/*
* Copyright 2013 Red Hat Inc. and/or its affiliates and other contributors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
* http://www.apache.org/licenses/LICENSE-2.0
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.switchyard.test.quickstarts.demo;
import java.io.File;
import java.io.FileInputStream;
import java.security.KeyStore;
import javax.net.ssl.KeyManagerFactory;
import javax.net.ssl.SSLContext;
import javax.net.ssl.TrustManagerFactory;
import org.custommonkey.xmlunit.XMLAssert;
import org.jboss.arquillian.container.test.api.Deployment;
import org.jboss.arquillian.junit.Arquillian;
import org.jboss.as.arquillian.api.ServerSetup;
import org.jboss.as.arquillian.api.ServerSetupTask;
import org.jboss.as.arquillian.container.ManagementClient;
import org.jboss.dmr.ModelNode;
import org.jboss.shrinkwrap.api.spec.JavaArchive;
import org.junit.Assert;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.switchyard.common.io.pull.StringPuller;
import org.switchyard.component.test.mixins.http.HTTPMixIn;
import org.switchyard.test.ArquillianUtil;
import org.switchyard.test.quickstarts.util.ResourceDeployer;
/**
* The policy-security-cert demo quickstart test.
*
* @author David Ward <<a href="mailto:dward@jboss.org">dward@jboss.org</a>> © 2012 Red Hat Inc.
*/
@RunWith(Arquillian.class)
@ServerSetup(PolicySecurityCertDemoQuickstartTest.SSLSocketBindingSetupTask.class)
public class PolicySecurityCertDemoQuickstartTest {
private static String SRC_DIR = System.getProperty("jboss.home") + "/quickstarts/demos/policy-security-cert";
@Deployment(testable = false)
public static JavaArchive createDeployment() {
return ArquillianUtil.createJarDemoDeployment("switchyard-demo-policy-security-cert");
}
@Test
public void testUnsecure() throws Exception {
String response = invokeWorkService("http", 8080, "policy-security-cert", null, null);
Assert.assertTrue(response.toLowerCase().contains("fault"));
}
@Test
public void testConfidentialSecure() throws Exception {
KeyStore keystore = KeyStore.getInstance("JKS");
keystore.load(new FileInputStream(new File(SRC_DIR, "connector.jks")), "changeit".toCharArray());
TrustManagerFactory tmf = TrustManagerFactory.getInstance("SunX509");
tmf.init(keystore);
KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
keyManagerFactory.init(keystore, "changeit".toCharArray());
SSLContext sslcontext = SSLContext.getInstance("TLS");
sslcontext.init(keyManagerFactory.getKeyManagers(), tmf.getTrustManagers(), null);
String response = invokeWorkService("https", 8443, "policy-security-cert",
new StringPuller().pull(new File(SRC_DIR, "src/test/resources/xml/BinarySecurityToken.xml")), sslcontext);
XMLAssert.assertXpathEvaluatesTo("true", "//received", response);
}
private String invokeWorkService(String scheme, int port, String context, String binarySecurityToken, SSLContext sslContext) throws Exception {
String soapRequest = new StringPuller().pull(new File(SRC_DIR, "src/test/resources/xml/soap-request.xml"))
.replaceAll("WORK_CMD", "CMD-" + System.currentTimeMillis());
if (binarySecurityToken != null) {
soapRequest = soapRequest.replaceFirst("<!-- BinarySecurityToken -->", binarySecurityToken);
}
HTTPMixIn http = new HTTPMixIn(sslContext);
http.initialize();
try {
String endpoint = String.format("%s://localhost:%s/%s/WorkService", scheme, port, context);
return http.postString(endpoint, soapRequest);
} finally {
http.uninitialize();
}
}
public static class SSLSocketBindingSetupTask implements ServerSetupTask {
@Override
public void setup(ManagementClient client, String unused) throws Exception {
ResourceDeployer.setupSSL(client, new File(SRC_DIR, "connector.jks").getAbsolutePath(), "changeit");
ModelNode op = new ModelNode();
op.get("operation").set("add");
op.get("address").add("subsystem", "security");
op.get("address").add("security-domain", "policy-security-cert");
op.get("cache-type").set("default");
client.getControllerClient().execute(op);
ModelNode loginModule = new ModelNode();
loginModule.get("code").set("org.switchyard.security.login.CertificateLoginModule");
loginModule.get("flag").set("required");
loginModule.get("module-options").add("keyStoreLocation",
new File(SRC_DIR, "users.jks").getAbsolutePath());
loginModule.get("module-options").add("keyStorePassword", "changeit");
loginModule.get("module-options").add("rolesProperties",
new File(SRC_DIR, "roles.properties").getAbsolutePath());
op = new ModelNode();
op.get("operation").set("add");
op.get("address").add("subsystem", "security");
op.get("address").add("security-domain", "policy-security-cert");
op.get("address").add("authentication", "classic");
op.get("login-modules").add(loginModule);
op.get("operation-headers", "allow-resource-service-restart").set("true");
client.getControllerClient().execute(op);
Thread.sleep(1000);
}
@Override
public void tearDown(ManagementClient client, String unused) throws Exception {
ResourceDeployer.tearDownSSL(client);
ModelNode op = new ModelNode();
op.get("operation").set("remove");
op.get("address").add("subsystem", "security");
op.get("address").add("security-domain", "policy-security-cert");
client.getControllerClient().execute(op);
}
}
}