Add spring authorization server for testing purposes
with Selenium. And ci job to build the docker image
This commit is contained in:
parent
df2dd96edf
commit
8fb36030a5
|
@ -0,0 +1,37 @@
|
||||||
|
name: Spring Authorization Server docker image (make)
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
paths:
|
||||||
|
- .github/workflows/authorization-server-make.yaml
|
||||||
|
- selenium/authorization-server
|
||||||
|
pull_request:
|
||||||
|
paths:
|
||||||
|
- .github/workflows/authorization-server-make.yaml
|
||||||
|
- selenium/authorization-server
|
||||||
|
|
||||||
|
env:
|
||||||
|
REGISTRY_IMAGE: pivotalrabbitmq/spring-authorization-server
|
||||||
|
IMAGE_TAG: 0.0.11
|
||||||
|
jobs:
|
||||||
|
docker:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
|
||||||
|
- name: CHECKOUT REPOSITORY
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Login to Docker Hub
|
||||||
|
uses: docker/login-action@v3
|
||||||
|
with:
|
||||||
|
username: ${{ secrets.DOCKERHUB_USERNAME }}
|
||||||
|
password: ${{ secrets.DOCKERHUB_PASSWORD }}
|
||||||
|
|
||||||
|
- name: Build and push
|
||||||
|
uses: docker/build-push-action@v6
|
||||||
|
with:
|
||||||
|
context: selenium/authorization-server
|
||||||
|
push: true
|
||||||
|
tags: ${{ env.REGISTRY_IMAGE }}:${{ env.IMAGE_TAG }}
|
|
@ -74,20 +74,22 @@ jobs:
|
||||||
- name: Run Suites
|
- name: Run Suites
|
||||||
id: tests
|
id: tests
|
||||||
run: |
|
run: |
|
||||||
IMAGE_TAG=$(find PACKAGES/rabbitmq-server-generic-unix-*.tar.xz | awk -F 'PACKAGES/rabbitmq-server-generic-unix-|.tar.xz' '{print $2}')
|
export IMAGE_TAG=$(find PACKAGES/rabbitmq-server-generic-unix-*.tar.xz | awk -F 'PACKAGES/rabbitmq-server-generic-unix-|.tar.xz' '{print $2}')
|
||||||
CONF_DIR_PREFIX="$(mktemp -d)" RABBITMQ_DOCKER_IMAGE=pivotalrabbitmq/rabbitmq:$IMAGE_TAG \
|
export CONF_DIR_PREFIX="$(mktemp -d)"
|
||||||
${SELENIUM_DIR}/run-suites.sh full-suite-authnz-messaging
|
export RABBITMQ_DOCKER_IMAGE=pivotalrabbitmq/rabbitmq:$IMAGE_TAG
|
||||||
echo "SELENIUM_ARTIFACTS=$CONF_DIR_PREFIX" >> "$GITHUB_OUTPUT"
|
echo "Running selenium tests with "
|
||||||
|
echo " - CONF_DIR_PREFIX: ${CONF_DIR_PREFIX}"
|
||||||
|
echo " - IMAGE_TAG: ${IMAGE_TAG}"
|
||||||
|
echo " - RABBITMQ_DOCKER_IMAGE: ${RABBITMQ_DOCKER_IMAGE}"
|
||||||
|
echo "SELENIUM_ARTIFACTS=${CONF_DIR_PREFIX}" >> $GITHUB_ENV
|
||||||
|
${SELENIUM_DIR}/run-suites.sh full-suite-authnz-messaging
|
||||||
|
|
||||||
- name: Upload Test Artifacts
|
- name: Upload Test Artifacts
|
||||||
if: always()
|
if: ${{ failure() && steps.tests.outcome == 'failure' }}
|
||||||
uses: actions/upload-artifact@v4.3.2
|
uses: actions/upload-artifact@v4.3.2
|
||||||
env:
|
|
||||||
SELENIUM_ARTIFACTS: ${{ steps.tests.outputs.SELENIUM_ARTIFACTS }}
|
|
||||||
with:
|
with:
|
||||||
name: test-artifacts-${{ matrix.browser }}-${{ matrix.erlang_version }}
|
name: test-artifacts-${{ matrix.browser }}-${{ matrix.erlang_version }}
|
||||||
path: |
|
path: ${{ env.SELENIUM_ARTIFACTS }}/*
|
||||||
$SELENIUM_ARTIFACTS/*
|
|
||||||
|
|
||||||
summary-selenium:
|
summary-selenium:
|
||||||
needs:
|
needs:
|
||||||
|
|
|
@ -62,17 +62,19 @@ jobs:
|
||||||
- name: Run short UI suites on a standalone rabbitmq server
|
- name: Run short UI suites on a standalone rabbitmq server
|
||||||
id: tests
|
id: tests
|
||||||
run: |
|
run: |
|
||||||
IMAGE_TAG=$(find PACKAGES/rabbitmq-server-generic-unix-*.tar.xz | awk -F 'PACKAGES/rabbitmq-server-generic-unix-|.tar.xz' '{print $2}')
|
export IMAGE_TAG=$(find PACKAGES/rabbitmq-server-generic-unix-*.tar.xz | awk -F 'PACKAGES/rabbitmq-server-generic-unix-|.tar.xz' '{print $2}')
|
||||||
CONF_DIR_PREFIX="$(mktemp -d)" RABBITMQ_DOCKER_IMAGE=pivotalrabbitmq/rabbitmq:$IMAGE_TAG \
|
export CONF_DIR_PREFIX="$(mktemp -d)"
|
||||||
${SELENIUM_DIR}/run-suites.sh short-suite-management-ui
|
export RABBITMQ_DOCKER_IMAGE=pivotalrabbitmq/rabbitmq:$IMAGE_TAG
|
||||||
echo "SELENIUM_ARTIFACTS=$CONF_DIR_PREFIX" >> "$GITHUB_OUTPUT"
|
echo "Running selenium tests with "
|
||||||
|
echo " - CONF_DIR_PREFIX: ${CONF_DIR_PREFIX}"
|
||||||
|
echo " - IMAGE_TAG: ${IMAGE_TAG}"
|
||||||
|
echo " - RABBITMQ_DOCKER_IMAGE: ${RABBITMQ_DOCKER_IMAGE}"
|
||||||
|
echo "SELENIUM_ARTIFACTS=${CONF_DIR_PREFIX}" >> $GITHUB_ENV
|
||||||
|
${SELENIUM_DIR}/run-suites.sh short-suite-management-ui
|
||||||
|
|
||||||
- name: Upload Test Artifacts
|
- name: Upload Test Artifacts
|
||||||
if: ${{ failure() && steps.tests.outcome == 'failed' }}
|
if: ${{ failure() && steps.tests.outcome == 'failure' }}
|
||||||
uses: actions/upload-artifact@v4
|
uses: actions/upload-artifact@v4
|
||||||
env:
|
|
||||||
SELENIUM_ARTIFACTS: ${{ steps.tests.outputs.SELENIUM_ARTIFACTS }}
|
|
||||||
with:
|
with:
|
||||||
name: test-artifacts-${{ matrix.browser }}-${{ matrix.erlang_version }}
|
name: test-artifacts-${{ matrix.browser }}-${{ matrix.erlang_version }}
|
||||||
path: |
|
path: ${{ env.SELENIUM_ARTIFACTS }}/*
|
||||||
$SELENIUM_ARTIFACTS/*
|
|
||||||
|
|
|
@ -66,17 +66,19 @@ jobs:
|
||||||
- name: Run full UI suite on a 3-node rabbitmq cluster
|
- name: Run full UI suite on a 3-node rabbitmq cluster
|
||||||
id: tests
|
id: tests
|
||||||
run: |
|
run: |
|
||||||
IMAGE_TAG=$(find PACKAGES/rabbitmq-server-generic-unix-*.tar.xz | awk -F 'PACKAGES/rabbitmq-server-generic-unix-|.tar.xz' '{print $2}')
|
export IMAGE_TAG=$(find PACKAGES/rabbitmq-server-generic-unix-*.tar.xz | awk -F 'PACKAGES/rabbitmq-server-generic-unix-|.tar.xz' '{print $2}')
|
||||||
CONF_DIR_PREFIX="$(mktemp -d)" RABBITMQ_DOCKER_IMAGE=pivotalrabbitmq/rabbitmq:$IMAGE_TAG \
|
export CONF_DIR_PREFIX="$(mktemp -d)"
|
||||||
${SELENIUM_DIR}/run-suites.sh full-suite-management-ui
|
export RABBITMQ_DOCKER_IMAGE=pivotalrabbitmq/rabbitmq:$IMAGE_TAG
|
||||||
echo "SELENIUM_ARTIFACTS=$CONF_DIR_PREFIX" >> "$GITHUB_OUTPUT"
|
echo "Running selenium tests with "
|
||||||
|
echo " - CONF_DIR_PREFIX: ${CONF_DIR_PREFIX}"
|
||||||
|
echo " - IMAGE_TAG: ${IMAGE_TAG}"
|
||||||
|
echo " - RABBITMQ_DOCKER_IMAGE: ${RABBITMQ_DOCKER_IMAGE}"
|
||||||
|
echo "SELENIUM_ARTIFACTS=${CONF_DIR_PREFIX}" >> $GITHUB_ENV
|
||||||
|
${SELENIUM_DIR}/run-suites.sh full-suite-management-ui
|
||||||
|
|
||||||
- name: Upload Test Artifacts
|
- name: Upload Test Artifacts
|
||||||
if: ${{ failure() && steps.tests.outcome == 'failed' }}
|
if: ${{ failure() && steps.tests.outcome == 'failure' }}
|
||||||
uses: actions/upload-artifact@v4.3.2
|
uses: actions/upload-artifact@v4.3.2
|
||||||
env:
|
|
||||||
SELENIUM_ARTIFACTS: ${{ steps.run-suites.outputs.SELENIUM_ARTIFACTS }}
|
|
||||||
with:
|
with:
|
||||||
name: test-artifacts-${{ matrix.browser }}-${{ matrix.erlang_version }}
|
name: test-artifacts-${{ matrix.browser }}-${{ matrix.erlang_version }}
|
||||||
path: |
|
path: ${{ env.SELENIUM_ARTIFACTS }}/*
|
||||||
$SELENIUM_ARTIFACTS/*
|
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
/mvnw text eol=lf
|
||||||
|
*.cmd text eol=crlf
|
|
@ -0,0 +1,33 @@
|
||||||
|
HELP.md
|
||||||
|
target/
|
||||||
|
.mvn/wrapper/maven-wrapper.jar
|
||||||
|
!**/src/main/**/target/
|
||||||
|
!**/src/test/**/target/
|
||||||
|
|
||||||
|
### STS ###
|
||||||
|
.apt_generated
|
||||||
|
.classpath
|
||||||
|
.factorypath
|
||||||
|
.project
|
||||||
|
.settings
|
||||||
|
.springBeans
|
||||||
|
.sts4-cache
|
||||||
|
|
||||||
|
### IntelliJ IDEA ###
|
||||||
|
.idea
|
||||||
|
*.iws
|
||||||
|
*.iml
|
||||||
|
*.ipr
|
||||||
|
|
||||||
|
### NetBeans ###
|
||||||
|
/nbproject/private/
|
||||||
|
/nbbuild/
|
||||||
|
/dist/
|
||||||
|
/nbdist/
|
||||||
|
/.nb-gradle/
|
||||||
|
build/
|
||||||
|
!**/src/main/**/build/
|
||||||
|
!**/src/test/**/build/
|
||||||
|
|
||||||
|
### VS Code ###
|
||||||
|
.vscode/
|
|
@ -0,0 +1,19 @@
|
||||||
|
# Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
# or more contributor license agreements. See the NOTICE file
|
||||||
|
# distributed with this work for additional information
|
||||||
|
# regarding copyright ownership. The ASF licenses this file
|
||||||
|
# to you under the Apache License, Version 2.0 (the
|
||||||
|
# "License"); you may not use this file except in compliance
|
||||||
|
# with the License. You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing,
|
||||||
|
# software distributed under the License is distributed on an
|
||||||
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
# KIND, either express or implied. See the License for the
|
||||||
|
# specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
wrapperVersion=3.3.2
|
||||||
|
distributionType=only-script
|
||||||
|
distributionUrl=https://repo.maven.apache.org/maven2/org/apache/maven/apache-maven/3.9.9/apache-maven-3.9.9-bin.zip
|
|
@ -0,0 +1,12 @@
|
||||||
|
FROM maven:3.9.9-eclipse-temurin-24-alpine as builder
|
||||||
|
WORKDIR /home/app/authorization-server
|
||||||
|
COPY ./ .
|
||||||
|
RUN mvn -Dmaven.test.skip=true clean package
|
||||||
|
|
||||||
|
FROM openjdk:24-jdk
|
||||||
|
EXPOSE 8080
|
||||||
|
ENTRYPOINT ["java","-jar","/authorization-server.jar"]
|
||||||
|
ARG JAR_FILE=target/*.jar
|
||||||
|
COPY --from=builder /home/app/authorization-server/target/*.jar authorization-server.jar
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,259 @@
|
||||||
|
#!/bin/sh
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
# Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
# or more contributor license agreements. See the NOTICE file
|
||||||
|
# distributed with this work for additional information
|
||||||
|
# regarding copyright ownership. The ASF licenses this file
|
||||||
|
# to you under the Apache License, Version 2.0 (the
|
||||||
|
# "License"); you may not use this file except in compliance
|
||||||
|
# with the License. You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing,
|
||||||
|
# software distributed under the License is distributed on an
|
||||||
|
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
# KIND, either express or implied. See the License for the
|
||||||
|
# specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
# Apache Maven Wrapper startup batch script, version 3.3.2
|
||||||
|
#
|
||||||
|
# Optional ENV vars
|
||||||
|
# -----------------
|
||||||
|
# JAVA_HOME - location of a JDK home dir, required when download maven via java source
|
||||||
|
# MVNW_REPOURL - repo url base for downloading maven distribution
|
||||||
|
# MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven
|
||||||
|
# MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output
|
||||||
|
# ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
set -euf
|
||||||
|
[ "${MVNW_VERBOSE-}" != debug ] || set -x
|
||||||
|
|
||||||
|
# OS specific support.
|
||||||
|
native_path() { printf %s\\n "$1"; }
|
||||||
|
case "$(uname)" in
|
||||||
|
CYGWIN* | MINGW*)
|
||||||
|
[ -z "${JAVA_HOME-}" ] || JAVA_HOME="$(cygpath --unix "$JAVA_HOME")"
|
||||||
|
native_path() { cygpath --path --windows "$1"; }
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
# set JAVACMD and JAVACCMD
|
||||||
|
set_java_home() {
|
||||||
|
# For Cygwin and MinGW, ensure paths are in Unix format before anything is touched
|
||||||
|
if [ -n "${JAVA_HOME-}" ]; then
|
||||||
|
if [ -x "$JAVA_HOME/jre/sh/java" ]; then
|
||||||
|
# IBM's JDK on AIX uses strange locations for the executables
|
||||||
|
JAVACMD="$JAVA_HOME/jre/sh/java"
|
||||||
|
JAVACCMD="$JAVA_HOME/jre/sh/javac"
|
||||||
|
else
|
||||||
|
JAVACMD="$JAVA_HOME/bin/java"
|
||||||
|
JAVACCMD="$JAVA_HOME/bin/javac"
|
||||||
|
|
||||||
|
if [ ! -x "$JAVACMD" ] || [ ! -x "$JAVACCMD" ]; then
|
||||||
|
echo "The JAVA_HOME environment variable is not defined correctly, so mvnw cannot run." >&2
|
||||||
|
echo "JAVA_HOME is set to \"$JAVA_HOME\", but \"\$JAVA_HOME/bin/java\" or \"\$JAVA_HOME/bin/javac\" does not exist." >&2
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
JAVACMD="$(
|
||||||
|
'set' +e
|
||||||
|
'unset' -f command 2>/dev/null
|
||||||
|
'command' -v java
|
||||||
|
)" || :
|
||||||
|
JAVACCMD="$(
|
||||||
|
'set' +e
|
||||||
|
'unset' -f command 2>/dev/null
|
||||||
|
'command' -v javac
|
||||||
|
)" || :
|
||||||
|
|
||||||
|
if [ ! -x "${JAVACMD-}" ] || [ ! -x "${JAVACCMD-}" ]; then
|
||||||
|
echo "The java/javac command does not exist in PATH nor is JAVA_HOME set, so mvnw cannot run." >&2
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
# hash string like Java String::hashCode
|
||||||
|
hash_string() {
|
||||||
|
str="${1:-}" h=0
|
||||||
|
while [ -n "$str" ]; do
|
||||||
|
char="${str%"${str#?}"}"
|
||||||
|
h=$(((h * 31 + $(LC_CTYPE=C printf %d "'$char")) % 4294967296))
|
||||||
|
str="${str#?}"
|
||||||
|
done
|
||||||
|
printf %x\\n $h
|
||||||
|
}
|
||||||
|
|
||||||
|
verbose() { :; }
|
||||||
|
[ "${MVNW_VERBOSE-}" != true ] || verbose() { printf %s\\n "${1-}"; }
|
||||||
|
|
||||||
|
die() {
|
||||||
|
printf %s\\n "$1" >&2
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
|
trim() {
|
||||||
|
# MWRAPPER-139:
|
||||||
|
# Trims trailing and leading whitespace, carriage returns, tabs, and linefeeds.
|
||||||
|
# Needed for removing poorly interpreted newline sequences when running in more
|
||||||
|
# exotic environments such as mingw bash on Windows.
|
||||||
|
printf "%s" "${1}" | tr -d '[:space:]'
|
||||||
|
}
|
||||||
|
|
||||||
|
# parse distributionUrl and optional distributionSha256Sum, requires .mvn/wrapper/maven-wrapper.properties
|
||||||
|
while IFS="=" read -r key value; do
|
||||||
|
case "${key-}" in
|
||||||
|
distributionUrl) distributionUrl=$(trim "${value-}") ;;
|
||||||
|
distributionSha256Sum) distributionSha256Sum=$(trim "${value-}") ;;
|
||||||
|
esac
|
||||||
|
done <"${0%/*}/.mvn/wrapper/maven-wrapper.properties"
|
||||||
|
[ -n "${distributionUrl-}" ] || die "cannot read distributionUrl property in ${0%/*}/.mvn/wrapper/maven-wrapper.properties"
|
||||||
|
|
||||||
|
case "${distributionUrl##*/}" in
|
||||||
|
maven-mvnd-*bin.*)
|
||||||
|
MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/
|
||||||
|
case "${PROCESSOR_ARCHITECTURE-}${PROCESSOR_ARCHITEW6432-}:$(uname -a)" in
|
||||||
|
*AMD64:CYGWIN* | *AMD64:MINGW*) distributionPlatform=windows-amd64 ;;
|
||||||
|
:Darwin*x86_64) distributionPlatform=darwin-amd64 ;;
|
||||||
|
:Darwin*arm64) distributionPlatform=darwin-aarch64 ;;
|
||||||
|
:Linux*x86_64*) distributionPlatform=linux-amd64 ;;
|
||||||
|
*)
|
||||||
|
echo "Cannot detect native platform for mvnd on $(uname)-$(uname -m), use pure java version" >&2
|
||||||
|
distributionPlatform=linux-amd64
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
distributionUrl="${distributionUrl%-bin.*}-$distributionPlatform.zip"
|
||||||
|
;;
|
||||||
|
maven-mvnd-*) MVN_CMD=mvnd.sh _MVNW_REPO_PATTERN=/maven/mvnd/ ;;
|
||||||
|
*) MVN_CMD="mvn${0##*/mvnw}" _MVNW_REPO_PATTERN=/org/apache/maven/ ;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
# apply MVNW_REPOURL and calculate MAVEN_HOME
|
||||||
|
# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-<version>,maven-mvnd-<version>-<platform>}/<hash>
|
||||||
|
[ -z "${MVNW_REPOURL-}" ] || distributionUrl="$MVNW_REPOURL$_MVNW_REPO_PATTERN${distributionUrl#*"$_MVNW_REPO_PATTERN"}"
|
||||||
|
distributionUrlName="${distributionUrl##*/}"
|
||||||
|
distributionUrlNameMain="${distributionUrlName%.*}"
|
||||||
|
distributionUrlNameMain="${distributionUrlNameMain%-bin}"
|
||||||
|
MAVEN_USER_HOME="${MAVEN_USER_HOME:-${HOME}/.m2}"
|
||||||
|
MAVEN_HOME="${MAVEN_USER_HOME}/wrapper/dists/${distributionUrlNameMain-}/$(hash_string "$distributionUrl")"
|
||||||
|
|
||||||
|
exec_maven() {
|
||||||
|
unset MVNW_VERBOSE MVNW_USERNAME MVNW_PASSWORD MVNW_REPOURL || :
|
||||||
|
exec "$MAVEN_HOME/bin/$MVN_CMD" "$@" || die "cannot exec $MAVEN_HOME/bin/$MVN_CMD"
|
||||||
|
}
|
||||||
|
|
||||||
|
if [ -d "$MAVEN_HOME" ]; then
|
||||||
|
verbose "found existing MAVEN_HOME at $MAVEN_HOME"
|
||||||
|
exec_maven "$@"
|
||||||
|
fi
|
||||||
|
|
||||||
|
case "${distributionUrl-}" in
|
||||||
|
*?-bin.zip | *?maven-mvnd-?*-?*.zip) ;;
|
||||||
|
*) die "distributionUrl is not valid, must match *-bin.zip or maven-mvnd-*.zip, but found '${distributionUrl-}'" ;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
# prepare tmp dir
|
||||||
|
if TMP_DOWNLOAD_DIR="$(mktemp -d)" && [ -d "$TMP_DOWNLOAD_DIR" ]; then
|
||||||
|
clean() { rm -rf -- "$TMP_DOWNLOAD_DIR"; }
|
||||||
|
trap clean HUP INT TERM EXIT
|
||||||
|
else
|
||||||
|
die "cannot create temp dir"
|
||||||
|
fi
|
||||||
|
|
||||||
|
mkdir -p -- "${MAVEN_HOME%/*}"
|
||||||
|
|
||||||
|
# Download and Install Apache Maven
|
||||||
|
verbose "Couldn't find MAVEN_HOME, downloading and installing it ..."
|
||||||
|
verbose "Downloading from: $distributionUrl"
|
||||||
|
verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName"
|
||||||
|
|
||||||
|
# select .zip or .tar.gz
|
||||||
|
if ! command -v unzip >/dev/null; then
|
||||||
|
distributionUrl="${distributionUrl%.zip}.tar.gz"
|
||||||
|
distributionUrlName="${distributionUrl##*/}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# verbose opt
|
||||||
|
__MVNW_QUIET_WGET=--quiet __MVNW_QUIET_CURL=--silent __MVNW_QUIET_UNZIP=-q __MVNW_QUIET_TAR=''
|
||||||
|
[ "${MVNW_VERBOSE-}" != true ] || __MVNW_QUIET_WGET='' __MVNW_QUIET_CURL='' __MVNW_QUIET_UNZIP='' __MVNW_QUIET_TAR=v
|
||||||
|
|
||||||
|
# normalize http auth
|
||||||
|
case "${MVNW_PASSWORD:+has-password}" in
|
||||||
|
'') MVNW_USERNAME='' MVNW_PASSWORD='' ;;
|
||||||
|
has-password) [ -n "${MVNW_USERNAME-}" ] || MVNW_USERNAME='' MVNW_PASSWORD='' ;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
if [ -z "${MVNW_USERNAME-}" ] && command -v wget >/dev/null; then
|
||||||
|
verbose "Found wget ... using wget"
|
||||||
|
wget ${__MVNW_QUIET_WGET:+"$__MVNW_QUIET_WGET"} "$distributionUrl" -O "$TMP_DOWNLOAD_DIR/$distributionUrlName" || die "wget: Failed to fetch $distributionUrl"
|
||||||
|
elif [ -z "${MVNW_USERNAME-}" ] && command -v curl >/dev/null; then
|
||||||
|
verbose "Found curl ... using curl"
|
||||||
|
curl ${__MVNW_QUIET_CURL:+"$__MVNW_QUIET_CURL"} -f -L -o "$TMP_DOWNLOAD_DIR/$distributionUrlName" "$distributionUrl" || die "curl: Failed to fetch $distributionUrl"
|
||||||
|
elif set_java_home; then
|
||||||
|
verbose "Falling back to use Java to download"
|
||||||
|
javaSource="$TMP_DOWNLOAD_DIR/Downloader.java"
|
||||||
|
targetZip="$TMP_DOWNLOAD_DIR/$distributionUrlName"
|
||||||
|
cat >"$javaSource" <<-END
|
||||||
|
public class Downloader extends java.net.Authenticator
|
||||||
|
{
|
||||||
|
protected java.net.PasswordAuthentication getPasswordAuthentication()
|
||||||
|
{
|
||||||
|
return new java.net.PasswordAuthentication( System.getenv( "MVNW_USERNAME" ), System.getenv( "MVNW_PASSWORD" ).toCharArray() );
|
||||||
|
}
|
||||||
|
public static void main( String[] args ) throws Exception
|
||||||
|
{
|
||||||
|
setDefault( new Downloader() );
|
||||||
|
java.nio.file.Files.copy( java.net.URI.create( args[0] ).toURL().openStream(), java.nio.file.Paths.get( args[1] ).toAbsolutePath().normalize() );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
END
|
||||||
|
# For Cygwin/MinGW, switch paths to Windows format before running javac and java
|
||||||
|
verbose " - Compiling Downloader.java ..."
|
||||||
|
"$(native_path "$JAVACCMD")" "$(native_path "$javaSource")" || die "Failed to compile Downloader.java"
|
||||||
|
verbose " - Running Downloader.java ..."
|
||||||
|
"$(native_path "$JAVACMD")" -cp "$(native_path "$TMP_DOWNLOAD_DIR")" Downloader "$distributionUrl" "$(native_path "$targetZip")"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If specified, validate the SHA-256 sum of the Maven distribution zip file
|
||||||
|
if [ -n "${distributionSha256Sum-}" ]; then
|
||||||
|
distributionSha256Result=false
|
||||||
|
if [ "$MVN_CMD" = mvnd.sh ]; then
|
||||||
|
echo "Checksum validation is not supported for maven-mvnd." >&2
|
||||||
|
echo "Please disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2
|
||||||
|
exit 1
|
||||||
|
elif command -v sha256sum >/dev/null; then
|
||||||
|
if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | sha256sum -c >/dev/null 2>&1; then
|
||||||
|
distributionSha256Result=true
|
||||||
|
fi
|
||||||
|
elif command -v shasum >/dev/null; then
|
||||||
|
if echo "$distributionSha256Sum $TMP_DOWNLOAD_DIR/$distributionUrlName" | shasum -a 256 -c >/dev/null 2>&1; then
|
||||||
|
distributionSha256Result=true
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo "Checksum validation was requested but neither 'sha256sum' or 'shasum' are available." >&2
|
||||||
|
echo "Please install either command, or disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
if [ $distributionSha256Result = false ]; then
|
||||||
|
echo "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised." >&2
|
||||||
|
echo "If you updated your Maven version, you need to update the specified distributionSha256Sum property." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# unzip and move
|
||||||
|
if command -v unzip >/dev/null; then
|
||||||
|
unzip ${__MVNW_QUIET_UNZIP:+"$__MVNW_QUIET_UNZIP"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -d "$TMP_DOWNLOAD_DIR" || die "failed to unzip"
|
||||||
|
else
|
||||||
|
tar xzf${__MVNW_QUIET_TAR:+"$__MVNW_QUIET_TAR"} "$TMP_DOWNLOAD_DIR/$distributionUrlName" -C "$TMP_DOWNLOAD_DIR" || die "failed to untar"
|
||||||
|
fi
|
||||||
|
printf %s\\n "$distributionUrl" >"$TMP_DOWNLOAD_DIR/$distributionUrlNameMain/mvnw.url"
|
||||||
|
mv -- "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" "$MAVEN_HOME" || [ -d "$MAVEN_HOME" ] || die "fail to move MAVEN_HOME"
|
||||||
|
|
||||||
|
clean || :
|
||||||
|
exec_maven "$@"
|
|
@ -0,0 +1,149 @@
|
||||||
|
<# : batch portion
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
@REM Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
@REM or more contributor license agreements. See the NOTICE file
|
||||||
|
@REM distributed with this work for additional information
|
||||||
|
@REM regarding copyright ownership. The ASF licenses this file
|
||||||
|
@REM to you under the Apache License, Version 2.0 (the
|
||||||
|
@REM "License"); you may not use this file except in compliance
|
||||||
|
@REM with the License. You may obtain a copy of the License at
|
||||||
|
@REM
|
||||||
|
@REM http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
@REM
|
||||||
|
@REM Unless required by applicable law or agreed to in writing,
|
||||||
|
@REM software distributed under the License is distributed on an
|
||||||
|
@REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
@REM KIND, either express or implied. See the License for the
|
||||||
|
@REM specific language governing permissions and limitations
|
||||||
|
@REM under the License.
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
@REM Apache Maven Wrapper startup batch script, version 3.3.2
|
||||||
|
@REM
|
||||||
|
@REM Optional ENV vars
|
||||||
|
@REM MVNW_REPOURL - repo url base for downloading maven distribution
|
||||||
|
@REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven
|
||||||
|
@REM MVNW_VERBOSE - true: enable verbose log; others: silence the output
|
||||||
|
@REM ----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
@IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0)
|
||||||
|
@SET __MVNW_CMD__=
|
||||||
|
@SET __MVNW_ERROR__=
|
||||||
|
@SET __MVNW_PSMODULEP_SAVE=%PSModulePath%
|
||||||
|
@SET PSModulePath=
|
||||||
|
@FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @(
|
||||||
|
IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B)
|
||||||
|
)
|
||||||
|
@SET PSModulePath=%__MVNW_PSMODULEP_SAVE%
|
||||||
|
@SET __MVNW_PSMODULEP_SAVE=
|
||||||
|
@SET __MVNW_ARG0_NAME__=
|
||||||
|
@SET MVNW_USERNAME=
|
||||||
|
@SET MVNW_PASSWORD=
|
||||||
|
@IF NOT "%__MVNW_CMD__%"=="" (%__MVNW_CMD__% %*)
|
||||||
|
@echo Cannot start maven from wrapper >&2 && exit /b 1
|
||||||
|
@GOTO :EOF
|
||||||
|
: end batch / begin powershell #>
|
||||||
|
|
||||||
|
$ErrorActionPreference = "Stop"
|
||||||
|
if ($env:MVNW_VERBOSE -eq "true") {
|
||||||
|
$VerbosePreference = "Continue"
|
||||||
|
}
|
||||||
|
|
||||||
|
# calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties
|
||||||
|
$distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl
|
||||||
|
if (!$distributionUrl) {
|
||||||
|
Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties"
|
||||||
|
}
|
||||||
|
|
||||||
|
switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) {
|
||||||
|
"maven-mvnd-*" {
|
||||||
|
$USE_MVND = $true
|
||||||
|
$distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip"
|
||||||
|
$MVN_CMD = "mvnd.cmd"
|
||||||
|
break
|
||||||
|
}
|
||||||
|
default {
|
||||||
|
$USE_MVND = $false
|
||||||
|
$MVN_CMD = $script -replace '^mvnw','mvn'
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# apply MVNW_REPOURL and calculate MAVEN_HOME
|
||||||
|
# maven home pattern: ~/.m2/wrapper/dists/{apache-maven-<version>,maven-mvnd-<version>-<platform>}/<hash>
|
||||||
|
if ($env:MVNW_REPOURL) {
|
||||||
|
$MVNW_REPO_PATTERN = if ($USE_MVND) { "/org/apache/maven/" } else { "/maven/mvnd/" }
|
||||||
|
$distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace '^.*'+$MVNW_REPO_PATTERN,'')"
|
||||||
|
}
|
||||||
|
$distributionUrlName = $distributionUrl -replace '^.*/',''
|
||||||
|
$distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$',''
|
||||||
|
$MAVEN_HOME_PARENT = "$HOME/.m2/wrapper/dists/$distributionUrlNameMain"
|
||||||
|
if ($env:MAVEN_USER_HOME) {
|
||||||
|
$MAVEN_HOME_PARENT = "$env:MAVEN_USER_HOME/wrapper/dists/$distributionUrlNameMain"
|
||||||
|
}
|
||||||
|
$MAVEN_HOME_NAME = ([System.Security.Cryptography.MD5]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join ''
|
||||||
|
$MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME"
|
||||||
|
|
||||||
|
if (Test-Path -Path "$MAVEN_HOME" -PathType Container) {
|
||||||
|
Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME"
|
||||||
|
Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD"
|
||||||
|
exit $?
|
||||||
|
}
|
||||||
|
|
||||||
|
if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) {
|
||||||
|
Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl"
|
||||||
|
}
|
||||||
|
|
||||||
|
# prepare tmp dir
|
||||||
|
$TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile
|
||||||
|
$TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir"
|
||||||
|
$TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null
|
||||||
|
trap {
|
||||||
|
if ($TMP_DOWNLOAD_DIR.Exists) {
|
||||||
|
try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null }
|
||||||
|
catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null
|
||||||
|
|
||||||
|
# Download and Install Apache Maven
|
||||||
|
Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..."
|
||||||
|
Write-Verbose "Downloading from: $distributionUrl"
|
||||||
|
Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName"
|
||||||
|
|
||||||
|
$webclient = New-Object System.Net.WebClient
|
||||||
|
if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) {
|
||||||
|
$webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD)
|
||||||
|
}
|
||||||
|
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||||
|
$webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null
|
||||||
|
|
||||||
|
# If specified, validate the SHA-256 sum of the Maven distribution zip file
|
||||||
|
$distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum
|
||||||
|
if ($distributionSha256Sum) {
|
||||||
|
if ($USE_MVND) {
|
||||||
|
Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties."
|
||||||
|
}
|
||||||
|
Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash
|
||||||
|
if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) {
|
||||||
|
Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
# unzip and move
|
||||||
|
Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null
|
||||||
|
Rename-Item -Path "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" -NewName $MAVEN_HOME_NAME | Out-Null
|
||||||
|
try {
|
||||||
|
Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null
|
||||||
|
} catch {
|
||||||
|
if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) {
|
||||||
|
Write-Error "fail to move MAVEN_HOME"
|
||||||
|
}
|
||||||
|
} finally {
|
||||||
|
try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null }
|
||||||
|
catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" }
|
||||||
|
}
|
||||||
|
|
||||||
|
Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD"
|
|
@ -0,0 +1,59 @@
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
|
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
|
||||||
|
<modelVersion>4.0.0</modelVersion>
|
||||||
|
<parent>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-parent</artifactId>
|
||||||
|
<version>3.5.0</version>
|
||||||
|
<relativePath/> <!-- lookup parent from repository -->
|
||||||
|
</parent>
|
||||||
|
<groupId>com.rabbitmq</groupId>
|
||||||
|
<artifactId>authorization-server</artifactId>
|
||||||
|
<version>0.0.11</version>
|
||||||
|
<name>authorization-server</name>
|
||||||
|
<description>Authorization Server for Selenium</description>
|
||||||
|
<url/>
|
||||||
|
<licenses>
|
||||||
|
<license/>
|
||||||
|
</licenses>
|
||||||
|
<developers>
|
||||||
|
<developer/>
|
||||||
|
</developers>
|
||||||
|
<scm>
|
||||||
|
<connection/>
|
||||||
|
<developerConnection/>
|
||||||
|
<tag/>
|
||||||
|
<url/>
|
||||||
|
</scm>
|
||||||
|
<properties>
|
||||||
|
<java.version>24</java.version>
|
||||||
|
</properties>
|
||||||
|
<dependencies>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter</artifactId>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-test</artifactId>
|
||||||
|
<scope>test</scope>
|
||||||
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-starter-oauth2-authorization-server</artifactId>
|
||||||
|
</dependency>
|
||||||
|
|
||||||
|
</dependencies>
|
||||||
|
|
||||||
|
<build>
|
||||||
|
<plugins>
|
||||||
|
<plugin>
|
||||||
|
<groupId>org.springframework.boot</groupId>
|
||||||
|
<artifactId>spring-boot-maven-plugin</artifactId>
|
||||||
|
</plugin>
|
||||||
|
</plugins>
|
||||||
|
</build>
|
||||||
|
|
||||||
|
</project>
|
|
@ -0,0 +1,37 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import org.springframework.security.authentication.AbstractAuthenticationToken;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.springframework.security.core.GrantedAuthority;
|
||||||
|
|
||||||
|
public class AudienceAuthority implements GrantedAuthority {
|
||||||
|
|
||||||
|
private String authority;
|
||||||
|
|
||||||
|
|
||||||
|
public AudienceAuthority(String value) {
|
||||||
|
this.authority = value;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static AudienceAuthority aud(String value) {
|
||||||
|
return new AudienceAuthority(value);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getAuthority() {
|
||||||
|
return authority;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return "Audience:" + authority;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static List<String> getAll(AbstractAuthenticationToken principal) {
|
||||||
|
return principal.getAuthorities()
|
||||||
|
.stream().filter(a -> a instanceof AudienceAuthority)
|
||||||
|
.map(a -> a.getAuthority()).toList();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,13 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import org.springframework.boot.SpringApplication;
|
||||||
|
import org.springframework.boot.autoconfigure.SpringBootApplication;
|
||||||
|
|
||||||
|
@SpringBootApplication
|
||||||
|
public class AuthorizationServerApplication {
|
||||||
|
|
||||||
|
public static void main(String[] args) {
|
||||||
|
SpringApplication.run(AuthorizationServerApplication.class, args);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,20 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.client.RegisteredClient;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.client.RegisteredClientRepository;
|
||||||
|
import org.springframework.web.bind.annotation.GetMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RequestParam;
|
||||||
|
import org.springframework.web.bind.annotation.RestController;
|
||||||
|
|
||||||
|
@RestController
|
||||||
|
public class ClientController {
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
private RegisteredClientRepository registeredClientRepository;
|
||||||
|
|
||||||
|
@GetMapping("/api/client")
|
||||||
|
public RegisteredClient findClientById(@RequestParam String clientId) {
|
||||||
|
return registeredClientRepository.findByClientId(clientId);
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,38 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import org.springframework.security.authentication.AbstractAuthenticationToken;
|
||||||
|
import org.springframework.security.core.GrantedAuthority;
|
||||||
|
|
||||||
|
public class ScopeAuthority implements GrantedAuthority {
|
||||||
|
|
||||||
|
private String authority;
|
||||||
|
|
||||||
|
public ScopeAuthority(String value) {
|
||||||
|
this.authority = value;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static ScopeAuthority scope(String value) {
|
||||||
|
return new ScopeAuthority(value);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getAuthority() {
|
||||||
|
return authority;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return "Scope:" + authority;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static List<String> getAuthorites(AbstractAuthenticationToken principal) {
|
||||||
|
return principal.getAuthorities()
|
||||||
|
.stream()
|
||||||
|
.filter(a -> a instanceof ScopeAuthority)
|
||||||
|
.map(a -> a.getAuthority()).toList();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,186 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import java.security.KeyPair;
|
||||||
|
import java.security.KeyPairGenerator;
|
||||||
|
import java.security.interfaces.RSAPrivateKey;
|
||||||
|
import java.security.interfaces.RSAPublicKey;
|
||||||
|
import java.util.UUID;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.context.annotation.Configuration;
|
||||||
|
import org.springframework.core.annotation.Order;
|
||||||
|
import org.springframework.http.MediaType;
|
||||||
|
import org.springframework.security.authentication.AbstractAuthenticationToken;
|
||||||
|
import org.springframework.security.config.Customizer;
|
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||||
|
import org.springframework.security.oauth2.jwt.JwtDecoder;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.OAuth2TokenType;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.config.annotation.web.configuration.OAuth2AuthorizationServerConfiguration;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.config.annotation.web.configurers.OAuth2AuthorizationServerConfigurer;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.settings.AuthorizationServerSettings;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.token.JwtEncodingContext;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.token.OAuth2TokenCustomizer;
|
||||||
|
import org.springframework.security.provisioning.InMemoryUserDetailsManager;
|
||||||
|
import org.springframework.security.web.SecurityFilterChain;
|
||||||
|
import org.springframework.security.web.authentication.LoginUrlAuthenticationEntryPoint;
|
||||||
|
import org.springframework.security.web.util.matcher.MediaTypeRequestMatcher;
|
||||||
|
import org.springframework.security.oauth2.server.authorization.token.OAuth2TokenClaimsContext;
|
||||||
|
|
||||||
|
import org.springframework.security.oauth2.core.AuthorizationGrantType;
|
||||||
|
|
||||||
|
import com.nimbusds.jose.jwk.JWKSet;
|
||||||
|
import com.nimbusds.jose.jwk.RSAKey;
|
||||||
|
import com.nimbusds.jose.jwk.source.ImmutableJWKSet;
|
||||||
|
import com.nimbusds.jose.jwk.source.JWKSource;
|
||||||
|
import com.nimbusds.jose.proc.SecurityContext;
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
public class SecurityConfig {
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
@Order(1)
|
||||||
|
public SecurityFilterChain authorizationServerSecurityFilterChain(HttpSecurity http)
|
||||||
|
throws Exception {
|
||||||
|
OAuth2AuthorizationServerConfigurer authorizationServerConfigurer =
|
||||||
|
OAuth2AuthorizationServerConfigurer.authorizationServer();
|
||||||
|
|
||||||
|
http
|
||||||
|
.securityMatcher(authorizationServerConfigurer.getEndpointsMatcher())
|
||||||
|
.with(authorizationServerConfigurer, (authorizationServer) ->
|
||||||
|
authorizationServer
|
||||||
|
.oidc(Customizer.withDefaults()) // Enable OpenID Connect 1.0
|
||||||
|
)
|
||||||
|
.authorizeHttpRequests((authorize) ->
|
||||||
|
authorize
|
||||||
|
.anyRequest().authenticated()
|
||||||
|
)
|
||||||
|
// Redirect to the login page when not authenticated from the
|
||||||
|
// authorization endpoint
|
||||||
|
.exceptionHandling((exceptions) -> exceptions
|
||||||
|
.defaultAuthenticationEntryPointFor(
|
||||||
|
new LoginUrlAuthenticationEntryPoint("/login"),
|
||||||
|
new MediaTypeRequestMatcher(MediaType.TEXT_HTML)
|
||||||
|
)
|
||||||
|
);
|
||||||
|
|
||||||
|
return http.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
@Order(2)
|
||||||
|
public SecurityFilterChain defaultSecurityFilterChain(HttpSecurity http)
|
||||||
|
throws Exception {
|
||||||
|
http
|
||||||
|
.authorizeHttpRequests((authorize) -> authorize
|
||||||
|
.anyRequest().authenticated()
|
||||||
|
)
|
||||||
|
// Form login handles the redirect to the login page from the
|
||||||
|
// authorization server filter chain
|
||||||
|
.formLogin(Customizer.withDefaults());
|
||||||
|
|
||||||
|
return http.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public UserDetailsService userDetailsService(UsersConfiguration users) {
|
||||||
|
return new InMemoryUserDetailsManager(users.getUserDetails());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public JWKSource<SecurityContext> jwkSource() {
|
||||||
|
KeyPair keyPair = generateRsaKey();
|
||||||
|
RSAPublicKey publicKey = (RSAPublicKey) keyPair.getPublic();
|
||||||
|
RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();
|
||||||
|
RSAKey rsaKey = new RSAKey.Builder(publicKey)
|
||||||
|
.privateKey(privateKey)
|
||||||
|
.keyID(UUID.randomUUID().toString())
|
||||||
|
.build();
|
||||||
|
JWKSet jwkSet = new JWKSet(rsaKey);
|
||||||
|
return new ImmutableJWKSet<>(jwkSet);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static KeyPair generateRsaKey() {
|
||||||
|
KeyPair keyPair;
|
||||||
|
try {
|
||||||
|
KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA");
|
||||||
|
keyPairGenerator.initialize(2048);
|
||||||
|
keyPair = keyPairGenerator.generateKeyPair();
|
||||||
|
}
|
||||||
|
catch (Exception ex) {
|
||||||
|
throw new IllegalStateException(ex);
|
||||||
|
}
|
||||||
|
return keyPair;
|
||||||
|
}
|
||||||
|
|
||||||
|
Logger logger = LoggerFactory.getLogger(SecurityConfig.class);
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public OAuth2TokenCustomizer<OAuth2TokenClaimsContext> accessTokenCustomizer() {
|
||||||
|
logger.info("Creating accessTokenCustomizer ...");
|
||||||
|
return (context) -> {
|
||||||
|
logger.info("Calling accessTokenCustomizer with tokenType: {}", context.getTokenType().getValue());
|
||||||
|
AbstractAuthenticationToken principal = context.getPrincipal();
|
||||||
|
logger.info("registered client: {}", context.getRegisteredClient());
|
||||||
|
logger.info("principal : {}", principal);
|
||||||
|
logger.info("token format : {} ",
|
||||||
|
context.getRegisteredClient().getTokenSettings().getAccessTokenFormat().getValue());
|
||||||
|
logger.info("authorities : {}", principal.getAuthorities());
|
||||||
|
logger.info("authorized scopes : {}", context.getAuthorizedScopes());
|
||||||
|
|
||||||
|
if (AuthorizationGrantType.CLIENT_CREDENTIALS.equals(context.getAuthorizationGrantType())) {
|
||||||
|
Collection<String> extra_scope = context.getRegisteredClient().getScopes();
|
||||||
|
logger.info("granting extra_scope: {}", extra_scope);
|
||||||
|
context.getClaims()
|
||||||
|
.claim("extra_scope", extra_scope);
|
||||||
|
} else {
|
||||||
|
Collection<String> extra_scope = ScopeAuthority.getAuthorites(principal);
|
||||||
|
List<String> audience = AudienceAuthority.getAll(principal);
|
||||||
|
logger.info("granting extra_scope: {}", extra_scope);
|
||||||
|
logger.info("granting audience: {}", audience);
|
||||||
|
context.getClaims()
|
||||||
|
.audience(audience)
|
||||||
|
.claim("extra_scope", extra_scope);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
@Bean
|
||||||
|
public OAuth2TokenCustomizer<JwtEncodingContext> jwtTokenCustomizer() {
|
||||||
|
logger.info("Creating jwtTokenCustomizer ...");
|
||||||
|
return (context) -> {
|
||||||
|
logger.info("Calling jwtTokenCustomizer with tokenType: {}", context.getTokenType().getValue());
|
||||||
|
if (OAuth2TokenType.ACCESS_TOKEN.equals(context.getTokenType())) {
|
||||||
|
AbstractAuthenticationToken principal = context.getPrincipal();
|
||||||
|
logger.info("registered client: {}", context.getRegisteredClient());
|
||||||
|
logger.info("principal : {}", principal);
|
||||||
|
logger.info("token format : {} ",
|
||||||
|
context.getRegisteredClient().getTokenSettings().getAccessTokenFormat().getValue());
|
||||||
|
logger.info("authorities : {}", principal.getAuthorities());
|
||||||
|
logger.info("authorized scopes : {}", context.getAuthorizedScopes());
|
||||||
|
|
||||||
|
context.getClaims()
|
||||||
|
.audience(AudienceAuthority.getAll(principal))
|
||||||
|
.claim("extra_scope", ScopeAuthority.getAuthorites(principal));
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public JwtDecoder jwtDecoder(JWKSource<SecurityContext> jwkSource) {
|
||||||
|
return OAuth2AuthorizationServerConfiguration.jwtDecoder(jwkSource);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Bean
|
||||||
|
public AuthorizationServerSettings authorizationServerSettings() {
|
||||||
|
return AuthorizationServerSettings.builder().build();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,52 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.core.Ordered;
|
||||||
|
import org.springframework.core.annotation.Order;
|
||||||
|
import org.springframework.stereotype.Component;
|
||||||
|
|
||||||
|
import jakarta.servlet.Filter;
|
||||||
|
import jakarta.servlet.FilterChain;
|
||||||
|
import jakarta.servlet.FilterConfig;
|
||||||
|
import jakarta.servlet.ServletException;
|
||||||
|
import jakarta.servlet.ServletRequest;
|
||||||
|
import jakarta.servlet.ServletResponse;
|
||||||
|
import jakarta.servlet.http.HttpServletRequest;
|
||||||
|
import jakarta.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
@Component
|
||||||
|
@Order(Ordered.HIGHEST_PRECEDENCE)
|
||||||
|
public class SimpleCORSFilter implements Filter {
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
public SimpleCORSFilter() {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void init(FilterConfig fc) throws ServletException {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void doFilter(ServletRequest req, ServletResponse resp,
|
||||||
|
FilterChain chain) throws IOException, ServletException {
|
||||||
|
HttpServletResponse response = (HttpServletResponse) resp;
|
||||||
|
HttpServletRequest request = (HttpServletRequest) req;
|
||||||
|
response.setHeader("Access-Control-Allow-Origin", "*");
|
||||||
|
response.setHeader("Access-Control-Allow-Methods", "POST, GET, OPTIONS, DELETE");
|
||||||
|
response.setHeader("Access-Control-Max-Age", "3600");
|
||||||
|
response.setHeader("Access-Control-Allow-Headers", "x-requested-with, authorization, Content-Type, Authorization, credential, X-XSRF-TOKEN");
|
||||||
|
|
||||||
|
if ("OPTIONS".equalsIgnoreCase(request.getMethod())) {
|
||||||
|
response.setStatus(HttpServletResponse.SC_OK);
|
||||||
|
} else {
|
||||||
|
chain.doFilter(req, resp);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void destroy() {
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,93 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.stream.Stream;
|
||||||
|
|
||||||
|
import org.springframework.boot.context.properties.ConfigurationProperties;
|
||||||
|
import org.springframework.security.core.GrantedAuthority;
|
||||||
|
import org.springframework.security.core.userdetails.User;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetails;
|
||||||
|
import org.springframework.stereotype.Component;
|
||||||
|
|
||||||
|
import static com.rabbitmq.authorization_server.AudienceAuthority.aud;
|
||||||
|
import static com.rabbitmq.authorization_server.ScopeAuthority.scope;
|
||||||
|
|
||||||
|
@Component
|
||||||
|
@ConfigurationProperties(prefix = "spring.security.oauth2")
|
||||||
|
public class UsersConfiguration {
|
||||||
|
|
||||||
|
private List<ConfigUser> users;
|
||||||
|
|
||||||
|
public UsersConfiguration() {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return "UsersConfiguration [users=" + users + "]";
|
||||||
|
}
|
||||||
|
|
||||||
|
public List<UserDetails> getUserDetails() {
|
||||||
|
return users.stream().map(u ->
|
||||||
|
User.withDefaultPasswordEncoder()
|
||||||
|
.username(u.getUsername())
|
||||||
|
.password(u.getPassword())
|
||||||
|
.authorities(u.getAuthorities())
|
||||||
|
.build()).toList();
|
||||||
|
}
|
||||||
|
|
||||||
|
public static class ConfigUser {
|
||||||
|
|
||||||
|
private String username;
|
||||||
|
private String password;
|
||||||
|
private List<String> scopes;
|
||||||
|
private List<String> audiencies;
|
||||||
|
|
||||||
|
public ConfigUser() {
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setUsername(String username) {
|
||||||
|
this.username = username;
|
||||||
|
}
|
||||||
|
public void setPassword(String password) {
|
||||||
|
this.password = password;
|
||||||
|
}
|
||||||
|
public void setScopes(List<String> scopes) {
|
||||||
|
this.scopes = scopes;
|
||||||
|
}
|
||||||
|
public void setAudiencies(List<String> audiencies) {
|
||||||
|
this.audiencies = audiencies;
|
||||||
|
}
|
||||||
|
public String getUsername() {
|
||||||
|
return username;
|
||||||
|
}
|
||||||
|
public String getPassword() {
|
||||||
|
return password;
|
||||||
|
}
|
||||||
|
public List<String> getScopes() {
|
||||||
|
return scopes;
|
||||||
|
}
|
||||||
|
public List<String> getAudiencies() {
|
||||||
|
return audiencies;
|
||||||
|
}
|
||||||
|
public List<GrantedAuthority> getAuthorities() {
|
||||||
|
return Stream.concat(scopes.stream().map(s -> scope(s)),
|
||||||
|
audiencies.stream().map(s -> aud(s))).toList();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return "User [username=" + username + ", password=" + password + ", scopes=" + scopes + ", audiencies="
|
||||||
|
+ audiencies + "]";
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
public List<ConfigUser> getUsers() {
|
||||||
|
return users;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setUsers(List<ConfigUser> users) {
|
||||||
|
this.users = users;
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,73 @@
|
||||||
|
logging.level:
|
||||||
|
com.rabbitmq.authorization_server: DEBUG
|
||||||
|
|
||||||
|
server:
|
||||||
|
port: 8443
|
||||||
|
ssl:
|
||||||
|
bundle: spring-authorizationserver
|
||||||
|
|
||||||
|
spring:
|
||||||
|
ssl:
|
||||||
|
bundle:
|
||||||
|
jks:
|
||||||
|
spring-authorizationserver:
|
||||||
|
key:
|
||||||
|
alias: server-spring-tls
|
||||||
|
password: foobar
|
||||||
|
keystore:
|
||||||
|
location: ../test/authnz-msg-protocols/spring/server_spring.jks
|
||||||
|
password: foobar
|
||||||
|
type: PKCS12
|
||||||
|
security:
|
||||||
|
oauth2:
|
||||||
|
users:
|
||||||
|
- username: rabbit_admin
|
||||||
|
password: rabbit_admin
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- rabbitmq.tag:administrator
|
||||||
|
audiencies:
|
||||||
|
- rabbitmq
|
||||||
|
authorizationserver:
|
||||||
|
client:
|
||||||
|
producer:
|
||||||
|
registration:
|
||||||
|
provider: spring
|
||||||
|
client-id: producer
|
||||||
|
client-secret: "{noop}producer"
|
||||||
|
authorization-grant-types:
|
||||||
|
- client_credentials
|
||||||
|
client-authentication-methods:
|
||||||
|
- client_secret_post
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- rabbitmq.tag:management
|
||||||
|
- rabbitmq.configure:*/*
|
||||||
|
- rabbitmq.read:*/*
|
||||||
|
- rabbitmq.write:*/*
|
||||||
|
client-name: producer
|
||||||
|
token:
|
||||||
|
access-token-format: reference
|
||||||
|
rabbitmq_client_code:
|
||||||
|
registration:
|
||||||
|
provider: spring
|
||||||
|
client-id: rabbitmq_client_code
|
||||||
|
authorization-grant-types:
|
||||||
|
- authorization_code
|
||||||
|
require-proof-key: true
|
||||||
|
client-authentication-methods:
|
||||||
|
- none
|
||||||
|
redirect-uris:
|
||||||
|
- "https://localhost:15671/js/oidc-oauth/login-callback.html"
|
||||||
|
post-logout-redirect-uris:
|
||||||
|
- "https://localhost:15671/"
|
||||||
|
scopes:
|
||||||
|
- openid
|
||||||
|
- profile
|
||||||
|
- rabbitmq.tag:administrator
|
||||||
|
- rabbitmq.tag:management
|
||||||
|
client-name: rabbitmq_client_code
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,13 @@
|
||||||
|
package com.rabbitmq.authorization_server;
|
||||||
|
|
||||||
|
import org.junit.jupiter.api.Test;
|
||||||
|
import org.springframework.boot.test.context.SpringBootTest;
|
||||||
|
|
||||||
|
@SpringBootTest
|
||||||
|
class AuthorizationServerApplicationTests {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
void contextLoads() {
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -32,6 +32,8 @@ init_fakeportal() {
|
||||||
print "> CLIENT_ID: ${CLIENT_ID}"
|
print "> CLIENT_ID: ${CLIENT_ID}"
|
||||||
print "> CLIENT_SECRET: ${CLIENT_SECRET}"
|
print "> CLIENT_SECRET: ${CLIENT_SECRET}"
|
||||||
print "> RABBITMQ_URL: ${RABBITMQ_URL}"
|
print "> RABBITMQ_URL: ${RABBITMQ_URL}"
|
||||||
|
print "> IDP_TOKEN_ENDPOINT: ${IDP_TOKEN_ENDPOINT}"
|
||||||
|
print "> IDP: ${IDP}"
|
||||||
}
|
}
|
||||||
start_fakeportal() {
|
start_fakeportal() {
|
||||||
begin "Starting fakeportal ..."
|
begin "Starting fakeportal ..."
|
||||||
|
@ -48,11 +50,11 @@ start_fakeportal() {
|
||||||
--env PORT=3000 \
|
--env PORT=3000 \
|
||||||
--env RABBITMQ_URL="${RABBITMQ_URL_FOR_FAKEPORTAL}" \
|
--env RABBITMQ_URL="${RABBITMQ_URL_FOR_FAKEPORTAL}" \
|
||||||
--env PROXIED_RABBITMQ_URL="${RABBITMQ_URL}" \
|
--env PROXIED_RABBITMQ_URL="${RABBITMQ_URL}" \
|
||||||
--env UAA_URL="${UAA_URL_FOR_FAKEPORTAL}" \
|
--env IDP_TOKEN_ENDPOINT="${IDP_TOKEN_ENDPOINT}" \
|
||||||
--env CLIENT_ID="${CLIENT_ID}" \
|
--env CLIENT_ID="${CLIENT_ID}" \
|
||||||
--env CLIENT_SECRET="${CLIENT_SECRET}" \
|
--env CLIENT_SECRET="${CLIENT_SECRET}" \
|
||||||
--env NODE_EXTRA_CA_CERTS=/etc/uaa/ca_uaa_certificate.pem \
|
--env NODE_EXTRA_CA_CERTS=/etc/${IDP}/ca_${IDP}_certificate.pem \
|
||||||
-v ${TEST_CONFIG_DIR}/uaa:/etc/uaa \
|
-v ${TEST_CONFIG_DIR}/${IDP}:/etc/${IDP} \
|
||||||
-v ${FAKEPORTAL_DIR}:/code/fakeportal \
|
-v ${FAKEPORTAL_DIR}:/code/fakeportal \
|
||||||
mocha-test:${mocha_test_tag} run fakeportal
|
mocha-test:${mocha_test_tag} run fakeportal
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,49 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
SPRING_DOCKER_IMAGE=${SPRING_DOCKER_IMAGE:-pivotalrabbitmq/spring-authorization-server:0.0.10}
|
||||||
|
|
||||||
|
ensure_spring() {
|
||||||
|
if docker ps | grep spring &> /dev/null; then
|
||||||
|
print "spring already running ..."
|
||||||
|
else
|
||||||
|
start_spring
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
init_spring() {
|
||||||
|
SPRING_CONFIG_DIR=${TEST_CONFIG_PATH}/spring
|
||||||
|
SPRING_URL=${SPRING_URL:-$OAUTH_PROVIDER_URL}
|
||||||
|
|
||||||
|
print "> SPRING_CONFIG_DIR: ${SPRING_CONFIG_DIR}"
|
||||||
|
print "> SPRING_URL: ${SPRING_URL}"
|
||||||
|
print "> SPRING_DOCKER_IMAGE: ${SPRING_DOCKER_IMAGE}"
|
||||||
|
|
||||||
|
generate-ca-server-client-kpi spring $SPRING_CONFIG_DIR
|
||||||
|
generate-server-keystore-if-required spring $SPRING_CONFIG_DIR
|
||||||
|
}
|
||||||
|
start_spring() {
|
||||||
|
begin "Starting spring ..."
|
||||||
|
|
||||||
|
init_spring
|
||||||
|
kill_container_if_exist spring
|
||||||
|
|
||||||
|
MOUNT_SPRING_CONF_DIR=$CONF_DIR/spring
|
||||||
|
|
||||||
|
mkdir -p $MOUNT_SPRING_CONF_DIR
|
||||||
|
${BIN_DIR}/gen-spring-yml ${SPRING_CONFIG_DIR} $ENV_FILE $MOUNT_SPRING_CONF_DIR/application.yml
|
||||||
|
print "> EFFECTIVE SPRING_CONFIG_FILE: $MOUNT_SPRING_CONF_DIR/application.yml"
|
||||||
|
cp ${SPRING_CONFIG_DIR}/*.pem $MOUNT_SPRING_CONF_DIR
|
||||||
|
cp ${SPRING_CONFIG_DIR}/*.jks $MOUNT_SPRING_CONF_DIR
|
||||||
|
|
||||||
|
docker run \
|
||||||
|
--detach \
|
||||||
|
--name spring \
|
||||||
|
--net ${DOCKER_NETWORK} \
|
||||||
|
--publish 8080:8080 \
|
||||||
|
--publish 8443:8443 \
|
||||||
|
-v ${MOUNT_SPRING_CONF_DIR}:/config \
|
||||||
|
${SPRING_DOCKER_IMAGE}
|
||||||
|
|
||||||
|
wait_for_oidc_endpoint spring $SPRING_URL $MOUNT_SPRING_CONF_DIR/ca_spring_certificate.pem
|
||||||
|
end "spring is ready"
|
||||||
|
|
||||||
|
}
|
|
@ -44,6 +44,7 @@ start_uaa() {
|
||||||
--env JAVA_OPTS="-Djava.security.policy=unlimited -Djava.security.egd=file:/dev/./urandom" \
|
--env JAVA_OPTS="-Djava.security.policy=unlimited -Djava.security.egd=file:/dev/./urandom" \
|
||||||
${UAA_DOCKER_IMAGE}
|
${UAA_DOCKER_IMAGE}
|
||||||
|
|
||||||
wait_for_oidc_endpoint uaa $UAA_URL
|
wait_for_message uaa "Server startup in" 20 10
|
||||||
|
wait_for_oidc_endpoint uaa $UAA_URL $MOUNT_UAA_CONF_DIR/ca_uaa_certificate.pem
|
||||||
end "UAA is ready"
|
end "UAA is ready"
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,20 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
SCRIPT="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
|
||||||
|
|
||||||
|
#set -x
|
||||||
|
|
||||||
|
SPRING_PATH=${1:?First parameter is the directory env and config files are relative to}
|
||||||
|
ENV_FILE=${2:?Second parameter is a comma-separated list of .env file which has exported template variables}
|
||||||
|
FINAL_CONFIG_FILE=${3:?Forth parameter is the name of the final config file. It is relative to where this script is run from}
|
||||||
|
|
||||||
|
source $ENV_FILE
|
||||||
|
|
||||||
|
parentdir="$(dirname "$FINAL_CONFIG_FILE")"
|
||||||
|
mkdir -p $parentdir
|
||||||
|
|
||||||
|
echo "" > $FINAL_CONFIG_FILE
|
||||||
|
|
||||||
|
for f in $($SCRIPT/find-template-files "${PROFILES}" $SPRING_PATH "application" "yml")
|
||||||
|
do
|
||||||
|
envsubst < $f >> $FINAL_CONFIG_FILE
|
||||||
|
done
|
|
@ -154,16 +154,17 @@ build_mocha_image() {
|
||||||
}
|
}
|
||||||
|
|
||||||
kill_container_if_exist() {
|
kill_container_if_exist() {
|
||||||
if docker stop $1 &> /dev/null; then
|
docker kill $1 &> /dev/null
|
||||||
docker rm $1 &> /dev/null
|
docker rm $1 &> /dev/null
|
||||||
fi
|
|
||||||
}
|
}
|
||||||
wait_for_message() {
|
wait_for_message() {
|
||||||
attemps_left=10
|
delay=${3:-5}
|
||||||
|
attemps_left=${4:-10}
|
||||||
|
|
||||||
while ! docker logs $1 2>&1 | grep -q "$2";
|
while ! docker logs $1 2>&1 | grep -q "$2";
|
||||||
do
|
do
|
||||||
sleep 5
|
sleep $delay
|
||||||
print "Waiting 5sec for $1 to start ($attemps_left attempts left )..."
|
print "Waiting $delay sec for $1 to start ($attemps_left attempts left )..."
|
||||||
((attemps_left--))
|
((attemps_left--))
|
||||||
if [[ "$attemps_left" -lt 1 ]]; then
|
if [[ "$attemps_left" -lt 1 ]]; then
|
||||||
print "Timed out waiting"
|
print "Timed out waiting"
|
||||||
|
@ -185,17 +186,20 @@ wait_for_oidc_endpoint() {
|
||||||
wait_for_oidc_endpoint_local() {
|
wait_for_oidc_endpoint_local() {
|
||||||
NAME=$1
|
NAME=$1
|
||||||
BASE_URL=$2
|
BASE_URL=$2
|
||||||
CURL_ARGS="-k --tlsv1.2 -L --fail "
|
CURL_ARGS="--tlsv1.2 -L --fail "
|
||||||
DELAY_BETWEEN_ATTEMPTS=5
|
DELAY_BETWEEN_ATTEMPTS=10
|
||||||
if [[ $# -eq 3 ]]; then
|
if [[ $# -eq 3 ]]; then
|
||||||
CURL_ARGS="$CURL_ARGS --cacert $3"
|
CURL_ARGS="$CURL_ARGS --cacert $3"
|
||||||
DELAY_BETWEEN_ATTEMPTS=10
|
DELAY_BETWEEN_ATTEMPTS=10
|
||||||
|
else
|
||||||
|
CURL_ARGS="$CURL_ARGS -k "
|
||||||
fi
|
fi
|
||||||
max_retry=15
|
max_retry=15
|
||||||
counter=0
|
counter=0
|
||||||
print "Waiting for OIDC discovery endpoint $NAME ... (BASE_URL: $BASE_URL)"
|
print "Waiting for OIDC discovery endpoint $NAME ... (BASE_URL: $BASE_URL)"
|
||||||
until (curl $CURL_ARGS ${BASE_URL}/.well-known/openid-configuration >/dev/null 2>&1)
|
until (curl $CURL_ARGS ${BASE_URL}/.well-known/openid-configuration >/dev/null 2>&1)
|
||||||
do
|
do
|
||||||
|
echo "Failed $?"
|
||||||
sleep $DELAY_BETWEEN_ATTEMPTS
|
sleep $DELAY_BETWEEN_ATTEMPTS
|
||||||
[[ counter -eq $max_retry ]] && print "Failed!" && exit 1
|
[[ counter -eq $max_retry ]] && print "Failed!" && exit 1
|
||||||
print "Trying again. Try #$counter"
|
print "Trying again. Try #$counter"
|
||||||
|
@ -208,7 +212,7 @@ wait_for_oidc_endpoint_docker() {
|
||||||
BASE_URL=$2
|
BASE_URL=$2
|
||||||
CURL_ARGS="-k --tlsv1.2 -L --fail "
|
CURL_ARGS="-k --tlsv1.2 -L --fail "
|
||||||
DOCKER_ARGS="--rm --net ${DOCKER_NETWORK} "
|
DOCKER_ARGS="--rm --net ${DOCKER_NETWORK} "
|
||||||
DELAY_BETWEEN_ATTEMPTS=5
|
DELAY_BETWEEN_ATTEMPTS=10
|
||||||
if [[ $# -gt 2 ]]; then
|
if [[ $# -gt 2 ]]; then
|
||||||
DOCKER_ARGS="$DOCKER_ARGS -v $3:/tmp/ca_certificate.pem"
|
DOCKER_ARGS="$DOCKER_ARGS -v $3:/tmp/ca_certificate.pem"
|
||||||
CURL_ARGS="$CURL_ARGS --cacert /tmp/ca_certificate.pem"
|
CURL_ARGS="$CURL_ARGS --cacert /tmp/ca_certificate.pem"
|
||||||
|
@ -469,7 +473,7 @@ do_generate-ca-server-client-kpi() {
|
||||||
cd $ROOT/tls-gen/basic
|
cd $ROOT/tls-gen/basic
|
||||||
cp openssl.cnf openssl.cnf.bak
|
cp openssl.cnf openssl.cnf.bak
|
||||||
if [ -f "$FOLDER/openssl.cnf.in" ]; then
|
if [ -f "$FOLDER/openssl.cnf.in" ]; then
|
||||||
cp $FOLDER/openssl.cnf.in >> openssl.cnf
|
cat $FOLDER/openssl.cnf.in >> openssl.cnf
|
||||||
fi
|
fi
|
||||||
if [[ ! -z "${DEBUG}" ]]; then
|
if [[ ! -z "${DEBUG}" ]]; then
|
||||||
print "Used this openssl.conf"
|
print "Used this openssl.conf"
|
||||||
|
|
|
@ -7,7 +7,7 @@ const rabbitmq_url = process.env.RABBITMQ_URL;
|
||||||
const proxied_rabbitmq_url = process.env.PROXIED_RABBITMQ_URL;
|
const proxied_rabbitmq_url = process.env.PROXIED_RABBITMQ_URL;
|
||||||
const client_id = process.env.CLIENT_ID;
|
const client_id = process.env.CLIENT_ID;
|
||||||
const client_secret = process.env.CLIENT_SECRET;
|
const client_secret = process.env.CLIENT_SECRET;
|
||||||
const uaa_url = process.env.UAA_URL;
|
const idp_token_endpoint = process.env.IDP_TOKEN_ENDPOINT;
|
||||||
const port = process.env.PORT || 3000;
|
const port = process.env.PORT || 3000;
|
||||||
|
|
||||||
app.engine('.html', require('ejs').__express);
|
app.engine('.html', require('ejs').__express);
|
||||||
|
@ -28,7 +28,10 @@ app.get('/favicon.ico', (req, res) => res.status(204));
|
||||||
|
|
||||||
|
|
||||||
app.listen(port);
|
app.listen(port);
|
||||||
console.log('Express started on port ' + port);
|
console.log('Express started on port ' + port + " using ")
|
||||||
|
console.log(" - idp_token_endpoint: " + idp_token_endpoint)
|
||||||
|
console.log(" - rabbitmq_url: " + rabbitmq_url)
|
||||||
|
console.log(" - proxied_rabbitmq_url: " + proxied_rabbitmq_url)
|
||||||
|
|
||||||
function default_if_blank(value, defaultValue) {
|
function default_if_blank(value, defaultValue) {
|
||||||
if (typeof value === "undefined" || value === null || value == "") {
|
if (typeof value === "undefined" || value === null || value == "") {
|
||||||
|
@ -40,14 +43,13 @@ function default_if_blank(value, defaultValue) {
|
||||||
|
|
||||||
function access_token(id, secret) {
|
function access_token(id, secret) {
|
||||||
const req = new XMLHttpRequest();
|
const req = new XMLHttpRequest();
|
||||||
const url = uaa_url + '/oauth/token';
|
const url = idp_token_endpoint
|
||||||
const params = 'client_id=' + id +
|
const params = 'client_id=' + id +
|
||||||
'&client_secret=' + secret +
|
'&client_secret=' + secret +
|
||||||
'&grant_type=client_credentials' +
|
'&grant_type=client_credentials' +
|
||||||
'&token_format=jwt' +
|
|
||||||
'&response_type=token';
|
'&response_type=token';
|
||||||
|
|
||||||
console.debug("Sending " + url + " with params "+ params);
|
console.debug("Sending " + url + " with params " + params);
|
||||||
|
|
||||||
req.open('POST', url, false);
|
req.open('POST', url, false);
|
||||||
req.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
|
req.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded');
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
export IDP_TOKEN_ENDPOINT=https://spring:8443/oauth2/token
|
|
@ -0,0 +1 @@
|
||||||
|
export IDP_TOKEN_ENDPOINT=https://uaa:8443/oauth/token
|
|
@ -0,0 +1 @@
|
||||||
|
export IDP_TOKEN_ENDPOINT=https://spring:8443/oauth2/token
|
|
@ -0,0 +1 @@
|
||||||
|
export IDP_TOKEN_ENDPOINT=https://uaa:8443/oauth/token
|
|
@ -0,0 +1,4 @@
|
||||||
|
export OAUTH_SERVER_CONFIG_DIR=${OAUTH_SERVER_CONFIG_BASEDIR}/oauth/spring
|
||||||
|
export OAUTH_SCOPES="openid profile"
|
||||||
|
export OAUTH_CLIENT_ID=rabbitmq_client_code
|
||||||
|
export IDP=spring
|
|
@ -2,3 +2,4 @@ export OAUTH_SIGNING_KEY_ID=legacy-token-key
|
||||||
export OAUTH_SERVER_CONFIG_DIR=${OAUTH_SERVER_CONFIG_BASEDIR}/oauth/uaa
|
export OAUTH_SERVER_CONFIG_DIR=${OAUTH_SERVER_CONFIG_BASEDIR}/oauth/uaa
|
||||||
export OAUTH_CLIENT_SECRET=rabbitmq_client_code
|
export OAUTH_CLIENT_SECRET=rabbitmq_client_code
|
||||||
export OAUTH_SCOPES="openid profile rabbitmq.*"
|
export OAUTH_SCOPES="openid profile rabbitmq.*"
|
||||||
|
export IDP=uaa
|
||||||
|
|
Loading…
Reference in New Issue