/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.ambari.server.security;
import static org.easymock.EasyMock.expect;
import static org.easymock.EasyMock.expectLastCall;
import java.io.IOException;
import java.util.Properties;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import org.apache.ambari.server.configuration.Configuration;
import org.easymock.EasyMockSupport;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.TemporaryFolder;
import org.springframework.security.core.AuthenticationException;
public class AmbariEntryPointTest extends EasyMockSupport {
@Rule
public TemporaryFolder temporaryFolder = new TemporaryFolder();
@Test
public void testCommenceDefault() throws Exception {
testCommence(null);
}
@Test
public void testCommenceKerberosAuthenticationEnabled() throws Exception {
testCommence(Boolean.TRUE);
}
@Test
public void testCommenceKerberosAuthenticationNotEnabled() throws Exception {
testCommence(Boolean.FALSE);
}
private void testCommence(Boolean kerberosAuthenticationEnabled) throws IOException, ServletException {
HttpServletRequest request = createStrictMock(HttpServletRequest.class);
HttpServletResponse response = createStrictMock(HttpServletResponse.class);
AuthenticationException exception = createStrictMock(AuthenticationException.class);
if (Boolean.TRUE == kerberosAuthenticationEnabled) {
response.setHeader("WWW-Authenticate", "Negotiate");
expectLastCall().once();
response.sendError(HttpServletResponse.SC_UNAUTHORIZED, "Authentication requested");
expectLastCall().once();
} else {
expect(exception.getMessage()).andReturn("message").once();
response.sendError(HttpServletResponse.SC_FORBIDDEN, "message");
expectLastCall().once();
}
replayAll();
Properties properties = new Properties();
if (kerberosAuthenticationEnabled != null) {
properties.setProperty(Configuration.KERBEROS_AUTH_ENABLED.getKey(), kerberosAuthenticationEnabled.toString());
properties.setProperty(Configuration.KERBEROS_AUTH_SPNEGO_KEYTAB_FILE.getKey(), temporaryFolder.newFile().getAbsolutePath());
}
AmbariEntryPoint entryPoint = new AmbariEntryPoint(new Configuration(properties));
entryPoint.commence(request, response, exception);
verifyAll();
}
}