Permalink
Browse files

AS7-5737 Test referrals with 2 LDAP servers

  • Loading branch information...
1 parent 34a30bc commit 9eadafb43e62edbb2ae7384e891841c153292d4e @kwart kwart committed with bstansberry Apr 3, 2013
@@ -256,7 +256,7 @@
<!-- Tests to execute. Overriden in webProfileExclusion.profile . -->
<excludes>
<!-- truststore setting used in LDAPs testing is affected by some other test -->
- <exclude>org/jboss/as/test/integration/security/loginmodules/Ldap*LoginModuleTestCase.java</exclude>
+ <exclude>org/jboss/as/test/integration/security/loginmodules/Ldap*TestCase.java</exclude>
<!-- 2nd run tests are run in other execution. -->
<exclude>org/jboss/as/test/integration/**/*SecondTestCase.java</exclude>
<!-- Tests which need FULL config. -->
@@ -318,7 +318,7 @@
<goals><goal>test</goal></goals>
<configuration>
<includes>
- <include>org/jboss/as/test/integration/security/loginmodules/Ldap*LoginModuleTestCase.java</include>
+ <include>org/jboss/as/test/integration/security/loginmodules/Ldap*TestCase.java</include>
</includes>
<systemPropertyVariables>
@@ -378,7 +378,7 @@
</includes>
<excludes>
<exclude>org/jboss/as/test/integration/**/*SecondTestCase.java</exclude>
- <exclude>org/jboss/as/test/integration/security/loginmodules/Ldap*LoginModuleTestCase.java</exclude>
+ <exclude>org/jboss/as/test/integration/security/loginmodules/Ldap*TestCase.java</exclude>
</excludes>
</configuration>
</execution>
@@ -0,0 +1,249 @@
+package org.jboss.as.test.integration.security.loginmodules;
+
+import java.io.File;
+import java.io.FileNotFoundException;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+
+import org.apache.commons.io.FileUtils;
+import org.apache.commons.io.IOUtils;
+import org.apache.commons.lang.text.StrSubstitutor;
+import org.apache.directory.server.annotations.CreateLdapServer;
+import org.apache.directory.server.annotations.CreateTransport;
+import org.apache.directory.server.core.annotations.AnnotationUtils;
+import org.apache.directory.server.core.annotations.ContextEntry;
+import org.apache.directory.server.core.annotations.CreateDS;
+import org.apache.directory.server.core.annotations.CreateIndex;
+import org.apache.directory.server.core.annotations.CreatePartition;
+import org.apache.directory.server.core.api.DirectoryService;
+import org.apache.directory.server.core.factory.DSAnnotationProcessor;
+import org.apache.directory.server.core.kerberos.KeyDerivationInterceptor;
+import org.apache.directory.server.factory.ServerAnnotationProcessor;
+import org.apache.directory.server.ldap.LdapServer;
+import org.apache.directory.shared.ldap.model.entry.DefaultEntry;
+import org.apache.directory.shared.ldap.model.ldif.LdifEntry;
+import org.apache.directory.shared.ldap.model.ldif.LdifReader;
+import org.apache.directory.shared.ldap.model.schema.SchemaManager;
+import org.apache.http.NameValuePair;
+import org.apache.http.client.utils.URLEncodedUtils;
+import org.apache.http.message.BasicNameValuePair;
+import org.jboss.as.arquillian.api.ServerSetupTask;
+import org.jboss.as.arquillian.container.ManagementClient;
+import org.jboss.as.network.NetworkUtils;
+import org.jboss.as.test.integration.security.common.AbstractSystemPropertiesServerSetupTask;
+import org.jboss.as.test.integration.security.common.ManagedCreateLdapServer;
+import org.jboss.as.test.integration.security.common.ManagedCreateTransport;
+import org.jboss.as.test.integration.security.common.Utils;
+import org.jboss.as.test.integration.security.loginmodules.common.servlets.RolePrintingServlet;
+import org.jboss.logging.Logger;
+
+/**
+ * A server setup task which configures and starts 2 LDAP servers for {@link LdapExtLoginModuleTestCase} and
+ * {@link LdapExtLikeAdvancedLdapLMTestCase}.
+ */
+public class LdapExtLDAPServerSetupTask implements ServerSetupTask {
+
+ private static Logger LOGGER = Logger.getLogger(LdapExtLDAPServerSetupTask.class);
+
+ static final String SECURITY_CREDENTIALS = "secret";
+ static final String SECURITY_PRINCIPAL = "uid=admin,ou=system";
+
+ static final String KEYSTORE_FILENAME = "ldaps.jks";
+ static final File KEYSTORE_FILE = new File(KEYSTORE_FILENAME);
+ static final int LDAP_PORT = 10389;
+ static final int LDAP_PORT2 = 11389;
+ static final int LDAPS_PORT = 10636;
+
+ static final String[] ROLE_NAMES = { "TheDuke", "Echo", "TheDuke2", "Echo2", "JBossAdmin", "jduke", "jduke2", "RG1", "RG2",
+ "RG3", "R1", "R2", "R3", "R4", "R5", "Roles", "User", "Admin", "SharedRoles" };
+
+ static final String QUERY_ROLES;
+ static {
+ final List<NameValuePair> qparams = new ArrayList<NameValuePair>();
+ for (final String role : ROLE_NAMES) {
+ qparams.add(new BasicNameValuePair(RolePrintingServlet.PARAM_ROLE_NAME, role));
+ }
+ QUERY_ROLES = URLEncodedUtils.format(qparams, "UTF-8");
+ }
+
+ private DirectoryService directoryService1;
+ private DirectoryService directoryService2;
+ private LdapServer ldapServer1;
+ private LdapServer ldapServer2;
+
+ /**
+ * Creates directory services, starts LDAP server and KDCServer
+ *
+ * @param managementClient
+ * @param containerId
+ * @throws Exception
+ * @see org.jboss.as.arquillian.api.ServerSetupTask#setup(org.jboss.as.arquillian.container.ManagementClient,
+ * java.lang.String)
+ */
+ public void setup(ManagementClient managementClient, String containerId) throws Exception {
+ final String hostname = Utils.getSecondaryTestAddress(managementClient, false);
+ createLdap1(hostname);
+ createLdap2(hostname);
+ }
+
+ //@formatter:off
+ @CreateDS(
+ name = "JBossDS",
+ partitions =
+ {
+ @CreatePartition(
+ name = "jboss",
+ suffix = "dc=jboss,dc=org",
+ contextEntry = @ContextEntry(
+ entryLdif =
+ "dn: dc=jboss,dc=org\n" +
+ "dc: jboss\n" +
+ "objectClass: top\n" +
+ "objectClass: domain\n\n" ),
+ indexes =
+ {
+ @CreateIndex( attribute = "objectClass" ),
+ @CreateIndex( attribute = "dc" ),
+ @CreateIndex( attribute = "ou" )
+ })
+ },
+ additionalInterceptors = { KeyDerivationInterceptor.class })
+ @CreateLdapServer (
+ transports =
+ {
+ @CreateTransport( protocol = "LDAP", port = LDAP_PORT),
+ @CreateTransport( protocol = "LDAPS", port = LDAPS_PORT)
+ },
+ certificatePassword="secret")
+ //@formatter:on
+ public void createLdap1(final String hostname) throws Exception, IOException, ClassNotFoundException, FileNotFoundException {
+ final Map<String, String> map = new HashMap<String, String>();
+ map.put("hostname", NetworkUtils.formatPossibleIpv6Address(hostname));
+ map.put("ldapPort2", Integer.toString(LDAP_PORT2));
+ directoryService1 = DSAnnotationProcessor.getDirectoryService();
+ final String ldifContent = StrSubstitutor.replace(
+ IOUtils.toString(
+ LdapExtLoginModuleTestCase.class.getResourceAsStream(LdapExtLoginModuleTestCase.class.getSimpleName()
+ + ".ldif"), "UTF-8"), map);
+ LOGGER.debug(ldifContent);
+
+ final SchemaManager schemaManager = directoryService1.getSchemaManager();
+ try {
+ for (LdifEntry ldifEntry : new LdifReader(IOUtils.toInputStream(ldifContent))) {
+ directoryService1.getAdminSession().add(new DefaultEntry(schemaManager, ldifEntry.getEntry()));
+ }
+ } catch (Exception e) {
+ e.printStackTrace();
+ throw e;
+ }
+ final ManagedCreateLdapServer createLdapServer = new ManagedCreateLdapServer(
+ (CreateLdapServer) AnnotationUtils.getInstance(CreateLdapServer.class));
+ FileOutputStream fos = new FileOutputStream(KEYSTORE_FILE);
+ IOUtils.copy(getClass().getResourceAsStream(KEYSTORE_FILENAME), fos);
+ fos.close();
+ createLdapServer.setKeyStore(KEYSTORE_FILE.getAbsolutePath());
+ fixTransportAddress(createLdapServer, hostname);
+ ldapServer1 = ServerAnnotationProcessor.instantiateLdapServer(createLdapServer, directoryService1);
+ ldapServer1.start();
+ }
+
+ //@formatter:off
+ @CreateDS(
+ name = "JBossComDS",
+ partitions =
+ {
+ @CreatePartition(
+ name = "jbossCom",
+ suffix = "dc=jboss,dc=com",
+ contextEntry = @ContextEntry(
+ entryLdif =
+ "dn: dc=jboss,dc=com\n" +
+ "dc: jboss\n" +
+ "objectClass: top\n" +
+ "objectClass: domain\n\n" ),
+ indexes =
+ {
+ @CreateIndex( attribute = "objectClass" ),
+ @CreateIndex( attribute = "dc" ),
+ @CreateIndex( attribute = "ou" )
+ })
+ },
+ additionalInterceptors = { KeyDerivationInterceptor.class })
+ @CreateLdapServer (
+ transports =
+ {
+ @CreateTransport( protocol = "LDAP", port = LDAP_PORT2)
+ })
+ //@formatter:on
+ public void createLdap2(final String hostname) throws Exception, IOException, ClassNotFoundException, FileNotFoundException {
+ directoryService2 = DSAnnotationProcessor.getDirectoryService();
+ final SchemaManager schemaManager = directoryService2.getSchemaManager();
+ try {
+ for (LdifEntry ldifEntry : new LdifReader(
+ LdapExtLoginModuleTestCase.class.getResourceAsStream(LdapExtLoginModuleTestCase.class.getSimpleName()
+ + "2.ldif"))) {
+ directoryService2.getAdminSession().add(new DefaultEntry(schemaManager, ldifEntry.getEntry()));
+ }
+ } catch (Exception e) {
+ e.printStackTrace();
+ throw e;
+ }
+ final ManagedCreateLdapServer createLdapServer = new ManagedCreateLdapServer(
+ (CreateLdapServer) AnnotationUtils.getInstance(CreateLdapServer.class));
+ fixTransportAddress(createLdapServer, hostname);
+ ldapServer2 = ServerAnnotationProcessor.instantiateLdapServer(createLdapServer, directoryService2);
+ ldapServer2.start();
+ }
+
+ /**
+ * Fixes bind address in the CreateTransport annotation.
+ *
+ * @param createLdapServer
+ */
+ private void fixTransportAddress(ManagedCreateLdapServer createLdapServer, String address) {
+ final CreateTransport[] createTransports = createLdapServer.transports();
+ for (int i = 0; i < createTransports.length; i++) {
+ final ManagedCreateTransport mgCreateTransport = new ManagedCreateTransport(createTransports[i]);
+ mgCreateTransport.setAddress(address);
+ createTransports[i] = mgCreateTransport;
+ }
+ }
+
+ /**
+ * Stops LDAP server and KDCServer and shuts down the directory service.
+ *
+ * @param managementClient
+ * @param containerId
+ * @throws Exception
+ * @see org.jboss.as.arquillian.api.ServerSetupTask#tearDown(org.jboss.as.arquillian.container.ManagementClient,
+ * java.lang.String)
+ */
+ public void tearDown(ManagementClient managementClient, String containerId) throws Exception {
+ ldapServer2.stop();
+ directoryService2.shutdown();
+ ldapServer1.stop();
+ directoryService1.shutdown();
+ KEYSTORE_FILE.delete();
+ FileUtils.deleteDirectory(directoryService2.getInstanceLayout().getInstanceDirectory());
+ FileUtils.deleteDirectory(directoryService1.getInstanceLayout().getInstanceDirectory());
+ }
+
+ /**
+ * This setup task sets truststore file.
+ */
+ static class SystemPropertiesSetup extends AbstractSystemPropertiesServerSetupTask {
+
+ /**
+ * @see org.jboss.as.test.integration.security.common.AbstractSystemPropertiesServerSetupTask#getSystemProperties()
+ */
+ @Override
+ protected SystemProperty[] getSystemProperties() {
+ return new SystemProperty[] { new DefaultSystemProperty("javax.net.ssl.trustStore", KEYSTORE_FILE.getAbsolutePath()) };
+ }
+ }
+
+}
Oops, something went wrong.

0 comments on commit 9eadafb

Please sign in to comment.