use of com.microsoft.identity.common.internal.providers.oauth2.AccessToken in project vertx-auth by vert-x3.
the class OAuth2IntrospectTest method introspectAccessToken.
@Test
public void introspectAccessToken() {
config = oauthIntrospect;
fixture = fixtureIntrospect;
oauth2.introspectToken(token, res -> {
if (res.failed()) {
fail(res.cause().getMessage());
} else {
AccessToken token = res.result();
assertNotNull(token);
JsonObject principal = token.principal();
// clean time specific value
principal.remove("expires_at");
principal.remove("access_token");
final JsonObject assertion = fixtureIntrospect.copy();
assertEquals(assertion.getMap(), principal.getMap());
token.isAuthorized("scopeB", res0 -> {
if (res0.failed()) {
fail(res0.cause().getMessage());
} else {
if (res0.result()) {
testComplete();
} else {
fail("Should be allowed");
}
}
});
}
});
await();
}
use of com.microsoft.identity.common.internal.providers.oauth2.AccessToken in project vertx-auth by vert-x3.
the class OAuth2UserInfoTest method getUserInfo.
@Test
public void getUserInfo() {
final AccessToken accessToken = new OAuth2TokenImpl((OAuth2AuthProviderImpl) oauth2, new JsonObject("{\"access_token\":\"eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJhdXRob3JpemF0aW9uIjp7InBlcm1pc3Npb25zIjpbeyJyZXNvdXJjZV9zZXRfaWQiOiJkMmZlOTg0My02NDYyLTRiZmMtYmFiYS1iNTc4N2JiNmUwZTciLCJyZXNvdXJjZV9zZXRfbmFtZSI6IkhlbGxvIFdvcmxkIFJlc291cmNlIn1dfSwianRpIjoiZDYxMDlhMDktNzhmZC00OTk4LWJmODktOTU3MzBkZmQwODkyLTE0NjQ5MDY2Nzk0MDUiLCJleHAiOjk5OTk5OTk5OTksIm5iZiI6MCwiaWF0IjoxNDY0OTA2NjcxLCJzdWIiOiJmMTg4OGY0ZC01MTcyLTQzNTktYmUwYy1hZjMzODUwNWQ4NmMiLCJ0eXAiOiJrY19ldHQiLCJhenAiOiJoZWxsby13b3JsZC1hdXRoei1zZXJ2aWNlIn0\",\"active\":true,\"scope\":\"scopeA scopeB\",\"client_id\":\"client-id\",\"username\":\"username\",\"token_type\":\"bearer\",\"expires_at\":99999999999000}"));
accessToken.userInfo(userInfo -> {
if (userInfo.failed()) {
fail(userInfo.cause().getMessage());
} else {
testComplete();
}
});
await();
}
use of com.microsoft.identity.common.internal.providers.oauth2.AccessToken in project vertx-auth by vert-x3.
the class ClientImpl method getToken.
/**
* Returns the Access Token object.
*
* @param params - scope: A String that represents the application privileges.
* @param handler - The handler returning the results.
*/
@Override
public void getToken(JsonObject params, Handler<AsyncResult<AccessToken>> handler) {
getToken("client_credentials", params, res -> {
if (res.failed()) {
handler.handle(Future.failedFuture(res.cause()));
return;
}
AccessToken token;
try {
token = new OAuth2TokenImpl(provider, res.result());
} catch (RuntimeException e) {
handler.handle(Future.failedFuture(e));
return;
}
handler.handle(Future.succeededFuture(token));
});
}
use of com.microsoft.identity.common.internal.providers.oauth2.AccessToken in project vertx-auth by vert-x3.
the class OAuth2AccessTokenTest method shouldRevokeAToken.
@Test
public void shouldRevokeAToken() {
config = oauthConfig;
oauth2.authenticate(tokenConfig, res -> {
if (res.failed()) {
fail(res.cause().getMessage());
} else {
AccessToken token = (AccessToken) res.result();
// refresh the token
config = revokeConfig;
token.revoke("refresh_token", v -> {
if (v.failed()) {
fail(v.cause().getMessage());
} else {
testComplete();
}
});
}
});
await();
}
use of com.microsoft.identity.common.internal.providers.oauth2.AccessToken in project vertx-auth by vert-x3.
the class OAuth2AccessTokenTest method whenRefreshingTokenShouldGetNewAccessToken.
@Test
public void whenRefreshingTokenShouldGetNewAccessToken() {
config = oauthConfig;
oauth2.authenticate(tokenConfig, res -> {
if (res.failed()) {
fail(res.cause().getMessage());
} else {
AccessToken token = (AccessToken) res.result();
final long origTTl = token.principal().getLong("expires_at");
// refresh the token
config = refreshConfig;
token.refresh(v -> {
if (v.failed()) {
fail(v.cause().getMessage());
} else {
assertTrue(origTTl < token.principal().getLong("expires_at"));
testComplete();
}
});
}
});
await();
}
Aggregations