/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.cxf.systest.kerberos.jaxrs.kerberos; import java.io.File; import java.nio.charset.StandardCharsets; import java.nio.file.FileSystems; import java.nio.file.Files; import java.nio.file.Path; import org.apache.cxf.configuration.security.AuthorizationPolicy; import org.apache.cxf.ext.logging.LoggingOutInterceptor; import org.apache.cxf.jaxrs.client.JAXRSClientFactory; import org.apache.cxf.jaxrs.client.WebClient; import org.apache.cxf.jaxrs.security.KerberosAuthOutInterceptor; import org.apache.cxf.systest.kerberos.common.SecurityTestUtil; import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase; import org.apache.cxf.transport.http.auth.HttpAuthHeader; import org.apache.cxf.transport.http.auth.SpnegoAuthSupplier; import org.apache.directory.server.annotations.CreateKdcServer; import org.apache.directory.server.annotations.CreateTransport; import org.apache.directory.server.core.annotations.ApplyLdifFiles; import org.apache.directory.server.core.annotations.CreateDS; import org.apache.directory.server.core.annotations.CreateIndex; import org.apache.directory.server.core.annotations.CreatePartition; import org.apache.directory.server.core.integ.AbstractLdapTestUnit; import org.apache.directory.server.core.integ.FrameworkRunner; import org.apache.directory.server.core.kerberos.KeyDerivationInterceptor; import org.ietf.jgss.GSSName; import org.junit.Assert; import org.junit.Before; import org.junit.BeforeClass; import org.junit.Test; import org.junit.runner.RunWith; /** * A set of tests for Kerberos Tokens that use an Apache DS instance as the KDC. */ @RunWith(FrameworkRunner.class) //Define the DirectoryService @CreateDS(name = "AbstractKerberosTest-class", enableAccessControl = false, allowAnonAccess = false, enableChangeLog = true, partitions = { @CreatePartition( name = "example", suffix = "dc=example,dc=com", indexes = { @CreateIndex(attribute = "objectClass"), @CreateIndex(attribute = "dc"), @CreateIndex(attribute = "ou") } ) }, additionalInterceptors = { KeyDerivationInterceptor.class } ) @CreateKdcServer( transports = { @CreateTransport(protocol = "KRB", address = "localhost") }, primaryRealm = "service.ws.apache.org", kdcPrincipal = "krbtgt/service.ws.apache.org@service.ws.apache.org" ) //Inject an file containing entries @ApplyLdifFiles("kerberos.ldif") public class JAXRSKerberosBookTest extends AbstractLdapTestUnit { public static final String PORT = BookKerberosServer.PORT; private static final String KERBEROS_CONFIG_FILE = "org/apache/cxf/systest/kerberos/jaxrs/kerberos/kerberosClient.xml"; private static boolean runTests; private static boolean portUpdated; @Before public void updatePort() throws Exception { if (!portUpdated) { String basedir = System.getProperty("basedir"); if (basedir == null) { basedir = new File(".").getCanonicalPath(); } // Read in krb5.conf and substitute in the correct port Path path = FileSystems.getDefault().getPath(basedir, "/src/test/resources/krb5.conf"); String content = new String(Files.readAllBytes(path), StandardCharsets.UTF_8); content = content.replaceAll("port", "" + super.getKdcServer().getTransports()[0].getPort()); Path path2 = FileSystems.getDefault().getPath(basedir, "/target/test-classes/jaxrs.krb5.conf"); Files.write(path2, content.getBytes()); System.setProperty("java.security.krb5.conf", path2.toString()); portUpdated = true; } } @BeforeClass public static void startServers() throws Exception { // // This test fails with the IBM JDK // if (!"IBM Corporation".equals(System.getProperty("java.vendor"))) { runTests = true; String basedir = System.getProperty("basedir"); if (basedir == null) { basedir = new File(".").getCanonicalPath(); } // System.setProperty("sun.security.krb5.debug", "true"); System.setProperty("java.security.auth.login.config", basedir + "/src/test/resources/kerberos.jaas"); } // Launch servers org.junit.Assert.assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork AbstractBusClientServerTestBase.launchServer(BookKerberosServer.class, true) ); } @org.junit.AfterClass public static void cleanup() throws Exception { SecurityTestUtil.cleanup(); AbstractBusClientServerTestBase.stopAllServers(); } @Test public void testGetBookWithConfigInHttpConduit() throws Exception { if (!runTests) { return; } doTestGetBook123Proxy(KERBEROS_CONFIG_FILE); } private void doTestGetBook123Proxy(String configFile) throws Exception { BookStore bs = JAXRSClientFactory.create("http://localhost:" + PORT, BookStore.class, configFile); WebClient.getConfig(bs).getOutInterceptors().add(new LoggingOutInterceptor()); SpnegoAuthSupplier authSupplier = new SpnegoAuthSupplier(); authSupplier.setServicePrincipalName("bob@service.ws.apache.org"); authSupplier.setServiceNameType(GSSName.NT_HOSTBASED_SERVICE); WebClient.getConfig(bs).getHttpConduit().setAuthSupplier(authSupplier); // just to verify the interface call goes through CGLIB proxy too Assert.assertEquals("http://localhost:" + PORT, WebClient.client(bs).getBaseURI().toString()); Book b = bs.getBook("123"); Assert.assertEquals(b.getId(), 123); b = bs.getBook("123"); Assert.assertEquals(b.getId(), 123); } @Test public void testGetBookWithInterceptor() throws Exception { if (!runTests) { return; } WebClient wc = WebClient.create("http://localhost:" + PORT + "/bookstore/books/123"); KerberosAuthOutInterceptor kbInterceptor = new KerberosAuthOutInterceptor(); AuthorizationPolicy policy = new AuthorizationPolicy(); policy.setAuthorizationType(HttpAuthHeader.AUTH_TYPE_NEGOTIATE); policy.setAuthorization("alice"); policy.setUserName("alice"); policy.setPassword("alice"); kbInterceptor.setPolicy(policy); kbInterceptor.setCredDelegation(true); WebClient.getConfig(wc).getOutInterceptors().add(new LoggingOutInterceptor()); WebClient.getConfig(wc).getOutInterceptors().add(kbInterceptor); // Required so as to get it working with our KDC kbInterceptor.setServicePrincipalName("bob@service.ws.apache.org"); kbInterceptor.setServiceNameType(GSSName.NT_HOSTBASED_SERVICE); Book b = wc.get(Book.class); Assert.assertEquals(b.getId(), 123); } }