blob: 5ca170ae80a42459f98ec391d2c83b18a3f36d63 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.sling.feature.cpconverter.accesscontrol;
import org.apache.sling.feature.*;
import org.apache.sling.feature.cpconverter.features.DefaultFeaturesManager;
import org.apache.sling.feature.cpconverter.features.FeaturesManager;
import org.apache.sling.feature.cpconverter.shared.RepoPath;
import org.apache.sling.feature.cpconverter.vltpkg.VaultPackageAssembler;
import org.apache.sling.repoinit.parser.RepoInitParser;
import org.apache.sling.repoinit.parser.RepoInitParsingException;
import org.apache.sling.repoinit.parser.impl.RepoInitParserService;
import org.apache.sling.repoinit.parser.operations.CreatePath;
import org.apache.sling.repoinit.parser.operations.Operation;
import org.jetbrains.annotations.NotNull;
import org.jetbrains.annotations.Nullable;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
import org.mockito.Mockito;
import java.io.File;
import java.io.IOException;
import java.io.StringReader;
import java.nio.file.Files;
import java.nio.file.Path;
import java.util.Collections;
import java.util.Comparator;
import java.util.Dictionary;
import java.util.HashMap;
import java.util.List;
import static org.apache.sling.feature.cpconverter.Util.normalize;
import static org.junit.Assert.assertArrayEquals;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;
import static org.mockito.ArgumentMatchers.anyString;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
public class EnforcePrincipalBasedTest {
private final SystemUser systemUser = new SystemUser("user1", new RepoPath("/home/users/system/intermediate/usernode"), new RepoPath("/home/users/system/intermediate"));
private final String relativeIntermediatePath = "system/intermediate";
private final String remappedIntermediatePath = "system/some/subtree/intermediate";
private AclManager aclManager;
private Path tempDir;
private VaultPackageAssembler assembler;
private FeaturesManager fm;
private Feature feature;
@Before
public void setUp() throws Exception {
aclManager = new DefaultAclManager("/home/users/system/some/subtree", "system");
tempDir = Files.createTempDirectory(getClass().getSimpleName());
assembler = mock(VaultPackageAssembler.class);
when(assembler.getEntry(anyString())).thenReturn(new File(System.getProperty("java.io.tmpdir")));
feature = new Feature(new ArtifactId("org.apache.sling", "org.apache.sling.cp2fm", "0.0.1", null, null));
fm = Mockito.spy(new DefaultFeaturesManager(tempDir.toFile()));
when(fm.getTargetFeature()).thenReturn(feature);
}
@After
public void tearDown() throws Exception {
aclManager = null;
// Delete the temp dir again
Files.walk(tempDir)
.sorted(Comparator.reverseOrder())
.map(Path::toFile)
.forEach(File::delete);
}
@Test(expected = IllegalStateException.class)
public void testInvalidSupportedPath() throws RepoInitParsingException {
AclManager acMgr = new DefaultAclManager("/an/invalid/supported/path", "invalid");
RepoPath accessControlledPath = new RepoPath("/content/feature");
getRepoInitExtension(acMgr, accessControlledPath, systemUser, false);
}
@Test(expected = IllegalArgumentException.class)
public void testPathMismatch() {
new DefaultAclManager("/an/invalid/supported/path", "system");
}
@Test
public void testResourceBasedConversionWithoutForce() throws RepoInitParsingException {
AclManager acMgr = new DefaultAclManager(null, "system") {
@Override
protected @Nullable CreatePath getCreatePath(@NotNull RepoPath path, @NotNull List<VaultPackageAssembler> packageAssemblers) {
CreatePath cp = new CreatePath(null);
cp.addSegment("content", null);
cp.addSegment("feature", "sling:Folder");
return cp;
}
};
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(acMgr, accessControlledPath, systemUser, false);
String expected = normalize(
"create service user user1 with path " + relativeIntermediatePath + "\n" +
"create path /content/feature(sling:Folder)\n" +
"set ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
RepoInitParser repoInitParser = new RepoInitParserService();
List<Operation> operations = repoInitParser.parse(new StringReader(actual));
assertFalse(operations.isEmpty());
}
@Test
public void testResourceBasedConversion() throws RepoInitParsingException {
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, false);
String expected = normalize(
"create service user user1 with forced path " + remappedIntermediatePath + "\n" +
"set principal ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
RepoInitParser repoInitParser = new RepoInitParserService();
List<Operation> operations = repoInitParser.parse(new StringReader(actual));
assertFalse(operations.isEmpty());
}
@Test
public void testPrincipalBased() throws RepoInitParsingException {
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, true);
String expected = normalize(
"create service user user1 with forced path " + remappedIntermediatePath + "\n" +
"set principal ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
RepoInitParser repoInitParser = new RepoInitParserService();
List<Operation> operations = repoInitParser.parse(new StringReader(actual));
assertFalse(operations.isEmpty());
}
@Test
public void testPrincipalBasedForUserHome() throws RepoInitParsingException {
RepoPath accessControlledPath = systemUser.getPath();
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, true);
String expected = normalize(
"create service user user1 with forced path " + remappedIntermediatePath + "\n" +
"set principal ACL for user1\n" +
" allow jcr:read on home(user1)\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
RepoInitParser repoInitParser = new RepoInitParserService();
List<Operation> operations = repoInitParser.parse(new StringReader(actual));
assertFalse(operations.isEmpty());
}
@Test
public void testSingleUserMapping() throws RepoInitParsingException {
aclManager.addMapping(new Mapping("org.apache.sling.testbundle:subservice="+systemUser.getId()));
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, false);
String expected = normalize(
"create service user user1 with path " +relativeIntermediatePath+ "\n" +
"create path /content/feature\n" +
"set ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
}
@Test
public void testPrincipalMapping() throws RepoInitParsingException {
aclManager.addMapping(new Mapping("org.apache.sling.testbundle:subservice=["+systemUser.getId()+"]"));
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, false);
String expected = normalize(
"create service user user1 with forced path " + remappedIntermediatePath + "\n" +
"set principal ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
}
@Test
public void testSingleUserMappingInSeed() throws IOException, RepoInitParsingException {
DefaultFeaturesManager fm = new DefaultFeaturesManager(true, 1, File.createTempFile("foo", "bar"), "*", "*", new HashMap<>(), aclManager);
Feature seed = new Feature(ArtifactId.fromMvnId("org:foo:2"));
Configuration foo = new Configuration("org.apache.sling.serviceusermapping.impl.ServiceUserMapperImpl~foo");
foo.getProperties().put("user.mapping", new String[]{"org.apache.sling.testbundle:subservice=user1"});
seed.getConfigurations().add(foo);
Extension extension = new Extension(ExtensionType.TEXT, Extension.EXTENSION_NAME_REPOINIT, ExtensionState.REQUIRED);
extension.setText("create service user user1");
seed.getExtensions().add(extension);
fm.addSeed(seed);
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, false);
String expected = normalize(
"create service user user1 with path " + relativeIntermediatePath + "\n" +
"create path /content/feature\n" +
"set ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
}
@Test
public void testPrincipalMappingInSeed() throws IOException, RepoInitParsingException {
DefaultFeaturesManager fm = new DefaultFeaturesManager(true, 1, File.createTempFile("foo", "bar"), "*", "*", new HashMap<>(), aclManager);
Feature seed = new Feature(ArtifactId.fromMvnId("org:foo:2"));
Configuration foo = new Configuration("org.apache.sling.serviceusermapping.impl.ServiceUserMapperImpl~foo");
foo.getProperties().put("user.mapping", new String[]{"org.apache.sling.testbundle:subservice=[user1]"});
seed.getConfigurations().add(foo);
Extension extension = new Extension(ExtensionType.TEXT, Extension.EXTENSION_NAME_REPOINIT, ExtensionState.REQUIRED);
extension.setText("create service user user1");
seed.getExtensions().add(extension);
fm.addSeed(seed);
RepoPath accessControlledPath = new RepoPath("/content/feature");
Extension repoinitExtension = getRepoInitExtension(aclManager, accessControlledPath, systemUser, false);
String expected = normalize(
"create service user user1 with forced path " + remappedIntermediatePath + "\n" +
"set principal ACL for user1\n" +
" allow jcr:read on /content/feature\n" +
"end\n");
String actual = repoinitExtension.getText();
assertEquals(expected, actual);
}
@Test
public void testWhitespaceUserMapping() throws IOException {
DefaultFeaturesManager fm = new DefaultFeaturesManager(true, 1, File.createTempFile("foo", "bar"), "*", "*", new HashMap<>(), aclManager);
Feature seed = new Feature(ArtifactId.fromMvnId("org:foo:2"));
// create a user.mapping configuratian with an empty-mapping
Configuration foo = new Configuration("org.apache.sling.serviceusermapping.impl.ServiceUserMapperImpl~foo");
Dictionary<String, Object> props = foo.getProperties();
props.put("user.mapping", new String[]{"serviceName:subservice=[user1]"," ","serviceName2:subservice2=[user2]"});
seed.getConfigurations().add(foo);
fm.init("groupId", "artifactId", "version1.0");
fm.addConfiguration("author", foo.getPid(), "/path", props);
// verify that invalid empty mapping has been stripped (without Exception)
String[] result = (String[]) foo.getProperties().get("user.mapping");
assertArrayEquals(new String[]{"serviceName:subservice=[user1]","serviceName2:subservice2=[user2]"}, result);
}
@Test
public void testEmptyUserMapping() throws IOException {
DefaultFeaturesManager fm = new DefaultFeaturesManager(true, 1, File.createTempFile("foo", "bar"), "*", "*", new HashMap<>(), aclManager);
// create a user.mapping configuratian with an empty-mapping
Configuration foo = new Configuration("org.apache.sling.serviceusermapping.impl.ServiceUserMapperImpl~foo");
Dictionary<String, Object> props = foo.getProperties();
props.put("user.mapping", new String[]{"serviceName:subservice=[user1]","","serviceName2:subservice2=[user2]"});
fm.init("groupId", "artifactId", "version1.0");
fm.addConfiguration("author", foo.getPid(), "/path", props);
// verify that invalid empty mapping has been stripped (without Exception)
String[] result = (String[]) foo.getProperties().get("user.mapping");
assertArrayEquals(new String[]{"serviceName:subservice=[user1]","serviceName2:subservice2=[user2]"}, result);
}
@NotNull
private Extension getRepoInitExtension(@NotNull AclManager aclManager, @NotNull RepoPath accessControlledPath, @NotNull SystemUser systemUser, boolean isPrincipalBased) throws RepoInitParsingException {
aclManager.addSystemUser(systemUser);
AccessControlEntry acl = new AccessControlEntry(true, Collections.singletonList("jcr:read"), accessControlledPath, isPrincipalBased);
aclManager.addAcl(systemUser.getId(), acl);
aclManager.addRepoinitExtension(Collections.singletonList(assembler), fm);
Extension repoinitExtension = feature.getExtensions().getByName(Extension.EXTENSION_NAME_REPOINIT);
assertNotNull(repoinitExtension);
return repoinitExtension;
}
}