/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.cxf.systest.sts.caching;
import java.net.URL;
import java.util.HashMap;
import java.util.Map;
import javax.xml.namespace.QName;
import javax.xml.ws.BindingProvider;
import javax.xml.ws.Service;
import org.w3c.dom.Element;
import org.apache.cxf.Bus;
import org.apache.cxf.bus.spring.SpringBusFactory;
import org.apache.cxf.endpoint.Client;
import org.apache.cxf.endpoint.Endpoint;
import org.apache.cxf.frontend.ClientProxy;
import org.apache.cxf.systest.sts.common.SecurityTestUtil;
import org.apache.cxf.systest.sts.deployment.STSServer;
import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase;
import org.apache.cxf.ws.security.SecurityConstants;
import org.apache.cxf.ws.security.tokenstore.SecurityToken;
import org.apache.cxf.ws.security.tokenstore.TokenStore;
import org.apache.cxf.ws.security.trust.STSClient;
import org.example.contract.doubleit.DoubleItPortType;
import org.junit.BeforeClass;
/**
* Test various server Caching properties
*/
public class ServerCachingTest extends AbstractBusClientServerTestBase {
static final String STSPORT = allocatePort(STSServer.class);
private static final String NAMESPACE = "http://www.example.org/contract/DoubleIt";
private static final QName SERVICE_QNAME = new QName(NAMESPACE, "DoubleItService");
private static final String SAML1_TOKEN_TYPE =
"http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1";
private static final String PUBLIC_KEY_KEYTYPE =
"http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey";
private static final String PORT = allocatePort(CachingServer.class);
private static final String PORT2 = allocatePort(CachingServer.class, 2);
private static final String DEFAULT_ADDRESS =
"https://localhost:" + PORT + "/doubleit/services/doubleittransportsaml1alternative";
@BeforeClass
public static void startServers() throws Exception {
assertTrue(
"Server failed to launch",
// run the server in the same process
// set this to false to fork
launchServer(CachingServer.class, true)
);
assertTrue(
"Server failed to launch",
// run the server in the same process
// set this to false to fork
launchServer(STSServer.class, true)
);
}
@org.junit.AfterClass
public static void cleanup() throws Exception {
SecurityTestUtil.cleanup();
stopAllServers();
}
// Disabled due to continually failing on Jenkins build
@org.junit.Test
@org.junit.Ignore
public void testServerSideSAMLTokenCaching() throws Exception {
SpringBusFactory bf = new SpringBusFactory();
URL busFile = ServerCachingTest.class.getResource("cxf-client.xml");
Bus bus = bf.createBus(busFile.toString());
SpringBusFactory.setDefaultBus(bus);
SpringBusFactory.setThreadDefaultBus(bus);
URL wsdl = ServerCachingTest.class.getResource("DoubleIt.wsdl");
Service service = Service.create(wsdl, SERVICE_QNAME);
QName portQName = new QName(NAMESPACE, "DoubleItTransportSAML1AlternativePort");
DoubleItPortType port =
service.getPort(portQName, DoubleItPortType.class);
((BindingProvider)port).getRequestContext().put("thread.local.request.context", "true");
updateAddressPort(port, PORT);
// Make an initial successful invocation
doubleIt(port, 25);
// Store the SAML Assertion that was obtained from the STS
Client client = ClientProxy.getClient(port);
Endpoint ep = client.getEndpoint();
String id = (String)ep.get(SecurityConstants.TOKEN_ID);
TokenStore store = (TokenStore)ep.getEndpointInfo().getProperty(TokenStore.class.getName());
SecurityToken tok = store.getToken(id);
assertNotNull(tok);
Element storedToken = tok.getToken();
// Get another security token by invoking on the STS directly and save it on the client port
SecurityToken token =
requestSecurityToken(SAML1_TOKEN_TYPE, PUBLIC_KEY_KEYTYPE, bus, DEFAULT_ADDRESS);
assertNotNull(token);
tok.setToken(token.getToken());
// Try another invocation - this will fail as the STSClient on the server side is disabled
// after the first invocation
try {
doubleIt(port, 30);
fail("Failure expected as the STSClient on the server side is null");
} catch (Throwable ex) {
// expected
}
// Try again using the original SAML token - this should work as it should be cached by the service
tok.setToken(storedToken);
doubleIt(port, 35);
((java.io.Closeable)port).close();
bus.shutdown(true);
}
@org.junit.Test
public void testServerSideUsernameTokenCaching() throws Exception {
SpringBusFactory bf = new SpringBusFactory();
URL busFile = ServerCachingTest.class.getResource("cxf-client.xml");
Bus bus = bf.createBus(busFile.toString());
SpringBusFactory.setDefaultBus(bus);
SpringBusFactory.setThreadDefaultBus(bus);
URL wsdl = ServerCachingTest.class.getResource("DoubleIt.wsdl");
Service service = Service.create(wsdl, SERVICE_QNAME);
QName portQName = new QName(NAMESPACE, "DoubleItTransportUTPort");
DoubleItPortType transportUTPort =
service.getPort(portQName, DoubleItPortType.class);
((BindingProvider)transportUTPort).getRequestContext().put("thread.local.request.context", "true");
updateAddressPort(transportUTPort, PORT);
// Make an initial successful invocation
doubleIt(transportUTPort, 25);
BindingProvider p = (BindingProvider)transportUTPort;
try {
// The STSClient on the server side is disabled after the first invocation
p.getRequestContext().put(SecurityConstants.USERNAME, "bob");
doubleIt(transportUTPort, 30);
fail("Failure expected as the STSClient on the server side is null");
} catch (Exception ex) {
// expected
}
// This will pass as the UsernameToken should be cached
p.getRequestContext().put(SecurityConstants.USERNAME, "alice");
doubleIt(transportUTPort, 35);
((java.io.Closeable)transportUTPort).close();
bus.shutdown(true);
}
@org.junit.Test
public void testServerSideBinarySecurityTokenCaching() throws Exception {
SpringBusFactory bf = new SpringBusFactory();
URL busFile = ServerCachingTest.class.getResource("cxf-client.xml");
Bus bus = bf.createBus(busFile.toString());
SpringBusFactory.setDefaultBus(bus);
SpringBusFactory.setThreadDefaultBus(bus);
URL wsdl = ServerCachingTest.class.getResource("DoubleIt.wsdl");
Service service = Service.create(wsdl, SERVICE_QNAME);
QName portQName = new QName(NAMESPACE, "DoubleItAsymmetricBSTPort");
DoubleItPortType bstPort =
service.getPort(portQName, DoubleItPortType.class);
((BindingProvider)bstPort).getRequestContext().put("thread.local.request.context", "true");
updateAddressPort(bstPort, PORT2);
// Make an initial successful invocation
doubleIt(bstPort, 25);
BindingProvider p = (BindingProvider)bstPort;
try {
// The STSClient on the server side is disabled after the first invocation
p.getRequestContext().put(SecurityConstants.SIGNATURE_USERNAME, "myservicekey");
p.getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, "serviceKeystore.properties");
doubleIt(bstPort, 30);
fail("Failure expected as the STSClient on the server side is null");
} catch (Exception ex) {
// expected
}
// This will pass as the BinarySecurityToken should be cached
p.getRequestContext().put(SecurityConstants.SIGNATURE_USERNAME, "myclientkey");
p.getRequestContext().put(SecurityConstants.SIGNATURE_PROPERTIES, "clientKeystore.properties");
doubleIt(bstPort, 35);
((java.io.Closeable)bstPort).close();
bus.shutdown(true);
}
private SecurityToken requestSecurityToken(
String tokenType,
String keyType,
Bus bus,
String endpointAddress
) throws Exception {
STSClient stsClient = new STSClient(bus);
stsClient.setWsdlLocation("https://localhost:" + STSPORT + "/SecurityTokenService/Transport?wsdl");
stsClient.setServiceName("{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService");
stsClient.setEndpointName("{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Transport_Port");
Map<String, Object> properties = new HashMap<>();
properties.put(SecurityConstants.USERNAME, "alice");
properties.put(
SecurityConstants.CALLBACK_HANDLER,
"org.apache.cxf.systest.sts.common.CommonCallbackHandler"
);
if (PUBLIC_KEY_KEYTYPE.equals(keyType)) {
properties.put(SecurityConstants.STS_TOKEN_USERNAME, "myservicekey");
properties.put(SecurityConstants.STS_TOKEN_PROPERTIES, "serviceKeystore.properties");
stsClient.setUseCertificateForConfirmationKeyInfo(true);
}
stsClient.setProperties(properties);
stsClient.setTokenType(tokenType);
stsClient.setKeyType(keyType);
stsClient.setAddressingNamespace("http://www.w3.org/2005/08/addressing");
return stsClient.requestSecurityToken(endpointAddress);
}
private static void doubleIt(DoubleItPortType port, int numToDouble) {
int resp = port.doubleIt(numToDouble);
assertEquals(numToDouble * 2, resp);
}
}