WhenValidateTokenCalledAndUseOidConfigDiscoveryThenAttemptToValidateTokenUsingDiscoverySettings() { var settings = Options.Create(new OpenIDConnectSettings { UseOIDCConfigDiscovery = true, OIDCConfigMetaDataUrl = "test", RedirectUrl = DefaultSignInRedirectUrl, SignOutRedirectUrl = DefaultSignOutRedirectUrl, Issuer = "issuerFromServer", AuthdUrl = "auth", AuthorizeUrl = "AuthorizeUrl", ClientId = "clientid", EndSessionUrl = "Endsesison", JWK = "jjjjjjfhfjjfjfjfjfhfjkhdfkhdfkjhskfhsldkjhfskdljfhsdlkfhsdflksdhsdlkfh", Exponent = "AQAB", }); var client = new AzureB2CAuthClient(settings, tokenHandler, configurationManager); SecurityToken secToken; var token = await client.ValidateToken("token").ConfigureAwait(true); A.CallTo(() => tokenHandler.ValidateToken(A <string> .Ignored, A <TokenValidationParameters> .That.Matches(x => x.ValidIssuer == "issuer"), out secToken)) .MustHaveHappened(); }
public async Task WhenGetRegisterUrlCalledWithoutParameterThenReturnUrlWithDefaultRedirect() { var client = new AzureB2CAuthClient(defaultSettings, tokenHandler, configurationManager); var url = await client.GetRegisterUrl(); Assert.Contains(DefaultSignInRedirectUrl, url, StringComparison.InvariantCultureIgnoreCase); }
public async Task WhenValidateTokenCalledThenAttemptToValidateToken() { var client = new AzureB2CAuthClient(defaultSettings, tokenHandler, configurationManager); SecurityToken secToken; var token = await client.ValidateToken("token").ConfigureAwait(true); A.CallTo(() => tokenHandler.ValidateToken(A <string> .Ignored, A <TokenValidationParameters> .That.Matches(x => x.ValidIssuer == defaultSettings.Value.Issuer), out secToken)).MustHaveHappened(); }
public async Task WhenGetSignOutUrlCalledWithParameterThenReturnUrlWithSuppliedRedirect() { var redirect = "RedirectFromChild"; var client = new AzureB2CAuthClient(defaultSettings, tokenHandler, configurationManager); var url = await client.GetSignOutUrl(redirect); Assert.Contains(redirect, url, StringComparison.InvariantCultureIgnoreCase); }
public async Task WhenGetResetPasswordUrlCalledThenReturnUrlWithDefaultRedirect() { var client = new AzureB2CAuthClient(defaultSettings, tokenHandler, configurationManager); var url = await client.GetResetPasswordUrl().ConfigureAwait(false); Assert.Contains(DefaultSignInRedirectUrl, url, StringComparison.InvariantCultureIgnoreCase); Assert.Contains(AzureB2CAuthClient.PasswordResetRequestType, url, StringComparison.InvariantCultureIgnoreCase); }
public async Task When_InCorrectPasswordProvided_Return_Failure() { var client = Substitute.For <IRestClient>(); client.PostAsync <VerifyPasswordResponse>(Arg.Any <string>(), Arg.Any <StringContent>()).ReturnsForAnyArgs(new VerifyPasswordResponse()); // Arrange var authClient = new AzureB2CAuthClient(Options.Create(new OpenIDConnectSettings() { TokenEndpoint = "http://www.something.com", PwdVerificationClientId = "some id" }), client); // Act var result = await authClient.VerifyPassword("something", "password"); // Assert result.Should().Be(Result.Fail("Invalid Password")); }
public async Task WhenGetRegisterUrlCalledAndUseOidConfigDiscoveryThenUseDiscoverySettings() { var settings = Options.Create(new OpenIDConnectSettings { UseOIDCConfigDiscovery = true, OIDCConfigMetaDataUrl = "test", RedirectUrl = DefaultSignInRedirectUrl, SignOutRedirectUrl = DefaultSignOutRedirectUrl, Issuer = "issuerFromServer", AuthdUrl = "auth", AuthorizeUrl = "AuthorizeUrl", ClientId = "clientid", EndSessionUrl = "Endsesison", JWK = "jjjjjjfhfjjfjfjfjfhfjkhdfkhdfkjhskfhsldkjhfskdljfhsdlkfhsdflksdhsdlkfh", }); var client = new AzureB2CAuthClient(settings, tokenHandler, configurationManager); var token = await client.GetRegisterUrl().ConfigureAwait(true); A.CallTo(() => configurationManager.GetConfigurationAsync(CancellationToken.None)).MustHaveHappened(); }