Skip to content

Commit

Permalink
Merge pull request #461 from sumedhassk/IDENTITY-4435-TestCases
Browse files Browse the repository at this point in the history
Committing test case for IDENTITY-4435
  • Loading branch information
Pushpalanka Jayawardhana committed Apr 11, 2016
2 parents bf7f180 + 84a2d26 commit 37a92cd
Show file tree
Hide file tree
Showing 5 changed files with 225 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -79,20 +79,29 @@ protected void init(TestUserMode userMode) throws Exception {
}

/**
* Create Application
* Create Application with the given app configurations
*
* @return OAuthConsumerAppDTO
* @throws Exception
*/
public OAuthConsumerAppDTO createApplication() throws Exception {
OAuthConsumerAppDTO appDtoResult = null;

OAuthConsumerAppDTO appDTO = new OAuthConsumerAppDTO();
appDTO.setApplicationName(org.wso2.identity.integration.test.utils.OAuth2Constant.OAUTH_APPLICATION_NAME);
appDTO.setCallbackUrl(OAuth2Constant.CALLBACK_URL);
appDTO.setOAuthVersion(OAuth2Constant.OAUTH_VERSION_2);
appDTO.setGrantTypes("authorization_code implicit password client_credentials refresh_token " +
"urn:ietf:params:oauth:grant-type:saml2-bearer iwa:ntlm");
appDTO.setGrantTypes("authorization_code implicit password client_credentials refresh_token "
+ "urn:ietf:params:oauth:grant-type:saml2-bearer iwa:ntlm");
return createApplication(appDTO);
}

/**
* Create Application with a given appDTO
*
* @return OAuthConsumerAppDTO
* @throws Exception
*/
public OAuthConsumerAppDTO createApplication(OAuthConsumerAppDTO appDTO) throws Exception {
OAuthConsumerAppDTO appDtoResult = null;

adminClient.registerOAuthApplicationData(appDTO);
OAuthConsumerAppDTO[] appDtos = adminClient.getAllOAuthApplicationData();
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,206 @@
/*
* Copyright (c) 2016, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
*
* WSO2 Inc. licenses this file to you under the Apache License,
* Version 2.0 (the "License"); you may not use this file except
* in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/

package org.wso2.identity.integration.test.oauth2;

import org.apache.catalina.startup.Tomcat;
import org.apache.http.Header;
import org.apache.http.HttpResponse;
import org.apache.http.NameValuePair;
import org.apache.http.impl.client.DefaultHttpClient;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.util.EntityUtils;
import org.testng.Assert;
import org.testng.annotations.AfterClass;
import org.testng.annotations.BeforeClass;
import org.testng.annotations.Test;
import org.wso2.carbon.automation.engine.context.TestUserMode;
import org.wso2.carbon.identity.oauth.stub.dto.OAuthConsumerAppDTO;
import org.wso2.carbon.integration.common.admin.client.AuthenticatorClient;
import org.wso2.identity.integration.test.utils.DataExtractUtil;
import org.wso2.identity.integration.test.utils.OAuth2Constant;

import java.io.File;
import java.net.URL;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.Map;

public class OAuth2ServiceRegexCallbackUrlTestCase extends OAuth2ServiceAbstractIntegrationTest {

private AuthenticatorClient logManger;
private String adminUsername;
private String adminPassword;
private String accessToken;
private String sessionDataKeyConsent;
private String sessionDataKey;

private String consumerKey;
private String consumerSecret;

private DefaultHttpClient client;
private Tomcat tomcat;

@BeforeClass(alwaysRun = true)
public void testInit() throws Exception {
super.init(TestUserMode.SUPER_TENANT_USER);
logManger = new AuthenticatorClient(backendURL);
adminUsername = userInfo.getUserName();
adminPassword = userInfo.getPassword();
logManger.login(isServer.getSuperTenant().getTenantAdmin().getUserName(),
isServer.getSuperTenant().getTenantAdmin().getPassword(),
isServer.getInstance().getHosts().get("default"));

setSystemproperties();
client = new DefaultHttpClient();

tomcat = getTomcat();
URL resourceUrl =
getClass().getResource(File.separator + "samples" + File.separator +
"playground2.war");
startTomcat(tomcat, OAuth2Constant.PLAYGROUND_APP_CONTEXT_ROOT, resourceUrl.getPath());
}

@AfterClass(alwaysRun = true)
public void atEnd() throws Exception {
deleteApplication();
removeOAuthApplicationData();
stopTomcat(tomcat);

logManger = null;
consumerKey = null;
accessToken = null;
}

@Test(groups = "wso2.is", description = "Check Oauth2 application registration")
public void testRegisterApplication() throws Exception {

OAuthConsumerAppDTO appConfigData = new OAuthConsumerAppDTO();
appConfigData.setApplicationName(org.wso2.identity.integration.test.utils.OAuth2Constant.OAUTH_APPLICATION_NAME);
appConfigData.setCallbackUrl(OAuth2Constant.CALLBACK_URL_REGEXP);
appConfigData.setOAuthVersion(OAuth2Constant.OAUTH_VERSION_2);
appConfigData.setGrantTypes("authorization_code implicit password client_credentials refresh_token "
+ "urn:ietf:params:oauth:grant-type:saml2-bearer iwa:ntlm");

OAuthConsumerAppDTO appDto = createApplication(appConfigData);
Assert.assertNotNull(appDto, "Application creation failed.");

consumerKey = appDto.getOauthConsumerKey();
Assert.assertNotNull(consumerKey, "Application creation failed.");
consumerSecret = appDto.getOauthConsumerSecret();
}

@Test(groups = "wso2.is", description = "Send authorize user request", dependsOnMethods = "testRegisterApplication")
public void testSendAuthorozedPost() throws Exception {
List<NameValuePair> urlParameters = new ArrayList<NameValuePair>();
urlParameters.add(new BasicNameValuePair("grantType",
OAuth2Constant.OAUTH2_GRANT_TYPE_IMPLICIT));
urlParameters.add(new BasicNameValuePair("consumerKey", consumerKey));
urlParameters.add(new BasicNameValuePair("callbackurl", OAuth2Constant.CALLBACK_REQUEST_URL_WITH_PARAMS));
urlParameters.add(new BasicNameValuePair("authorizeEndpoint", OAuth2Constant.APPROVAL_URL));
urlParameters.add(new BasicNameValuePair("authorize", OAuth2Constant.AUTHORIZE_PARAM));
urlParameters.add(new BasicNameValuePair("consumerSecret", consumerSecret));

HttpResponse response =
sendPostRequestWithParameters(client, urlParameters, OAuth2Constant.AUTHORIZED_USER_URL);
Assert.assertNotNull(response, "Authorization request failed. Authorized response is null");

Header locationHeader =
response.getFirstHeader(OAuth2Constant.HTTP_RESPONSE_HEADER_LOCATION);
Assert.assertNotNull(locationHeader, "Authorized response header is null");
EntityUtils.consume(response.getEntity());

response = sendGetRequest(client, locationHeader.getValue());
Assert.assertNotNull(response, "Authorized user response is null.");

Map<String, Integer> keyPositionMap = new HashMap<String, Integer>(1);
keyPositionMap.put("name=\"sessionDataKey\"", 1);
List<DataExtractUtil.KeyValue> keyValues =
DataExtractUtil.extractDataFromResponse(response, keyPositionMap);
Assert.assertNotNull(keyValues, "sessionDataKey key value is null");

sessionDataKey = keyValues.get(0).getValue();
Assert.assertNotNull(sessionDataKey, "Session data key is null.");
EntityUtils.consume(response.getEntity());
}

@Test(groups = "wso2.is", description = "Send login post request", dependsOnMethods = "testSendAuthorozedPost")
public void testSendLoginPost() throws Exception {
HttpResponse response = sendLoginPost(client, sessionDataKey);
Assert.assertNotNull(response, "Login request failed. Login response is null.");

Header locationHeader =
response.getFirstHeader(OAuth2Constant.HTTP_RESPONSE_HEADER_LOCATION);
Assert.assertNotNull(locationHeader, "Login request failed. Login response header is null");
EntityUtils.consume(response.getEntity());

response = sendGetRequest(client, locationHeader.getValue());
Map<String, Integer> keyPositionMap = new HashMap<String, Integer>(1);
keyPositionMap.put("name=\"sessionDataKeyConsent\"", 1);
List<DataExtractUtil.KeyValue> keyValues =
DataExtractUtil.extractSessionConsentDataFromResponse(response,
keyPositionMap);
Assert.assertNotNull(keyValues, "SessionDataKeyConsent key value is null");
sessionDataKeyConsent = keyValues.get(0).getValue();
EntityUtils.consume(response.getEntity());

Assert.assertNotNull(sessionDataKeyConsent, "Invalid session key consent.");
}

@Test(groups = "wso2.is", description = "Send approval post request", dependsOnMethods = "testSendLoginPost")
public void testSendApprovalPost() throws Exception {

List<NameValuePair> urlParameters = new ArrayList<NameValuePair>();
urlParameters.add(new BasicNameValuePair("consent", "approve"));
urlParameters.add(new BasicNameValuePair("sessionDataKeyConsent", sessionDataKeyConsent));

HttpResponse response =
sendPostRequestWithParameters(client, urlParameters,
OAuth2Constant.APPROVAL_URL);
Assert.assertNotNull(response, "Approval response is invalid.");

Header locationHeader =
response.getFirstHeader(OAuth2Constant.HTTP_RESPONSE_HEADER_LOCATION);
Assert.assertNotNull(locationHeader, "Approval Location header is null.");

accessToken = DataExtractUtil.extractAccessTokenFromQueryString(locationHeader.getValue());
Assert.assertNotNull(accessToken, "Access token is null.");
EntityUtils.consume(response.getEntity());
}

@Test(groups = "wso2.is", description = "Validate access token", dependsOnMethods = "testSendApprovalPost")
public void testValidateAccessToken() throws Exception {
HttpResponse response = sendValidateAccessTokenPost(client, accessToken);
Assert.assertNotNull(response, "Validate access token response is invalid.");

Map<String, Integer> keyPositionMap = new HashMap<String, Integer>(1);
keyPositionMap.put("name=\"valid\"", 1);

List<DataExtractUtil.KeyValue> keyValues =
DataExtractUtil.extractInputValueFromResponse(response,
keyPositionMap);
Assert.assertNotNull(keyValues, "Access token Key value is null.");
String valid = keyValues.get(0).getValue();
EntityUtils.consume(response.getEntity());
Assert.assertEquals(valid, "true", "Token Validation failed");
EntityUtils.consume(response.getEntity());
}


}
Original file line number Diff line number Diff line change
Expand Up @@ -226,7 +226,8 @@ public static List<KeyValue> extractSessionConsentDataFromResponse(HttpResponse
* @return Access Token
*/
public static String extractAccessTokenFromQueryString(String query) {
String[] params = query.split("&");
String fragment = query.substring(query.indexOf("#") + 1);
String[] params = fragment.split("&");
for (String param : params) {
String name = param.split("=")[0];
if (name.contains(OAuth2Constant.ACCESS_TOKEN)) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,8 @@ public final class OAuth2Constant {
public static final String UNSUPPORTED_GRANT_TYPE = "unsupported_grant_type";

public final static String CALLBACK_URL = "http://localhost:8490/playground2/oauth2client";
public final static String CALLBACK_URL_REGEXP = "regexp=http:\\/\\/localhost:8490\\/playground2\\/oauth2client[\\?]?((\\w+)=(\\w+)&?)+";
public final static String CALLBACK_REQUEST_URL_WITH_PARAMS = "http://localhost:8490/playground2/oauth2client?param=value&param2=value2";
public final static String AUTHORIZED_USER_URL = "http://localhost:8490/playground2/oauth2-authorize-user.jsp";
public final static String AUTHORIZED_URL = "http://localhost:8490/playground2/oauth2.jsp";
public final static String GET_ACCESS_TOKEN_URL = "http://localhost:8490/playground2/oauth2-get-access-token.jsp";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,7 @@
<class name="org.wso2.identity.integration.test.oauth2.OAuth2ServiceAuthCodeGrantOpenIdTestCase"/>
<class name="org.wso2.identity.integration.test.oauth2.OAuth2ServiceClientCredentialTestCase"/>
<class name="org.wso2.identity.integration.test.oauth2.OAuth2ServiceImplicitGrantTestCase"/>
<class name="org.wso2.identity.integration.test.oauth2.OAuth2ServiceRegexCallbackUrlTestCase"/>
<class name="org.wso2.identity.integration.test.oauth2.OAuth2ServiceResourceOwnerTestCase"/>
<class name="org.wso2.identity.integration.test.oauth2.OAuth2ServiceAuthCodeGrantTestCase"/>
<class name="org.wso2.identity.integration.test.oauth2.OAuth2TokenRevokeAfterCacheTimeOutTestCase"/>
Expand Down

0 comments on commit 37a92cd

Please sign in to comment.