blob: a75a401ddc1dc38b775f5172043862e79f2c1e34 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.usergrid.rest.management.users;
import java.io.IOException;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import javax.mail.Message;
import javax.mail.MessagingException;
import javax.mail.internet.MimeMultipart;
import javax.ws.rs.core.MediaType;
import org.codehaus.jackson.JsonNode;
import org.junit.Ignore;
import org.junit.Rule;
import org.junit.Test;
import org.jvnet.mock_javamail.Mailbox;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.apache.usergrid.management.AccountCreationProps;
import org.apache.usergrid.management.ActivationState;
import org.apache.usergrid.management.MockImapClient;
import org.apache.usergrid.management.OrganizationInfo;
import org.apache.usergrid.management.OrganizationOwnerInfo;
import org.apache.usergrid.management.UserInfo;
import org.apache.usergrid.rest.AbstractRestIT;
import org.apache.usergrid.rest.TestContextSetup;
import org.apache.usergrid.rest.management.organizations.OrganizationsResource;
import org.apache.usergrid.rest.test.resource.mgmt.Organization;
import org.apache.usergrid.rest.test.security.TestAdminUser;
import org.apache.usergrid.rest.test.security.TestUser;
import org.apache.usergrid.security.AuthPrincipalInfo;
import org.apache.usergrid.security.AuthPrincipalType;
import org.apache.usergrid.utils.UUIDUtils;
import org.apache.commons.lang.StringUtils;
import com.sun.jersey.api.client.UniformInterfaceException;
import com.sun.jersey.api.representation.Form;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertNull;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;
import static org.apache.usergrid.management.AccountCreationProps.PROPERTIES_ADMIN_USERS_REQUIRE_CONFIRMATION;
import static org.apache.usergrid.management.AccountCreationProps.PROPERTIES_NOTIFY_ADMIN_OF_ACTIVATION;
import static org.apache.usergrid.management.AccountCreationProps.PROPERTIES_SYSADMIN_APPROVES_ADMIN_USERS;
import static org.apache.usergrid.management.AccountCreationProps.PROPERTIES_SYSADMIN_APPROVES_ORGANIZATIONS;
import static org.apache.usergrid.management.AccountCreationProps.PROPERTIES_SYSADMIN_EMAIL;
import static org.apache.usergrid.utils.MapUtils.hashMap;
/** @author zznate */
public class MUUserResourceIT extends AbstractRestIT {
private Logger LOG = LoggerFactory.getLogger( MUUserResourceIT.class );
@Rule
public TestContextSetup context = new TestContextSetup( this );
/**
* Tests mixed case creation of an administrative user, and failures to authenticate against management interfaces
* when case is different from user creation case.
* <p/>
* From USERGRID-2075
*/
@Test
// @Ignore( "aok - check this please" )
public void testCaseSensitivityAdminUser() throws Exception {
LOG.info( "Starting testCaseSensitivityAdminUser()" );
UserInfo mixcaseUser = setup.getMgmtSvc()
.createAdminUser( "AKarasulu", "Alex Karasulu", "AKarasulu@Apache.org", "test",
true, false );
AuthPrincipalInfo adminPrincipal =
new AuthPrincipalInfo( AuthPrincipalType.ADMIN_USER, mixcaseUser.getUuid(), UUIDUtils.newTimeUUID() );
OrganizationInfo organizationInfo = setup.getMgmtSvc().createOrganization( "MixedCaseOrg", mixcaseUser, true );
String tokenStr = mgmtToken( "akarasulu@apache.org", "test" );
// Should succeed even when we use all lowercase
JsonNode node =
resource().path( "/management/users/akarasulu@apache.org" ).queryParam( "access_token", tokenStr )
.accept( MediaType.APPLICATION_JSON ).type( MediaType.APPLICATION_JSON_TYPE )
.get( JsonNode.class );
logNode( node );
}
@Test
public void testUnconfirmedAdminLogin() throws Exception {
// Setup properties to require confirmation of users
// -------------------------------------------
Map<String, String> originalProperties = getRemoteTestProperties();
try {
setTestProperty( PROPERTIES_SYSADMIN_APPROVES_ADMIN_USERS, "false" );
setTestProperty( PROPERTIES_SYSADMIN_APPROVES_ORGANIZATIONS, "false" );
setTestProperty( PROPERTIES_ADMIN_USERS_REQUIRE_CONFIRMATION, "true" );
setTestProperty( PROPERTIES_SYSADMIN_EMAIL, "sysadmin-1@mockserver.com" );
setTestProperty( PROPERTIES_NOTIFY_ADMIN_OF_ACTIVATION, "true" );
assertTrue( setup.getMgmtSvc().newAdminUsersRequireConfirmation() );
assertFalse( setup.getMgmtSvc().newAdminUsersNeedSysAdminApproval() );
// Setup org/app/user variables and create them
// -------------------------------------------
String orgName = this.getClass().getName();
String appName = "testUnconfirmedAdminLogin";
String userName = "TestUser";
String email = "test-user-46@mockserver.com";
String passwd = "testpassword";
OrganizationOwnerInfo orgOwner;
orgOwner = setup.getMgmtSvc()
.createOwnerAndOrganization( orgName, userName, appName, email, passwd, false, false );
assertNotNull( orgOwner );
String returnedUsername = orgOwner.getOwner().getUsername();
assertEquals( userName, returnedUsername );
UserInfo adminUserInfo = setup.getMgmtSvc().getAdminUserByUsername( userName );
assertNotNull( adminUserInfo );
assertFalse( "adminUser should not be activated yet", adminUserInfo.isActivated() );
assertFalse( "adminUser should not be confirmed yet", adminUserInfo.isConfirmed() );
// Attempt to authenticate but this should fail
// -------------------------------------------
JsonNode node;
try {
node = resource().path( "/management/token" ).queryParam( "grant_type", "password" )
.queryParam( "username", userName ).queryParam( "password", passwd )
.accept( MediaType.APPLICATION_JSON ).get( JsonNode.class );
fail( "Unconfirmed users should not be authorized to authenticate." );
}
catch ( UniformInterfaceException e ) {
node = e.getResponse().getEntity( JsonNode.class );
assertEquals( "invalid_grant", node.get( "error" ).getTextValue() );
assertEquals( "User must be confirmed to authenticate",
node.get( "error_description" ).getTextValue() );
LOG.info( "Unconfirmed user was not authorized to authenticate!" );
}
// Confirm the getting account confirmation email for unconfirmed user
// -------------------------------------------
List<Message> inbox = Mailbox.get( email );
assertFalse( inbox.isEmpty() );
MockImapClient client = new MockImapClient( "mockserver.com", "test-user-46", "somepassword" );
client.processMail();
Message confirmation = inbox.get( 0 );
assertEquals( "User Account Confirmation: " + email, confirmation.getSubject() );
// Extract the token to confirm the user
// -------------------------------------------
String token = getTokenFromMessage( confirmation );
LOG.info( token );
ActivationState state =
setup.getMgmtSvc().handleConfirmationTokenForAdminUser( orgOwner.getOwner().getUuid(), token );
assertEquals( ActivationState.ACTIVATED, state );
Message activation = inbox.get( 1 );
assertEquals( "User Account Activated", activation.getSubject() );
client = new MockImapClient( "mockserver.com", "test-user-46", "somepassword" );
client.processMail();
// Attempt to authenticate again but this time should pass
// -------------------------------------------
node = resource().path( "/management/token" ).queryParam( "grant_type", "password" )
.queryParam( "username", userName ).queryParam( "password", passwd )
.accept( MediaType.APPLICATION_JSON ).get( JsonNode.class );
assertNotNull( node );
LOG.info( "Authentication succeeded after confirmation: {}.", node.toString() );
}
finally {
setTestProperties( originalProperties );
}
}
@Test
public void testSystemAdminNeedsNoConfirmation() throws Exception {
Map<String, String> originalProperties = getRemoteTestProperties();
try {
// require comfirmation of new admin users
setTestProperty( PROPERTIES_SYSADMIN_APPROVES_ADMIN_USERS, "false" );
setTestProperty( PROPERTIES_SYSADMIN_APPROVES_ORGANIZATIONS, "false" );
setTestProperty( PROPERTIES_ADMIN_USERS_REQUIRE_CONFIRMATION, "true" );
assertTrue( setup.getMgmtSvc().newAdminUsersRequireConfirmation() );
assertFalse( setup.getMgmtSvc().newAdminUsersNeedSysAdminApproval() );
String sysadminUsername = ( String ) setup.getMgmtSvc().getProperties()
.get( AccountCreationProps.PROPERTIES_SYSADMIN_LOGIN_EMAIL );
String sysadminPassword = ( String ) setup.getMgmtSvc().getProperties()
.get( AccountCreationProps.PROPERTIES_SYSADMIN_LOGIN_PASSWORD );
// sysadmin login should suceed despite confirmation setting
JsonNode node;
try {
node = resource().path( "/management/token" ).queryParam( "grant_type", "password" )
.queryParam( "username", sysadminUsername ).queryParam( "password", sysadminPassword )
.accept( MediaType.APPLICATION_JSON ).get( JsonNode.class );
}
catch ( UniformInterfaceException e ) {
fail( "Sysadmin should need no confirmation" );
}
}
finally {
setTestProperties( originalProperties );
}
}
@Test
public void testTestUserNeedsNoConfirmation() throws Exception {
Map<String, String> originalProperties = getRemoteTestProperties();
try {
// require comfirmation of new admin users
setTestProperty( PROPERTIES_SYSADMIN_APPROVES_ADMIN_USERS, "false" );
setTestProperty( PROPERTIES_SYSADMIN_APPROVES_ORGANIZATIONS, "false" );
setTestProperty( PROPERTIES_ADMIN_USERS_REQUIRE_CONFIRMATION, "true" );
assertTrue( setup.getMgmtSvc().newAdminUsersRequireConfirmation() );
assertFalse( setup.getMgmtSvc().newAdminUsersNeedSysAdminApproval() );
String testUserUsername = ( String ) setup.getMgmtSvc().getProperties()
.get( AccountCreationProps
.PROPERTIES_TEST_ACCOUNT_ADMIN_USER_EMAIL );
String testUserPassword = ( String ) setup.getMgmtSvc().getProperties()
.get( AccountCreationProps
.PROPERTIES_TEST_ACCOUNT_ADMIN_USER_PASSWORD );
// test user login should suceed despite confirmation setting
JsonNode node;
try {
node = resource().path( "/management/token" ).queryParam( "grant_type", "password" )
.queryParam( "username", testUserUsername ).queryParam( "password", testUserPassword )
.accept( MediaType.APPLICATION_JSON ).get( JsonNode.class );
}
catch ( UniformInterfaceException e ) {
fail( "Test User should need no confirmation" );
}
}
finally {
setTestProperties( originalProperties );
}
}
private String getTokenFromMessage( Message msg ) throws IOException, MessagingException {
String body = ( ( MimeMultipart ) msg.getContent() ).getBodyPart( 0 ).getContent().toString();
return StringUtils.substringAfterLast( body, "token=" );
}
@Test
public void updateManagementUser() throws Exception {
Map<String, String> payload =
hashMap( "email", "uort-user-1@apigee.com" ).map( "username", "uort-user-1" ).map( "name", "Test User" )
.map( "password", "password" ).map( "organization", "uort-org" ).map( "company", "Apigee" );
JsonNode node = resource().path( "/management/organizations" ).accept( MediaType.APPLICATION_JSON )
.type( MediaType.APPLICATION_JSON_TYPE ).post( JsonNode.class, payload );
logNode( node );
String userId = node.get( "data" ).get( "owner" ).get( "uuid" ).asText();
assertEquals( "Apigee", node.get( "data" ).get( "owner" ).get( "properties" ).get( "company" ).asText() );
String token = mgmtToken( "uort-user-1@apigee.com", "password" );
node = resource().path( String.format( "/management/users/%s", userId ) ).queryParam( "access_token", token )
.type( MediaType.APPLICATION_JSON_TYPE ).get( JsonNode.class );
logNode( node );
payload = hashMap( "company", "Usergrid" );
LOG.info( "sending PUT for company update" );
node = resource().path( String.format( "/management/users/%s", userId ) ).queryParam( "access_token", token )
.type( MediaType.APPLICATION_JSON_TYPE ).put( JsonNode.class, payload );
assertNotNull( node );
node = resource().path( String.format( "/management/users/%s", userId ) ).queryParam( "access_token", token )
.type( MediaType.APPLICATION_JSON_TYPE ).get( JsonNode.class );
assertEquals( "Usergrid", node.get( "data" ).get( "properties" ).get( "company" ).asText() );
logNode( node );
}
@Test
public void getUser() throws Exception {
// set an organization property
HashMap<String, Object> payload = new HashMap<String, Object>();
Map<String, Object> properties = new HashMap<String, Object>();
properties.put( "securityLevel", 5 );
payload.put( OrganizationsResource.ORGANIZATION_PROPERTIES, properties );
/**
* Get the original org admin before we overwrite the property as a super user
*/
final TestUser orgAdmin = context.getActiveUser();
final String orgName = context.getOrgName();
final String superAdminToken = superAdminToken();
TestAdminUser superAdmin = new TestAdminUser( "super", "super", "superuser@usergrid.com" );
superAdmin.setToken( superAdminToken );
Organization org = context.withUser( superAdmin ).management().orgs().organization( orgName );
org.put( payload );
//now get the org
JsonNode node = context.withUser( orgAdmin ).management().users().user( orgAdmin.getUser() ).get();
logNode( node );
JsonNode applications = node.findValue( "applications" );
assertNotNull( applications );
JsonNode users = node.findValue( "users" );
assertNotNull( users );
JsonNode securityLevel = node.findValue( "securityLevel" );
assertNotNull( securityLevel );
assertEquals( 5L, securityLevel.asLong() );
}
@Test
public void getUserShallow() throws Exception {
// set an organization property
HashMap<String, Object> payload = new HashMap<String, Object>();
Map<String, Object> properties = new HashMap<String, Object>();
properties.put( "securityLevel", 5 );
payload.put( OrganizationsResource.ORGANIZATION_PROPERTIES, properties );
/**
* Get the original org admin before we overwrite the property as a super user
*/
final TestUser orgAdmin = context.getActiveUser();
final String orgName = context.getOrgName();
final String superAdminToken = superAdminToken();
TestAdminUser superAdmin = new TestAdminUser( "super", "super", "superuser@usergrid.com" );
superAdmin.setToken( superAdminToken );
Organization org = context.withUser( superAdmin ).management().orgs().organization( orgName );
org.put( payload );
//now get the org
JsonNode node = context.withUser( orgAdmin ).management().users().user( orgAdmin.getUser() ).withParam(
"shallow", "true" ).get();
logNode( node );
JsonNode applications = node.findValue( "applications" );
assertNull( applications );
JsonNode users = node.findValue( "users" );
assertNull( users );
JsonNode securityLevel = node.findValue( "securityLevel" );
assertNotNull( securityLevel );
assertEquals( 5L, securityLevel.asLong() );
}
@Test
public void reactivateMultipleSend() throws Exception {
JsonNode node = resource().path( "/management/organizations" ).accept( MediaType.APPLICATION_JSON )
.type( MediaType.APPLICATION_JSON_TYPE ).post( JsonNode.class, buildOrgUserPayload( "reactivate" ) );
logNode( node );
String email = node.get( "data" ).get( "owner" ).get( "email" ).asText();
String uuid = node.get( "data" ).get( "owner" ).get( "uuid" ).asText();
assertNotNull( email );
assertEquals( "MUUserResourceIT-reactivate@apigee.com", email );
// reactivate should send activation email
node = resource().path( String.format( "/management/users/%s/reactivate", uuid ) )
.queryParam( "access_token", adminAccessToken ).accept( MediaType.APPLICATION_JSON )
.type( MediaType.APPLICATION_JSON_TYPE ).get( JsonNode.class );
List<Message> inbox = org.jvnet.mock_javamail.Mailbox.get( email );
assertFalse( inbox.isEmpty() );
logNode( node );
}
private Map<String, String> buildOrgUserPayload( String caller ) {
String className = this.getClass().getSimpleName();
Map<String, String> payload = hashMap( "email", String.format( "%s-%s@apigee.com", className, caller ) )
.map( "username", String.format( "%s-%s-user", className, caller ) )
.map( "name", String.format( "%s %s", className, caller ) ).map( "password", "password" )
.map( "organization", String.format( "%s-%s-org", className, caller ) );
return payload;
}
@Test
// @Ignore( "because of that jstl classloader error thing" )
public void checkPasswordReset() throws Exception {
TestUser user = context.getActiveUser();
String email = user.getEmail();
UserInfo userInfo = setup.getMgmtSvc().getAdminUserByEmail( email );
String resetToken = setup.getMgmtSvc().getPasswordResetTokenForAdminUser( userInfo.getUuid(), 15000 );
assertTrue( setup.getMgmtSvc().checkPasswordResetTokenForAdminUser( userInfo.getUuid(), resetToken ) );
Form formData = new Form();
formData.add( "token", resetToken );
formData.add( "password1", "sesame" );
formData.add( "password2", "sesame" );
String html = resource().path( "/management/users/" + userInfo.getUsername() + "/resetpw" )
.type( MediaType.APPLICATION_FORM_URLENCODED_TYPE ).post( String.class, formData );
assertTrue( html.contains( "password set" ) );
assertFalse( setup.getMgmtSvc().checkPasswordResetTokenForAdminUser( userInfo.getUuid(), resetToken ) );
html = resource().path( "/management/users/" + userInfo.getUsername() + "/resetpw" )
.type( MediaType.APPLICATION_FORM_URLENCODED_TYPE ).post( String.class, formData );
assertTrue( html.contains( "invalid token" ) );
}
@Test
@Ignore( "causes problems in build" )
public void passwordResetIncorrectUserName() throws Exception {
String email = "test2@usergrid.com";
setup.getMgmtSvc().createAdminUser( "test2", "test2", "test2@usergrid.com", "sesa2me", false, false );
UserInfo userInfo = setup.getMgmtSvc().getAdminUserByEmail( email );
String resetToken = setup.getMgmtSvc().getPasswordResetTokenForAdminUser( userInfo.getUuid(), 15000 );
assertTrue( setup.getMgmtSvc().checkPasswordResetTokenForAdminUser( userInfo.getUuid(), resetToken ) );
Form formData = new Form();
formData.add( "token", resetToken );
formData.add( "password1", "sesa2me" );
formData.add( "password2", "sesa2me" );
String html = resource().path( "/management/users/" + "noodle" + userInfo.getUsername() + "/resetpw" )
.type( MediaType.APPLICATION_FORM_URLENCODED_TYPE ).post( String.class, formData );
assertTrue( html.contains( "Incorrect username entered" ) );
html = resource().path( "/management/users/" + userInfo.getUsername() + "/resetpw" )
.type( MediaType.APPLICATION_FORM_URLENCODED_TYPE ).post( String.class, formData );
assertTrue( html.contains( "password set" ) );
}
@Test
public void checkPasswordHistoryConflict() throws Exception {
String[] passwords = new String[] { "password1", "password2", "password3", "password4" };
UserInfo user =
setup.getMgmtSvc().createAdminUser( "edanuff", "Ed Anuff", "ed@anuff.com", passwords[0], true, false );
assertNotNull( user );
OrganizationInfo organization = setup.getMgmtSvc().createOrganization( "ed-organization", user, true );
assertNotNull( organization );
// set history to 1
Map<String, Object> props = new HashMap<String, Object>();
props.put( OrganizationInfo.PASSWORD_HISTORY_SIZE_KEY, 1 );
organization.setProperties( props );
setup.getMgmtSvc().updateOrganization( organization );
UserInfo userInfo = setup.getMgmtSvc().getAdminUserByEmail( "ed@anuff.com" );
Map<String, String> payload = hashMap( "oldpassword", passwords[0] ).map( "newpassword", passwords[0] ); // fail
try {
JsonNode node = resource().path( "/management/users/edanuff/password" ).accept( MediaType.APPLICATION_JSON )
.type( MediaType.APPLICATION_JSON_TYPE ).post( JsonNode.class, payload );
fail( "should fail with conflict" );
}
catch ( UniformInterfaceException e ) {
assertEquals( 409, e.getResponse().getStatus() );
}
payload.put( "newpassword", passwords[1] ); // ok
JsonNode node = resource().path( "/management/users/edanuff/password" ).accept( MediaType.APPLICATION_JSON )
.type( MediaType.APPLICATION_JSON_TYPE ).post( JsonNode.class, payload );
payload.put( "oldpassword", passwords[1] );
payload.put( "newpassword", passwords[0] ); // fail
try {
node = resource().path( "/management/users/edanuff/password" ).accept( MediaType.APPLICATION_JSON )
.type( MediaType.APPLICATION_JSON_TYPE ).post( JsonNode.class, payload );
fail( "should fail with conflict" );
}
catch ( UniformInterfaceException e ) {
assertEquals( 409, e.getResponse().getStatus() );
}
}
@Test
// @Ignore( "because of that jstl classloader error thing" )
public void checkPasswordChangeTime() throws Exception {
final TestUser user = context.getActiveUser();
String email = user.getEmail();
UserInfo userInfo = setup.getMgmtSvc().getAdminUserByEmail( email );
String resetToken = setup.getMgmtSvc().getPasswordResetTokenForAdminUser( userInfo.getUuid(), 15000 );
Form formData = new Form();
formData.add( "token", resetToken );
formData.add( "password1", "sesame" );
formData.add( "password2", "sesame" );
String html = resource().path( "/management/users/" + userInfo.getUsername() + "/resetpw" )
.type( MediaType.APPLICATION_FORM_URLENCODED_TYPE ).post( String.class, formData );
assertTrue( html.contains( "password set" ) );
JsonNode node = resource().path( "/management/token" ).queryParam( "grant_type", "password" )
.queryParam( "username", email ).queryParam( "password", "sesame" ).accept( MediaType.APPLICATION_JSON )
.get( JsonNode.class );
Long changeTime = node.get( "passwordChanged" ).getLongValue();
assertTrue( System.currentTimeMillis() - changeTime < 2000 );
Map<String, String> payload = hashMap( "oldpassword", "sesame" ).map( "newpassword", "test" );
node = resource().path( "/management/users/" + userInfo.getUsername() + "/password" )
.accept( MediaType.APPLICATION_JSON ).type( MediaType.APPLICATION_JSON_TYPE )
.post( JsonNode.class, payload );
node = resource().path( "/management/token" ).queryParam( "grant_type", "password" )
.queryParam( "username", email ).queryParam( "password", "test" ).accept( MediaType.APPLICATION_JSON )
.get( JsonNode.class );
Long changeTime2 = node.get( "passwordChanged" ).getLongValue();
assertTrue( changeTime < changeTime2 );
assertTrue( System.currentTimeMillis() - changeTime2 < 2000 );
node = resource().path( "/management/me" ).queryParam( "grant_type", "password" )
.queryParam( "username", email ).queryParam( "password", "test" ).accept( MediaType.APPLICATION_JSON )
.get( JsonNode.class );
Long changeTime3 = node.get( "passwordChanged" ).getLongValue();
assertEquals( changeTime2, changeTime3 );
}
/** USERGRID-1960 */
@Test
@Ignore( "Depends on other tests" )
public void listOrgUsersByName() {
JsonNode response = context.management().orgs().organization( context.getOrgName() ).users().get();
//get the response and verify our user is there
JsonNode adminNode = response.get( "data" ).get( 0 );
assertEquals( context.getActiveUser().getEmail(), adminNode.get( "email" ).asText() );
assertEquals( context.getActiveUser().getUser(), adminNode.get( "username" ).asText() );
}
}