployment.getPublicKeyLocator() instanceof HardcodedPublicKeyLocator);
|
|
assertEquals(PemUtils.decodePublicKey("MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrVrCuTtArbgaZzL1hvh0xtL5mc7o0NqPVnYXkLvgcwiC3BjLGw1tGEGoJaXDuSaRllobm53JBhjx33UNv+5z/UMG4kytBWxheNVKnL6GgqlNabMaFfPLPCF8kAgKnsi79NMo+n6KnSY8YeUmec/p2vjO2NjsSAVcWEQMVhJ31LwIDAQAB"),
|
|
deployment.getPublicKeyLocator().getPublicKey(null, deployment));
|
|
|
|
assertEquals("https://localhost:8443/auth", deployment.getAuthServerBaseUrl());
|
|
assertEquals(SslRequired.EXTERNAL, deployment.getSslRequired());
|
|
assertTrue(deployment.isUseResourceRoleMappings());
|
|
assertTrue(deployment.isCors());
|
|
assertEquals(1000, deployment.getCorsMaxAge());
|
|
assertEquals("POST, PUT, DELETE, GET", deployment.getCorsAllowedMethods());
|
|
assertEquals("X-Custom, X-Custom2", deployment.getCorsAllowedHeaders());
|
|
assertEquals("X-Custom3, X-Custom4", deployment.getCorsExposedHeaders());
|
|
assertTrue(deployment.isBearerOnly());
|
|
assertTrue(deployment.isPublicClient());
|
|
assertTrue(deployment.isEnableBasicAuth());
|
|
assertTrue(deployment.isExposeToken());
|
|
assertFalse(deployment.isOAuthQueryParameterEnabled());
|
|
assertEquals("234234-234234-234234", deployment.getResourceCredentials().get("secret"));
|
|
assertEquals(ClientIdAndSecretCredentialsProvider.PROVIDER_ID, deployment.getClientAuthenticator().getId());
|
|
HttpClient client = deployment.getClient();
|
|
int maxPoolConnections = -1;
|
|
Field connManager = null;
|
|
|
|
try {
|
|
connManager = client.getClass().getDeclaredField("connManager");
|
|
connManager.setAccessible(true);
|
|
maxPoolConnections = ((PoolingHttpClientConnectionManager) connManager.get(client)).getMaxTotal();
|
|
} catch (Exception cause) {
|
|
throw new RuntimeException("Failed to get max pool connections", cause);
|
|
} finally {
|
|
connManager.setAccessible(false);
|
|
}
|
|
|
|
|
|
assertEquals(20, maxPoolConnections);
|
|
assertEquals(RelativeUrlsUsed.NEVER, deployment.getRelativeUrls());
|
|
assertTrue(deployment.isAlwaysRefreshToken());
|
|
assertTrue(deployment.isRegisterNodeAtStartup());
|
|
assertEquals(1000, deployment.getRegisterNodePeriod());
|
|
assertEquals(TokenStore.COOKIE, deployment.getTokenStore());
|
|
assertEquals("email", deployment.getPrincipalAttribute());
|
|
assertEquals(10, deployment.getTokenMinimumTimeToLive());
|
|
assertEquals(20, deployment.getMinTimeBetweenJwksRequests());
|
|
assertEquals(120, deployment.getPublicKeyCacheTtl());
|
|
assertEquals("/api/$1", deployment.getRedirectRewriteRules().get("^/wsmaster/api/(.*)$"));
|
|
assertTrue(deployment.isVerifyTokenAudience());
|
|
}
|
|
|
|
@Test
|
|
public void loadNoClientCredentials() {
|
|
KeycloakDeployment deployment = KeycloakDeploymentBuilder.build(getClass().getResourceAsStream("/keycloak-no-credentials.json"));
|
|
assertEquals(ClientIdAndSecretCredentialsProvider.PROVIDER_ID, deployment.getClientAuthenticator().getId());
|
|
|
|
assertTrue(deployment.getPublicKeyLocator() instanceof JWKPublicKeyLocator);
|
|
assertEquals(10, deployment.getMinTimeBetweenJwksRequests());
|
|
assertEquals(86400, deployment.getPublicKeyCacheTtl());
|
|
}
|
|
|
|
@Test
|
|
public void loadJwtCredentials() {
|
|
KeycloakDeployment deployment = KeycloakDeploymentBuilder.build(getClass().getResourceAsStream("/keycloak-jwt.json"));
|
|
assertEquals(JWTClientCredentialsProvider.PROVIDER_ID, deployment.getClientAuthenticator().getId());
|
|
}
|
|
|
|
@Test
|
|
public void loadSecretJwtCredentials() {
|
|
KeycloakDeployment deployment = KeycloakDeploymentBuilder.build(getClass().getResourceAsStream("/keycloak-secret-jwt.json"));
|
|
assertEquals(JWTClientSecretCredentialsProvider.PROVIDER_ID, deployment.getClientAuthenticator().getId());
|
|
}
|
|
|
|
@Test
|
|
public void loadHttpClientTimeoutConfiguration() {
|
|
KeycloakDeployment deployment = KeycloakDeploymentBuilder.build(getClass().getResourceAsStream("/keycloak-http-client.json"));
|
|
assertThat(deployment, CoreMatchers.notNullValue());
|
|
|
|
HttpClient client = deployment.getClient();
|
|
assertThat(client, CoreMatchers.notNullValue());
|
|
|
|
long socketTimeout = ((Configurable) client).getConfig().getSocketTimeout();
|
|
long connectionTimeout = ((Configurable) client).getConfig().getConnectTimeout();
|
|
|
|
assertThat(socketTimeout, CoreMatchers.is(2000L));
|
|
assertThat(connectionTimeout, CoreMatchers.is(6000L));
|
|
}
|
|
}
|