mirror of
				https://github.com/datahub-project/datahub.git
				synced 2025-10-30 18:26:58 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			348 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Java
		
	
	
	
	
	
			
		
		
	
	
			348 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Java
		
	
	
	
	
	
| package app;
 | |
| 
 | |
| import static org.junit.jupiter.api.Assertions.assertEquals;
 | |
| import static org.junit.jupiter.api.Assertions.assertTrue;
 | |
| import static play.mvc.Http.Status.NOT_FOUND;
 | |
| import static play.mvc.Http.Status.OK;
 | |
| import static play.test.Helpers.fakeRequest;
 | |
| import static play.test.Helpers.route;
 | |
| 
 | |
| import com.nimbusds.jwt.JWT;
 | |
| import com.nimbusds.jwt.JWTClaimsSet;
 | |
| import com.nimbusds.jwt.JWTParser;
 | |
| import controllers.routes;
 | |
| import java.io.IOException;
 | |
| import java.net.HttpURLConnection;
 | |
| import java.net.InetAddress;
 | |
| import java.net.URL;
 | |
| import java.text.ParseException;
 | |
| import java.util.Date;
 | |
| import java.util.List;
 | |
| import java.util.Map;
 | |
| import java.util.concurrent.CompletableFuture;
 | |
| import java.util.concurrent.TimeUnit;
 | |
| import java.util.concurrent.TimeoutException;
 | |
| import no.nav.security.mock.oauth2.MockOAuth2Server;
 | |
| import no.nav.security.mock.oauth2.http.OAuth2HttpRequest;
 | |
| import no.nav.security.mock.oauth2.http.OAuth2HttpResponse;
 | |
| import no.nav.security.mock.oauth2.http.Route;
 | |
| import no.nav.security.mock.oauth2.token.DefaultOAuth2TokenCallback;
 | |
| import okhttp3.Headers;
 | |
| import okhttp3.mockwebserver.MockResponse;
 | |
| import okhttp3.mockwebserver.MockWebServer;
 | |
| import org.awaitility.Awaitility;
 | |
| import org.awaitility.Durations;
 | |
| import org.jetbrains.annotations.NotNull;
 | |
| import org.junit.jupiter.api.AfterAll;
 | |
| import org.junit.jupiter.api.BeforeAll;
 | |
| import org.junit.jupiter.api.Test;
 | |
| import org.junit.jupiter.api.TestInstance;
 | |
| import org.junitpioneer.jupiter.SetEnvironmentVariable;
 | |
| import org.openqa.selenium.Cookie;
 | |
| import org.openqa.selenium.htmlunit.HtmlUnitDriver;
 | |
| import org.slf4j.Logger;
 | |
| import org.slf4j.LoggerFactory;
 | |
| import play.Application;
 | |
| import play.Environment;
 | |
| import play.Mode;
 | |
| import play.inject.guice.GuiceApplicationBuilder;
 | |
| import play.mvc.Http;
 | |
| import play.mvc.Result;
 | |
| import play.test.Helpers;
 | |
| import play.test.TestBrowser;
 | |
| import play.test.WithBrowser;
 | |
| 
 | |
| @TestInstance(TestInstance.Lifecycle.PER_CLASS)
 | |
| @SetEnvironmentVariable(key = "DATAHUB_SECRET", value = "test")
 | |
| @SetEnvironmentVariable(key = "KAFKA_BOOTSTRAP_SERVER", value = "")
 | |
| @SetEnvironmentVariable(key = "DATAHUB_ANALYTICS_ENABLED", value = "false")
 | |
| @SetEnvironmentVariable(key = "AUTH_OIDC_ENABLED", value = "true")
 | |
| @SetEnvironmentVariable(key = "AUTH_OIDC_JIT_PROVISIONING_ENABLED", value = "false")
 | |
| @SetEnvironmentVariable(key = "AUTH_OIDC_CLIENT_ID", value = "testclient")
 | |
| @SetEnvironmentVariable(key = "AUTH_OIDC_CLIENT_SECRET", value = "testsecret")
 | |
| @SetEnvironmentVariable(key = "AUTH_VERBOSE_LOGGING", value = "true")
 | |
| public class ApplicationTest extends WithBrowser {
 | |
|   private static final Logger logger = LoggerFactory.getLogger(ApplicationTest.class);
 | |
|   private static final String ISSUER_ID = "testIssuer";
 | |
| 
 | |
|   @Override
 | |
|   protected Application provideApplication() {
 | |
|     return new GuiceApplicationBuilder()
 | |
|         .configure("metadataService.port", String.valueOf(gmsServerPort()))
 | |
|         .configure("auth.baseUrl", "http://localhost:" + providePort())
 | |
|         .configure(
 | |
|             "auth.oidc.discoveryUri",
 | |
|             "http://localhost:"
 | |
|                 + oauthServerPort()
 | |
|                 + "/testIssuer/.well-known/openid-configuration")
 | |
|         .in(new Environment(Mode.TEST))
 | |
|         .build();
 | |
|   }
 | |
| 
 | |
|   @Override
 | |
|   protected TestBrowser provideBrowser(int port) {
 | |
|     HtmlUnitDriver webClient = new HtmlUnitDriver();
 | |
|     webClient.setJavascriptEnabled(false);
 | |
|     return Helpers.testBrowser(webClient, providePort());
 | |
|   }
 | |
| 
 | |
|   public int oauthServerPort() {
 | |
|     return providePort() + 1;
 | |
|   }
 | |
| 
 | |
|   public int gmsServerPort() {
 | |
|     return providePort() + 2;
 | |
|   }
 | |
| 
 | |
|   private MockOAuth2Server oauthServer;
 | |
|   private Thread oauthServerThread;
 | |
|   private CompletableFuture<Void> oauthServerStarted;
 | |
| 
 | |
|   private MockWebServer gmsServer;
 | |
| 
 | |
|   private String wellKnownUrl;
 | |
| 
 | |
|   private static final String TEST_USER = "urn:li:corpuser:testUser@myCompany.com";
 | |
|   private static final String TEST_TOKEN = "faketoken_YCpYIrjQH4sD3_rAc3VPPFg4";
 | |
| 
 | |
|   @BeforeAll
 | |
|   public void init() throws IOException {
 | |
|     // Start Mock GMS
 | |
|     gmsServer = new MockWebServer();
 | |
|     gmsServer.enqueue(new MockResponse().setResponseCode(404)); // dynamic settings - not tested
 | |
|     gmsServer.enqueue(new MockResponse().setResponseCode(404)); // dynamic settings - not tested
 | |
|     gmsServer.enqueue(new MockResponse().setResponseCode(404)); // dynamic settings - not tested
 | |
|     gmsServer.enqueue(new MockResponse().setBody(String.format("{\"value\":\"%s\"}", TEST_USER)));
 | |
|     gmsServer.enqueue(
 | |
|         new MockResponse().setBody(String.format("{\"accessToken\":\"%s\"}", TEST_TOKEN)));
 | |
|     gmsServer.start(gmsServerPort());
 | |
| 
 | |
|     // Start Mock Identity Provider
 | |
|     startMockOauthServer();
 | |
|     // Start Play Frontend
 | |
|     startServer();
 | |
|     // Start Browser
 | |
|     createBrowser();
 | |
| 
 | |
|     Awaitility.await().timeout(Durations.TEN_SECONDS).until(() -> app != null);
 | |
|   }
 | |
| 
 | |
|   @AfterAll
 | |
|   public void shutdown() throws IOException {
 | |
|     if (gmsServer != null) {
 | |
|       logger.info("Shutdown Mock GMS");
 | |
|       gmsServer.shutdown();
 | |
|     }
 | |
|     logger.info("Shutdown Play Frontend");
 | |
|     stopServer();
 | |
|     if (oauthServer != null) {
 | |
|       logger.info("Shutdown MockOAuth2Server");
 | |
|       oauthServer.shutdown();
 | |
|     }
 | |
|     if (oauthServerThread != null && oauthServerThread.isAlive()) {
 | |
|       logger.info("Shutdown MockOAuth2Server thread");
 | |
|       oauthServerThread.interrupt();
 | |
|       try {
 | |
|         oauthServerThread.join(2000); // Wait up to 2 seconds for thread to finish
 | |
|       } catch (InterruptedException e) {
 | |
|         logger.warn("Shutdown MockOAuth2Server thread failed to join.");
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   private void startMockOauthServer() {
 | |
|     // Configure HEAD responses
 | |
|     Route[] routes =
 | |
|         new Route[] {
 | |
|           new Route() {
 | |
|             @Override
 | |
|             public boolean match(@NotNull OAuth2HttpRequest oAuth2HttpRequest) {
 | |
|               return "HEAD".equals(oAuth2HttpRequest.getMethod())
 | |
|                   && (String.format("/%s/.well-known/openid-configuration", ISSUER_ID)
 | |
|                           .equals(oAuth2HttpRequest.getUrl().url().getPath())
 | |
|                       || String.format("/%s/token", ISSUER_ID)
 | |
|                           .equals(oAuth2HttpRequest.getUrl().url().getPath()));
 | |
|             }
 | |
| 
 | |
|             @Override
 | |
|             public OAuth2HttpResponse invoke(OAuth2HttpRequest oAuth2HttpRequest) {
 | |
|               return new OAuth2HttpResponse(
 | |
|                   Headers.of(
 | |
|                       Map.of(
 | |
|                           "Content-Type", "application/json",
 | |
|                           "Cache-Control", "no-store",
 | |
|                           "Pragma", "no-cache",
 | |
|                           "Content-Length", "-1")),
 | |
|                   200,
 | |
|                   null,
 | |
|                   null);
 | |
|             }
 | |
|           }
 | |
|         };
 | |
|     oauthServer = new MockOAuth2Server(routes);
 | |
|     oauthServerStarted = new CompletableFuture<>();
 | |
| 
 | |
|     // Create and start server in separate thread
 | |
|     oauthServerThread =
 | |
|         new Thread(
 | |
|             () -> {
 | |
|               try {
 | |
|                 // Configure mock responses
 | |
|                 oauthServer.enqueueCallback(
 | |
|                     new DefaultOAuth2TokenCallback(
 | |
|                         ISSUER_ID,
 | |
|                         "testUser",
 | |
|                         "JWT",
 | |
|                         List.of(),
 | |
|                         Map.of(
 | |
|                             "email", "testUser@myCompany.com",
 | |
|                             "groups", "myGroup"),
 | |
|                         600));
 | |
| 
 | |
|                 oauthServer.start(InetAddress.getByName("localhost"), oauthServerPort());
 | |
| 
 | |
|                 oauthServerStarted.complete(null);
 | |
| 
 | |
|                 // Keep thread alive until server is stopped
 | |
|                 while (!Thread.currentThread().isInterrupted() && testServer.isRunning()) {
 | |
|                   try {
 | |
|                     Thread.sleep(1000);
 | |
|                   } catch (InterruptedException e) {
 | |
|                     Thread.currentThread().interrupt();
 | |
|                     break;
 | |
|                   }
 | |
|                 }
 | |
|               } catch (Exception e) {
 | |
|                 oauthServerStarted.completeExceptionally(e);
 | |
|               }
 | |
|             });
 | |
| 
 | |
|     oauthServerThread.setDaemon(true); // Ensure thread doesn't prevent JVM shutdown
 | |
|     oauthServerThread.start();
 | |
| 
 | |
|     // Wait for server to start with timeout
 | |
|     oauthServerStarted
 | |
|         .orTimeout(10, TimeUnit.SECONDS)
 | |
|         .whenComplete(
 | |
|             (result, throwable) -> {
 | |
|               if (throwable != null) {
 | |
|                 if (throwable instanceof TimeoutException) {
 | |
|                   throw new RuntimeException(
 | |
|                       "MockOAuth2Server failed to start within timeout", throwable);
 | |
|                 }
 | |
|                 throw new RuntimeException("MockOAuth2Server failed to start", throwable);
 | |
|               }
 | |
|             });
 | |
| 
 | |
|     // Discovery url to authorization server metadata
 | |
|     wellKnownUrl = oauthServer.wellKnownUrl(ISSUER_ID).toString();
 | |
| 
 | |
|     // Wait for server to return configuration
 | |
|     // Validate mock server returns data
 | |
|     try {
 | |
|       URL url = new URL(wellKnownUrl);
 | |
|       HttpURLConnection conn = (HttpURLConnection) url.openConnection();
 | |
|       conn.setRequestMethod("GET");
 | |
|       int responseCode = conn.getResponseCode();
 | |
|       logger.info("Well-known endpoint response code: {}", responseCode);
 | |
| 
 | |
|       if (responseCode != 200) {
 | |
|         throw new RuntimeException(
 | |
|             "MockOAuth2Server not accessible. Response code: " + responseCode);
 | |
|       }
 | |
|       logger.info("Successfully started MockOAuth2Server.");
 | |
|     } catch (Exception e) {
 | |
|       throw new RuntimeException("Failed to connect to MockOAuth2Server", e);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testHealth() {
 | |
|     Http.RequestBuilder request = fakeRequest(routes.Application.healthcheck());
 | |
| 
 | |
|     Result result = route(app, request);
 | |
|     assertEquals(OK, result.status());
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testIndex() {
 | |
|     Http.RequestBuilder request = fakeRequest(routes.Application.index(""));
 | |
| 
 | |
|     Result result = route(app, request);
 | |
|     assertEquals(OK, result.status());
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testIndexNotFound() {
 | |
|     Http.RequestBuilder request = fakeRequest(routes.Application.index("/other"));
 | |
|     Result result = route(app, request);
 | |
|     assertEquals(NOT_FOUND, result.status());
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testOpenIdConfig() {
 | |
|     assertEquals(
 | |
|         "http://localhost:" + oauthServerPort() + "/testIssuer/.well-known/openid-configuration",
 | |
|         wellKnownUrl);
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testHappyPathOidc() throws ParseException {
 | |
|     browser.goTo("/authenticate");
 | |
|     assertEquals("", browser.url());
 | |
| 
 | |
|     Cookie actorCookie = browser.getCookie("actor");
 | |
|     assertEquals(TEST_USER, actorCookie.getValue());
 | |
| 
 | |
|     Cookie sessionCookie = browser.getCookie("PLAY_SESSION");
 | |
|     String jwtStr = sessionCookie.getValue();
 | |
|     JWT jwt = JWTParser.parse(jwtStr);
 | |
|     JWTClaimsSet claims = jwt.getJWTClaimsSet();
 | |
|     Map<String, String> data = (Map<String, String>) claims.getClaim("data");
 | |
|     assertEquals(TEST_TOKEN, data.get("token"));
 | |
|     assertEquals(TEST_USER, data.get("actor"));
 | |
|     // Default expiration is 24h, so should always be less than current time + 1 day since it stamps
 | |
|     // the time before this executes
 | |
|     assertTrue(
 | |
|         claims
 | |
|                 .getExpirationTime()
 | |
|                 .compareTo(new Date(System.currentTimeMillis() + (24 * 60 * 60 * 1000)))
 | |
|             < 0);
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testAPI() throws ParseException {
 | |
|     testHappyPathOidc();
 | |
|     int requestCount = gmsServer.getRequestCount();
 | |
| 
 | |
|     browser.goTo("/api/v2/graphql/");
 | |
|     assertEquals(++requestCount, gmsServer.getRequestCount());
 | |
|   }
 | |
| 
 | |
|   @Test
 | |
|   public void testOidcRedirectToRequestedUrl() {
 | |
|     browser.goTo("/authenticate?redirect_uri=%2Fcontainer%2Furn%3Ali%3Acontainer%3ADATABASE");
 | |
|     assertEquals("container/urn:li:container:DATABASE", browser.url());
 | |
|   }
 | |
| 
 | |
|   /**
 | |
|    * The Redirect Uri parameter is used to store a previous relative location within the app to be
 | |
|    * able to take a user back to their expected page. Redirecting to other domains should be
 | |
|    * blocked.
 | |
|    */
 | |
|   @Test
 | |
|   public void testInvalidRedirectUrl() {
 | |
|     browser.goTo("/authenticate?redirect_uri=https%3A%2F%2Fwww.google.com");
 | |
|     assertEquals("", browser.url());
 | |
| 
 | |
|     browser.goTo("/authenticate?redirect_uri=file%3A%2F%2FmyFile");
 | |
|     assertEquals("", browser.url());
 | |
| 
 | |
|     browser.goTo("/authenticate?redirect_uri=ftp%3A%2F%2FsomeFtp");
 | |
|     assertEquals("", browser.url());
 | |
| 
 | |
|     browser.goTo("/authenticate?redirect_uri=localhost%3A9002%2Flogin");
 | |
|     assertEquals("", browser.url());
 | |
|   }
 | |
| }
 | 
