/******************************************************************************* * Copyright French Prime minister Office/SGMAP/DINSIC/Vitam Program (2015-2019) * * contact.vitam@culture.gouv.fr * * This software is a computer program whose purpose is to implement a digital archiving back-office system managing * high volumetry securely and efficiently. * * This software is governed by the CeCILL 2.1 license under French law and abiding by the rules of distribution of free * software. You can use, modify and/ or redistribute the software under the terms of the CeCILL 2.1 license as * circulated by CEA, CNRS and INRIA at the following URL "http://www.cecill.info". * * As a counterpart to the access to the source code and rights to copy, modify and redistribute granted by the license, * users are provided only with a limited warranty and the software's author, the holder of the economic rights, and the * successive licensors have only limited liability. * * In this respect, the user's attention is drawn to the risks associated with loading, using, modifying and/or * developing or reproducing the software by the user in light of its specific status of free software, that may mean * that it is complicated to manipulate, and that also therefore means that it is reserved for developers and * experienced professionals having in-depth computer knowledge. Users are therefore encouraged to load and test the * software's suitability as regards their requirements in conditions enabling the security of their systems and/or data * to be ensured and, more generally, to use and operate it in the same conditions as regards security. * * The fact that you are presently reading this means that you have had knowledge of the CeCILL 2.1 license and that you * accept its terms. *******************************************************************************/ package fr.gouv.vitam.common.auth.core.realm; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertNull; import static org.junit.Assert.assertTrue; import static org.mockito.Mockito.mock; import static org.mockito.Mockito.when; import java.io.FileInputStream; import java.io.IOException; import java.io.InputStream; import java.math.BigInteger; import java.security.KeyStore; import java.security.KeyStoreException; import java.security.NoSuchAlgorithmException; import java.security.cert.CertificateException; import java.security.cert.X509Certificate; import org.junit.Before; import org.junit.Test; import fr.gouv.vitam.common.auth.core.authc.X509AuthenticationInfo; import fr.gouv.vitam.common.auth.core.authc.X509AuthenticationToken; public class X509KeystoreFileRealmTest { private X509KeystoreFileRealm realm; private X509Certificate cert; byte[] certBytes = new byte[] {'[', 'B', '@', 1, 4, 0, 'c', 9, 'f', 3, 9}; BigInteger serial = new BigInteger("1000000000000000"); @Before public void setUp() throws Exception { realm = new X509KeystoreFileRealm(); realm.setGrantedKeyStoreName("src/test/resources/tls/server/granted_certs.jks"); realm.setGrantedKeyStorePassphrase("gazerty"); realm.setTrustedKeyStoreName("src/test/resources/tls/server/truststore.jks"); realm.setTrustedKeyStorePassphrase("tazerty"); cert = mock(X509Certificate.class); when(cert.getEncoded()).thenReturn(certBytes); when(cert.getSerialNumber()).thenReturn(serial); } @Test public void testGettersAndSetters() { realm.getAuthenticationTokenClass(); assertEquals("src/test/resources/tls/server/granted_certs.jks", realm.getGrantedKeyStoreName()); assertEquals("gazerty", realm.getGrantedKeyStorePassphrase()); assertEquals("src/test/resources/tls/server/truststore.jks", realm.getTrustedKeyStoreName()); assertEquals("tazerty", realm.getTrustedKeyStorePassphrase()); } @Test public void givenRealmWhenSendCertificateTokenThenGetCertificateInfo() { final X509Certificate[] clientCertChain = new X509Certificate[] {cert}; final X509AuthenticationToken token = new X509AuthenticationToken(clientCertChain, "XXX"); assertTrue(realm.supports(token)); final X509AuthenticationInfo info = (X509AuthenticationInfo) realm.doGetAuthenticationInfo(token); } @Test(expected = NullPointerException.class) public void givenRealmWhenKeyStoreNotFoundThenReturnNull() { realm.setGrantedKeyStoreName("XXX.jks"); realm.setGrantedKeyStorePassphrase("gazerty"); final X509Certificate[] clientCertChain = new X509Certificate[] {cert}; final X509AuthenticationToken token = new X509AuthenticationToken(clientCertChain, "XXX"); realm.doGetAuthenticationInfo(token); } @Test public void givenRealmWhenP12NotGrantedThenReturnNull() throws KeyStoreException, NoSuchAlgorithmException, CertificateException, IOException { final InputStream inStream = new FileInputStream("src/test/resources/tls/client/client_notgranted.p12"); final KeyStore ks = KeyStore.getInstance("PKCS12"); ks.load(inStream, "vitam2016".toCharArray()); final String alias = ks.aliases().nextElement(); final X509Certificate certificate = (X509Certificate) ks.getCertificate(alias); final X509Certificate[] clientCertChain = new X509Certificate[] {certificate}; final X509AuthenticationToken token = new X509AuthenticationToken(clientCertChain, "XXX"); final X509AuthenticationInfo info = (X509AuthenticationInfo) realm.doGetAuthenticationInfo(token); assertNull(info); } }