blob: 8ef5cebbe6550d89db8cabf1a57e786f83d1f2b6 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.brooklyn.security;
import static org.apache.brooklyn.KarafTestUtils.defaultOptionsWith;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNotNull;
import java.io.IOException;
import java.util.concurrent.Callable;
import javax.inject.Inject;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.login.AppConfigurationEntry;
import javax.security.auth.login.FailedLoginException;
import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException;
import org.apache.brooklyn.api.mgmt.ManagementContext;
import org.apache.brooklyn.core.internal.BrooklynProperties;
import org.apache.brooklyn.rest.BrooklynWebConfig;
import org.apache.brooklyn.rest.security.provider.ExplicitUsersSecurityProvider;
import org.apache.brooklyn.test.Asserts;
import org.apache.brooklyn.test.IntegrationTest;
import org.apache.http.HttpStatus;
import org.apache.http.auth.AuthScope;
import org.apache.http.auth.UsernamePasswordCredentials;
import org.apache.http.client.ClientProtocolException;
import org.apache.http.client.CredentialsProvider;
import org.apache.http.client.methods.CloseableHttpResponse;
import org.apache.http.client.methods.HttpGet;
import org.apache.http.impl.client.BasicCredentialsProvider;
import org.apache.http.impl.client.CloseableHttpClient;
import org.apache.http.impl.client.HttpClientBuilder;
import org.apache.karaf.features.BootFinished;
import org.junit.Before;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.junit.runner.RunWith;
import org.ops4j.pax.exam.Configuration;
import org.ops4j.pax.exam.Option;
import org.ops4j.pax.exam.junit.PaxExam;
import org.ops4j.pax.exam.spi.reactors.ExamReactorStrategy;
import org.ops4j.pax.exam.spi.reactors.PerClass;
import org.ops4j.pax.exam.util.Filter;
@RunWith(PaxExam.class)
@ExamReactorStrategy(PerClass.class)
@Category(IntegrationTest.class)
public class StockSecurityProviderTest {
private static final String WEBCONSOLE_REALM = "webconsole";
private static final String USER = "admin";
private static final String PASSWORD = "password";
/**
* To make sure the tests run only when the boot features are fully
* installed
*/
@Inject
@Filter(timeout = 120000)
BootFinished bootFinished;
@Inject
@Filter(timeout = 120000)
ManagementContext managementContext;
@Configuration
public static Option[] configuration() throws Exception {
return defaultOptionsWith(
// Uncomment this for remote debugging the tests on port 5005
// KarafDistributionOption.debugConfiguration()
);
}
@Before
public void setUp() {
//Works only before initializing the security provider (i.e. before first use)
addUser(USER, PASSWORD);
}
@Test(expected = FailedLoginException.class)
public void checkLoginFails() throws LoginException {
doLogin("invalid", "auth");
}
@Test
public void checkLoginSucceeds() throws LoginException {
LoginContext lc = doLogin(USER, PASSWORD);
assertNotNull(lc.getSubject());
}
@Test
public void checkRestSecurityFails() throws IOException {
checkRestSecurity(null, null, HttpStatus.SC_UNAUTHORIZED);
}
@Test
public void checkRestSecuritySucceeds() throws IOException {
checkRestSecurity(USER, PASSWORD, HttpStatus.SC_OK);
}
private void checkRestSecurity(String username, String password, final int code) throws IOException {
CredentialsProvider credentialsProvider = new BasicCredentialsProvider();
if (username != null && password != null) {
credentialsProvider.setCredentials(AuthScope.ANY, new UsernamePasswordCredentials(username, password));
}
try(CloseableHttpClient client =
HttpClientBuilder.create().setDefaultCredentialsProvider(credentialsProvider).build()) {
Asserts.succeedsEventually(new Callable<Void>() {
@Override
public Void call() throws Exception {
assertResponseEquals(client, code);
return null;
}
});
}
}
private void assertResponseEquals(CloseableHttpClient httpclient, int code) throws IOException, ClientProtocolException {
// TODO get this dynamically (from CXF service?)
// TODO port is static, should make it dynamic
HttpGet httpGet = new HttpGet("http://localhost:8081/v1/server/ha/state");
try (CloseableHttpResponse response = httpclient.execute(httpGet)) {
assertEquals(code, response.getStatusLine().getStatusCode());
}
}
private void addUser(String username, String password) {
// TODO Dirty hack to inject the needed properties. Improve once managementContext is configurable.
// Alternatively re-register a test managementContext service (how?)
BrooklynProperties brooklynProperties = (BrooklynProperties)managementContext.getConfig();
brooklynProperties.put(BrooklynWebConfig.SECURITY_PROVIDER_CLASSNAME.getName(), ExplicitUsersSecurityProvider.class.getCanonicalName());
brooklynProperties.put(BrooklynWebConfig.USERS.getName(), username);
brooklynProperties.put(BrooklynWebConfig.PASSWORD_FOR_USER(username), password);
}
private LoginContext doLogin(final String username, final String password) throws LoginException {
assertRealmRegisteredEventually(WEBCONSOLE_REALM);
LoginContext lc = new LoginContext(WEBCONSOLE_REALM, new CallbackHandler() {
public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {
for (int i = 0; i < callbacks.length; i++) {
Callback callback = callbacks[i];
if (callback instanceof PasswordCallback) {
PasswordCallback passwordCallback = (PasswordCallback)callback;
passwordCallback.setPassword(password.toCharArray());
} else if (callback instanceof NameCallback) {
NameCallback nameCallback = (NameCallback)callback;
nameCallback.setName(username);
}
}
}
});
lc.login();
return lc;
}
private void assertRealmRegisteredEventually(final String userPassRealm) {
// Need to wait a bit for the realm to get registered, any OSGi way to do this?
Asserts.succeedsEventually(new Runnable() {
@Override
public void run() {
javax.security.auth.login.Configuration initialConfig = javax.security.auth.login.Configuration.getConfiguration();
AppConfigurationEntry[] realm = initialConfig.getAppConfigurationEntry(userPassRealm);
assertNotNull(realm);
}
});
}
}