/* * JBoss, Home of Professional Open Source. * Copyright 2017, Red Hat Middleware LLC, and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.wildfly.test.integration.elytron.realmmappers; import java.util.ArrayList; import java.util.List; import org.wildfly.test.security.common.AbstractElytronSetupTask; import org.wildfly.test.security.common.elytron.ConfigurableElement; import org.wildfly.test.security.common.elytron.PropertiesRealm; import org.wildfly.test.security.common.elytron.SimpleSecurityDomain; import org.wildfly.test.security.common.elytron.UndertowDomainMapper; import org.wildfly.test.security.servlets.SecuredPrincipalPrintingServlet; /** * * @author olukas */ public class RealmMapperServerSetupTask extends AbstractElytronSetupTask { public static final String USER_IN_DEFAULT_REALM = "userInDefaultRealm"; public static final String USER_IN_REALM1 = "userInRealm1"; public static final String USER_IN_REALM2 = "userInRealm2"; public static final String USER_IN_REALM3 = "userInRealm3"; public static final String USER_IN_DEFAULT_REALM_MAPPED = "userInDefaultRealm&mapped"; public static final String USER_IN_DEFAULT_REALM_MAPPED2 = "userInDefaultRealm@mapped2"; public static final String USER_IN_REALM1_WITH_REALM = "userInRealm1@realm1"; public static final String USER_IN_REALM1_WITH_REALM_AND_SUFFIX = "userInRealm1@realm1&suffix"; public static final String USER_IN_REALM1_WITH_INFIX_AND_SUFFIX = "userInRealm1@infix&suffix"; public static final String USER_IN_REALM1_WITH_REALM_AND_DIFFERENT_SUFFIX = "userInRealm1@realm1&different"; public static final String USER_IN_REALM2_WITH_REALM1 = "userInRealm2&realm1"; public static final String CORRECT_PASSWORD = "password"; public static final String SECURITY_DOMAIN_NAME = "constantRealmMapperSecurityDomain"; public static final String SECURITY_DOMAIN_REFERENCE = "usedSecurityDomain"; public static final String DEFAULT_REALM = "defaultRealm"; public static final String REALM1 = "realm1"; public static final String REALM2 = "realm2"; public static final String REALM3 = "realm3"; @Override protected ConfigurableElement[] getConfigurableElements() { List<ConfigurableElement> elements = new ArrayList<>(); elements.add(PropertiesRealm.builder().withName(DEFAULT_REALM) .withUser(USER_IN_DEFAULT_REALM, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_DEFAULT_REALM_MAPPED, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_DEFAULT_REALM_MAPPED2, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .build()); elements.add(PropertiesRealm.builder().withName(REALM1) .withUser(USER_IN_REALM1, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_REALM1_WITH_REALM, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_REALM1_WITH_REALM_AND_SUFFIX, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_REALM1_WITH_INFIX_AND_SUFFIX, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_REALM1_WITH_REALM_AND_DIFFERENT_SUFFIX, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .build()); elements.add(PropertiesRealm.builder().withName(REALM2) .withUser(USER_IN_REALM2, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .withUser(USER_IN_REALM2_WITH_REALM1, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE) .build()); elements.add(PropertiesRealm.builder().withName(REALM3) .withUser(USER_IN_REALM3, CORRECT_PASSWORD, SecuredPrincipalPrintingServlet.ALLOWED_ROLE).build()); SimpleSecurityDomain.SecurityDomainRealm sdDefaultRealm = SimpleSecurityDomain.SecurityDomainRealm.builder().withRoleDecoder("groups-to-roles") .withRealm(DEFAULT_REALM).build(); SimpleSecurityDomain.SecurityDomainRealm sdRealm1 = SimpleSecurityDomain.SecurityDomainRealm.builder().withRoleDecoder("groups-to-roles") .withRealm(REALM1).build(); SimpleSecurityDomain.SecurityDomainRealm sdRealm2 = SimpleSecurityDomain.SecurityDomainRealm.builder().withRoleDecoder("groups-to-roles") .withRealm(REALM2).build(); SimpleSecurityDomain.SecurityDomainRealm sdRealm3 = SimpleSecurityDomain.SecurityDomainRealm.builder().withRoleDecoder("groups-to-roles") .withRealm(REALM3).build(); elements.add(SimpleSecurityDomain.builder().withName(SECURITY_DOMAIN_NAME).withDefaultRealm(DEFAULT_REALM) .withPermissionMapper("default-permission-mapper").withRealms(sdDefaultRealm, sdRealm1, sdRealm2, sdRealm3) .build()); elements.add(UndertowDomainMapper.builder().withName(SECURITY_DOMAIN_NAME) .withApplicationDomains(SECURITY_DOMAIN_REFERENCE) .build()); return elements.toArray(new ConfigurableElement[elements.size()]); } }