/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.ambari.server.security.authorization; import static org.easymock.EasyMock.capture; import static org.easymock.EasyMock.createMock; import static org.easymock.EasyMock.eq; import static org.easymock.EasyMock.expect; import static org.easymock.EasyMock.expectLastCall; import static org.easymock.EasyMock.newCapture; import static org.easymock.EasyMock.replay; import static org.easymock.EasyMock.verify; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertNull; import java.io.IOException; import java.util.HashSet; import javax.servlet.FilterChain; import javax.servlet.ServletException; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.apache.ambari.server.orm.entities.PrincipalEntity; import org.apache.ambari.server.orm.entities.UserEntity; import org.apache.ambari.server.scheduler.ExecutionScheduleManager; import org.apache.ambari.server.security.authorization.internal.InternalTokenClientFilter; import org.apache.ambari.server.security.authorization.internal.InternalTokenStorage; import org.easymock.Capture; import org.junit.Before; import org.junit.Test; import org.springframework.security.core.Authentication; import org.springframework.security.core.context.SecurityContextHolder; public class AmbariUserAuthenticationFilterTest { private static final String TEST_INTERNAL_TOKEN = "test token"; private static final String TEST_USER_ID_HEADER = "1"; private static final String TEST_USER_NAME = "userName"; private static final int TEST_USER_ID = 1; @Before public void setUp() throws Exception { SecurityContextHolder.getContext().setAuthentication(null); } @Test public void testDoFilterValid() throws IOException, ServletException { final Users users = createMock(Users.class); HttpServletRequest request = createMock(HttpServletRequest.class); HttpServletResponse response = createMock(HttpServletResponse.class); FilterChain chain = createMock(FilterChain.class); InternalTokenStorage tokenStorage = createMock(InternalTokenStorage.class); expect(request.getHeader(InternalTokenClientFilter.INTERNAL_TOKEN_HEADER)).andReturn(TEST_INTERNAL_TOKEN); expect(tokenStorage.isValidInternalToken(TEST_INTERNAL_TOKEN)).andReturn(true); expect(request.getHeader(ExecutionScheduleManager.USER_ID_HEADER)).andReturn(TEST_USER_ID_HEADER); User user = combineUser(); expect(users.getUser(TEST_USER_ID)).andReturn(user); expect(users.getUserAuthorities(user.getUserName(), user.getUserType())).andReturn(new HashSet<AmbariGrantedAuthority>()); Capture<String> userHeaderValue = newCapture(); response.setHeader(eq("User"), capture(userHeaderValue)); expectLastCall(); chain.doFilter(request, response); expectLastCall(); replay(users, request, response, chain, tokenStorage); AmbariUserAuthorizationFilter filter = new AmbariUserAuthorizationFilter(tokenStorage, users); filter.doFilter(request, response, chain); verify(users, request, response, chain, tokenStorage); Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); assertNotNull(authentication); assertEquals(true, authentication.isAuthenticated()); assertEquals(TEST_USER_NAME, userHeaderValue.getValue()); } @Test public void testDoFilterWithoutInternalToken() throws IOException, ServletException { final Users users = createMock(Users.class); HttpServletRequest request = createMock(HttpServletRequest.class); HttpServletResponse response = createMock(HttpServletResponse.class); FilterChain chain = createMock(FilterChain.class); InternalTokenStorage tokenStorage = createMock(InternalTokenStorage.class); expect(request.getHeader(InternalTokenClientFilter.INTERNAL_TOKEN_HEADER)).andReturn(null); chain.doFilter(request, response); expectLastCall(); replay(users, request, response, chain, tokenStorage); AmbariUserAuthorizationFilter filter = new AmbariUserAuthorizationFilter(tokenStorage, users); filter.doFilter(request, response, chain); verify(users, request, response, chain, tokenStorage); Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); assertNull(authentication); } @Test public void testDoFilterWithoutUserToken() throws IOException, ServletException { final Users users = createMock(Users.class); HttpServletRequest request = createMock(HttpServletRequest.class); HttpServletResponse response = createMock(HttpServletResponse.class); FilterChain chain = createMock(FilterChain.class); InternalTokenStorage tokenStorage = createMock(InternalTokenStorage.class); expect(request.getHeader(InternalTokenClientFilter.INTERNAL_TOKEN_HEADER)).andReturn(TEST_INTERNAL_TOKEN); expect(tokenStorage.isValidInternalToken(TEST_INTERNAL_TOKEN)).andReturn(true); expect(request.getHeader(ExecutionScheduleManager.USER_ID_HEADER)).andReturn(null); chain.doFilter(request, response); expectLastCall(); replay(users, request, response, chain, tokenStorage); AmbariUserAuthorizationFilter filter = new AmbariUserAuthorizationFilter(tokenStorage, users); filter.doFilter(request, response, chain); verify(users, request, response, chain, tokenStorage); Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); assertNull(authentication); } @Test public void testDoFilterWithIncorrectUser() throws IOException, ServletException { final Users users = createMock(Users.class); HttpServletRequest request = createMock(HttpServletRequest.class); HttpServletResponse response = createMock(HttpServletResponse.class); FilterChain chain = createMock(FilterChain.class); InternalTokenStorage tokenStorage = createMock(InternalTokenStorage.class); expect(request.getHeader(InternalTokenClientFilter.INTERNAL_TOKEN_HEADER)).andReturn(TEST_INTERNAL_TOKEN); expect(tokenStorage.isValidInternalToken(TEST_INTERNAL_TOKEN)).andReturn(true); expect(request.getHeader(ExecutionScheduleManager.USER_ID_HEADER)).andReturn(TEST_USER_ID_HEADER); expect(users.getUser(TEST_USER_ID)).andReturn(null); response.sendError(HttpServletResponse.SC_FORBIDDEN, "Authentication required"); expectLastCall(); response.flushBuffer(); expectLastCall(); replay(users, request, response, chain, tokenStorage); AmbariUserAuthorizationFilter filter = new AmbariUserAuthorizationFilter(tokenStorage, users); filter.doFilter(request, response, chain); verify(users, request, response, chain, tokenStorage); Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); assertNull(authentication); } @Test public void testDoFilterWithInvalidUserID() throws IOException, ServletException { final Users users = createMock(Users.class); HttpServletRequest request = createMock(HttpServletRequest.class); HttpServletResponse response = createMock(HttpServletResponse.class); FilterChain chain = createMock(FilterChain.class); InternalTokenStorage tokenStorage = createMock(InternalTokenStorage.class); expect(request.getHeader(InternalTokenClientFilter.INTERNAL_TOKEN_HEADER)).andReturn(TEST_INTERNAL_TOKEN); expect(tokenStorage.isValidInternalToken(TEST_INTERNAL_TOKEN)).andReturn(true); expect(request.getHeader(ExecutionScheduleManager.USER_ID_HEADER)).andReturn("admin"); response.sendError(HttpServletResponse.SC_FORBIDDEN, "Invalid user ID"); expectLastCall(); response.flushBuffer(); expectLastCall(); replay(users, request, response, chain, tokenStorage); AmbariUserAuthorizationFilter filter = new AmbariUserAuthorizationFilter(tokenStorage, users); filter.doFilter(request, response, chain); verify(users, request, response, chain, tokenStorage); Authentication authentication = SecurityContextHolder.getContext().getAuthentication(); assertNull(authentication); } private User combineUser() { PrincipalEntity principalEntity = new PrincipalEntity(); UserEntity userEntity = new UserEntity(); userEntity.setUserId(TEST_USER_ID); userEntity.setUserName(UserName.fromString(TEST_USER_NAME)); userEntity.setUserType(UserType.LOCAL); userEntity.setPrincipal(principalEntity); User user = new User(userEntity); return user; } }