Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test: don't specify test environment #842

Merged
merged 1 commit into from
Nov 9, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ class ExpirationJwtClaimsValidatorSpec extends Specification {
given:
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name' : ExpirationJwtClaimsValidatorSpec.simpleName,
], Environment.TEST)
])

when:
embeddedServer.applicationContext.getBean(ExpirationJwtClaimsValidator)
Expand All @@ -31,7 +31,7 @@ class ExpirationJwtClaimsValidatorSpec extends Specification {
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name' : ExpirationJwtClaimsValidatorSpec.simpleName,
'micronaut.security.token.jwt.claims-validators.expiration': false
], Environment.TEST)
])

when:
embeddedServer.applicationContext.getBean(ExpirationJwtClaimsValidator)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ class SubjectNotNullJwtClaimsValidatorSpec extends Specification {
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name' : SubjectNotNullJwtClaimsValidatorSpec.simpleName,

], Environment.TEST)
])

when:
embeddedServer.applicationContext.getBean(SubjectNotNullJwtClaimsValidator)
Expand All @@ -33,7 +33,7 @@ class SubjectNotNullJwtClaimsValidatorSpec extends Specification {
'spec.name' : SubjectNotNullJwtClaimsValidatorSpec.simpleName,
'micronaut.security.token.jwt.claims-validators.subject-not-null': false

], Environment.TEST)
])

when:
embeddedServer.applicationContext.getBean(SubjectNotNullJwtClaimsValidator)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ class SecurityJwtBeansWithSecurityDisabledSpec extends Specification {
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name' : SecurityJwtBeansWithSecurityDisabledSpec.simpleName,
'micronaut.security.enabled': false,
], Environment.TEST)
])

@Unroll("if micronaut.security.enabled=false bean [#description] is not loaded")
void "if micronaut.security.enabled=false security related beans are not loaded"(Class clazz, String description) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ class SecurityJwtBeansWithSecurityJwtDisabledSpec extends Specification {
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name' : SecurityJwtBeansWithSecurityJwtDisabledSpec.simpleName,
'micronaut.security.token.jwt.enabled': false,
], Environment.TEST)
])

@Unroll("if micronaut.security.enabled=true and micronaut.security.token.jwt.enabled=false bean [#description] is not loaded")
void "if micronaut.security.token.jwt.enabled=false security related beans are not loaded"(Class clazz, String description) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ class SecretEncryptionSpec extends Specification {
'micronaut.security.token.jwt.encryptions.secret.generator.secret': 'XXX',
'micronaut.security.token.jwt.encryptions.secret.generator.jwe-algorithm': 'dir',
'micronaut.security.token.jwt.encryptions.secret.generator.encryption-method': 'A128CBC-HS256',
], Environment.TEST)
])

when:
ctx.getBean(SecretEncryptionFactory)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ class KeysControllerSpec extends Specification {
'spec.name' : 'keyscontrollerspec',
'micronaut.security.endpoints.keys.path': path,

], Environment.TEST)
])
HttpClient client = embeddedServer.applicationContext.createBean(HttpClient, embeddedServer.getURL())

when:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ class CustomRolesParserSpec extends Specification {
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name': "customclaimsrolesparser",
'micronaut.security.token.jwt.signatures.secret.generator.secret': 'pleaseChangeThisSecretForANewOne',
], Environment.TEST)
])

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,14 +24,13 @@ class JwksSignature500Spec extends Specification implements JwtFixture {
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
(SPEC_NAME_PROPERTY) : 'jwkssignature500spec',

], Environment.TEST)
])

void "if the remote JWKS endpoint throws 500, the JwksSignature handles it and it does not crash"() {
given:
ApplicationContext context = ApplicationContext.run([
'micronaut.security.token.jwt.signatures.jwks.awscognito.url': "http://localhost:${embeddedServer.getPort()}/keys",
], Environment.TEST)
])

when:
Collection<JwksSignature> beans = context.getBeansOfType(JwksSignature)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,13 +37,13 @@ class JwsSignatureSpec extends Specification implements JwtFixture {

@AutoCleanup
@Shared
EmbeddedServer embeddedServer = embeddedServer = ApplicationContext.run(EmbeddedServer, conf, Environment.TEST)
EmbeddedServer embeddedServer = embeddedServer = ApplicationContext.run(EmbeddedServer, conf)

void "JwsSignature does not verify a RSA256 signed JWT, which was generated with a different signature, even if both the JwsSiganture and the JWT support the same algorithm"() {
given:
ApplicationContext context = ApplicationContext.run([
'micronaut.security.token.jwt.signatures.jwks.awscognito.url': "http://localhost:${embeddedServer.getPort()}/keys",
], Environment.TEST)
])

when:
Collection<JwksSignature> beans = context.getBeansOfType(JwksSignature)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ class TwoServicesOneSignWithRsaOneVerfiesWithRsaSpec extends Specification imple
'micronaut.server.port' : -1,
]

booksEmbeddedServer = ApplicationContext.run(EmbeddedServer, booksConfig, Environment.TEST)
booksEmbeddedServer = ApplicationContext.run(EmbeddedServer, booksConfig)
booksPort = booksEmbeddedServer.getPort()
BooksRsaSignatureConfiguration booksRsaSignatureConfiguration = new BooksRsaSignatureConfiguration(rsaJwk)
booksEmbeddedServer.applicationContext.registerSingleton(RSASignatureConfiguration, booksRsaSignatureConfiguration, Qualifiers.byName("validation"))
Expand Down Expand Up @@ -126,7 +126,7 @@ class TwoServicesOneSignWithRsaOneVerfiesWithRsaSpec extends Specification imple
'micronaut.security.authentication' : 'bearer',
]

gatewayEmbeddedServer = ApplicationContext.run(EmbeddedServer, gatewayConfig, Environment.TEST)
gatewayEmbeddedServer = ApplicationContext.run(EmbeddedServer, gatewayConfig)
GatewayRsaSignatureConfiguration bean = gatewayEmbeddedServer.applicationContext.createBean(GatewayRsaSignatureConfiguration, rsaJwk)
gatewayEmbeddedServer.applicationContext.registerSingleton(bean)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ class PrincipalTenantResolverSpec extends Specification {

]

gormEmbeddedServer = ApplicationContext.run(EmbeddedServer, gormConfig, Environment.TEST)
gormEmbeddedServer = ApplicationContext.run(EmbeddedServer, gormConfig)

gormClient = gormEmbeddedServer.applicationContext.createBean(HttpClient, gormEmbeddedServer.getURL())

Expand Down Expand Up @@ -95,7 +95,7 @@ class PrincipalTenantResolverSpec extends Specification {
'micronaut.security.token.propagation.service-id-regex': 'books',
]

gatewayEmbeddedServer = ApplicationContext.run(EmbeddedServer, gatewayConfig, Environment.TEST)
gatewayEmbeddedServer = ApplicationContext.run(EmbeddedServer, gatewayConfig)

when:
for (Class beanClazz : [AuthenticationProviderUserPassword,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ class OauthConfigurationSpec extends Specification {
(SPEC_NAME_PROPERTY): getClass().simpleName,
'micronaut.security.oauth2.clients.foo.client-id': 'XXXX',
'micronaut.security.oauth2.clients.foo.client-secret': 'YYYY',
], Environment.TEST)
])

when:
OauthClientConfiguration clientConfiguration = context.getBean(OauthClientConfiguration)
Expand All @@ -34,7 +34,7 @@ class OauthConfigurationSpec extends Specification {
(SPEC_NAME_PROPERTY): getClass().simpleName,
'micronaut.security.oauth2.clients.foo.client-id': 'XXXX',
'micronaut.security.oauth2.clients.foo.client-secret': 'YYYY',
], Environment.TEST)
])

when:
context.getBean(OauthClientConfiguration)
Expand All @@ -61,7 +61,7 @@ class OauthConfigurationSpec extends Specification {
'micronaut.security.oauth2.openid.additional-claims.jwt': true,
'micronaut.security.oauth2.openid.additional-claims.access-token': true,
'micronaut.security.oauth2.openid.additional-claims.refresh-token': true,
], Environment.TEST)
])

when:
OauthConfiguration config = context.getBean(OauthConfiguration)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ micronaut:

@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ endpoints:

@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ micronaut:

@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ class PermitAllSpec extends Specification {

@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ class SecuredSpec extends Specification {

@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ class BasicAuthSpec extends Specification implements YamlAsciidocTagCleaner {

@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -81,8 +81,7 @@ micronaut:
@Shared
@AutoCleanup
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer,
config as Map<String, Object>,
Environment.TEST)
config as Map<String, Object>)

@Shared
@AutoCleanup
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ class SecurityDisabledSpec extends Specification {
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, [
'spec.name' : SecurityDisabledSpec.simpleName,
'micronaut.security.enabled': false,
], Environment.TEST)
])

@Unroll("if micronaut.security.enabled=false bean [#description] is not loaded")
void "if micronaut.security.enabled=false security related beans are not loaded"(Class clazz, String description) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ class SecurityConfigurationPropertiesSpec extends Specification {
def ctx = ApplicationContext.run([
'micronaut.security.intercept-url-map': [
[pattern: '/health']
]], Environment.TEST)
]])

when:
ctx.getBean(SecurityConfigurationProperties)
Expand All @@ -32,7 +32,7 @@ class SecurityConfigurationPropertiesSpec extends Specification {
def ctx = ApplicationContext.run([
"micronaut.security.intercept-url-map": [
[httpMethod: 'FOO', pattern: '/health', access: ['isAnonymous()']]
]], Environment.TEST)
]])

when:
ctx.getBean(SecurityConfigurationProperties)
Expand All @@ -50,7 +50,7 @@ class SecurityConfigurationPropertiesSpec extends Specification {
def ctx = ApplicationContext.run([
"micronaut.security.intercept-url-map": [
[httpMethod: 'POST', access: ['isAnonymous()']]
]], Environment.TEST)
]])

when:
ctx.getBean(SecurityConfigurationProperties)
Expand All @@ -71,7 +71,7 @@ class SecurityConfigurationPropertiesSpec extends Specification {
[pattern: '/health', access: 'isAnonymous()'],
[httpMethod: 'POST', pattern: '/health', access: ['isAnonymous()']],
[httpMethod: 'post', pattern: '/health', access: ['isAnonymous()']]
]], Environment.TEST)
]])

when:
SecurityConfigurationProperties config = ctx.getBean(SecurityConfigurationProperties)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ class LogoutControllerAllowedMethodsSpec extends Specification {

void "LogoutController does not accept GET requests by default"() {
given:
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, configuration, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, configuration)
HttpClient client = embeddedServer.applicationContext.createBean(HttpClient, embeddedServer.getURL())

when:
Expand All @@ -53,7 +53,7 @@ class LogoutControllerAllowedMethodsSpec extends Specification {
m.putAll(configuration)
m.put('micronaut.security.endpoints.logout.get-allowed', true)

EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, m, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, m)
HttpClient client = embeddedServer.applicationContext.createBean(HttpClient, embeddedServer.getURL())

when:
Expand All @@ -73,7 +73,7 @@ class LogoutControllerAllowedMethodsSpec extends Specification {
m.putAll(configuration)
m.put('micronaut.security.endpoints.logout.get-allowed', true)

EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, m, Environment.TEST)
EmbeddedServer embeddedServer = ApplicationContext.run(EmbeddedServer, m)
HttpClient client = embeddedServer.applicationContext.createBean(HttpClient, embeddedServer.getURL())

when:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ class TokenPropagationHttpClientFilterPathSpec extends Specification {
'micronaut.security.token.writer.header.enabled': true,
'micronaut.security.token.propagation.enabled': true,
(SPEC_NAME_PROPERTY):getClass().simpleName
], Environment.TEST)
])

when:
TokenPropagationHttpClientFilter filter = context.getBean(TokenPropagationHttpClientFilter)
Expand Down Expand Up @@ -64,7 +64,7 @@ class TokenPropagationHttpClientFilterPathSpec extends Specification {
'micronaut.security.token.propagation.enabled': true,
'micronaut.security.token.propagation.path': '/books/**',
(SPEC_NAME_PROPERTY):getClass().simpleName
], Environment.TEST)
])

when:
TokenPropagationHttpClientFilter filter = context.getBean(TokenPropagationHttpClientFilter)
Expand Down