/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.cxf.systest.ws.saml.subjectconf; import java.net.URL; import java.util.Arrays; import java.util.Collection; import javax.xml.namespace.QName; import javax.xml.ws.BindingProvider; import javax.xml.ws.Service; import org.apache.cxf.Bus; import org.apache.cxf.bus.spring.SpringBusFactory; import org.apache.cxf.rt.security.SecurityConstants; import org.apache.cxf.systest.ws.common.SecurityTestUtil; import org.apache.cxf.systest.ws.common.TestParam; import org.apache.cxf.systest.ws.saml.client.SamlCallbackHandler; import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase; import org.apache.wss4j.common.saml.builder.SAML2Constants; import org.example.contract.doubleit.DoubleItPortType; import org.junit.BeforeClass; import org.junit.runner.RunWith; import org.junit.runners.Parameterized.Parameters; /** * A set of tests for the validation rules associated with various Subject Confirmation * methods. */ @RunWith(value = org.junit.runners.Parameterized.class) public class SamlSubjectConfTest extends AbstractBusClientServerTestBase { static final String PORT = allocatePort(Server.class); static final String STAX_PORT = allocatePort(StaxServer.class); private static final String NAMESPACE = "http://www.example.org/contract/DoubleIt"; private static final QName SERVICE_QNAME = new QName(NAMESPACE, "DoubleItService"); final TestParam test; public SamlSubjectConfTest(TestParam type) { this.test = type; } @BeforeClass public static void startServers() throws Exception { assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork launchServer(Server.class, true) ); assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork launchServer(StaxServer.class, true) ); } @Parameters(name = "{0}") public static Collection<TestParam[]> data() { return Arrays.asList(new TestParam[][] {{new TestParam(PORT, false)}, {new TestParam(STAX_PORT, false)}, }); } @org.junit.AfterClass public static void cleanup() throws Exception { SecurityTestUtil.cleanup(); stopAllServers(); } // // HOK requires client auth + a internally signed token. The server is set up not to // require client auth to test this. // @org.junit.Test public void testHOKClientAuthentication() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-auth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, true); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_HOLDER_KEY); callbackHandler.setCryptoAlias("morpit"); callbackHandler.setCryptoPassword("password"); callbackHandler.setCryptoPropertiesFile("morpit.properties"); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); int result = port.doubleIt(25); assertTrue(result == 50); // Don't sign the Assertion callbackHandler = new SamlCallbackHandler(true, false); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_HOLDER_KEY); callbackHandler.setCryptoAlias("morpit"); callbackHandler.setCryptoPassword("password"); callbackHandler.setCryptoPropertiesFile("morpit.properties"); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); try { port.doubleIt(25); fail("Failure expected on a unsigned assertion"); } catch (javax.xml.ws.soap.SOAPFaultException ex) { // expected } ((java.io.Closeable)port).close(); bus.shutdown(true); } // Sign using "alice" @org.junit.Test public void testHOKNonMatchingCert() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-auth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, true); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_HOLDER_KEY); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); try { port.doubleIt(25); fail("Failure expected on a non matching cert (SAML -> TLS)"); } catch (javax.xml.ws.soap.SOAPFaultException ex) { // expected } ((java.io.Closeable)port).close(); bus.shutdown(true); } @org.junit.Test public void testHOKNoClientAuthentication() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-noauth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, true); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_HOLDER_KEY); callbackHandler.setCryptoAlias("morpit"); callbackHandler.setCryptoPassword("password"); callbackHandler.setCryptoPropertiesFile("morpit.properties"); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); try { port.doubleIt(25); fail("Failure expected on no client auth"); } catch (javax.xml.ws.soap.SOAPFaultException ex) { // expected } ((java.io.Closeable)port).close(); bus.shutdown(true); } // // SV requires client auth. The server is set up not to require client auth to // test this. SV does not require an internal signature unlike HOK. // @org.junit.Test public void testSVClientAuthentication() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-auth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, false); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_SENDER_VOUCHES); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); int result = port.doubleIt(25); assertTrue(result == 50); ((java.io.Closeable)port).close(); bus.shutdown(true); } @org.junit.Test public void testSVNoClientAuthentication() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-noauth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, false); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_SENDER_VOUCHES); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); try { port.doubleIt(25); fail("Failure expected on no client auth"); } catch (javax.xml.ws.soap.SOAPFaultException ex) { // expected } ((java.io.Closeable)port).close(); bus.shutdown(true); } // // Bearer does not require client auth, but it does require an internal signature // @org.junit.Test public void testBearer() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-auth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, true); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_BEARER); callbackHandler.setCryptoAlias("morpit"); callbackHandler.setCryptoPassword("password"); callbackHandler.setCryptoPropertiesFile("morpit.properties"); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); int result = port.doubleIt(25); assertTrue(result == 50); ((java.io.Closeable)port).close(); bus.shutdown(true); } @org.junit.Test public void testUnsignedBearer() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-auth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, false); callbackHandler.setConfirmationMethod(SAML2Constants.CONF_BEARER); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); try { port.doubleIt(25); fail("Failure expected on an unsigned bearer token"); } catch (javax.xml.ws.soap.SOAPFaultException ex) { // expected } ((java.io.Closeable)port).close(); bus.shutdown(true); } @org.junit.Test public void testUnknownCustomMethod() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = SamlSubjectConfTest.class.getResource("client-auth.xml"); Bus bus = bf.createBus(busFile.toString()); SpringBusFactory.setDefaultBus(bus); SpringBusFactory.setThreadDefaultBus(bus); URL wsdl = SamlSubjectConfTest.class.getResource("DoubleItSamlSubjectConf.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItSaml2TransportPort"); DoubleItPortType port = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(port, test.getPort()); // Successful call SamlCallbackHandler callbackHandler = new SamlCallbackHandler(true, false); callbackHandler.setConfirmationMethod("urn:oasis:names:tc:SAML:2.0:cm:custom"); ((BindingProvider)port).getRequestContext().put( SecurityConstants.SAML_CALLBACK_HANDLER, callbackHandler ); try { port.doubleIt(25); fail("Failure expected on an unknown custom subject confirmation method"); } catch (javax.xml.ws.soap.SOAPFaultException ex) { // expected } ((java.io.Closeable)port).close(); bus.shutdown(true); } }