blob: 779033d321dd4eb0c4c002860019b6cb62a0e32a [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.jackrabbit.oak.spi.security.authorization.principalbased.impl;
import org.apache.jackrabbit.guava.common.collect.Sets;
import org.apache.jackrabbit.api.security.authorization.PrivilegeManager;
import org.apache.jackrabbit.oak.api.Tree;
import org.apache.jackrabbit.oak.namepath.NamePathMapper;
import org.apache.jackrabbit.oak.spi.security.authorization.principalbased.Filter;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.AbstractRestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.authorization.restriction.RestrictionProvider;
import org.apache.jackrabbit.oak.spi.security.principal.PrincipalImpl;
import org.apache.jackrabbit.oak.spi.xml.ImportBehavior;
import org.jetbrains.annotations.NotNull;
import org.jetbrains.annotations.Nullable;
import org.junit.Test;
import org.mockito.stubbing.Answer;
import javax.jcr.RepositoryException;
import javax.jcr.security.AccessControlException;
import javax.jcr.security.Privilege;
import java.security.Principal;
import java.util.Collections;
import java.util.Set;
import static org.junit.Assert.assertArrayEquals;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertSame;
import static org.junit.Assert.assertTrue;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.verifyNoInteractions;
import static org.mockito.Mockito.verifyNoMoreInteractions;
import static org.mockito.Mockito.when;
public class UtilsTest implements Constants {
private static final Principal PRINCIPAL = new PrincipalImpl("name");
private static final String INVALID_PRIVILEGE_NAME = "invalid";
private static Tree mockTree(boolean exists, @NotNull String name, @Nullable String type) {
return MockUtility.mockTree(name, type, exists);
}
private static Filter mockFilter(boolean canHandle) {
Filter filter = mock(Filter.class);
when(filter.canHandle(any(Set.class))).thenReturn(canHandle);
return filter;
}
private static PrivilegeManager mockPrivilegeManager() throws RepositoryException {
PrivilegeManager privilegeManager = mock(PrivilegeManager.class);
when(privilegeManager.getPrivilege(any(String.class))).then((Answer<Privilege>) invocationOnMock -> {
Privilege p = mock(Privilege.class);
when(p.getName()).thenReturn(invocationOnMock.getArgument(0));
return p;
});
when(privilegeManager.getPrivilege(INVALID_PRIVILEGE_NAME)).thenThrow(new AccessControlException());
return privilegeManager;
}
@Test
public void testIsPrincipalPolicyTreeNotExists() {
assertFalse(Utils.isPrincipalPolicyTree(mockTree(false, NT_REP_PRINCIPAL_POLICY, REP_PRINCIPAL_POLICY)));
}
@Test
public void testIsPrincipalPolicyTreeWrongName() {
assertFalse(Utils.isPrincipalPolicyTree(mockTree(true, REP_RESTRICTIONS, NT_REP_PRINCIPAL_POLICY)));
}
@Test
public void testIsPrincipalPolicyTreeWrongType() {
assertFalse(Utils.isPrincipalPolicyTree(mockTree(true, REP_PRINCIPAL_POLICY, NT_REP_RESTRICTIONS)));
}
@Test
public void testIsPrincipalPolicyTreeMissingType() {
assertFalse(Utils.isPrincipalPolicyTree(mockTree(true, REP_PRINCIPAL_POLICY, null)));
}
@Test
public void testIsPrincipalPolicyTreeWrongNameType() {
assertFalse(Utils.isPrincipalPolicyTree(mockTree(true, REP_RESTRICTIONS, NT_REP_RESTRICTIONS)));
}
@Test
public void testIsPrincipalPolicyTree() {
assertTrue(Utils.isPrincipalPolicyTree(mockTree(true, REP_PRINCIPAL_POLICY, NT_REP_PRINCIPAL_POLICY))); }
@Test(expected = AccessControlException.class)
public void testCanHandleNullName() throws Exception {
Utils.canHandle(mock(Principal.class), mockFilter(true), ImportBehavior.ABORT);
}
@Test(expected = AccessControlException.class)
public void testCanHandleEmptyName() throws Exception {
Utils.canHandle(new PrincipalImpl(""), mockFilter(true), ImportBehavior.ABORT);
}
@Test(expected = AccessControlException.class)
public void testCanHandleUnsupportedPrincipalAbort() throws Exception {
Utils.canHandle(PRINCIPAL, mockFilter(false), ImportBehavior.ABORT);
}
@Test
public void testCanHandleUnsupportedPrincipalIgnore() throws Exception {
assertFalse(Utils.canHandle(PRINCIPAL, mockFilter(false), ImportBehavior.IGNORE));
}
@Test
public void testCanHandleUnsupportedPrincipalBestEffort() throws Exception {
assertFalse(Utils.canHandle(PRINCIPAL, mockFilter(false), ImportBehavior.BESTEFFORT));
}
@Test(expected = IllegalArgumentException.class)
public void testCanHandleIllegalImportBehavior() throws Exception {
assertFalse(Utils.canHandle(PRINCIPAL, mockFilter(true), -1));
}
@Test
public void testCanHandle() throws Exception {
for (int behavior : new int[] {ImportBehavior.ABORT, ImportBehavior.BESTEFFORT, ImportBehavior.IGNORE}) {
assertTrue(Utils.canHandle(PRINCIPAL, mockFilter(true), behavior));
}
}
@Test
public void testPrivilegesFromNamesEmptyNames() {
assertArrayEquals(new Privilege[0], Utils.privilegesFromOakNames(Collections.emptySet(), mock(PrivilegeManager.class), NamePathMapper.DEFAULT));
}
@Test
public void testPrivilegesFromNamesInvalidName() throws Exception {
assertArrayEquals(new Privilege[0], Utils.privilegesFromOakNames(Collections.singleton(INVALID_PRIVILEGE_NAME), mockPrivilegeManager(), NamePathMapper.DEFAULT));
}
@Test
public void testPrivilegesFromNamesRemapped() throws Exception {
NamePathMapper mapper = mock(NamePathMapper.class);
when(mapper.getJcrName(any())).thenReturn("c");
Privilege[] privs = Utils.privilegesFromOakNames(Sets.newHashSet("a", "b"), mockPrivilegeManager(), mapper);
assertEquals(2, privs.length);
for (Privilege p : privs) {
assertEquals("c", p.getName());
}
}
@Test
public void testReadRestrictionsNoRestrictionTree() {
Tree entryTree = mock(Tree.class);
RestrictionProvider rp = mock(AbstractRestrictionProvider.class);
when(entryTree.hasChild(REP_RESTRICTIONS)).thenReturn(false);
assertSame(Collections.emptySet(), Utils.readRestrictions(rp, "/test/path", entryTree));
verifyNoInteractions(rp);
}
@Test
public void testReadRestrictions() {
Tree restTree = mock(Tree.class);
Tree entryTree = mock(Tree.class);
RestrictionProvider rp = mock(AbstractRestrictionProvider.class);
when(entryTree.hasChild(REP_RESTRICTIONS)).thenReturn(true);
when(entryTree.getChild(REP_RESTRICTIONS)).thenReturn(restTree);
when(restTree.getProperties()).thenReturn(Collections.emptyList());
Utils.readRestrictions(rp, "/test/path", entryTree);
verify(rp).readRestrictions("/test/path", entryTree);
verifyNoMoreInteractions(rp);
}
}