/** Verify the private key and certificate are indeed matching. */ public void testConsumerPrivateKeyCertificateCompatibility() { assertTrue( SignatureUtil.validatePrivateKeyCertificateCompatibility( TEST_CONSUMER_PRIVATE_KEY, TEST_CONSUMER_CERTIFICATE)); }
/** * This class tests OAuthClientHelper, but also gives examples on how you can use OAuthClientHelper * to generate OAuth calls to OAuth providers in the supported scenarios: * * <ol> * <li>regular three-legged OAuth calls * <li>two-legged OAuth calls * <li>obtaining a request token POST /oauth/request_token * <li>obtaining an access token POST /oauth/acces_token * </ol> */ public class OAuthClientHelperTest extends TestCase { private static String TEST_CONSUMER_PRIVATE_KEY_BASE64 = "MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDAHXL/VXv3X3B0" + "iK3S6CfUR12nMo60tZ/w2924GVtML5hEVkwSseYNxAI6Wg7edoPGWLAkgxccYYaq" + "5Ztl1rW90zLXbnj07/3lMqA0VlNkrU229wgqmcN8rdQhGatKjNgDQwf9EZAqByun" + "izpCzx9j8yttigcAJbkyG9SWrXMg+kTFzy8rlvFSE6wvu4b9lM3PDRYZKQEWH9Fx" + "70Dsve+rcQwijigpqouY0dNkq1v3DGBnaskO5FkhGcKtgQnIFe16IYsTZWrSa9xO" + "Tp5g09+bxmctQyiRo1ZCODquw+0VugPpUKL6n5bXc3pkO/nDupSbHRQDPvLuw5+M" + "uOHQMhBRAgMBAAECggEAD3FOkR+5+0R8saFa950ZtoKWEJ6LwhLnbGEADZBcOl+J" + "CdU2ADq0l16uHyqmD1PPe94dKpIvBWUBgjM6rpD3wu57I74JkwbHjejn380gnvMf" + "UBnDWklJ4XfHmXGKx09S/dAhkEIdKIOzCqCyajRj/ZDKaN+zeFuP62s5R3Nh0cCo" + "ntbT50bxUgFYbHQqBm1uG7uCenIw8/G+D1wE7EnWAxDhkKz3Z+tALXQMwXOSObMR" + "3xKpvVBdoknhsEDFiLTAeTdY80k2xJJX63awE+2m9vJ/oO1QJ6hS/IlRRVksFBUx" + "xuIQX29TDrdg6ttruEXkfNdUU0J7wt5dePKS6jBe0QKBgQDnkj+jgYPBcbwfvN2A" + "G6qbDZMSnQYV69vlPSgpsKkbN6R4LFSOU1ldkpm2fxqX/AnAkCoxjZzgC1DrF5Lj" + "THaZGPsPYD4+z0S5jyOO2QrbclcZGH60Kac5Ue5xCMju+FDT32Dcg5m2+isV0Hwm" + "Lb4qRWIK0M0QH2CZgdW79S5/vwKBgQDUYafngR3ZVKWSYxgGwayNq27TknUryk3u" + "37tqBq/VkyX2b/qeEg6yXRi1zUCAd+81BX0zAtRBjraSSECs7ECb0O2eXbbqB8OW" + "tFm8A4Weqm7Kg1MT8iqi00+IAyoobdKlcPdkbIqEBG3tHlOgFvoLu5hhIDseOZwn" + "tDDoMxpz7wKBgQDUtMtrvr1tZLEuXeb/k2okPlXHlSBP5nP3nzNTCAhtDbEvCVkp" + "2nmNr+ktbpbY4BN9I27+UVu1l+9d4it0SXnuqrmBqB/ExdIUt9wrjEWiyOYkERHh" + "HxmRVya0ASPADasA0oBATUlWf3gv8272CrJQVab21FBn7MpodpACs/VgNQKBgGpp" + "p9xaGF+dhvxLBG3WOqQdQoFlv6m6SsQme9wLD60edoX844CyIYUDGm91MR1teoCB" + "iJK3lyxl2lp/M1Cxa0nnLDgOUqj+TOTE5rVKuneeg7aaiFTVIMHGyPGoTEZHiKT2" + "bi52KA0vvvhxGot7F7wrOZVotdZWHUTThzHA8T8nAoGBALCstqjzATbt8CCMZhOR" + "Lkmr2Z/qmUcqiVooc+gh2+YFiM9r+MQY7R1CWIM99dEYvQBOel8Q7s+DTs0RYiFb" + "68FXoiiT8wdWdQiZKcg9LE3P8pudikf4WuhIXALy7ljWXogSFxQ/iZPaJX8K6cEM" + "GfhU91pNYJJmvyIuwzxJ7BWK"; public static PrivateKey TEST_CONSUMER_PRIVATE_KEY = SignatureUtil.makePrivateKey(TEST_CONSUMER_PRIVATE_KEY_BASE64); private static String TEST_CONSUMER_CERTIFICATE_BASE64 = "MIICzDCCAbQCCQClKBfhTDve7jANBgkqhkiG9w0BAQUFADAoMQswCQYDVQQGEwJD" + "QTELMAkGA1UECBMCQkMxDDAKBgNVBAoTA1NBUDAeFw0xMTA2MTAyMjM5MDhaFw0y" + "MTA2MDcyMjM5MDhaMCgxCzAJBgNVBAYTAkNBMQswCQYDVQQIEwJCQzEMMAoGA1UE" + "ChMDU0FQMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwB1y/1V7919w" + "dIit0ugn1EddpzKOtLWf8NvduBlbTC+YRFZMErHmDcQCOloO3naDxliwJIMXHGGG" + "quWbZda1vdMy12549O/95TKgNFZTZK1NtvcIKpnDfK3UIRmrSozYA0MH/RGQKgcr" + "p4s6Qs8fY/MrbYoHACW5MhvUlq1zIPpExc8vK5bxUhOsL7uG/ZTNzw0WGSkBFh/R" + "ce9A7L3vq3EMIo4oKaqLmNHTZKtb9wxgZ2rJDuRZIRnCrYEJyBXteiGLE2Vq0mvc" + "Tk6eYNPfm8ZnLUMokaNWQjg6rsPtFboD6VCi+p+W13N6ZDv5w7qUmx0UAz7y7sOf" + "jLjh0DIQUQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQCepKNPU47CfeeY/UPAajTE" + "GZCaYh0IztK/lMyFC0tVtI8eB4Tih3d7dlV0/H3twXV11FvTCmr2QTpi6riQHPm8" + "OXUhi8uj7+ibJm+mKoh0nJW2BsEERJ/9VX7/HeLehB7EWDIGFnC/13XTol69m3hE" + "q1y8mIyU9u4WNTykVoGjge7W4re4ra/uYWz+CD2CuOI+Z8wY2fQqKq5RQ6q3mw4A" + "zynu3QO8znNoE3Ns8PVLvv1rb7Ayr4mNVANULWZTR+8jm9p7gRgbSkqKdQiQiygC" + "Z8G3X9udS479U0xvCeqLJvJwg5RT+RvNWYwvrKsTSgMXodv9D3D7oIngtURkpAHy"; public static X509Certificate TEST_CONSUMER_CERTIFICATE = SignatureUtil.makeCertificate(TEST_CONSUMER_CERTIFICATE_BASE64); /** Tests a call to a two-legged OAuth endpoint. */ public void testTwoLeggedOAuthCall() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("https://cheetah.dhcp.pgdev.sap.corp/oauth/test_consumer_request")); och.setConsumerKey("1VMzOctCAidMaahS9yJU"); och.setConsumerSecret("JinGkf4bjzFQhOVUbhxpL3eU1esKgO8qTAGfCXy7"); och.setTokenForTwoLeggedOAuth(); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1307734348L); och.setNonce("thZmo2SoWA"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"1VMzOctCAidMaahS9yJU\", oauth_nonce=\"thZmo2SoWA\", oauth_signature_method=\"HMAC-SHA1\", oauth_timestamp=\"1307734348\", oauth_version=\"1.0\", oauth_token=\"\", oauth_signature=\"suUt%2B%2BCRsEp8WhSPApI83BtsBYk%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Tests a call to the two-legged OAuth endpoint: GET /oauth/test_consumer_request using the * RSA-SHA1 signature method. */ public void testTwoLeggedOAuthCallWithRsaSha1Signature() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("https://cheetah.dhcp.pgdev.sap.corp/oauth/test_consumer_request")); och.setConsumerKey("1VMzOctCAidMaahS9yJU"); och.setConsumerPrivateKey(TEST_CONSUMER_PRIVATE_KEY); och.setTokenForTwoLeggedOAuth(); och.setSignatureMethod(SignatureMethod.RSA_SHA1); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1307748357L); och.setNonce("NtX9Gah3Bw"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"1VMzOctCAidMaahS9yJU\", oauth_nonce=\"NtX9Gah3Bw\", oauth_signature_method=\"RSA-SHA1\", oauth_timestamp=\"1307748357\", oauth_version=\"1.0\", oauth_token=\"\", oauth_signature=\"h%2FKJEkVh3GdY%2BLN7G6gQazi625uwKGkxzyN3dcQh4LzyS2z%2FBLCcLiWL5u9Xkk%2FwxvIwvE6FcvWmYlPHxzNUPxjNfXkIo6CgfF2wAqDf09JLPuMlZPAKaj8n%2BFOTiswuOH%2BsxkCatN2ziUKsMqniYWHLxgT3Q9DI1Fve6tdGOuJO0H3Lg%2BzAIC8oWSWw4q6VPPauCbslJaZTA6d6v2yg2oMxBoLCnJ9x1F2C2B9Fqb3w0lkzDm5Vxz%2B%2BWgswLSXpIBQpfoqzZpE5qohBpq%2FT9KGMM8Ewj2hvzf0NSZtMRPvqpE5A4AFBxMnHlIHKnFLTxRqjAn2qgm1MY6wJhDDuoQ%3D%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Tests a call to an OAuth endpoint: GET /oauth/test_request. This is a regular 3-legged OAuth * call i.e. with an authenticated access token for a user. */ public void testOAuthCall() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("https://cheetah.dhcp.pgdev.sap.corp/oauth/test_request")); och.setConsumerKey("1VMzOctCAidMaahS9yJU"); och.setConsumerSecret("JinGkf4bjzFQhOVUbhxpL3eU1esKgO8qTAGfCXy7"); och.setToken("qlbjCFbiBewXcCSAgIB9"); och.setTokenSecret("fYtRQv54NygyJXUTzebgCopW3a5RTaBruvByh92g"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1302731153L); och.setNonce("dd9YXogHSg"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"1VMzOctCAidMaahS9yJU\", oauth_nonce=\"dd9YXogHSg\", oauth_signature_method=\"HMAC-SHA1\", oauth_timestamp=\"1302731153\", oauth_version=\"1.0\", oauth_token=\"qlbjCFbiBewXcCSAgIB9\", oauth_signature=\"gJS7nzUTIbqDTEnel%2FYx8Cw%2B7q4%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } public void testOAuthCall2() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl( new URL( "https://streamwork.com/v1/feed/users/4q2BimSWiRulA56XLnX22A?page_size=100&page=1&comments=100")); och.setConsumerKey("3Ume0eXZm8Q9fpaLsAOZ"); och.setConsumerSecret("JinGkf4bjzFQhOVUbhxpL3eU1esKgO8qTAGfCXy7"); och.setToken("OPNy0Tk0EPfMimMOjTFs"); och.setTokenSecret("fYtRQv54NygyJXUTzebgCopW3a5RTaBruvByh92g"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1312874008L); och.setNonce("AlPd4z"); String expectedAuthorizationHeader = "OAuth oauth_signature_method=\"HMAC-SHA1\",oauth_version=\"1.0\",oauth_nonce=\"AlPd4z\",oauth_timestamp=\"1312874008\",oauth_consumer_key=\"3Ume0eXZm8Q9fpaLsAOZ\",oauth_token=\"OPNy0Tk0EPfMimMOjTFs\",oauth_signature=\"t6d%2F6vLUvDJVvdt1k53PlwPuzko%3D\""; String actualAuthorizationHeader = och.generateAuthorizationHeader(); assertEqualAuthorizationHeaders(expectedAuthorizationHeader, actualAuthorizationHeader); } /** * Tests a call to an OAuth endpoint: GET /oauth/test_request using the RSA-SHA1 signature method, * which is the most secure one. This is a regular 3-legged OAuth call i.e. with an authenticated * access token for a user. */ public void testOAuthCallWithRsaSha1Signature() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("https://cheetah.dhcp.pgdev.sap.corp/oauth/test_request")); och.setConsumerKey("1VMzOctCAidMaahS9yJU"); och.setConsumerPrivateKey(TEST_CONSUMER_PRIVATE_KEY); och.setToken("qlbjCFbiBewXcCSAgIB9"); och.setSignatureMethod(SignatureMethod.RSA_SHA1); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1307745674L); och.setNonce("oCaDVVBkIw"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"1VMzOctCAidMaahS9yJU\", oauth_nonce=\"oCaDVVBkIw\", oauth_signature_method=\"RSA-SHA1\", oauth_timestamp=\"1307745674\", oauth_version=\"1.0\", oauth_token=\"qlbjCFbiBewXcCSAgIB9\", oauth_signature=\"U2gpD7SZldInb6JorOkopdKBDlUG2xZikHf92MwKxFH%2FdXxr9J6LSsrg0G8HXPHXGgzm5%2BD7edjz2gl1yss4jtFBCb8AmMxp5VVyehzlZUm6A4rfpkrq9tH7Hdpc%2BLCnFC4c2vqAMzT%2BTf3r2Ki%2FrE9hwtu4Iireb1feN3V3ZQ7rZNRjdPc%2BJpDYSkoo9VTL2KSzUzZYDYJaSRLPoryburLRpam%2BMA3DCvFrCT6pKOXnS6II5H6Uyt%2FOR3GHPDWcb15zZijMKstxPaj8kvv6ziwVPcN1UVm8p12%2FKEQxlmohVwh1YR0lObT%2BKG790u47Em3Gk8Ot%2FDN4cg9ewJqb%2BA%3D%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Tests a call to an OAuth endpoint: GET /oauth/test_request using the PLAINTEXT signature * method. This is a regular 3-legged OAuth call i.e. with an authenticated access token for a * user. * * <p>Note: using the PLAINTEXT signature method is not recommended, other than for initial * development work. */ public void testOAuthCallWithPlaintextSignature() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("https://cheetah.dhcp.pgdev.sap.corp/oauth/test_request")); och.setConsumerKey("1VMzOctCAidMaahS9yJU"); och.setConsumerSecret("JinGkf4bjzFQhOVUbhxpL3eU1esKgO8qTAGfCXy7"); och.setToken("qlbjCFbiBewXcCSAgIB9"); och.setTokenSecret("fYtRQv54NygyJXUTzebgCopW3a5RTaBruvByh92g"); och.setSignatureMethod(SignatureMethod.PLAINTEXT); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1307739908); och.setNonce("GSBTC7JA5Q"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"1VMzOctCAidMaahS9yJU\", oauth_nonce=\"GSBTC7JA5Q\", oauth_signature_method=\"PLAINTEXT\", oauth_timestamp=\"1307739908\", oauth_version=\"1.0\", oauth_token=\"qlbjCFbiBewXcCSAgIB9\", oauth_signature=\"JinGkf4bjzFQhOVUbhxpL3eU1esKgO8qTAGfCXy7%26fYtRQv54NygyJXUTzebgCopW3a5RTaBruvByh92g\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Tests the initial entry point for initiating the process of obtaining an authorized OAuth * access token, namely a call to POST /oauth/request_token. */ public void testOAuthRequestTokenCall() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.POST); och.setRequestUrl(new URL("https://staging.streamwork.com/oauth/request_token")); och.setConsumerKey("E4dKDaEitNJYqhqKJ2cw"); och.setConsumerSecret("julSfpM2z2C7YlJya8BcO4lMplvunMzPnQ4iEGWg"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); // must set either a callback URL or indicate that the callback is out of band och.setOutOfBandCallback(); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1303338556); och.setNonce("2c_H_Rwcxg"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"E4dKDaEitNJYqhqKJ2cw\", oauth_nonce=\"2c_H_Rwcxg\", oauth_signature_method=\"HMAC-SHA1\", oauth_timestamp=\"1303338556\", oauth_version=\"1.0\", oauth_callback=\"oob\", oauth_signature=\"qbNrBP02UOFckJUR8ucmZDWIedA%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Tests the call to obtain an authorized OAuth access token from a request token, namely a call * to POST /oauth/access_token. */ public void testOAuthAccessTokenCall() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.POST); och.setRequestUrl(new URL("https://staging.streamwork.com/oauth/access_token")); och.setConsumerKey("E4dKDaEitNJYqhqKJ2cw"); och.setConsumerSecret("julSfpM2z2C7YlJya8BcO4lMplvunMzPnQ4iEGWg"); // the request token och.setToken("KoRr6aAkMStAjR16ZxFY"); // the request token secret och.setTokenSecret("lgM0DiY9HJB0y9HjP7ps9LXrxdqOgn4FKBH5yFrk"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); och.setVerifier("J188mJCSgxzGIbjNmjoi"); // under normal circumstances, we would not set the timestamp and nonce, and just let the // library // use the current time and a generated uuid. However, we're comparing with a known good request och.setTimestamp(1303338681); och.setNonce("6UXq131D6A"); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"E4dKDaEitNJYqhqKJ2cw\", oauth_nonce=\"6UXq131D6A\", oauth_signature_method=\"HMAC-SHA1\", oauth_timestamp=\"1303338681\", oauth_version=\"1.0\", oauth_token=\"KoRr6aAkMStAjR16ZxFY\", oauth_verifier=\"J188mJCSgxzGIbjNmjoi\", oauth_signature=\"9IXeoCfWbtjkt5otYmpeYG0k3jw%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** Verify test case from Appendix A.5.1 of OAuth spec http://oauth.net/core/1.0a/#anchor12 */ public void testSignatureBaseString() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("http://photos.example.net/photos")); och.setConsumerKey("dpf43f3p2l4k3l03"); och.setToken("nnch734d00sl2jdk"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 1191242096L; och.setTimestamp(timestamp); String nonce = "kllo9940pd9333jh"; och.setNonce(nonce); List<Pair<String, String>> extraParams = new ArrayList<Pair<String, String>>(); extraParams.add(new Pair<String, String>("file", "vacation.jpg")); extraParams.add(new Pair<String, String>("size", "original")); och.setExtraAuthorizationHeaderParams(extraParams); String expectedSignatureBaseString = "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26oauth_consumer_key%3Ddpf43f3p2l4k3l03%26oauth_nonce%3Dkllo9940pd9333jh%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26oauth_token%3Dnnch734d00sl2jdk%26oauth_version%3D1.0%26size%3Doriginal"; assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); // parameters in the query string get included in the signature och.setRequestUrl(new URL("http://photos.example.net/photos?file=vacation.jpg&size=original")); och.setExtraAuthorizationHeaderParams(null); assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); } /** Verify test case from the OAuth spec http://tools.ietf.org/html/rfc5849 section-3.4.1.1. */ public void testSignatureBaseString2() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.POST); och.setRequestUrl(new URL("http://example.com/request?b5=%3D%253D&a3=a&c%40=&a2=r%20b")); och.setRealm("Example"); och.setConsumerKey("9djdj82h48djs9d2"); och.setToken("kkk9d7dh3k39sjv7"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 137131201L; och.setTimestamp(timestamp); String nonce = "7d8f3e4a"; och.setNonce(nonce); och.omitOAuthVersion(); List<Pair<String, String>> requestBodyParams = new ArrayList<Pair<String, String>>(); requestBodyParams.add(new Pair<String, String>("c2", null)); requestBodyParams.add( new Pair<String, String>( "a3", "2 q")); // 2+q in the spec, since it is shown in the form of a HTTP request, where it // is encoded. och.setExtraRequestBodyParams(requestBodyParams); String expectedSignatureBaseString = "POST&http%3A%2F%2Fexample.com%2Frequest&a2%3Dr%2520b%26a3%3D2%2520q" + "%26a3%3Da%26b5%3D%253D%25253D%26c%2540%3D%26c2%3D%26oauth_consumer_" + "key%3D9djdj82h48djs9d2%26oauth_nonce%3D7d8f3e4a%26oauth_signature_m" + "ethod%3DHMAC-SHA1%26oauth_timestamp%3D137131201%26oauth_token%3Dkkk" + "9d7dh3k39sjv7"; assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); } /** * This tests that query params are being properly encoded. There was previously a bug in this * library that manifested itself when query param values needed escaping, such as the @ in the * name query param value. The correct behavior was verified with the OAuth calculator here: * http://hueniverse.com/2008/10/beginners-guide-to-oauth-part-iv-signing-requests/ */ public void testOAuthCallWithEmailParam() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl( new URL( "https://cheetah.dhcp.pgdev.sap.corp/oauth/test_consumer_request?name=" + OAuthUtils.urlEncode("*****@*****.**"))); och.setConsumerKey("1VMzOctCAidMaahS9yJU"); och.setConsumerSecret("JinGkf4bjzFQhOVUbhxpL3eU1esKgO8qTAGfCXy7"); och.setToken("kkk9d7dh3k39sjv7"); och.setTokenSecret("fYtRQv54NygyJXUTzebgCopW3a5RTaBruvByh92g"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 137131201L; och.setTimestamp(timestamp); String nonce = "7d8f3e4a"; och.setNonce(nonce); String expectedSignatureBaseString = "GET&https%3A%2F%2Fcheetah.dhcp.pgdev.sap.corp%2Foauth%2Ftest_consumer_request&name%3Dfred%2540gmail.com%26oauth_consumer_key%3D1VMzOctCAidMaahS9yJU%26oauth_nonce%3D7d8f3e4a%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D137131201%26oauth_token%3Dkkk9d7dh3k39sjv7%26oauth_version%3D1.0"; assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"1VMzOctCAidMaahS9yJU\", oauth_token=\"kkk9d7dh3k39sjv7\", oauth_nonce=\"7d8f3e4a\", oauth_timestamp=\"137131201\", oauth_signature_method=\"HMAC-SHA1\", oauth_version=\"1.0\", oauth_signature=\"G3tfgEHevQfQ7jNlsWZ4O%2Fo92Xw%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Test based on the example at * http://hueniverse.com/2008/10/beginners-guide-to-oauth-part-iv-signing-requests/ entitled "Non * URL-Safe Parameter" */ public void testOAuthCallWithNonUrlSafeParams() throws MalformedURLException { // http://PHOTOS.example.net:8001/Photos with the parameters photo size=300%, title=Back of $100 // Dollars Bill OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl( new URL( "http://PHOTOS.example.net:8001/Photos?" + OAuthUtils.urlEncode("photo size") + "=" + OAuthUtils.urlEncode("300%") + "&title=" + OAuthUtils.urlEncode("Back of $100 Dollars Bill"))); och.setConsumerKey("dpf43f3++p+#2l4k3l03"); och.setConsumerSecret("kd9@4h%%4f93k423kf44"); och.setToken("nnch734d(0)0sl2jdk"); och.setTokenSecret("pfkkd#hi9_sl-3r=4s00"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 1191242096L; och.setTimestamp(timestamp); String nonce = "kllo~9940~pd9333jh"; och.setNonce(nonce); String expectedSignatureBaseString = "GET&http%3A%2F%2Fphotos.example.net%3A8001%2FPhotos&oauth_consumer_key%3Ddpf43f3%252B%252Bp%252B%25232l4k3l03%26oauth_nonce%3Dkllo~9940~pd9333jh%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26oauth_token%3Dnnch734d%25280%25290sl2jdk%26oauth_version%3D1.0%26photo%2520size%3D300%2525%26title%3DBack%2520of%2520%2524100%2520Dollars%2520Bill"; assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"dpf43f3%2B%2Bp%2B%232l4k3l03\", oauth_token=\"nnch734d%280%290sl2jdk\", oauth_nonce=\"kllo~9940~pd9333jh\", oauth_timestamp=\"1191242096\", oauth_signature_method=\"HMAC-SHA1\", oauth_version=\"1.0\", oauth_signature=\"tTFyqivhutHiglPvmyilZlHm5Uk%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Test based on the example at * http://hueniverse.com/2008/10/beginners-guide-to-oauth-part-iv-signing-requests/ entitled "Non * English Parameters" */ public void testOAuthCallWithNonEnglishParams() throws MalformedURLException { // http://PHOTOS.example.net:8001/Photos with the type and scenario parameters having unicode // parameters OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); // Used the online tool http://www.snible.org/java2/uni2java.html to convert the unicode strings // to Java String literals. String typeValue = "\u00D7\u0090\u00D7\u2022\u00D7\u02DC\u00D7\u2022\u00D7\u2018\u00D7\u2022\u00D7\u00A1"; // Note \u00A0 which encodes as UTF8 as C2A0 is the non-breaking space character. // http://stackoverflow.com/questions/2774471/what-is-c2-a0-in-mime-encoded-quoted-printable-text // If you just cut and paste from the web page, it will convert to a regular space, so be // careful! String scenarioValue = "\u00D7\u00AA\u00D7\u0090\u00D7\u2022\u00D7\u00A0\u00D7\u201D"; och.setRequestUrl( new URL( "http://PHOTOS.example.net:8001/Photos?type=" + OAuthUtils.urlEncode(typeValue) + "&scenario=" + OAuthUtils.urlEncode(scenarioValue))); och.setConsumerKey("dpf43f3++p+#2l4k3l03"); och.setConsumerSecret("kd9@4h%%4f93k423kf44"); och.setToken("nnch734d(0)0sl2jdk"); och.setTokenSecret("pfkkd#hi9_sl-3r=4s00"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 1191242096L; och.setTimestamp(timestamp); String nonce = "kllo~9940~pd9333jh"; och.setNonce(nonce); String expectedSignatureBaseString = "GET&http%3A%2F%2Fphotos.example.net%3A8001%2FPhotos&oauth_consumer_key%3Ddpf43f3%252B%252Bp%252B%25232l4k3l03%26oauth_nonce%3Dkllo~9940~pd9333jh%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26oauth_token%3Dnnch734d%25280%25290sl2jdk%26oauth_version%3D1.0%26scenario%3D%25C3%2597%25C2%25AA%25C3%2597%25C2%2590%25C3%2597%25E2%2580%25A2%25C3%2597%25C2%25A0%25C3%2597%25E2%2580%259D%26type%3D%25C3%2597%25C2%2590%25C3%2597%25E2%2580%25A2%25C3%2597%25CB%259C%25C3%2597%25E2%2580%25A2%25C3%2597%25E2%2580%2598%25C3%2597%25E2%2580%25A2%25C3%2597%25C2%25A1"; assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"dpf43f3%2B%2Bp%2B%232l4k3l03\", oauth_token=\"nnch734d%280%290sl2jdk\", oauth_nonce=\"kllo~9940~pd9333jh\", oauth_timestamp=\"1191242096\", oauth_signature_method=\"HMAC-SHA1\", oauth_version=\"1.0\", oauth_signature=\"MH9NDodF4I%2FV6GjYYVChGaKCtnk%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** * Test based on a case where OAuth sort is not the same as lexicographic sort of the 'key=value' * Strings. For example, a1=3, a=2 sorts in OAuth order as a=2, a1=3, but as Strings it is a1=3, * a=2 since '1' < '='. The expected values were computed independently with the calculator at * http://hueniverse.com/2008/10/beginners-guide-to-oauth-part-iv-signing-requests/ * * @throws MalformedURLException */ public void testOAuthCallWithEdgeCasePairParamSortOrder() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("http://PHOTOS.example.net:8001/Photos?a1=3&a=2")); och.setConsumerKey("dpf43f3++p+#2l4k3l03"); och.setConsumerSecret("kd9@4h%%4f93k423kf44"); och.setToken("nnch734d(0)0sl2jdk"); och.setTokenSecret("pfkkd#hi9_sl-3r=4s00"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 1191242096L; och.setTimestamp(timestamp); String nonce = "kllo~9940~pd9333jh"; och.setNonce(nonce); String expectedSignatureBaseString = "GET&http%3A%2F%2Fphotos.example.net%3A8001%2FPhotos&a%3D2%26a1%3D3%26oauth_consumer_key%3Ddpf43f3%252B%252Bp%252B%25232l4k3l03%26oauth_nonce%3Dkllo~9940~pd9333jh%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26oauth_token%3Dnnch734d%25280%25290sl2jdk%26oauth_version%3D1.0"; assertEquals(expectedSignatureBaseString, och.generateSignatureBaseString(nonce, timestamp)); String expectedAuthorizationHeader = "OAuth oauth_consumer_key=\"dpf43f3%2B%2Bp%2B%232l4k3l03\", oauth_token=\"nnch734d%280%290sl2jdk\", oauth_nonce=\"kllo~9940~pd9333jh\", oauth_timestamp=\"1191242096\", oauth_signature_method=\"HMAC-SHA1\", oauth_version=\"1.0\", oauth_signature=\"XvQXwVym27PgKSIWiElVVSdGIq8%3D\""; assertEqualAuthorizationHeaders(expectedAuthorizationHeader, och.generateAuthorizationHeader()); } /** Verify test case from Appendix A.5.2 of OAuth spec http://oauth.net/core/1.0a/#anchor12 */ public void testHmacSha1Signature() { String message = "GET&http%3A%2F%2Fphotos.example.net%2Fphotos&file%3Dvacation.jpg%26oauth_consumer_key%3Ddpf43f3p2l4k3l03%26oauth_nonce%3Dkllo9940pd9333jh%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1191242096%26oauth_token%3Dnnch734d00sl2jdk%26oauth_version%3D1.0%26size%3Doriginal"; String key = "kd94hf93k423kf44&pfkkdhi9sl3r4s00"; assertEquals( "tR3+Ty81lMeYAr/Fid0kMTYa/WM=", OAuthUtils.calculateHmacSha1Signature(message, key)); } /** * Verifies base string URI encoding with some examples from the OAuth spec * http://tools.ietf.org/html/rfc5849#section-3.5 * * @throws MalformedURLException */ public void testBaseStringUrl() throws MalformedURLException { assertEquals( "https://streamwork.com/", OAuthUtils.baseStringUrl(new URL("https://streamwork.com"))); assertEquals( "http://example.com/r%20v/X", OAuthUtils.baseStringUrl(new URL("HTTP://EXAMPLE.COM:80/r%20v/X?id=123"))); assertEquals( "https://www.example.net:8080/", OAuthUtils.baseStringUrl(new URL("https://www.example.net:8080/?q=1"))); } /** Checks that the authorization headers are equal, modulo ordering of the parameters */ private void assertEqualAuthorizationHeaders(String h1, String h2) { String[] a1 = h1.split(",?\\s*"); Arrays.sort(a1); String[] a2 = h2.split(",?\\s*"); Arrays.sort(a2); assertEquals(Arrays.asList(a1), Arrays.asList(a2)); } /** Verify test case from Appendix A.5.3 of OAuth spec http://oauth.net/core/1.0a/ */ public void testOAuthCallUsingQueryString() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("http://photos.example.net/photos?file=vacation.jpg&size=original")); och.setConsumerKey("dpf43f3p2l4k3l03"); och.setConsumerSecret("kd94hf93k423kf44"); och.setToken("nnch734d00sl2jdk"); och.setTokenSecret("pfkkdhi9sl3r4s00"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 1191242096L; och.setTimestamp(timestamp); String nonce = "kllo9940pd9333jh"; och.setNonce(nonce); String expectedQueryString = "file=vacation.jpg&size=original&oauth_consumer_key=dpf43f3p2l4k3l03&oauth_token=nnch734d00sl2jdk&oauth_signature_method=HMAC-SHA1&oauth_signature=tR3%2BTy81lMeYAr%2FFid0kMTYa%2FWM%3D&oauth_timestamp=1191242096&oauth_nonce=kllo9940pd9333jh&oauth_version=1.0"; assertEquals(expectedQueryString, och.generateRequestQuery()); } /** Verify test case from Appendix A.5.3 of OAuth spec http://oauth.net/core/1.0a/ */ public void testOAuthCallUsingRequestBody() throws MalformedURLException { OAuthClientHelper och = new OAuthClientHelper(); och.setHttpMethod(HttpMethod.GET); och.setRequestUrl(new URL("http://photos.example.net/photos")); och.setConsumerKey("dpf43f3p2l4k3l03"); och.setConsumerSecret("kd94hf93k423kf44"); och.setToken("nnch734d00sl2jdk"); och.setTokenSecret("pfkkdhi9sl3r4s00"); och.setSignatureMethod(SignatureMethod.HMAC_SHA1); long timestamp = 1191242096L; och.setTimestamp(timestamp); String nonce = "kllo9940pd9333jh"; och.setNonce(nonce); List<Pair<String, String>> extraParams = new ArrayList<Pair<String, String>>(); extraParams.add(new Pair<String, String>("file", "vacation.jpg")); extraParams.add(new Pair<String, String>("size", "original")); och.setExtraRequestBodyParams(extraParams); String expectedQueryString = "file=vacation.jpg&size=original&oauth_consumer_key=dpf43f3p2l4k3l03&oauth_token=nnch734d00sl2jdk&oauth_signature_method=HMAC-SHA1&oauth_signature=tR3%2BTy81lMeYAr%2FFid0kMTYa%2FWM%3D&oauth_timestamp=1191242096&oauth_nonce=kllo9940pd9333jh&oauth_version=1.0"; assertEquals(expectedQueryString, och.generateRequestBody()); } /** Verify the private key and certificate are indeed matching. */ public void testConsumerPrivateKeyCertificateCompatibility() { assertTrue( SignatureUtil.validatePrivateKeyCertificateCompatibility( TEST_CONSUMER_PRIVATE_KEY, TEST_CONSUMER_CERTIFICATE)); } public void testSignatureVerificationRoundtrip() throws Exception { String signatureBaseString = "GET&https%3A%2F%2Fcheetah.dhcp.pgdev.sap.corp%2Foauth%2Ftest_consumer_request&oauth_consumer_key%3D1VMzOctCAidMaahS9yJU%26oauth_nonce%3DNtX9Gah3Bw%26oauth_signature_method%3DRSA-SHA1%26oauth_timestamp%3D1307748357%26oauth_token%3D%26oauth_version%3D1.0"; String signature = OAuthUtils.calculateRsaSha1Signature(signatureBaseString, TEST_CONSUMER_PRIVATE_KEY); boolean valid = OAuthUtils.verifyRsaSha1Signature( TEST_CONSUMER_CERTIFICATE.getPublicKey(), signature, signatureBaseString); assertTrue(valid); } }