use of org.wso2.carbon.identity.api.server.application.management.v1.OIDCMetaData in project product-is by wso2.
the class ApplicationMetadataPositiveTest method init.
@BeforeClass(alwaysRun = true)
public void init() throws IOException {
super.testInit(API_VERSION, swaggerDefinition, tenant);
// Init getAllEmailTemplateTypes method response
ObjectMapper jsonWriter = new ObjectMapper(new JsonFactory());
String expectedResponse = readResource("all-inbound-protocols-response.json");
allInboundProtocolsResponse = Arrays.asList(jsonWriter.readValue(expectedResponse, AuthProtocolMetadata[].class));
// Init OIDC Metadata
expectedResponse = readResource("oidc-metadata.json");
oidcMetaData = jsonWriter.readValue(expectedResponse, OIDCMetaData.class);
// Init SAML Metadata
expectedResponse = readResource("saml-metadata-super-tenant.json");
samlMetaDataSuperTenant = jsonWriter.readValue(expectedResponse, SAMLMetaData.class);
expectedResponse = readResource("saml-metadata-tenant.json");
samlMetaDataTenant = jsonWriter.readValue(expectedResponse, SAMLMetaData.class);
// Init WS Trust Metadata
expectedResponse = readResource("ws-trust-metadata-super-tenant.json");
wsTrustMetaDataSuperTenant = jsonWriter.readValue(expectedResponse, WSTrustMetaData.class);
expectedResponse = readResource("ws-trust-metadata-tenant.json");
wsTrustMetaDataTenant = jsonWriter.readValue(expectedResponse, WSTrustMetaData.class);
}
use of org.wso2.carbon.identity.api.server.application.management.v1.OIDCMetaData in project product-is by wso2.
the class ApplicationMetadataPositiveTest method testGetOIDCMetadata.
@Test
public void testGetOIDCMetadata() throws IOException {
Response response = getResponseOfGet(METADATA_API_BASE_PATH + PATH_SEPARATOR + INBOUND_PROTOCOLS_PATH + PATH_SEPARATOR + OIDC_PATH);
response.then().log().ifValidationFails().assertThat().statusCode(HttpStatus.SC_OK);
ObjectMapper jsonWriter = new ObjectMapper(new JsonFactory());
OIDCMetaData responseFound = jsonWriter.readValue(response.asString(), OIDCMetaData.class);
Assert.assertEquals(sortScopeValidators(responseFound), oidcMetaData, "OIDC Metadata returned from the API doesn't match.");
}
use of org.wso2.carbon.identity.api.server.application.management.v1.OIDCMetaData in project identity-api-server by wso2.
the class ServerApplicationMetadataService method getOIDCMetadata.
/**
* Pull OAuth/OIDC Metadata from OAuthAdminServiceImpl and return.
*
* @return Populated OIDCMetadata object.
*/
public OIDCMetaData getOIDCMetadata() {
OIDCMetaData oidcMetaData = new OIDCMetaData();
OAuthAdminServiceImpl oAuthAdminService = ApplicationManagementServiceHolder.getOAuthAdminService();
List<String> supportedGrantTypes = new LinkedList<>(Arrays.asList(oAuthAdminService.getAllowedGrantTypes()));
List<GrantType> supportedGrantTypeNames = new ArrayList<>();
// Iterate through the standard grant type names and add matching elements.
for (String supportedGrantTypeName : supportedGrantTypes) {
GrantType grantType = new GrantType();
if (getOAuthGrantTypeNames().keySet().contains(supportedGrantTypeName)) {
grantType.setName(supportedGrantTypeName);
grantType.setDisplayName(getOAuthGrantTypeNames().get(supportedGrantTypeName));
} else {
grantType.setName(supportedGrantTypeName);
grantType.setDisplayName(supportedGrantTypeName);
}
supportedGrantTypeNames.add(grantType);
}
// Set extracted grant types.
oidcMetaData.setAllowedGrantTypes(new GrantTypeMetaData().options(supportedGrantTypeNames));
oidcMetaData.setDefaultUserAccessTokenExpiryTime(String.valueOf(oAuthAdminService.getTokenExpiryTimes().getUserAccessTokenExpiryTime()));
oidcMetaData.defaultApplicationAccessTokenExpiryTime(String.valueOf(oAuthAdminService.getTokenExpiryTimes().getApplicationAccessTokenExpiryTime()));
oidcMetaData.defaultRefreshTokenExpiryTime(String.valueOf(oAuthAdminService.getTokenExpiryTimes().getRefreshTokenExpiryTime()));
oidcMetaData.defaultIdTokenExpiryTime(String.valueOf(oAuthAdminService.getTokenExpiryTimes().getIdTokenExpiryTime()));
OAuthIDTokenAlgorithmDTO idTokenAlgorithmDTO = oAuthAdminService.getSupportedIDTokenAlgorithms();
oidcMetaData.setIdTokenEncryptionAlgorithm(new MetadataProperty().defaultValue(idTokenAlgorithmDTO.getDefaultIdTokenEncryptionAlgorithm()).options(idTokenAlgorithmDTO.getSupportedIdTokenEncryptionAlgorithms()));
oidcMetaData.idTokenEncryptionMethod(new MetadataProperty().defaultValue(idTokenAlgorithmDTO.getDefaultIdTokenEncryptionMethod()).options(idTokenAlgorithmDTO.getSupportedIdTokenEncryptionMethods()));
oidcMetaData.setScopeValidators(new MetadataProperty().defaultValue(null).options(Arrays.asList(oAuthAdminService.getAllowedScopeValidators())));
oidcMetaData.accessTokenType(new MetadataProperty().defaultValue(oAuthAdminService.getDefaultTokenType()).options(oAuthAdminService.getSupportedTokenTypes()));
List<TokenBindingMetaDataDTO> supportedTokenBindings = oAuthAdminService.getSupportedTokenBindingsMetaData();
List<String> supportedTokenBindingTypes = new ArrayList<>();
supportedTokenBindingTypes.add("None");
for (TokenBindingMetaDataDTO tokenBindingDTO : supportedTokenBindings) {
supportedTokenBindingTypes.add(tokenBindingDTO.getTokenBindingType());
}
oidcMetaData.setAccessTokenBindingType(new MetadataProperty().defaultValue("None").options(supportedTokenBindingTypes));
return oidcMetaData;
}
Aggregations