use of com.amazonaws.mobileconnectors.cognitoidentityprovider.continuations.AuthenticationDetails in project aws-sdk-android by aws-amplify.
the class CognitoIdentityProviderSignInUserTest method getSessionWithUserPasswordInCurrentThreadNoCachedTokensNoMFA.
// Authenticate user with user password auth in current thread
// Failing due to Mockito error
@Ignore
@Test
public void getSessionWithUserPasswordInCurrentThreadNoCachedTokensNoMFA() throws Exception {
testUser = testPool.getUser(TEST_USER_NAME);
assertNotNull(testUser.getUserId());
// Test with a user cached in shared preferences, with no cached tokens
awsKeyValueStorageUtility.put("CognitoIdentityProvider." + TEST_CLIENT_ID + ".LastAuthUser", TEST_USER_NAME);
// Set mock returns for Authentication API Calls
// API call to start forgot-password flow
doReturn(TEST_VALID_INITIATE_USER_SRP_AUTH_RESPONSE).when(mockCSIClient).initiateAuth(any(InitiateAuthRequest.class));
// Tracker to validate the callback sequence -> callback.getAuthenticationDetails() -> onSuccess()
final FlowTracker tracker = new FlowTracker("getAuthenticationDetails");
System.out.println("Get session");
testUser.getSession(new AuthenticationHandler() {
@Override
public void onSuccess(CognitoUserSession session, CognitoDevice device) {
// Check if this method was called out of sequence
assertTrue(tracker.check("onSuccess"));
// Extract the arguments passed to the initiateAuth API call
ArgumentCaptor<InitiateAuthRequest> argumentCaptor = ArgumentCaptor.forClass(InitiateAuthRequest.class);
verify(mockCSIClient).initiateAuth(argumentCaptor.capture());
InitiateAuthRequest requestSent = argumentCaptor.getValue();
// Verify the arguments passed in the API call
assertNotNull(requestSent);
assertEquals(TEST_CLIENT_ID, requestSent.getClientId());
assertEquals("USER_PASSWORD_AUTH", requestSent.getAuthFlow());
// Check authentication parameters - username and password.
assertNotNull(requestSent.getAuthParameters().get("USERNAME"));
assertNotNull(requestSent.getAuthParameters().get("PASSWORD"));
// Verify if we have a valid session
assertNotNull(session);
assertTrue(session.isValid());
// Verify that the device is null
assertNull(device);
tracker.setNext("end");
}
@Override
public void getAuthenticationDetails(AuthenticationContinuation continuation, String username) {
// Check if this method was called out of sequence
assertTrue(tracker.check("getAuthenticationDetails"));
// Check parameters
assertNotNull(continuation);
assertNotNull(continuation.getParameters());
// Continue with authentication details
Map<String, String> TEST_IN_VALIDATION_DATA = new HashMap<String, String>();
TEST_IN_VALIDATION_DATA.put("DummyAttribute_1", "Value4DummyAttribute_1");
TEST_IN_VALIDATION_DATA.put("DummyAttribute_2", "Value4DummyAttribute_2");
AuthenticationDetails authDetails = new AuthenticationDetails(TEST_USER_NAME, TEST_USER_PASSWORD, TEST_IN_VALIDATION_DATA);
authDetails.setAuthenticationType(TEST_USER_PASSWORD_AUTH_TYPE);
tracker.setNext("onSuccess");
continuation.setAuthenticationDetails(authDetails);
// Set challenge response for valid
doReturn(TEST_VALID_INITIATE_USER_PASSWORD_AUTH_RESPONSE).when(mockCSIClient).initiateAuth(any(InitiateAuthRequest.class));
doReturn(TEST_VALID_SUCCESSFUL_AUTH_RESPONSE).when(mockCSIClient).respondToAuthChallenge(any(RespondToAuthChallengeRequest.class));
continuation.continueTask();
}
@Override
public void getMFACode(MultiFactorAuthenticationContinuation continuation) {
// Check if this method was called out of sequence
assertTrue(tracker.check("getMFACode"));
}
@Override
public void onFailure(Exception exception) {
// Check if this method was called out of sequence
assertTrue(tracker.check("onFailure"));
}
@Override
public void authenticationChallenge(ChallengeContinuation continuation) {
// Check if this method was called out of sequence
assertTrue(tracker.check("authenticationChallenge"));
}
});
}
use of com.amazonaws.mobileconnectors.cognitoidentityprovider.continuations.AuthenticationDetails in project aws-sdk-android by aws-amplify.
the class CognitoIdentityProviderSignInUserTest method getSessionWithUserPasswordInBackgroundThreadNoCachedTokensNoMFA.
// Authenticate user with user password auth in current thread
// Failing due to Mockito error
@Ignore
@Test
public void getSessionWithUserPasswordInBackgroundThreadNoCachedTokensNoMFA() throws Exception {
testPool = new CognitoUserPool(appContext, TEST_USER_POOL, TEST_CLIENT_ID, TEST_CLIENT_SECRET, mockCSIClient);
testUser = testPool.getUser(TEST_USER_NAME);
assertNotNull(testUser.getUserId());
// Test with a user cached in shared preferences, with no cached tokens
awsKeyValueStorageUtility.put("CognitoIdentityProvider." + TEST_CLIENT_ID + ".LastAuthUser", TEST_USER_NAME);
// Set mock returns for Authentication API Calls
// API call to start forgot-password flow
doReturn(TEST_VALID_INITIATE_USER_SRP_AUTH_RESPONSE).when(mockCSIClient).initiateAuth(any(InitiateAuthRequest.class));
// Tracker to validate the callback sequence -> callback.getAuthenticationDetails() -> onSuccess()
final FlowTracker tracker = new FlowTracker("getAuthenticationDetails");
System.out.println("Get session");
testUser.getSessionInBackground(new AuthenticationHandler() {
@Override
public void onSuccess(CognitoUserSession session, CognitoDevice device) {
// Check if this method was called out of sequence
assertTrue(tracker.check("onSuccess"));
// Extract the arguments passed to the initiateAuth API call
ArgumentCaptor<InitiateAuthRequest> argumentCaptor = ArgumentCaptor.forClass(InitiateAuthRequest.class);
verify(mockCSIClient).initiateAuth(argumentCaptor.capture());
InitiateAuthRequest requestSent = argumentCaptor.getValue();
// Verify the arguments passed in the API call
assertNotNull(requestSent);
assertEquals(TEST_CLIENT_ID, requestSent.getClientId());
assertEquals("USER_PASSWORD_AUTH", requestSent.getAuthFlow());
// Check authentication parameters - username and password.
assertNotNull(requestSent.getAuthParameters().get("USERNAME"));
assertNotNull(requestSent.getAuthParameters().get("PASSWORD"));
// Verify if we have a valid session
assertNotNull(session);
assertTrue(session.isValid());
// Verify that the device is null
assertNull(device);
tracker.setNext("end");
}
@Override
public void getAuthenticationDetails(AuthenticationContinuation continuation, String username) {
// Check if this method was called out of sequence
assertTrue(tracker.check("getAuthenticationDetails"));
// Check parameters
assertNotNull(continuation);
assertNotNull(continuation.getParameters());
// Continue with authentication details
Map<String, String> TEST_IN_VALIDATION_DATA = new HashMap<String, String>();
TEST_IN_VALIDATION_DATA.put("DummyAttribute_1", "Value4DummyAttribute_1");
TEST_IN_VALIDATION_DATA.put("DummyAttribute_2", "Value4DummyAttribute_2");
AuthenticationDetails authDetails = new AuthenticationDetails(TEST_USER_NAME, TEST_USER_PASSWORD, TEST_IN_VALIDATION_DATA);
authDetails.setAuthenticationType(TEST_USER_PASSWORD_AUTH_TYPE);
tracker.setNext("onSuccess");
continuation.setAuthenticationDetails(authDetails);
// Set challenge response for valid
doReturn(TEST_VALID_INITIATE_USER_PASSWORD_AUTH_RESPONSE).when(mockCSIClient).initiateAuth(any(InitiateAuthRequest.class));
doReturn(TEST_VALID_SUCCESSFUL_AUTH_RESPONSE).when(mockCSIClient).respondToAuthChallenge(any(RespondToAuthChallengeRequest.class));
continuation.continueTask();
}
@Override
public void getMFACode(MultiFactorAuthenticationContinuation continuation) {
// Check if this method was called out of sequence
assertTrue(tracker.check("getMFACode"));
}
@Override
public void onFailure(Exception exception) {
// Check if this method was called out of sequence
assertTrue(tracker.check("onFailure"));
}
@Override
public void authenticationChallenge(ChallengeContinuation continuation) {
// Check if this method was called out of sequence
assertTrue(tracker.check("authenticationChallenge"));
}
});
}
use of com.amazonaws.mobileconnectors.cognitoidentityprovider.continuations.AuthenticationDetails in project aws-sdk-android by aws-amplify.
the class CognitoUserPoolsIntegrationTestBase method signIn.
CognitoUserSession signIn() {
final CountDownLatch signInLatch = new CountDownLatch(1);
final ArrayList<CognitoUserSession> listSessions = new ArrayList<CognitoUserSession>();
cognitoUserPool.getUser(userName).getSession(new AuthenticationHandler() {
@Override
public void onSuccess(CognitoUserSession userSession, CognitoDevice newDevice) {
listSessions.add(userSession);
signInLatch.countDown();
}
@Override
public void getAuthenticationDetails(AuthenticationContinuation authenticationContinuation, String userId) {
AuthenticationDetails authenticationDetails = new AuthenticationDetails(userName, password, null);
authenticationContinuation.setAuthenticationDetails(authenticationDetails);
authenticationContinuation.continueTask();
}
@Override
public void getMFACode(MultiFactorAuthenticationContinuation continuation) {
fail("Tests are not configured to work with MFA. " + "Either create a CognitoUserPool without MFA or update the test.");
signInLatch.countDown();
}
@Override
public void authenticationChallenge(ChallengeContinuation continuation) {
fail("Tests are not configured to work with additional challenges. " + "Either create a CognitoUserPool without additional challenges or update the test.");
signInLatch.countDown();
}
@Override
public void onFailure(Exception exception) {
fail("Error while signing-in. " + exception.getLocalizedMessage());
signInLatch.countDown();
}
});
try {
signInLatch.await(TIMEOUT_IN_SECONDS, TimeUnit.SECONDS);
} catch (InterruptedException e) {
e.printStackTrace();
}
assertEquals(1, listSessions.size());
return listSessions.get(0);
}
use of com.amazonaws.mobileconnectors.cognitoidentityprovider.continuations.AuthenticationDetails in project aws-sdk-android by aws-amplify.
the class OAuth2Utils method _signIn.
private Runnable _signIn(final String username, final String password, final Map<String, String> validationData, final Map<String, String> clientMetadata, final Callback<SignInResult> callback) {
this.signInCallback = callback;
signInState = null;
mStore.set(SIGN_IN_MODE, SignInMode.SIGN_IN.toString());
return new Runnable() {
@Override
public void run() {
try {
userpool.getUser(username).getSession(clientMetadata, new AuthenticationHandler() {
@Override
public void onSuccess(CognitoUserSession userSession, CognitoDevice newDevice) {
try {
mCognitoUserSession = userSession;
signInState = SignInState.DONE;
} catch (Exception e) {
signInCallback.onError(e);
signInCallback = null;
}
try {
if (isFederationEnabled()) {
federatedSignInWithoutAssigningState(userpoolsLoginKey, mCognitoUserSession.getIdToken().getJWTToken());
}
releaseSignInWait();
} catch (Exception e) {
Log.w(TAG, "Failed to federate tokens during sign-in", e);
} finally {
setUserState(new UserStateDetails(UserState.SIGNED_IN, getSignInDetailsMap()));
}
signInCallback.onResult(SignInResult.DONE);
}
@Override
public void getAuthenticationDetails(AuthenticationContinuation authenticationContinuation, String userId) {
Log.d(TAG, "Sending password.");
final HashMap<String, String> authParameters = new HashMap<>();
// Check if the auth flow type setting is in the configuration.
boolean authFlowTypeInConfig = awsConfiguration.optJsonObject(AUTH_KEY) != null && awsConfiguration.optJsonObject(AUTH_KEY).has("authenticationFlowType");
try {
String authFlowType = authFlowTypeInConfig ? awsConfiguration.optJsonObject(AUTH_KEY).getString("authenticationFlowType") : null;
if (authFlowTypeInConfig && AUTH_TYPE_INIT_CUSTOM_AUTH.equals(authFlowType)) {
// use one of the below constructors depending on what's passed in.
if (password != null) {
authenticationContinuation.setAuthenticationDetails(new AuthenticationDetails(username, password, authParameters, validationData));
} else {
authenticationContinuation.setAuthenticationDetails(new AuthenticationDetails(username, authParameters, validationData));
}
} else if (authFlowTypeInConfig && AUTH_TYPE_INIT_USER_PASSWORD.equals(authFlowType)) {
// If there's a value in the config and it's USER_PASSWORD_AUTH, set the auth type (challenge name)
// to be USER_PASSWORD.
AuthenticationDetails authenticationDetails = new AuthenticationDetails(username, password, validationData);
authenticationDetails.setAuthenticationType(CHLG_TYPE_USER_PASSWORD);
authenticationContinuation.setAuthenticationDetails(authenticationDetails);
} else {
// Otherwise, auth flow is USER_SRP_AUTH and the auth type (challenge name)
// will default to PASSWORD_VERIFIER.
Log.d(TAG, "Using USER_SRP_AUTH for flow type.");
authenticationContinuation.setAuthenticationDetails(new AuthenticationDetails(username, password, validationData));
}
} catch (JSONException exception) {
Log.w(TAG, "Exception while attempting to read authenticationFlowType from config.", exception);
}
authenticationContinuation.continueTask();
}
@Override
public void getMFACode(MultiFactorAuthenticationContinuation continuation) {
signInMfaContinuation = continuation;
CognitoUserCodeDeliveryDetails parameters = continuation.getParameters();
signInState = SignInState.SMS_MFA;
signInCallback.onResult(new SignInResult(SignInState.SMS_MFA, new UserCodeDeliveryDetails(parameters.getDestination(), parameters.getDeliveryMedium(), parameters.getAttributeName())));
}
@Override
public void authenticationChallenge(ChallengeContinuation continuation) {
try {
signInState = SignInState.valueOf(continuation.getChallengeName());
signInChallengeContinuation = continuation;
signInCallback.onResult(new SignInResult(signInState, continuation.getParameters()));
} catch (IllegalArgumentException e) {
signInCallback.onError(e);
}
}
@Override
public void onFailure(Exception exception) {
signInCallback.onError(exception);
}
});
} catch (Exception e) {
callback.onError(e);
}
}
};
}
use of com.amazonaws.mobileconnectors.cognitoidentityprovider.continuations.AuthenticationDetails in project aws-mobile-appsync-sdk-android by awslabs.
the class CustomCognitoUserPool method setup.
@NonNull
public static String setup() {
// Sign in the user.
Await.result((Await.ResultErrorEmitter<SignInResult, RuntimeException>) (onResult, onError) -> {
DelegatingMobileClientCallback<SignInResult> callback = DelegatingMobileClientCallback.to(onResult, exception -> onError.accept(new RuntimeException(exception)));
TestAWSMobileClient.instance(getTargetContext()).signIn("appsync-multi-auth-test-user", "P@ssw0rd!", null, callback);
});
// Build a custom cognito user pool.
AWSConfiguration awsConfiguration = new AWSConfiguration(getTargetContext());
awsConfiguration.setConfiguration("Custom");
CognitoUserPool cognitoUserPool = new CognitoUserPool(getTargetContext(), awsConfiguration);
// Get the ID token for this user.
return Await.result((onResult, onError) -> cognitoUserPool.getUser("appsync-multi-auth-test-user").getSession(new AuthenticationHandler() {
@Override
public void onSuccess(CognitoUserSession userSession, CognitoDevice newDevice) {
onResult.accept(userSession.getIdToken().getJWTToken());
}
@Override
public void getAuthenticationDetails(AuthenticationContinuation authenticationContinuation, String userId) {
Log.d(TAG, "Sending password.");
authenticationContinuation.setAuthenticationDetails(new AuthenticationDetails("appsync-multi-auth-test-user", "P@ssw0rd!", null));
authenticationContinuation.continueTask();
}
@Override
public void getMFACode(MultiFactorAuthenticationContinuation continuation) {
}
@Override
public void authenticationChallenge(ChallengeContinuation continuation) {
}
@Override
public void onFailure(Exception exception) {
onError.accept(new RuntimeException(exception));
}
}));
}
Aggregations