/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.syncope.fit.core;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertNotEquals;
import static org.junit.Assert.assertNotNull;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;
import java.util.Arrays;
import java.util.List;
import org.apache.commons.lang3.SerializationUtils;
import org.apache.syncope.common.lib.SyncopeClientException;
import org.apache.syncope.common.lib.policy.AccountPolicyTO;
import org.apache.syncope.common.lib.policy.PasswordPolicyTO;
import org.apache.syncope.common.lib.policy.PullPolicyTO;
import org.apache.syncope.common.lib.policy.DefaultAccountRuleConf;
import org.apache.syncope.common.lib.types.AnyTypeKind;
import org.apache.syncope.common.lib.types.ClientExceptionType;
import org.apache.syncope.common.lib.policy.DefaultPasswordRuleConf;
import org.apache.syncope.common.lib.types.PolicyType;
import org.apache.syncope.common.lib.policy.PullPolicySpec;
import org.apache.syncope.fit.AbstractITCase;
import org.apache.syncope.fit.core.reference.TestPullRule;
import org.junit.Test;
public class PolicyITCase extends AbstractITCase {
private PullPolicyTO buildPullPolicyTO() {
PullPolicyTO policy = new PullPolicyTO();
PullPolicySpec spec = new PullPolicySpec();
spec.getCorrelationRules().put(AnyTypeKind.USER.name(), TestPullRule.class.getName());
policy.setSpecification(spec);
policy.setDescription("Pull policy");
return policy;
}
@Test
public void listByType() {
List<PullPolicyTO> policyTOs = policyService.list(PolicyType.PULL);
assertNotNull(policyTOs);
assertFalse(policyTOs.isEmpty());
}
@Test
public void getAccountPolicy() {
AccountPolicyTO policyTO = policyService.read("06e2ed52-6966-44aa-a177-a0ca7434201f");
assertNotNull(policyTO);
assertTrue(policyTO.getUsedByResources().isEmpty());
assertTrue(policyTO.getUsedByRealms().contains("/odd"));
}
@Test
public void getPasswordPolicy() {
PasswordPolicyTO policyTO = policyService.read("986d1236-3ac5-4a19-810c-5ab21d79cba1");
assertNotNull(policyTO);
assertTrue(policyTO.getUsedByResources().contains(RESOURCE_NAME_NOPROPAGATION));
assertTrue(policyTO.getUsedByRealms().containsAll(Arrays.asList("/", "/odd", "/even")));
}
@Test
public void getPullPolicy() {
PullPolicyTO policyTO = policyService.read("66691e96-285f-4464-bc19-e68384ea4c85");
assertNotNull(policyTO);
assertTrue(policyTO.getUsedByRealms().isEmpty());
}
@Test
public void createMissingDescription() {
PullPolicyTO policy = new PullPolicyTO();
policy.setSpecification(new PullPolicySpec());
try {
createPolicy(policy);
fail();
} catch (SyncopeClientException e) {
assertEquals(ClientExceptionType.InvalidPolicy, e.getType());
}
}
@Test
public void create() {
PullPolicyTO policy = buildPullPolicyTO();
PullPolicyTO policyTO = createPolicy(policy);
assertNotNull(policyTO);
assertEquals(TestPullRule.class.getName(),
policyTO.getSpecification().getCorrelationRules().get(AnyTypeKind.USER.name()));
}
@Test
public void update() {
PasswordPolicyTO globalPolicy = policyService.read("ce93fcda-dc3a-4369-a7b0-a6108c261c85");
PasswordPolicyTO policy = SerializationUtils.clone(globalPolicy);
policy.setDescription("A simple password policy");
// create a new password policy using the former as a template
policy = createPolicy(policy);
assertNotNull(policy);
assertNotEquals("ce93fcda-dc3a-4369-a7b0-a6108c261c85", policy.getKey());
((DefaultPasswordRuleConf) policy.getRuleConfs().get(0)).setMaxLength(22);
// update new password policy
policyService.update(policy);
policy = policyService.read(policy.getKey());
assertNotNull(policy);
assertEquals(22, ((DefaultPasswordRuleConf) policy.getRuleConfs().get(0)).getMaxLength());
assertEquals(8, ((DefaultPasswordRuleConf) policy.getRuleConfs().get(0)).getMinLength());
}
@Test
public void delete() {
PullPolicyTO policy = buildPullPolicyTO();
PullPolicyTO policyTO = createPolicy(policy);
assertNotNull(policyTO);
policyService.delete(policyTO.getKey());
try {
policyService.read(policyTO.getKey());
fail();
} catch (SyncopeClientException e) {
assertNotNull(e);
}
}
@Test
public void getCorrelationRules() {
assertEquals(1, syncopeService.platform().getPullCorrelationRules().size());
}
@Test
public void issueSYNCOPE553() {
AccountPolicyTO policy = new AccountPolicyTO();
policy.setDescription("SYNCOPE553");
DefaultAccountRuleConf ruleConf = new DefaultAccountRuleConf();
ruleConf.setMinLength(3);
ruleConf.setMaxLength(8);
policy.getRuleConfs().add(ruleConf);
policy = createPolicy(policy);
assertNotNull(policy);
}
@Test
public void issueSYNCOPE682() {
AccountPolicyTO policy = new AccountPolicyTO();
policy.setDescription("SYNCOPE682");
policy.getPassthroughResources().add(RESOURCE_NAME_LDAP);
DefaultAccountRuleConf ruleConf = new DefaultAccountRuleConf();
ruleConf.setMinLength(3);
ruleConf.setMaxLength(8);
policy.getRuleConfs().add(ruleConf);
policy = createPolicy(policy);
assertNotNull(policy);
}
}