blob: 7a9affd74740c53466a5183d42f78481eea9d1cb [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.qpid.server.management.plugin.auth;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertNull;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.ArgumentMatchers.anyString;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
import java.net.URISyntaxException;
import java.security.Principal;
import java.util.Collections;
import java.util.Set;
import javax.security.auth.Subject;
import javax.servlet.http.HttpServletRequest;
import org.junit.Before;
import org.junit.Test;
import org.apache.qpid.server.management.plugin.HttpManagementConfiguration;
import org.apache.qpid.server.model.port.HttpPort;
import org.apache.qpid.server.security.SubjectCreator;
import org.apache.qpid.server.security.auth.AuthenticatedPrincipal;
import org.apache.qpid.server.security.auth.AuthenticationResult;
import org.apache.qpid.server.security.auth.SubjectAuthenticationResult;
import org.apache.qpid.server.security.auth.UsernamePrincipal;
import org.apache.qpid.server.security.auth.manager.oauth2.OAuth2AuthenticationProvider;
import org.apache.qpid.test.utils.UnitTestBase;
public class OAuth2PreemptiveAuthenticatorTest extends UnitTestBase
{
private static final String TEST_AUTHORIZED_USER = "testAuthorizedUser";
private static final String TEST_UNAUTHORIZED_USER = "testUnauthorizedUser";
private static final String TEST_VALID_ACCESS_TOKEN = "testValidAccessToken";
private static final String TEST_INVALID_ACCESS_TOKEN = "testInvalidAccessToken";
private static final String TEST_UNAUTHORIZED_ACCESS_TOKEN = "testUnauthorizedAccessToken";
private OAuth2PreemptiveAuthenticator _authenticator;
private HttpManagementConfiguration _mockConfiguration;
private HttpPort _mockPort;
@Before
public void setUp() throws Exception
{
_mockPort = mock(HttpPort.class);
_mockConfiguration = mock(HttpManagementConfiguration.class);
OAuth2AuthenticationProvider<?> mockAuthProvider = createMockOAuth2AuthenticationProvider(_mockPort);
when(_mockConfiguration.getAuthenticationProvider(any(HttpServletRequest.class))).thenReturn(mockAuthProvider);
when(_mockConfiguration.getPort(any(HttpServletRequest.class))).thenReturn(_mockPort);
_authenticator = new OAuth2PreemptiveAuthenticator();
}
@Test
public void testAttemptAuthenticationSuccessful() throws Exception
{
HttpServletRequest mockRequest = mock(HttpServletRequest.class);
when(mockRequest.getServerName()).thenReturn("localhost");
when(mockRequest.getHeader("Authorization")).thenReturn("Bearer " + TEST_VALID_ACCESS_TOKEN);
Subject subject = _authenticator.attemptAuthentication(mockRequest, _mockConfiguration);
assertNotNull("Authenticator failed unexpectedly", subject);
final Set<Principal> principals = subject.getPrincipals();
assertEquals("Subject created with unexpected principal",
TEST_AUTHORIZED_USER,
principals.iterator().next().getName());
}
@Test
public void testAttemptAuthenticationUnauthorizedUser() throws Exception
{
HttpServletRequest mockRequest = mock(HttpServletRequest.class);
when(mockRequest.getServerName()).thenReturn("localhost");
when(mockRequest.getHeader("Authorization")).thenReturn("Bearer " + TEST_UNAUTHORIZED_ACCESS_TOKEN);
Subject subject = _authenticator.attemptAuthentication(mockRequest, _mockConfiguration);
assertNotNull("Authenticator failed unexpectedly", subject);
final Set<Principal> principals = subject.getPrincipals();
assertEquals("Subject created with unexpected principal",
TEST_UNAUTHORIZED_USER,
principals.iterator().next().getName());
}
@Test
public void testAttemptAuthenticationInvalidToken() throws Exception
{
HttpServletRequest mockRequest = mock(HttpServletRequest.class);
when(mockRequest.getServerName()).thenReturn("localhost");
when(mockRequest.getHeader("Authorization")).thenReturn("Bearer " + TEST_INVALID_ACCESS_TOKEN);
Subject subject = _authenticator.attemptAuthentication(mockRequest, _mockConfiguration);
assertNull("Authenticator did not fail with invalid access token", subject);
}
@Test
public void testAttemptAuthenticationMissingHeader() throws Exception
{
HttpServletRequest mockRequest = mock(HttpServletRequest.class);
Subject subject = _authenticator.attemptAuthentication(mockRequest, _mockConfiguration);
assertNull("Authenticator did not failed without authentication header", subject);
}
@Test
public void testAttemptAuthenticationMalformedHeader() throws Exception
{
HttpServletRequest mockRequest = mock(HttpServletRequest.class);
when(mockRequest.getHeader("Authorization")).thenReturn("malformed Bearer " + TEST_UNAUTHORIZED_ACCESS_TOKEN);
Subject subject = _authenticator.attemptAuthentication(mockRequest, _mockConfiguration);
assertNull("Authenticator did not failed with malformed authentication header", subject);
}
private OAuth2AuthenticationProvider<?> createMockOAuth2AuthenticationProvider(final HttpPort mockPort) throws URISyntaxException
{
OAuth2AuthenticationProvider authenticationProvider = mock(OAuth2AuthenticationProvider.class);
SubjectCreator mockSubjectCreator = mock(SubjectCreator.class);
SubjectAuthenticationResult mockSuccessfulSubjectAuthenticationResult = mock(SubjectAuthenticationResult.class);
SubjectAuthenticationResult mockUnauthorizedSubjectAuthenticationResult = mock(SubjectAuthenticationResult.class);
final Subject successfulSubject = new Subject(true,
Collections.singleton(new AuthenticatedPrincipal(new UsernamePrincipal(
TEST_AUTHORIZED_USER,
null))),
Collections.emptySet(),
Collections.emptySet());
final Subject unauthorizedSubject = new Subject(true,
Collections.singleton(new AuthenticatedPrincipal(new UsernamePrincipal(
TEST_UNAUTHORIZED_USER,
null))),
Collections.emptySet(),
Collections.emptySet());
AuthenticationResult mockSuccessfulAuthenticationResult = mock(AuthenticationResult.class);
AuthenticationResult mockUnauthorizedAuthenticationResult = mock(AuthenticationResult.class);
AuthenticationResult failedAuthenticationResult = new AuthenticationResult(AuthenticationResult.AuthenticationStatus.ERROR,
new Exception("authentication failed"));
SubjectAuthenticationResult failedSubjectAuthenticationResult = new SubjectAuthenticationResult(failedAuthenticationResult);
when(mockPort.getSubjectCreator(any(Boolean.class), anyString())).thenReturn(mockSubjectCreator);
when(authenticationProvider.authenticateViaAccessToken(TEST_VALID_ACCESS_TOKEN,
null)).thenReturn(mockSuccessfulAuthenticationResult);
when(authenticationProvider.authenticateViaAccessToken(TEST_INVALID_ACCESS_TOKEN,
null)).thenReturn(failedAuthenticationResult);
when(authenticationProvider.authenticateViaAccessToken(TEST_UNAUTHORIZED_ACCESS_TOKEN,
null)).thenReturn(mockUnauthorizedAuthenticationResult);
when(mockSuccessfulSubjectAuthenticationResult.getSubject()).thenReturn(successfulSubject);
when(mockUnauthorizedSubjectAuthenticationResult.getSubject()).thenReturn(unauthorizedSubject);
when(mockSubjectCreator.createResultWithGroups(mockSuccessfulAuthenticationResult)).thenReturn(mockSuccessfulSubjectAuthenticationResult);
when(mockSubjectCreator.createResultWithGroups(mockUnauthorizedAuthenticationResult)).thenReturn(mockUnauthorizedSubjectAuthenticationResult);
when(mockSubjectCreator.createResultWithGroups(failedAuthenticationResult)).thenReturn(failedSubjectAuthenticationResult);
return authenticationProvider;
}
}