/* * JBoss, Home of Professional Open Source. * Copyright 2012, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.jboss.as.test.integration.security.jacc; import static org.junit.Assert.assertEquals; import java.io.IOException; import java.io.UnsupportedEncodingException; import java.net.MalformedURLException; import java.net.URISyntaxException; import java.net.URL; import org.apache.http.client.ClientProtocolException; import org.jboss.arquillian.container.test.api.Deployment; import org.jboss.arquillian.container.test.api.RunAsClient; import org.jboss.arquillian.junit.Arquillian; import org.jboss.arquillian.test.api.ArquillianResource; import org.jboss.as.arquillian.api.ServerSetup; import org.jboss.as.arquillian.api.ServerSetupTask; import org.jboss.as.security.Constants; import org.jboss.as.test.integration.security.common.AbstractSecurityDomainsServerSetupTask; import org.jboss.as.test.integration.security.common.Utils; import org.jboss.as.test.integration.security.common.config.SecurityDomain; import org.jboss.as.test.integration.security.common.config.SecurityModule; import org.jboss.as.test.integration.security.jacc.propagation.BridgeBean; import org.jboss.as.test.integration.security.jacc.propagation.Manage; import org.jboss.as.test.integration.security.jacc.propagation.PropagationTestServlet; import org.jboss.as.test.integration.security.jacc.propagation.TargetBean; import org.jboss.as.test.integration.security.loginmodules.UsersRolesLoginModuleTestCase; import org.jboss.logging.Logger; import org.jboss.shrinkwrap.api.ShrinkWrap; import org.jboss.shrinkwrap.api.asset.StringAsset; import org.jboss.shrinkwrap.api.spec.WebArchive; import org.junit.Ignore; import org.junit.Test; import org.junit.runner.RunWith; /** * Tests, which checks run-as identity handling in EJB JACC authorization module. * * @author Josef Cacek */ @RunWith(Arquillian.class) @ServerSetup({JACCAuthzPropagationTestCase.SecurityDomainsSetup.class}) @RunAsClient @Ignore("See WFLY-4989") public class JACCAuthzPropagationTestCase { private static final Logger LOGGER = Logger.getLogger(JACCAuthzPropagationTestCase.class); private static final String TEST_NAME = Manage.TEST_NAME; // Public methods -------------------------------------------------------- /** * Creates {@link WebArchive} deployment. */ @Deployment(name = "war") public static WebArchive warDeployment() { LOGGER.trace("Start WAR deployment"); final WebArchive war = ShrinkWrap.create(WebArchive.class, TEST_NAME + ".war"); war.addClasses(PropagationTestServlet.class, Manage.class, BridgeBean.class, TargetBean.class); final StringAsset usersRolesAsset = new StringAsset(Utils.createUsersFromRoles(Manage.ROLES_ALL)); war.addAsResource(usersRolesAsset, "users.properties"); war.addAsResource(usersRolesAsset, "roles.properties"); war.addAsWebInfResource(UsersRolesLoginModuleTestCase.class.getPackage(), "web-basic-authn.xml", "web.xml"); war.addAsWebInfResource(Utils.getJBossWebXmlAsset(TEST_NAME), "jboss-web.xml"); war.addAsWebInfResource(Utils.getJBossEjb3XmlAsset(TEST_NAME), "jboss-ejb3.xml"); return war; } /** * Tests direct permissions (RolesAllowed). * * @param webAppURL * @throws Exception */ @Test public void testTarget(@ArquillianResource URL webAppURL) throws Exception { assertAccessAllowed(webAppURL, Manage.BEAN_NAME_TARGET, PropagationTestServlet.METHOD_NAME_ADMIN, Manage.ROLE_ADMIN); assertAccessAllowed(webAppURL, Manage.BEAN_NAME_TARGET, PropagationTestServlet.METHOD_NAME_MANAGE, Manage.ROLE_MANAGER); assertAccessAllowed(webAppURL, Manage.BEAN_NAME_TARGET, PropagationTestServlet.METHOD_NAME_WORK, Manage.ROLE_ADMIN); assertAccessDenied(webAppURL, Manage.BEAN_NAME_TARGET, PropagationTestServlet.METHOD_NAME_ADMIN, Manage.ROLE_MANAGER); } /** * Tests run-as permissions. * * @param webAppURL * @throws Exception */ @Test public void testBridge(@ArquillianResource URL webAppURL) throws Exception { assertAccessAllowed(webAppURL, Manage.BEAN_NAME_BRIDGE, PropagationTestServlet.METHOD_NAME_MANAGE, Manage.ROLE_ADMIN); assertAccessAllowed(webAppURL, Manage.BEAN_NAME_BRIDGE, PropagationTestServlet.METHOD_NAME_MANAGE, Manage.ROLE_MANAGER); assertAccessAllowed(webAppURL, Manage.BEAN_NAME_BRIDGE, PropagationTestServlet.METHOD_NAME_MANAGE, Manage.ROLE_USER); assertAccessAllowed(webAppURL, Manage.BEAN_NAME_BRIDGE, PropagationTestServlet.METHOD_NAME_WORK, Manage.ROLE_USER); assertAccessDenied(webAppURL, Manage.BEAN_NAME_BRIDGE, PropagationTestServlet.METHOD_NAME_ADMIN, Manage.ROLE_ADMIN); assertAccessDenied(webAppURL, Manage.BEAN_NAME_BRIDGE, PropagationTestServlet.METHOD_NAME_ADMIN, Manage.ROLE_MANAGER); } // Private methods ------------------------------------------------------- /** * Asserts the access to the given method in the given bean is allowed for given role. * * @param webAppURL * @param beanName * @param methodName * @param roleName * @throws ClientProtocolException * @throws IOException * @throws URISyntaxException */ private void assertAccessAllowed(URL webAppURL, String beanName, String methodName, String roleName) throws IOException, URISyntaxException { final URL testUrl = getTestURL(webAppURL, beanName, methodName); assertEquals("Access of role " + roleName + " to " + methodName + " method in " + beanName + " should be allowed.", Manage.RESULT, Utils.makeCallWithBasicAuthn(testUrl, roleName, roleName, 200)); } /** * Asserts the access to the given method in the given bean is denied for given role. * * @param webAppURL * @param beanName * @param methodName * @param roleName * @throws ClientProtocolException * @throws IOException * @throws URISyntaxException */ private void assertAccessDenied(URL webAppURL, String beanName, String methodName, String roleName) throws IOException, URISyntaxException { final URL testUrl = getTestURL(webAppURL, beanName, methodName); assertEquals("Access of role " + roleName + " to " + methodName + " method in " + beanName + " should be denied.", PropagationTestServlet.RESULT_EJB_ACCESS_EXCEPTION, Utils.makeCallWithBasicAuthn(testUrl, roleName, roleName, 200)); } /** * Creates URL of the test application with the given values of request parameters. * * @param webAppURL * @param beanName * @param method * @return * @throws MalformedURLException * @throws UnsupportedEncodingException */ private URL getTestURL(URL webAppURL, String beanName, String method) throws MalformedURLException, UnsupportedEncodingException { return new URL(webAppURL.toExternalForm() + PropagationTestServlet.SERVLET_PATH.substring(1) + "?" // + PropagationTestServlet.PARAM_BEAN_NAME + "=" + beanName + "&" // + PropagationTestServlet.PARAM_METHOD_NAME + "=" + method); } // Embedded classes ------------------------------------------------------ /** * A {@link ServerSetupTask} instance which creates security domains for this test case. * * @author Josef Cacek */ static class SecurityDomainsSetup extends AbstractSecurityDomainsServerSetupTask { /** * @see org.jboss.as.test.integration.security.common.AbstractSecurityDomainsServerSetupTask#getSecurityDomains() */ @Override protected SecurityDomain[] getSecurityDomains() { return new SecurityDomain[]{new SecurityDomain.Builder().name(TEST_NAME) .loginModules(new SecurityModule.Builder().name("UsersRoles").flag(Constants.REQUIRED).build()) // .authorizationModules(new SecurityModule.Builder().name("JACC").flag(Constants.REQUIRED).build()) // .cacheType("default") // .build()}; } } }