| /** |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.activemq.jaas; |
| |
| import org.apache.directory.server.core.integ.AbstractLdapTestUnit; |
| import org.apache.directory.server.core.integ.FrameworkRunner; |
| import org.apache.directory.server.ldap.LdapServer; |
| import org.apache.directory.server.annotations.CreateLdapServer; |
| import org.apache.directory.server.annotations.CreateTransport; |
| import org.apache.directory.server.core.annotations.ApplyLdifFiles; |
| import org.junit.After; |
| import org.junit.Before; |
| import org.junit.Test; |
| import org.junit.runner.RunWith; |
| |
| import javax.naming.Context; |
| import javax.naming.NameClassPair; |
| import javax.naming.NamingEnumeration; |
| import javax.naming.directory.DirContext; |
| import javax.naming.directory.InitialDirContext; |
| import javax.security.auth.callback.*; |
| import javax.security.auth.login.FailedLoginException; |
| import javax.security.auth.login.LoginContext; |
| import javax.security.auth.login.LoginException; |
| |
| import java.io.IOException; |
| import java.util.HashSet; |
| import java.util.Hashtable; |
| |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertTrue; |
| import static org.junit.Assert.fail; |
| |
| @RunWith ( FrameworkRunner.class ) |
| @CreateLdapServer(transports = {@CreateTransport(protocol = "LDAP", port=1024)}, allowAnonymousAccess = true) |
| @ApplyLdifFiles( |
| "test.ldif" |
| ) |
| public class LDAPLoginModuleTest extends AbstractLdapTestUnit { |
| |
| private static final String BASE = "o=ActiveMQ,ou=system"; |
| public static LdapServer ldapServer; |
| |
| private static final String FILTER = "(objectclass=*)"; |
| |
| private static final String PRINCIPAL = "uid=admin,ou=system"; |
| private static final String CREDENTIALS = "secret"; |
| |
| private final String loginConfigSysPropName = "java.security.auth.login.config"; |
| private String oldLoginConfig; |
| @Before |
| public void setLoginConfigSysProperty() { |
| oldLoginConfig = System.getProperty(loginConfigSysPropName, null); |
| System.setProperty(loginConfigSysPropName, "src/test/resources/login.config"); |
| } |
| |
| @After |
| public void resetLoginConfigSysProperty() { |
| if (oldLoginConfig != null) { |
| System.setProperty(loginConfigSysPropName, oldLoginConfig); |
| } |
| } |
| |
| @SuppressWarnings("unchecked") |
| @Test |
| public void testRunning() throws Exception { |
| |
| Hashtable env = new Hashtable(); |
| env.put(Context.PROVIDER_URL, "ldap://localhost:1024"); |
| env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory"); |
| env.put(Context.SECURITY_AUTHENTICATION, "simple"); |
| env.put(Context.SECURITY_PRINCIPAL, PRINCIPAL); |
| env.put(Context.SECURITY_CREDENTIALS, CREDENTIALS); |
| DirContext ctx = new InitialDirContext(env); |
| |
| HashSet set = new HashSet(); |
| |
| NamingEnumeration list = ctx.list("ou=system"); |
| |
| while (list.hasMore()) { |
| NameClassPair ncp = (NameClassPair) list.next(); |
| set.add(ncp.getName()); |
| } |
| |
| assertTrue(set.contains("uid=admin")); |
| assertTrue(set.contains("ou=users")); |
| assertTrue(set.contains("ou=groups")); |
| assertTrue(set.contains("ou=configuration")); |
| assertTrue(set.contains("prefNodeName=sysPrefRoot")); |
| |
| } |
| |
| @Test |
| public void testLogin() throws LoginException { |
| LoginContext context = new LoginContext("LDAPLogin", new CallbackHandler() { |
| @Override |
| public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException { |
| for (int i = 0; i < callbacks.length; i++) { |
| if (callbacks[i] instanceof NameCallback) { |
| ((NameCallback) callbacks[i]).setName("first"); |
| } else if (callbacks[i] instanceof PasswordCallback) { |
| ((PasswordCallback) callbacks[i]).setPassword("secret".toCharArray()); |
| } else { |
| throw new UnsupportedCallbackException(callbacks[i]); |
| } |
| } |
| } |
| }); |
| context.login(); |
| context.logout(); |
| } |
| |
| @Test |
| public void testEncryptedLogin() throws LoginException { |
| |
| LoginContext context = new LoginContext("EncryptedLDAPLogin", new CallbackHandler() { |
| @Override |
| public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException { |
| for (int i = 0; i < callbacks.length; i++) { |
| if (callbacks[i] instanceof NameCallback) { |
| ((NameCallback) callbacks[i]).setName("first"); |
| } else if (callbacks[i] instanceof PasswordCallback) { |
| ((PasswordCallback) callbacks[i]).setPassword("secret".toCharArray()); |
| } else { |
| throw new UnsupportedCallbackException(callbacks[i]); |
| } |
| } |
| } |
| }); |
| context.login(); |
| context.logout(); |
| } |
| |
| @Test |
| public void testUnauthenticated() throws LoginException { |
| LoginContext context = new LoginContext("UnAuthenticatedLDAPLogin", new CallbackHandler() { |
| @Override |
| public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException { |
| for (int i = 0; i < callbacks.length; i++) { |
| if (callbacks[i] instanceof NameCallback) { |
| ((NameCallback) callbacks[i]).setName("first"); |
| } else if (callbacks[i] instanceof PasswordCallback) { |
| ((PasswordCallback) callbacks[i]).setPassword("secret".toCharArray()); |
| } else { |
| throw new UnsupportedCallbackException(callbacks[i]); |
| } |
| } |
| } |
| }); |
| try { |
| context.login(); |
| } catch (LoginException le) { |
| assertEquals(le.getCause().getMessage(), "Empty password is not allowed"); |
| return; |
| } |
| fail("Should have failed authenticating"); |
| } |
| |
| |
| @Test |
| public void testAuthenticatedViaBindOnAnonConnection() throws Exception { |
| LoginContext context = new LoginContext("AnonBindCheckUserLDAPLogin", new CallbackHandler() { |
| @Override |
| public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException { |
| for (int i = 0; i < callbacks.length; i++) { |
| if (callbacks[i] instanceof NameCallback) { |
| ((NameCallback) callbacks[i]).setName("first"); |
| } else if (callbacks[i] instanceof PasswordCallback) { |
| ((PasswordCallback) callbacks[i]).setPassword("wrongSecret".toCharArray()); |
| } else { |
| throw new UnsupportedCallbackException(callbacks[i]); |
| } |
| } |
| } |
| }); |
| try { |
| context.login(); |
| fail("Should have failed authenticating"); |
| } catch (FailedLoginException expected) { |
| } |
| } |
| |
| @Test |
| public void testAuthenticatedOkViaBindOnAnonConnection() throws Exception { |
| LoginContext context = new LoginContext("AnonBindCheckUserLDAPLogin", new CallbackHandler() { |
| @Override |
| public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException { |
| for (int i = 0; i < callbacks.length; i++) { |
| if (callbacks[i] instanceof NameCallback) { |
| ((NameCallback) callbacks[i]).setName("first"); |
| } else if (callbacks[i] instanceof PasswordCallback) { |
| ((PasswordCallback) callbacks[i]).setPassword("secret".toCharArray()); |
| } else { |
| throw new UnsupportedCallbackException(callbacks[i]); |
| } |
| } |
| } |
| }); |
| context.login(); |
| context.logout(); |
| } |
| |
| } |