/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
*
* Copyright (c) 2010-2016 Oracle and/or its affiliates. All rights reserved.
*
* The contents of this file are subject to the terms of either the GNU
* General Public License Version 2 only ("GPL") or the Common Development
* and Distribution License("CDDL") (collectively, the "License"). You
* may not use this file except in compliance with the License. You can
* obtain a copy of the License at
* http://glassfish.java.net/public/CDDL+GPL_1_1.html
* or packager/legal/LICENSE.txt. See the License for the specific
* language governing permissions and limitations under the License.
*
* When distributing the software, include this License Header Notice in each
* file and include the License file at packager/legal/LICENSE.txt.
*
* GPL Classpath Exception:
* Oracle designates this particular file as subject to the "Classpath"
* exception as provided by Oracle in the GPL Version 2 section of the License
* file that accompanied this code.
*
* Modifications:
* If applicable, add the following below the License Header, with the fields
* enclosed by brackets [] replaced by your own identifying information:
* "Portions Copyright [year] [name of copyright owner]"
*
* Contributor(s):
* If you wish your version of this file to be governed by only the CDDL or
* only the GPL Version 2, indicate your decision by adding "[Contributor]
* elects to include this software in this distribution under the [CDDL or GPL
* Version 2] license." If you don't indicate a single choice of license, a
* recipient has the option to distribute your version of this file under
* either the CDDL, the GPL Version 2 or to extend the choice of license to
* its licensees as provided above. However, if you add GPL Version 2 code
* and therefore, elected the GPL Version 2 license, then the option applies
* only if the new code is made subject to such option by the copyright
* holder.
*/
package org.glassfish.jersey.examples.httpsclientservergrizzly;
import javax.ws.rs.client.Client;
import javax.ws.rs.client.ClientBuilder;
import javax.ws.rs.client.WebTarget;
import javax.ws.rs.core.Response;
import javax.net.ssl.SSLContext;
import org.glassfish.jersey.SslConfigurator;
import org.glassfish.jersey.client.ClientConfig;
import org.glassfish.jersey.client.HttpUrlConnectorProvider;
import org.glassfish.jersey.client.authentication.HttpAuthenticationFeature;
import org.glassfish.jersey.grizzly.connector.GrizzlyConnectorProvider;
import org.glassfish.jersey.logging.LoggingFeature;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertTrue;
/**
* This test class starts the grizzly server and then client performs several SSL (https)
* requests where different scenarios are tested (SSL Client authentication, missing truststore
* configuration, etc.). Server is a Grizzly server configured for SSL support and client
* uses both, {@link HttpUrlConnectorProvider} and {@link GrizzlyConnectorProvider}.
*
* @author Pavel Bucek (pavel.bucek at oracle.com)
*/
public class MainTest {
private static final String TRUSTORE_CLIENT_FILE = "./truststore_client";
private static final String TRUSTSTORE_CLIENT_PWD = "asdfgh";
private static final String KEYSTORE_CLIENT_FILE = "./keystore_client";
private static final String KEYSTORE_CLIENT_PWD = "asdfgh";
private final Object serverGuard = new Object();
private Server server = null;
@Before
public void setUp() throws Exception {
synchronized (serverGuard) {
if (server != null) {
throw new IllegalStateException(
"Test run sync issue: Another instance of the SSL-secured HTTP test server has been already started.");
}
server = Server.start();
}
}
@After
public void tearDown() throws Exception {
synchronized (serverGuard) {
if (server == null) {
throw new IllegalStateException("Test run sync issue: There is no SSL-secured HTTP test server to stop.");
}
server.stop();
server = null;
}
}
@Test
public void testSSLWithBasicAndSSLAuthGrizzlyConnector() {
final ClientConfig clientConfig = getGrizzlyConfig();
_testSSLWithBasicAndSSLAuth(clientConfig);
}
private ClientConfig getGrizzlyConfig() {
return new ClientConfig().connectorProvider(new GrizzlyConnectorProvider());
}
@Test
public void testSSLWithBasicAndSSLAuthHttpUrlConnector() {
final ClientConfig clientConfig = getHttpUrlConnectorConfig();
_testSSLWithBasicAndSSLAuth(clientConfig);
}
private ClientConfig getHttpUrlConnectorConfig() {
return new ClientConfig().connectorProvider(new HttpUrlConnectorProvider());
}
/**
* Test to see that the correct Http status is returned.
*/
private void _testSSLWithBasicAndSSLAuth(ClientConfig clientConfig) {
SslConfigurator sslConfig = SslConfigurator.newInstance()
.trustStoreFile(TRUSTORE_CLIENT_FILE)
.trustStorePassword(TRUSTSTORE_CLIENT_PWD)
.keyStoreFile(KEYSTORE_CLIENT_FILE)
.keyPassword(KEYSTORE_CLIENT_PWD);
final SSLContext sslContext = sslConfig.createSSLContext();
Client client = ClientBuilder.newBuilder().withConfig(clientConfig)
.sslContext(sslContext).build();
// client basic auth demonstration
client.register(HttpAuthenticationFeature.basic("user", "password"));
System.out.println("Client: GET " + Server.BASE_URI);
WebTarget target = client.target(Server.BASE_URI);
final Response response = target.path("/").request().get(Response.class);
assertEquals(200, response.getStatus());
}
@Test
public void testWithoutBasicAuthHttpUrlConnector() {
_testWithoutBasicAuth(getHttpUrlConnectorConfig());
}
@Test
public void testWithoutBasicAuthGrizzlyConnector() {
_testWithoutBasicAuth(getGrizzlyConfig());
}
/**
* Test to see that HTTP 401 is returned when client tries to GET without
* proper credentials.
*/
private void _testWithoutBasicAuth(ClientConfig clientConfig) {
SslConfigurator sslConfig = SslConfigurator.newInstance()
.trustStoreFile(TRUSTORE_CLIENT_FILE)
.trustStorePassword(TRUSTSTORE_CLIENT_PWD)
.keyStoreFile(KEYSTORE_CLIENT_FILE)
.keyPassword(KEYSTORE_CLIENT_PWD);
Client client = ClientBuilder.newBuilder().withConfig(clientConfig).sslContext(sslConfig
.createSSLContext()).build();
System.out.println("Client: GET " + Server.BASE_URI);
WebTarget target = client.target(Server.BASE_URI);
target.register(LoggingFeature.class);
Response response;
try {
response = target.path("/").request().get(Response.class);
} catch (Exception e) {
e.printStackTrace();
throw new RuntimeException(e);
}
assertEquals(401, response.getStatus());
}
/**
* Test to see that SSLHandshakeException is thrown when client don't have
* trusted key.
*/
private void _testWithoutSSLAuthentication(ClientConfig clientConfig) {
SslConfigurator sslConfig = SslConfigurator.newInstance()
.trustStoreFile(TRUSTORE_CLIENT_FILE)
.trustStorePassword(TRUSTSTORE_CLIENT_PWD);
Client client = ClientBuilder.newBuilder()
.withConfig(clientConfig)
.sslContext(sslConfig.createSSLContext()).build();
System.out.println("Client: GET " + Server.BASE_URI);
WebTarget target = client.target(Server.BASE_URI);
target.register(LoggingFeature.class);
boolean caught = false;
try {
target.path("/").request().get(String.class);
} catch (Exception e) {
caught = true;
}
assertTrue(caught);
// solaris throws java.net.SocketException instead of SSLHandshakeException
// assertTrue(msg.contains("SSLHandshakeException"));
}
@Test
public void testWithoutSSLAuthenticationGrizzly() {
_testWithoutSSLAuthentication(getGrizzlyConfig());
}
@Test
public void testWithoutSSLAuthenticationHttpUrlConnector() {
_testWithoutSSLAuthentication(getHttpUrlConnectorConfig());
}
}