blob: 436969fb8849754bdd38c2f8d79d6cbb52fd90da [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.knox.gateway.securequery;
import org.apache.knox.gateway.filter.rewrite.api.UrlRewriteEnvironment;
import org.apache.knox.gateway.filter.rewrite.spi.UrlRewriteContext;
import org.apache.knox.gateway.services.ServiceType;
import org.apache.knox.gateway.services.GatewayServices;
import org.apache.knox.gateway.services.security.AliasService;
import org.apache.knox.gateway.services.security.impl.DefaultCryptoService;
import org.apache.knox.gateway.util.urltemplate.Parser;
import org.apache.knox.gateway.util.urltemplate.Template;
import org.easymock.Capture;
import org.easymock.EasyMock;
import org.junit.Test;
import java.nio.charset.StandardCharsets;
import java.util.Base64;
import java.util.Collections;
import static org.hamcrest.CoreMatchers.is;
import static org.hamcrest.MatcherAssert.assertThat;
public class SecureQueryEncodeProcessorTest {
@Test
public void testSimpleQueryEncoding() throws Exception {
AliasService as = EasyMock.createNiceMock( AliasService.class );
String secret = "sdkjfhsdkjfhsdfs";
EasyMock.expect( as.getPasswordFromAliasForCluster("test-cluster-name", "encryptQueryString")).andReturn( secret.toCharArray() ).anyTimes();
DefaultCryptoService cryptoService = new DefaultCryptoService();
cryptoService.setAliasService(as);
GatewayServices gatewayServices = EasyMock.createNiceMock( GatewayServices.class );
EasyMock.expect( gatewayServices.getService( ServiceType.CRYPTO_SERVICE ) ).andReturn( cryptoService );
UrlRewriteEnvironment environment = EasyMock.createNiceMock( UrlRewriteEnvironment.class );
EasyMock.expect( environment.getAttribute( GatewayServices.GATEWAY_SERVICES_ATTRIBUTE ) ).andReturn( gatewayServices ).anyTimes();
EasyMock.expect( environment.getAttribute( GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE ) ).andReturn(Collections.singletonList("test-cluster-name")).anyTimes();
Template inTemplate = Parser.parseLiteral( "http://host:0/root/path?query" );
UrlRewriteContext context = EasyMock.createNiceMock( UrlRewriteContext.class );
EasyMock.expect( context.getCurrentUrl() ).andReturn( inTemplate );
Capture<Template> outTemplate = Capture.newInstance();
context.setCurrentUrl( EasyMock.capture( outTemplate ) );
EasyMock.replay( environment, context );
SecureQueryEncodeDescriptor descriptor = new SecureQueryEncodeDescriptor();
SecureQueryEncodeProcessor processor = new SecureQueryEncodeProcessor();
processor.initialize( environment, descriptor );
processor.process( context );
String encQuery = Base64.getEncoder().encodeToString( "query".getBytes(StandardCharsets.UTF_8) );
encQuery = encQuery.replaceAll( "\\=", "" );
String outExpect = "http://host:0/root/path?_=" + encQuery;
String outActual = outTemplate.getValue().toString();
assertThat( outActual, is( outExpect ) );
}
}