@Override public void validateFilterConfig(SecurityNamedServiceConfig config) throws FilterConfigException { if (config instanceof OAuth2FilterConfig) { validateOAuth2FilterConfig((OAuth2FilterConfig) config); } else { super.validateFilterConfig(config); } }
@Test public void testOAuth2FilterConfigValidation() throws Exception { GoogleOAuth2FilterConfig config = new GoogleOAuth2FilterConfig(); config.setClassName(GeoServerOAuthAuthenticationFilter.class.getName()); config.setName("testOAuth2"); check(config); validator.validateOAuth2FilterConfig(config); }
@Test public void testOAuth2FilterConfigValidation() throws Exception { GitHubOAuth2FilterConfig config = new GitHubOAuth2FilterConfig(); config.setClassName(GeoServerOAuthAuthenticationFilter.class.getName()); config.setName("testOAuth2"); check(config); validator.validateOAuth2FilterConfig(config); }
@Test public void testOAuth2FilterConfigValidation() throws Exception { OpenIdConnectFilterConfig config = new OpenIdConnectFilterConfig(); config.setClassName(GeoServerOAuthAuthenticationFilter.class.getName()); config.setName("testOAuth2"); // the OpenConnectId config is empty as anyone can implement it, fill in some mandatory // values config.setAccessTokenUri("https://www.connectid/fake/test"); config.setUserAuthorizationUri("https://www.connectid/fake/test"); config.setCheckTokenEndpointUrl("https://www.connectid/fake/test"); check(config); validator.validateOAuth2FilterConfig(config); }
validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_CLIENT_ID_REQUIRED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_CLIENT_ID_REQUIRED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) { assertEquals( failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_ACCESSTOKENURI_MALFORMED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) {
validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_CLIENT_ID_REQUIRED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_CLIENT_ID_REQUIRED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) { assertEquals( failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_ACCESSTOKENURI_MALFORMED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) {
validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_CLIENT_ID_REQUIRED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_CLIENT_ID_REQUIRED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (FilterConfigException ex) { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) { assertEquals( failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) { assertEquals(OAuth2FilterConfigException.OAUTH2_ACCESSTOKENURI_MALFORMED, ex.getId()); failed = false; try { validator.validateOAuth2FilterConfig(config); } catch (OAuth2FilterConfigException ex) {