blob: 33be1c79c6cb5995e58d85fb2682844441449c06 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.knox.gateway.service.knoxsso;
import static org.apache.knox.gateway.service.knoxsso.WebSSOResource.TOKEN_TTL_DEFAULT;
import static org.apache.knox.gateway.services.GatewayServices.GATEWAY_CLUSTER_ATTRIBUTE;
import static org.easymock.EasyMock.anyObject;
import static org.easymock.EasyMock.anyString;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;
import java.lang.reflect.Field;
import java.net.HttpCookie;
import java.net.URLEncoder;
import java.nio.charset.StandardCharsets;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.Principal;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
import java.util.Arrays;
import java.util.Collections;
import java.util.Date;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Set;
import javax.servlet.ServletContext;
import javax.servlet.ServletOutputStream;
import javax.servlet.http.Cookie;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpServletResponseWrapper;
import javax.ws.rs.WebApplicationException;
import javax.ws.rs.core.Response;
import org.apache.http.HttpStatus;
import org.apache.knox.gateway.audit.log4j.audit.Log4jAuditor;
import org.apache.knox.gateway.config.GatewayConfig;
import org.apache.knox.gateway.services.GatewayServices;
import org.apache.knox.gateway.services.ServiceType;
import org.apache.knox.gateway.services.security.AliasService;
import org.apache.knox.gateway.services.security.token.JWTokenAttributes;
import org.apache.knox.gateway.services.security.token.JWTokenAuthority;
import org.apache.knox.gateway.services.security.token.TokenServiceException;
import org.apache.knox.gateway.services.security.token.TokenUtils;
import org.apache.knox.gateway.services.security.token.impl.JWT;
import org.apache.knox.gateway.services.security.token.impl.JWTToken;
import org.apache.knox.gateway.session.control.ConcurrentSessionVerifier;
import org.apache.knox.gateway.util.RegExUtils;
import org.easymock.EasyMock;
import org.junit.Assert;
import org.junit.BeforeClass;
import org.junit.Test;
import com.nimbusds.jose.JOSEException;
import com.nimbusds.jose.JOSEObjectType;
import com.nimbusds.jose.JWSSigner;
import com.nimbusds.jose.JWSVerifier;
import com.nimbusds.jose.KeyLengthException;
import com.nimbusds.jose.crypto.MACSigner;
import com.nimbusds.jose.crypto.MACVerifier;
import com.nimbusds.jose.crypto.RSASSASigner;
import com.nimbusds.jose.crypto.RSASSAVerifier;
/**
* Some tests for the Knox SSO service.
*/
public class WebSSOResourceTest {
private static RSAPublicKey gatewayPublicKey;
private static RSAPrivateKey gatewayPrivateKey;
private ServletContext context;
private HttpServletRequest request;
private JWTokenAuthority authority;
private ConcurrentSessionVerifier verifier;
CookieResponseWrapper responseWrapper;
@BeforeClass
public static void setUpBeforeClass() throws Exception {
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
kpg.initialize(2048);
KeyPair keyPair = kpg.generateKeyPair();
gatewayPublicKey = (RSAPublicKey) keyPair.getPublic();
gatewayPrivateKey = (RSAPrivateKey) keyPair.getPrivate();
}
@Test
public void testWhitelistMatching() {
String whitelist = "^https?://.*example.com:8080/.*$;" +
"^https?://.*example.com/.*$;" +
"^https?://.*example2.com:\\d{0,9}/.*$;" +
"^https://.*example3.com:\\d{0,9}/.*$;" +
"^https?://localhost:\\d{0,9}/.*$;^/.*$";
// match on explicit hostname/domain and port
Assert.assertTrue("Failed to match whitelist", RegExUtils.checkWhitelist(whitelist,
"http://host.example.com:8080/"));
// match on non-required port
Assert.assertTrue("Failed to match whitelist", RegExUtils.checkWhitelist(whitelist,
"http://host.example.com/"));
// match on required but any port
Assert.assertTrue("Failed to match whitelist", RegExUtils.checkWhitelist(whitelist,
"http://host.example2.com:1234/"));
// fail on missing port
assertFalse("Matched whitelist inappropriately", RegExUtils.checkWhitelist(whitelist,
"http://host.example2.com/"));
// fail on invalid port
assertFalse("Matched whitelist inappropriately", RegExUtils.checkWhitelist(whitelist,
"http://host.example.com:8081/"));
// fail on alphanumeric port
assertFalse("Matched whitelist inappropriately", RegExUtils.checkWhitelist(whitelist,
"http://host.example.com:A080/"));
// fail on invalid hostname/domain
assertFalse("Matched whitelist inappropriately", RegExUtils.checkWhitelist(whitelist,
"http://host.example.net:8080/"));
// fail on required port
assertFalse("Matched whitelist inappropriately", RegExUtils.checkWhitelist(whitelist,
"http://host.example2.com/"));
// fail on required https
assertFalse("Matched whitelist inappropriately", RegExUtils.checkWhitelist(whitelist,
"http://host.example3.com/"));
// match on localhost and port
Assert.assertTrue("Failed to match whitelist", RegExUtils.checkWhitelist(whitelist,
"http://localhost:8080/"));
// match on local/relative path
Assert.assertTrue("Failed to match whitelist", RegExUtils.checkWhitelist(whitelist,
"/local/resource/"));
}
@Test
public void testWhitelistMatchingAgainstBaseURL() {
Assert.assertTrue("Failed to match whitelist",
RegExUtils.checkBaseUrlAgainstWhitelist("^https?:\\/\\/(.*KNOX_GW_DOMAIN)(?::[0-9]+)?(?:\\/.*)?$",
"https://KNOX_GW_DOMAIN"));
Assert.assertTrue("Failed to match whitelist",
RegExUtils.checkBaseUrlAgainstWhitelist("^https?:\\/\\/(.*KNOX_GW_DOMAIN)(?::[0-9]+)?(?:\\/.*)?$",
"https://KNOX_GW_DOMAIN?a=1&b=2"));
Assert.assertTrue("Failed to match whitelist",
RegExUtils.checkBaseUrlAgainstWhitelist("^https?:\\/\\/(.*KNOX_GW_DOMAIN)(?::[0-9]+)?(?:\\/.*)?$",
"https://KNOX_GW_DOMAIN?a=1&b=2"));
Assert.assertTrue("Failed to match whitelist",
RegExUtils.checkBaseUrlAgainstWhitelist("^https?:\\/\\/(.*KNOX_GW_DOMAIN)(?::[0-9]+)?(?:\\/.*)?$",
"https://KNOX_GW_DOMAIN/path1/path2/path/3?a=1&b=2"));
Assert.assertFalse("Inappropriately matched whitelist",
RegExUtils.checkBaseUrlAgainstWhitelist("^https?:\\/\\/(.*KNOX_GW_DOMAIN)(?::[0-9]+)?(?:\\/.*)?$",
"https://google.com?https://KNOX_GW_DOMAIN"));
Assert.assertFalse("Inappropriately matched whitelist",
RegExUtils.checkBaseUrlAgainstWhitelist("^https?:\\/\\/(.*KNOX_GW_DOMAIN)(?::[0-9]+)?(?:\\/.*)?$",
"https://google.com/https://KNOX_GW_DOMAIN"));
}
private void configureCommonExpectations(Map<String, String> contextExpectations) throws Exception {
configureCommonExpectations(contextExpectations, false, false, true);
}
private void configureCommonExpectations(Map<String, String> contextExpectations, boolean sslEnabled) throws Exception {
configureCommonExpectations(contextExpectations, false, sslEnabled, true);
}
private void configureCommonExpectations(Map<String, String> contextExpectations, boolean useHmac, boolean sslEnabled, boolean concurrentSessionVerifyResult) throws Exception {
context = EasyMock.createNiceMock(ServletContext.class);
contextExpectations.forEach((key, value) -> EasyMock.expect(context.getInitParameter(key)).andReturn(value).anyTimes());
request = EasyMock.createNiceMock(HttpServletRequest.class);
EasyMock.expect(request.getParameter("originalUrl")).andReturn("http://localhost:9080/service");
EasyMock.expect(request.getParameterMap()).andReturn(Collections.emptyMap());
EasyMock.expect(request.getServletContext()).andReturn(context).anyTimes();
Principal principal = EasyMock.createNiceMock(Principal.class);
EasyMock.expect(principal.getName()).andReturn("alice").anyTimes();
EasyMock.expect(request.getUserPrincipal()).andReturn(principal).anyTimes();
GatewayServices services = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(context.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(services).anyTimes();
EasyMock.expect(context.getAttribute(GatewayConfig.GATEWAY_CONFIG_ATTRIBUTE)).andReturn(expectGatewayConfig(sslEnabled)).anyTimes();
AliasService aliasService = EasyMock.createNiceMock(AliasService.class);
EasyMock.expect(services.getService(ServiceType.ALIAS_SERVICE)).andReturn(aliasService).anyTimes();
EasyMock.expect(aliasService.getPasswordFromAliasForGateway(TokenUtils.SIGNING_HMAC_SECRET_ALIAS)).andReturn(null).anyTimes();
authority = new TestJWTokenAuthority(gatewayPublicKey, gatewayPrivateKey, useHmac);
EasyMock.expect(services.getService(ServiceType.TOKEN_SERVICE)).andReturn(authority);
HttpServletResponse response = EasyMock.createNiceMock(HttpServletResponse.class);
ServletOutputStream outputStream = EasyMock.createNiceMock(ServletOutputStream.class);
responseWrapper = new CookieResponseWrapper(response, outputStream);
verifier = EasyMock.createNiceMock(ConcurrentSessionVerifier.class);
EasyMock.expect(verifier.verifySessionForUser(anyString())).andReturn(concurrentSessionVerifyResult).anyTimes();
EasyMock.expect(verifier.registerToken(anyString(), anyObject())).andReturn(concurrentSessionVerifyResult).anyTimes();
EasyMock.expect(services.getService(ServiceType.CONCURRENT_SESSION_VERIFIER)).andReturn(verifier).anyTimes();
EasyMock.replay(principal, services, context, request, verifier);
}
@Test
public void testGetToken() throws Exception {
configureCommonExpectations(Collections.emptyMap());
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
}
@Test
public void testAudiences() throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.token.audiences", "recipient1,recipient2"));
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
// Verify the audiences
List<String> audiences = Arrays.asList(parsedToken.getAudienceClaims());
assertEquals(2, audiences.size());
assertTrue(audiences.contains("recipient1"));
assertTrue(audiences.contains("recipient2"));
}
@Test
public void testAudiencesWhitespace() throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.token.audiences", " recipient1, recipient2 "));
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWTToken parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
// Verify the audiences
List<String> audiences = Arrays.asList(parsedToken.getAudienceClaims());
assertEquals(2, audiences.size());
assertTrue(audiences.contains("recipient1"));
assertTrue(audiences.contains("recipient2"));
}
@Test
public void testRSASignatureAlgorithm() throws Exception {
testSignatureAlgorithm(false);
}
@Test
public void testHMACSignatureAlgorithm() throws Exception {
testSignatureAlgorithm(true);
}
private void testSignatureAlgorithm(boolean useHMAC) throws Exception {
final String algorithm = useHMAC ? "HS256" : "RS512";
configureCommonExpectations(Collections.singletonMap("knoxsso.token.sigalg", algorithm), useHMAC, false, true);
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
assertTrue(parsedToken.getHeader().contains(algorithm));
}
@Test
public void testDefaultTTL() throws Exception {
configureCommonExpectations(Collections.emptyMap());
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
Date expiresDate = parsedToken.getExpiresDate();
Date now = new Date();
assertTrue(expiresDate.after(now));
assertTrue((expiresDate.getTime() - now.getTime()) < TOKEN_TTL_DEFAULT);
}
@Test
public void testCustomTTL() throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.token.ttl", "60000"));
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
Date expiresDate = parsedToken.getExpiresDate();
Date now = new Date();
assertTrue(expiresDate.after(now));
long diff = expiresDate.getTime() - now.getTime();
assertTrue(diff < 60000L && diff > 30000L);
}
@Test
public void testNegativeTTL() throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.token.ttl", "-60000"));
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
Date expiresDate = parsedToken.getExpiresDate();
Date now = new Date();
assertTrue(expiresDate.after(now));
assertTrue((expiresDate.getTime() - now.getTime()) < TOKEN_TTL_DEFAULT);
}
@Test
public void shouldMatchKnoxSsoSecureOnlyWithSslEnabledInCaseKnoxSsoSecureOnlyIsNotSet() throws Exception {
testSecureOnly(false, null, false);
testSecureOnly(true, null, true);
}
@Test
public void shouldUseKnoxSsoSecureOnlyInCaseKnoxSsoSecureOnlyIsSet() throws Exception {
testSecureOnly(false, Boolean.TRUE, true);
testSecureOnly(true, Boolean.FALSE, false);
}
private void testSecureOnly(boolean sslEnabled, Boolean knoxSsoCookieSecureOnly, boolean expectedknoxSsoSecureOnly) throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.cookie.secure.only", knoxSsoCookieSecureOnly == null ? null : knoxSsoCookieSecureOnly.toString()), sslEnabled);
final WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
final Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
assertEquals(expectedknoxSsoSecureOnly, cookie.getSecure());
}
@Test
public void testSameConfigurableSite() throws Exception {
testSameSite("None", "None"); // explicitly set to None
testSameSite(null, "Strict"); // default value
testSameSite("Lax", "Lax"); // explicitly set to Lax
}
private void testSameSite(String knoxSsoCookiesameSite, String expectedknoxSsoSecureOnly) throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.cookie.samesite", knoxSsoCookiesameSite == null ? null : knoxSsoCookiesameSite));
final WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
final Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
assertTrue(((CookieResponseWrapper)responseWrapper).headers.get("Set-Cookie").contains("SameSite=" + expectedknoxSsoSecureOnly));
}
@Test
public void testOverflowTTL() throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.token.ttl", String.valueOf(Long.MAX_VALUE)));
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertTrue(authority.verifyToken(parsedToken));
Date expiresDate = parsedToken.getExpiresDate();
Date now = new Date();
assertTrue(expiresDate.after(now));
assertTrue((expiresDate.getTime() - now.getTime()) < TOKEN_TTL_DEFAULT);
}
@Test
public void testWhitelistValidationWithEncodedOriginalURL() throws Exception {
ServletContext context = EasyMock.createNiceMock(ServletContext.class);
EasyMock.expect(context.getAttribute(GatewayConfig.GATEWAY_CONFIG_ATTRIBUTE)).andReturn(expectGatewayConfig()).anyTimes();
HttpServletRequest request = EasyMock.createNiceMock(HttpServletRequest.class);
EasyMock.expect(request.getParameter("originalUrl")).andReturn(
URLEncoder.encode("http://disallowedhost:9080/service", StandardCharsets.UTF_8.name()));
EasyMock.expect(request.getAttribute("targetServiceRole")).andReturn("KNOXSSO").anyTimes();
EasyMock.expect(request.getParameterMap()).andReturn(Collections.emptyMap());
EasyMock.expect(request.getServletContext()).andReturn(context).anyTimes();
EasyMock.expect(request.getServerName()).andReturn("localhost").anyTimes();
Principal principal = EasyMock.createNiceMock(Principal.class);
EasyMock.expect(principal.getName()).andReturn("alice").anyTimes();
EasyMock.expect(request.getUserPrincipal()).andReturn(principal).anyTimes();
GatewayServices services = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(context.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(services);
AliasService aliasService = EasyMock.createNiceMock(AliasService.class);
EasyMock.expect(services.getService(ServiceType.ALIAS_SERVICE)).andReturn(aliasService).anyTimes();
EasyMock.expect(aliasService.getPasswordFromAliasForGateway(TokenUtils.SIGNING_HMAC_SECRET_ALIAS)).andReturn(null).anyTimes();
JWTokenAuthority authority = new TestJWTokenAuthority(gatewayPublicKey, gatewayPrivateKey);
EasyMock.expect(services.getService(ServiceType.TOKEN_SERVICE)).andReturn(authority);
HttpServletResponse response = EasyMock.createNiceMock(HttpServletResponse.class);
ServletOutputStream outputStream = EasyMock.createNiceMock(ServletOutputStream.class);
CookieResponseWrapper responseWrapper = new CookieResponseWrapper(response, outputStream);
EasyMock.replay(principal, services, context, request);
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
try {
webSSOResponse.doGet();
} catch (WebApplicationException e) {
// Expected
int status = e.getResponse().getStatus();
assertEquals(HttpStatus.SC_BAD_REQUEST, status);
}
}
private GatewayConfig expectGatewayConfig() {
return expectGatewayConfig(true);
}
private GatewayConfig expectGatewayConfig(boolean sslEnabled) {
final GatewayConfig config = EasyMock.createNiceMock(GatewayConfig.class);
EasyMock.expect(config.getDispatchWhitelistServices()).andReturn(Collections.emptyList()).anyTimes();
EasyMock.expect(config.getDispatchWhitelist()).andReturn(null).anyTimes();
EasyMock.expect(config.isSSLEnabled()).andReturn(sslEnabled).anyTimes();
EasyMock.replay(config);
return config;
}
@Test
public void testTopologyDefinedWhitelist() throws Exception {
configureCommonExpectations(Collections.singletonMap("knoxsso.redirect.whitelist.regex", "^.*$"));
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
Field whitelistField = webSSOResponse.getClass().getDeclaredField("whitelist");
whitelistField.setAccessible(true);
String whitelistValue = (String) whitelistField.get(webSSOResponse);
assertNotNull(whitelistValue);
assertEquals("^.*$", whitelistValue);
}
@Test
public void testExpectedKnoxSSOParams() throws Exception {
final HashMap<String, String[]> paramMap = new HashMap<>();
paramMap.put("knoxtoken", new String[]{"eyJhbGciOiJSUzI1NiJ9.eyJzdWIiO"
+ "iJhZG1pbjEiLCJpc3MiOiJLTk9YU1NPIiwiZXhwIjoxNTMwODk1NjUw"
+ "fQ.Sodks_BTwaijMM5eg9rY77ro1H4um12TCqmwL5eWn4IMWBBXZQOV"
+ "D4JRWNKG_OtITKvkn9EhowOZO6Qtb6tvZLUPyW8Bf9gfgKAHJNLSYyc"
+ "yWSPzBOc2kcPmwdYXkOXtPu6KWZaQcD-WRw-89aORbgqZVRKX2Zyk2MLb0Rnig_0"});
final String originalUrl = "http://localhost:9080/service";
ServletContext context = EasyMock.createNiceMock(ServletContext.class);
EasyMock.expect(context.getInitParameter("knoxsso.expected.params")).andReturn("knoxtoken,originalUrl");
EasyMock.expect(context.getAttribute(GatewayConfig.GATEWAY_CONFIG_ATTRIBUTE)).andReturn(expectGatewayConfig()).anyTimes();
ServletContext contextNoParam = EasyMock.createNiceMock(ServletContext.class);
HttpServletRequest request = EasyMock.createNiceMock(HttpServletRequest.class);
EasyMock.expect(request.getParameter("originalUrl")).andReturn(originalUrl).anyTimes();
EasyMock.expect(request.getParameterMap()).andReturn(paramMap).anyTimes();
EasyMock.expect(request.getServletContext()).andReturn(context).anyTimes();
Principal principal = EasyMock.createNiceMock(Principal.class);
EasyMock.expect(principal.getName()).andReturn("tom").anyTimes();
EasyMock.expect(request.getUserPrincipal()).andReturn(principal).anyTimes();
GatewayServices services = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(context.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(services).anyTimes();
EasyMock.expect(contextNoParam.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(services).anyTimes();
AliasService aliasService = EasyMock.createNiceMock(AliasService.class);
EasyMock.expect(services.getService(ServiceType.ALIAS_SERVICE)).andReturn(aliasService).anyTimes();
EasyMock.expect(aliasService.getPasswordFromAliasForGateway(TokenUtils.SIGNING_HMAC_SECRET_ALIAS)).andReturn(null).anyTimes();
ConcurrentSessionVerifier concurrentSessionVerifier = EasyMock.createNiceMock(ConcurrentSessionVerifier.class);
EasyMock.expect(concurrentSessionVerifier.verifySessionForUser(anyString())).andReturn(true).anyTimes();
EasyMock.expect(concurrentSessionVerifier.registerToken(anyString(), anyObject())).andReturn(true).anyTimes();
EasyMock.expect(services.getService(ServiceType.CONCURRENT_SESSION_VERIFIER)).andReturn(concurrentSessionVerifier).anyTimes();
JWTokenAuthority authority = new TestJWTokenAuthority(gatewayPublicKey, gatewayPrivateKey);
EasyMock.expect(services.getService(ServiceType.TOKEN_SERVICE)).andReturn(authority).anyTimes();
HttpServletResponse response = EasyMock.createNiceMock(HttpServletResponse.class);
ServletOutputStream outputStream = EasyMock.createNiceMock(ServletOutputStream.class);
CookieResponseWrapper responseWrapper = new CookieResponseWrapper(response, outputStream);
EasyMock.replay(principal, services, context, contextNoParam, request, aliasService, concurrentSessionVerifier);
/* declare knoxtoken as part of knoxsso param so it is stripped from the final url */
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
Response resp = webSSOResponse.doGet();
assertEquals(originalUrl, resp.getLocation().toString());
/* declare knoxtoken as NOT part of knoxsso param so it is stripped from the final url */
webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = contextNoParam;
webSSOResponse.init();
resp = webSSOResponse.doGet();
assertEquals(originalUrl+"?&"+"knoxtoken="+"eyJhbGciOiJSUzI1NiJ9.eyJzdWIiO"
+ "iJhZG1pbjEiLCJpc3MiOiJLTk9YU1NPIiwiZXhwIjoxNTMwODk1NjUw"
+ "fQ.Sodks_BTwaijMM5eg9rY77ro1H4um12TCqmwL5eWn4IMWBBXZQOV"
+ "D4JRWNKG_OtITKvkn9EhowOZO6Qtb6tvZLUPyW8Bf9gfgKAHJNLSYyc"
+ "yWSPzBOc2kcPmwdYXkOXtPu6KWZaQcD-WRw-89aORbgqZVRKX2Zyk2MLb0Rnig_0",resp.getLocation().toString());
}
@Test
public void testRedactToken() {
final String token = "eyJhbGciOiJSUzI1NiJ9."
+ "eyJzdWIiOiJhZG1pbjEiLCJpc3MiOiJLTk9YU1NPIiwiZXhwIjoxNTMwNzkwMjkxfQ."
+ "BdWDAzGvXVvBH_TiEhAqowH-K24GfH8rgb8HJLromVpGwBTkbijIfOZWcvT3a5uZx6r"
+ "VEGAXqAKPEqrODBGTSV6l0uEJGeAfQj_7ulQD0YkXaPPJ_FYYntelSA814HzTU0X8UmY"
+ "Wo6awEaBwRC_xgNoZ_bMqnkjgFAfTtdHiiEQ";
final String originalUrl1 = "http://loclahost:8080/?&knoxtoken="+token;
final String originalUrl2 = "http://loclahost:8080/?&test=value&knoxtoken="+token;
final String originalUrl3 = "http://loclahost:8080/?&knoxtoken="+token+"&test=value";
final String fragment1 = "/gateway/knoxsso/api/v1/websso?knoxtoken="+token;
final String fragment2 = "/gateway/knoxsso/api/v1/websso?knoxtoken="+token+
"&originalUrl=http%3A%2F%2Fwww.local.com%3A8443%2F%3Fgateway%3Done%26knoxtoken";
final String fragment3 = "/gateway/knoxsso/api/v1/websso?test=value"+
"&originalUrl=http%3A%2F%2Fwww.local.com%3A8443%2F%3Fgateway%3Done%26knoxtoken";
assertEquals("http://loclahost:8080/?&knoxtoken=***************", Log4jAuditor
.maskTokenFromURL(originalUrl1));
assertEquals("http://loclahost:8080/?&test=value&knoxtoken=***************", Log4jAuditor.maskTokenFromURL(originalUrl2));
assertEquals("http://loclahost:8080/?&knoxtoken=***************&test=value", Log4jAuditor.maskTokenFromURL(originalUrl3));
assertEquals("/gateway/knoxsso/api/v1/websso?knoxtoken=***************", Log4jAuditor.maskTokenFromURL(fragment1));
assertEquals("/gateway/knoxsso/api/v1/websso?knoxtoken=***************"+
"&originalUrl=http://www.local.com:8443/?gateway=one&knoxtoken", Log4jAuditor.maskTokenFromURL(fragment2));
assertEquals("/gateway/knoxsso/api/v1/websso?test=value"+
"&originalUrl=http://www.local.com:8443/?gateway=one&knoxtoken", Log4jAuditor.maskTokenFromURL(fragment3));
}
@Test
public void testCustomSigningKey() throws Exception {
String topologyName = "testCustomSigningKeyTopology";
String customSigningKeyName = "testSigningKeyName";
String customSigningKeyAlias = "testSigningKeyAlias";
String customSigningKeyPassphraseAlias = "testSigningKeyPassphraseAlias";
String customSigningKeyPassphrase = "testSigningKeyPassphrase";
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
kpg.initialize(2048);
KeyPair keyPair = kpg.generateKeyPair();
RSAPublicKey customPublicKey = (RSAPublicKey) keyPair.getPublic();
RSAPrivateKey customPrivateKey = (RSAPrivateKey) keyPair.getPrivate();
ServletContext context = EasyMock.createNiceMock(ServletContext.class);
EasyMock.expect(context.getAttribute(GatewayConfig.GATEWAY_CONFIG_ATTRIBUTE)).andReturn(expectGatewayConfig()).anyTimes();
EasyMock.expect(context.getInitParameter("knoxsso.signingkey.keystore.name"))
.andReturn(customSigningKeyName);
EasyMock.expect(context.getInitParameter("knoxsso.signingkey.keystore.alias"))
.andReturn(customSigningKeyAlias);
EasyMock.expect(context.getInitParameter("knoxsso.signingkey.keystore.passphrase.alias"))
.andReturn(customSigningKeyPassphraseAlias);
EasyMock.expect(context.getAttribute(GATEWAY_CLUSTER_ATTRIBUTE)).andReturn(topologyName);
HttpServletRequest request = EasyMock.createNiceMock(HttpServletRequest.class);
EasyMock.expect(request.getParameter("originalUrl")).andReturn("http://localhost:9080/service");
EasyMock.expect(request.getParameterMap()).andReturn(Collections.emptyMap());
EasyMock.expect(request.getServletContext()).andReturn(context).anyTimes();
Principal principal = EasyMock.createNiceMock(Principal.class);
EasyMock.expect(principal.getName()).andReturn("alice").anyTimes();
EasyMock.expect(request.getUserPrincipal()).andReturn(principal).anyTimes();
GatewayServices services = EasyMock.createNiceMock(GatewayServices.class);
EasyMock.expect(context.getAttribute(GatewayServices.GATEWAY_SERVICES_ATTRIBUTE)).andReturn(services).anyTimes();
TestJWTokenAuthority authority = new TestJWTokenAuthority(gatewayPublicKey, gatewayPrivateKey);
authority.addCustomSigningKey(customSigningKeyName, customSigningKeyAlias, customSigningKeyPassphrase.toCharArray(),
customPrivateKey);
EasyMock.expect(services.getService(ServiceType.TOKEN_SERVICE)).andReturn(authority);
AliasService aliasService = EasyMock.createNiceMock(AliasService.class);
EasyMock.expect(aliasService.getPasswordFromAliasForCluster(topologyName, customSigningKeyPassphraseAlias))
.andReturn(customSigningKeyPassphrase.toCharArray());
EasyMock.expect(aliasService.getPasswordFromAliasForGateway(TokenUtils.SIGNING_HMAC_SECRET_ALIAS)).andReturn(null).anyTimes();
EasyMock.expect(services.getService(ServiceType.ALIAS_SERVICE)).andReturn(aliasService).anyTimes();
ConcurrentSessionVerifier concurrentSessionVerifier = EasyMock.createNiceMock(ConcurrentSessionVerifier.class);
EasyMock.expect(concurrentSessionVerifier.verifySessionForUser(anyString())).andReturn(true).anyTimes();
EasyMock.expect(concurrentSessionVerifier.registerToken(anyString(), anyObject())).andReturn(true).anyTimes();
EasyMock.expect(services.getService(ServiceType.CONCURRENT_SESSION_VERIFIER)).andReturn(concurrentSessionVerifier).anyTimes();
HttpServletResponse response = EasyMock.createNiceMock(HttpServletResponse.class);
ServletOutputStream outputStream = EasyMock.createNiceMock(ServletOutputStream.class);
CookieResponseWrapper responseWrapper = new CookieResponseWrapper(response, outputStream);
EasyMock.replay(principal, services, context, request, aliasService, concurrentSessionVerifier);
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
// Issue a token
webSSOResponse.doGet();
// Check the cookie
Cookie cookie = responseWrapper.getCookie("hadoop-jwt");
assertNotNull(cookie);
JWT parsedToken = new JWTToken(cookie.getValue());
assertEquals("alice", parsedToken.getSubject());
assertFalse(authority.verifyToken(parsedToken, gatewayPublicKey));
assertTrue(authority.verifyToken(parsedToken, customPublicKey));
}
@Test
public void testConcurrentSessionLimitHit() throws Exception {
configureCommonExpectations(Collections.emptyMap(), false, false, false);
WebSSOResource webSSOResponse = new WebSSOResource();
webSSOResponse.request = request;
webSSOResponse.response = responseWrapper;
webSSOResponse.context = context;
webSSOResponse.init();
Assert.assertThrows(WebApplicationException.class, webSSOResponse::doPost);
}
/**
* A wrapper for HttpServletResponseWrapper to store the cookies
*/
private static class CookieResponseWrapper extends HttpServletResponseWrapper {
private ServletOutputStream outputStream;
private Map<String, String> headers = new HashMap<>();
private Map<String, Cookie> cookies = new HashMap<>();
CookieResponseWrapper(HttpServletResponse response, ServletOutputStream outputStream) {
super(response);
this.outputStream = outputStream;
}
@Override
public ServletOutputStream getOutputStream() {
return outputStream;
}
@Override
public void setHeader(String name, String value) {
headers.put(name, value);
/* if we have Set-Cookie header create a cookie for it */
if ("Set-Cookie".equalsIgnoreCase(name)) {
final List<HttpCookie> clientCookies = HttpCookie.parse(value);
clientCookies.forEach(c -> {
Cookie cookie = new Cookie(c.getName(), c.getValue());
cookie.setSecure(c.getSecure());
if (c.getDomain() != null) {
cookie.setDomain(c.getDomain());
}
if (c.getPath() != null) {
cookie.setPath(c.getPath());
}
cookie.setHttpOnly(c.isHttpOnly());
cookie.setMaxAge(Math.toIntExact(c.getMaxAge()));
this.addCookie(cookie);
});
}
}
@Override
public void addCookie(Cookie cookie) {
super.addCookie(cookie);
cookies.put(cookie.getName(), cookie);
}
Cookie getCookie(String name) {
return cookies.get(name);
}
}
private static class TestJWTokenAuthority implements JWTokenAuthority {
private static final String HMAC_SECRET = "6w9z$B&E)H@McQfTjWnZr4u7x!A%D*F-";
private RSAPublicKey publicKey;
private RSAPrivateKey privateKey;
private boolean useHMAC;
private Map<String, Map<String,Object>> customSigningKeys = new HashMap<>();
TestJWTokenAuthority(RSAPublicKey publicKey, RSAPrivateKey privateKey) {
this(publicKey, privateKey, false);
}
TestJWTokenAuthority(RSAPublicKey publicKey, RSAPrivateKey privateKey, boolean useHMAC) {
this.publicKey = publicKey;
this.privateKey = privateKey;
this.useHMAC = useHMAC;
}
void addCustomSigningKey(String signingKeystoreName, String signingKeystoreAlias,
char[] signingKeystorePassphrase, RSAPrivateKey customPrivateKey) {
Map<String, Object> signingKey = new HashMap<>();
signingKey.put("alias", signingKeystoreAlias);
signingKey.put("passphrase", signingKeystorePassphrase);
signingKey.put("privateKey", customPrivateKey);
customSigningKeys.put(signingKeystoreName, signingKey);
}
@Override
public boolean verifyToken(JWT token) throws TokenServiceException {
return verifyToken(token, this.publicKey);
}
@Override
public JWT issueToken(JWTokenAttributes jwtAttributes)
throws TokenServiceException {
JWT token = new JWTToken(jwtAttributes);
try {
JWSSigner signer = useHMAC ? new MACSigner(HMAC_SECRET)
: new RSASSASigner(getPrivateKey(jwtAttributes.getSigningKeystoreName(), jwtAttributes.getSigningKeystoreAlias(), jwtAttributes.getSigningKeystorePassphrase()));
token.sign(signer);
} catch (KeyLengthException e) {
throw new TokenServiceException(e);
}
return token;
}
private RSAPrivateKey getPrivateKey(String signingKeystoreName, String signingKeystoreAlias,
char[] signingKeystorePassphrase) throws TokenServiceException {
if(signingKeystoreName != null) {
Map<String, Object> signingKey = customSigningKeys.get(signingKeystoreName);
if(signingKey == null || !signingKey.get("alias").equals(signingKeystoreAlias) ||
!Arrays.equals((char[])signingKey.get("passphrase"), signingKeystorePassphrase)) {
throw new TokenServiceException("Invalid alias or passphrase");
}
return (RSAPrivateKey)signingKey.get("privateKey");
}
return privateKey;
}
@Override
public boolean verifyToken(JWT token, RSAPublicKey publicKey) throws TokenServiceException {
try {
JWSVerifier verifier = useHMAC ? new MACVerifier(HMAC_SECRET) : new RSASSAVerifier(publicKey);
return token.verify(verifier);
} catch(JOSEException e) {
throw new TokenServiceException(e);
}
}
@Override
public boolean verifyToken(JWT token, String jwksurl, String algorithm, Set<JOSEObjectType> allowedJwsTypes) {
return false;
}
}
}