/* * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. * * Copyright (c) 2010-2017 Oracle and/or its affiliates. All rights reserved. * * The contents of this file are subject to the terms of either the GNU * General Public License Version 2 only ("GPL") or the Common Development * and Distribution License("CDDL") (collectively, the "License"). You * may not use this file except in compliance with the License. You can * obtain a copy of the License at * http://glassfish.java.net/public/CDDL+GPL_1_1.html * or packager/legal/LICENSE.txt. See the License for the specific * language governing permissions and limitations under the License. * * When distributing the software, include this License Header Notice in each * file and include the License file at packager/legal/LICENSE.txt. * * GPL Classpath Exception: * Oracle designates this particular file as subject to the "Classpath" * exception as provided by Oracle in the GPL Version 2 section of the License * file that accompanied this code. * * Modifications: * If applicable, add the following below the License Header, with the fields * enclosed by brackets [] replaced by your own identifying information: * "Portions Copyright [year] [name of copyright owner]" * * Contributor(s): * If you wish your version of this file to be governed by only the CDDL or * only the GPL Version 2, indicate your decision by adding "[Contributor] * elects to include this software in this distribution under the [CDDL or GPL * Version 2] license." If you don't indicate a single choice of license, a * recipient has the option to distribute your version of this file under * either the CDDL, the GPL Version 2 or to extend the choice of license to * its licensees as provided above. However, if you add GPL Version 2 code * and therefore, elected the GPL Version 2 license, then the option applies * only if the new code is made subject to such option by the copyright * holder. */ package org.glassfish.jersey.tests.e2e.server.filter; import java.security.Principal; import javax.ws.rs.GET; import javax.ws.rs.POST; import javax.ws.rs.Path; import javax.ws.rs.Priorities; import javax.ws.rs.client.Entity; import javax.ws.rs.container.ContainerRequestContext; import javax.ws.rs.container.ContainerRequestFilter; import javax.ws.rs.container.PreMatching; import javax.ws.rs.core.Application; import javax.ws.rs.core.Response; import javax.ws.rs.core.SecurityContext; import javax.annotation.Priority; import javax.annotation.security.DenyAll; import javax.annotation.security.PermitAll; import javax.annotation.security.RolesAllowed; import org.glassfish.jersey.server.ResourceConfig; import org.glassfish.jersey.server.filter.RolesAllowedDynamicFeature; import org.glassfish.jersey.test.JerseyTest; import org.junit.Test; import static org.hamcrest.CoreMatchers.is; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertThat; /** * * @author Paul Sandoz * @author Martin Matula */ public class RolesAllowedTest extends JerseyTest { @PreMatching @Priority(Priorities.AUTHENTICATION) public static class SecurityFilter implements ContainerRequestFilter { public void filter(final ContainerRequestContext request) { final String user = request.getHeaders().getFirst("X-USER"); request.setSecurityContext(new Authenticator(user)); } private static class Authenticator implements SecurityContext { private final Principal principal; Authenticator(final String name) { principal = name == null ? null : new Principal() { public String getName() { return name; } }; } public Principal getUserPrincipal() { return principal; } public boolean isUserInRole(final String role) { return role.equals(principal.getName()) || ("user".equals(role) && "admin".equals(principal.getName())); } public boolean isSecure() { return false; } public String getAuthenticationScheme() { return ""; } } } @Path("/") @PermitAll public static class Resource { @RolesAllowed("user") @GET public String get() { return "GET"; } @RolesAllowed("admin") @POST public String post(final String content) { return content; } @Path("sub") public SubResource getSubResource() { return new SubResource(); } } @RolesAllowed("admin") public static class SubResource { @Path("deny-all") @DenyAll @GET public String denyAll() { return "GET"; } @Path("permit-all") @PermitAll @GET public String permitAll() { return "GET"; } } @Override protected Application configure() { return new ResourceConfig(Resource.class, RolesAllowedDynamicFeature.class, SecurityFilter.class); } @Test public void testGetAsUser() { assertEquals("GET", target().request().header("X-USER", "user").get(String.class)); } @Test public void testGetAsAdmin() { assertEquals("GET", target().request().header("X-USER", "admin").get(String.class)); } @Test public void testPostAsUser() { final Response cr = target().request().header("X-USER", "user").post(Entity.text("POST")); assertEquals(403, cr.getStatus()); } @Test public void testPostAsAdmin() { assertEquals("POST", target().request().header("X-USER", "admin").post(Entity.text("POST"), String.class)); } @Test public void testDenyAll() { assertEquals(403, target("sub/deny-all").request().header("X-USER", "admin").get().getStatus()); } @Test public void testPermitAll() { assertEquals("GET", target("sub/permit-all").request().header("X-USER", "xyz").get(String.class)); } @Test public void testNotAuthorized() { assertThat("User should not be authorized.", target().request().get().getStatus(), is(403)); } }