/** * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.activemq.security; import javax.naming.NameClassPair; import javax.naming.NamingEnumeration; import javax.naming.directory.DirContext; import java.text.MessageFormat; import java.util.HashSet; import java.util.Set; import org.apache.activemq.advisory.AdvisorySupport; import org.apache.activemq.command.ActiveMQDestination; import org.apache.activemq.command.ActiveMQQueue; import org.apache.activemq.command.ActiveMQTopic; import org.apache.activemq.jaas.GroupPrincipal; import org.apache.directory.server.annotations.CreateLdapServer; import org.apache.directory.server.annotations.CreateTransport; import org.apache.directory.server.core.annotations.ApplyLdifFiles; import org.apache.directory.server.core.integ.AbstractLdapTestUnit; import org.apache.directory.server.core.integ.FrameworkRunner; import org.apache.directory.server.ldap.LdapServer; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertTrue; /** * This test assumes setup like in file 'AMQauth.ldif'. Contents of this file is attached below in comments. * * @author ngcutura */ @RunWith(FrameworkRunner.class) @CreateLdapServer(transports = {@CreateTransport(protocol = "LDAP")}) @ApplyLdifFiles("org/apache/activemq/security/AMQauth.ldif") public class LDAPAuthorizationMapTest extends AbstractLdapTestUnit { private static LDAPAuthorizationMap authMap; public static LdapServer ldapServer; @Before public void setup() throws Exception { authMap = new LDAPAuthorizationMap(); authMap.setConnectionURL("ldap://localhost:" + getLdapServer().getPort()); authMap.setTopicSearchMatchingFormat(new MessageFormat("uid={0},ou=topics,ou=destinations,o=ActiveMQ,ou=system")); authMap.setQueueSearchMatchingFormat(new MessageFormat("uid={0},ou=queues,ou=destinations,o=ActiveMQ,ou=system")); authMap.setAdvisorySearchBase("uid=ActiveMQ.Advisory,ou=topics,ou=destinations,o=ActiveMQ,ou=system"); authMap.setTempSearchBase("uid=ActiveMQ.Temp,ou=topics,ou=destinations,o=ActiveMQ,ou=system"); } @Test public void testOpen() throws Exception { DirContext ctx = authMap.open(); HashSet<String> set = new HashSet<>(); NamingEnumeration<NameClassPair> list = ctx.list("ou=destinations,o=ActiveMQ,ou=system"); while (list.hasMore()) { NameClassPair ncp = list.next(); set.add(ncp.getName()); } assertTrue(set.contains("ou=topics")); assertTrue(set.contains("ou=queues")); } /* * Test method for 'org.apache.activemq.security.LDAPAuthorizationMap.getAdminACLs(ActiveMQDestination)' */ @Test public void testGetAdminACLs() { ActiveMQDestination q1 = new ActiveMQQueue("queue1"); Set<GroupPrincipal> aclsq1 = authMap.getAdminACLs(q1); assertEquals(1, aclsq1.size()); assertTrue(aclsq1.contains(new GroupPrincipal("role1"))); ActiveMQDestination t1 = new ActiveMQTopic("topic1"); Set<GroupPrincipal> aclst1 = authMap.getAdminACLs(t1); assertEquals(1, aclst1.size()); assertTrue(aclst1.contains(new GroupPrincipal("role1"))); } /* * Test method for 'org.apache.activemq.security.LDAPAuthorizationMap.getReadACLs(ActiveMQDestination)' */ @Test public void testGetReadACLs() { ActiveMQDestination q1 = new ActiveMQQueue("queue1"); Set<GroupPrincipal> aclsq1 = authMap.getReadACLs(q1); assertEquals(1, aclsq1.size()); assertTrue(aclsq1.contains(new GroupPrincipal("role1"))); ActiveMQDestination t1 = new ActiveMQTopic("topic1"); Set<GroupPrincipal> aclst1 = authMap.getReadACLs(t1); assertEquals(1, aclst1.size()); assertTrue(aclst1.contains(new GroupPrincipal("role2"))); } /* * Test method for 'org.apache.activemq.security.LDAPAuthorizationMap.getWriteACLs(ActiveMQDestination)' */ @Test public void testGetWriteACLs() { ActiveMQDestination q1 = new ActiveMQQueue("queue1"); Set<GroupPrincipal> aclsq1 = authMap.getWriteACLs(q1); assertEquals(2, aclsq1.size()); assertTrue(aclsq1.contains(new GroupPrincipal("role1"))); assertTrue(aclsq1.contains(new GroupPrincipal("role2"))); ActiveMQDestination t1 = new ActiveMQTopic("topic1"); Set<GroupPrincipal> aclst1 = authMap.getWriteACLs(t1); assertEquals(1, aclst1.size()); assertTrue(aclst1.contains(new GroupPrincipal("role3"))); } @Test public void testComposite() { ActiveMQDestination q1 = new ActiveMQQueue("queue1,topic://topic1"); Set<GroupPrincipal> aclsq1 = authMap.getWriteACLs(q1); assertEquals(0, aclsq1.size()); } @Test public void testAdvisory() { ActiveMQDestination dest = AdvisorySupport.getConnectionAdvisoryTopic(); Set<GroupPrincipal> acls = authMap.getWriteACLs(dest); assertEquals(1, acls.size()); assertTrue(acls.contains(new GroupPrincipal("role3"))); } @Test public void testTemp() { Set<GroupPrincipal> acls = authMap.getTempDestinationAdminACLs(); assertEquals(1, acls.size()); assertTrue(acls.contains(new GroupPrincipal("role1"))); } }