-
Notifications
You must be signed in to change notification settings - Fork 214
/
WebSocketJwtAuthenticationProviderTest.java
55 lines (46 loc) · 1.78 KB
/
WebSocketJwtAuthenticationProviderTest.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
/*
* Copyright (c) 2021 Contributors to the Eclipse Foundation
*
* See the NOTICE file(s) distributed with this work for additional
* information regarding copyright ownership.
*
* This program and the accompanying materials are made available under the
* terms of the Eclipse Public License 2.0 which is available at
* http://www.eclipse.org/legal/epl-2.0
*
* SPDX-License-Identifier: EPL-2.0
*/
package org.eclipse.ditto.gateway.service.security.authentication.jwt;
import org.eclipse.ditto.base.model.headers.DittoHeaders;
import org.junit.Before;
import org.junit.Test;
import org.apache.pekko.http.javadsl.server.RequestContext;
/**
* Tests {@link JwtAuthenticationProvider}.
*/
public final class WebSocketJwtAuthenticationProviderTest extends AbstractJwtAuthenticationProviderTest {
private JwtAuthenticationProvider underTest;
@Before
public void setup() {
knownDittoHeaders = DittoHeaders.newBuilder().correlationId(testName.getMethodName()).build();
underTest = JwtAuthenticationProvider.newWsInstance(authenticationContextProvider, jwtValidator);
}
@Override
protected JwtAuthenticationProvider getUnderTest() {
return underTest;
}
@Override
protected boolean supportsAccessTokenParameter() {
return true;
}
@Override
protected String getExpectedMissingJwtDescription() {
return "Please provide a valid JWT in the 'Authorization' header prefixed with 'Bearer ' or as query" +
" parameter 'access_token'.";
}
@Test
public void doExtractAuthenticationWithInvalidJwtFromAccessTokenParameter() {
final RequestContext requestContext = mockRequestContext(URI_WITH_ACCESS_TOKEN_PARAMETER);
doExtractAuthenticationWithInvalidJwt(getUnderTest(), requestContext);
}
}