-
Notifications
You must be signed in to change notification settings - Fork 51
/
JwtAuthenticationFilterTest.java
88 lines (67 loc) · 3.28 KB
/
JwtAuthenticationFilterTest.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
package com.example.demo;
import com.example.demo.security.jwt.JwtTokenAuthenticationFilter;
import com.example.demo.security.jwt.JwtTokenProvider;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.springframework.http.HttpHeaders;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.authority.AuthorityUtils;
import org.springframework.security.core.context.ReactiveSecurityContextHolder;
import org.springframework.web.server.ServerWebExchange;
import org.springframework.web.server.WebFilterChain;
import reactor.core.publisher.Mono;
import static org.mockito.ArgumentMatchers.anyString;
import static org.mockito.Mockito.RETURNS_DEEP_STUBS;
import static org.mockito.Mockito.atLeast;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.reset;
import static org.mockito.Mockito.times;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
class JwtAuthenticationFilterTest {
private JwtTokenProvider tokenProvider = mock(JwtTokenProvider.class);
private ServerWebExchange exchange = mock(ServerWebExchange.class, RETURNS_DEEP_STUBS);
private WebFilterChain chain = mock(WebFilterChain.class, RETURNS_DEEP_STUBS);
@BeforeEach
void setup() {
reset(this.tokenProvider);
reset(this.exchange);
reset(this.chain);
}
@Test
void testFilter() {
var filter = new JwtTokenAuthenticationFilter(this.tokenProvider);
var usernamePasswordToken = new UsernamePasswordAuthenticationToken("test", "password",
AuthorityUtils.createAuthorityList("ROLE_USER"));
when(this.exchange.getRequest().getHeaders().getFirst(HttpHeaders.AUTHORIZATION))
.thenReturn("Bearer atesttoken");
when(this.tokenProvider.validateToken(anyString())).thenReturn(true);
when(this.tokenProvider.getAuthentication(anyString())).thenReturn(usernamePasswordToken);
when(
this.chain
.filter(this.exchange)
.contextWrite(ReactiveSecurityContextHolder.withAuthentication(usernamePasswordToken))
).thenReturn(Mono.empty());
filter.filter(this.exchange, this.chain);
verify(this.chain, atLeast(1)).filter(this.exchange);
}
@Test
void testFilterWithNoToken() {
var filter = new JwtTokenAuthenticationFilter(this.tokenProvider);
when(this.exchange.getRequest().getHeaders().getFirst(HttpHeaders.AUTHORIZATION))
.thenReturn(null);
when(this.chain.filter(this.exchange)).thenReturn(Mono.empty());
filter.filter(this.exchange, this.chain);
verify(this.chain, times(1)).filter(this.exchange);
}
@Test
void testFilterWithInvalidToken() {
var filter = new JwtTokenAuthenticationFilter(this.tokenProvider);
when(this.exchange.getRequest().getHeaders().getFirst(HttpHeaders.AUTHORIZATION))
.thenReturn("Bearer atesttoken");
when(this.tokenProvider.validateToken(anyString())).thenReturn(false);
when(this.chain.filter(this.exchange)).thenReturn(Mono.empty());
filter.filter(this.exchange, this.chain);
verify(this.chain, times(1)).filter(this.exchange);
}
}