1 /*******************************************************************************
\r
2 * ============LICENSE_START====================================================
\r
4 * * ===========================================================================
\r
5 * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
\r
6 * * ===========================================================================
\r
7 * * Licensed under the Apache License, Version 2.0 (the "License");
\r
8 * * you may not use this file except in compliance with the License.
\r
9 * * You may obtain a copy of the License at
\r
11 * * http://www.apache.org/licenses/LICENSE-2.0
\r
13 * * Unless required by applicable law or agreed to in writing, software
\r
14 * * distributed under the License is distributed on an "AS IS" BASIS,
\r
15 * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
\r
16 * * See the License for the specific language governing permissions and
\r
17 * * limitations under the License.
\r
18 * * ============LICENSE_END====================================================
\r
20 * * ECOMP is a trademark and service mark of AT&T Intellectual Property.
\r
22 ******************************************************************************/
\r
23 package org.onap.aaf.cadi.lur.test;
\r
25 import static junit.framework.Assert.assertEquals;
\r
26 import static junit.framework.Assert.assertFalse;
\r
27 import static junit.framework.Assert.assertTrue;
\r
29 import java.io.ByteArrayOutputStream;
\r
30 import java.io.IOException;
\r
31 import java.security.Principal;
\r
32 import java.util.ArrayList;
\r
33 import java.util.List;
\r
34 import java.util.Set;
\r
35 import java.util.TreeSet;
\r
37 import org.junit.Test;
\r
38 import org.onap.aaf.cadi.Lur;
\r
39 import org.onap.aaf.cadi.Permission;
\r
40 import org.onap.aaf.cadi.PropAccess;
\r
41 import org.onap.aaf.cadi.Symm;
\r
42 import org.onap.aaf.cadi.CredVal.Type;
\r
43 import org.onap.aaf.cadi.config.UsersDump;
\r
44 import org.onap.aaf.cadi.lur.LocalLur;
\r
45 import org.onap.aaf.cadi.lur.LocalPermission;
\r
47 public class JU_LocalLur {
\r
50 public void test() throws IOException {
\r
51 Symm symmetric = Symm.baseCrypt().obtain();
\r
53 ByteArrayOutputStream baos = new ByteArrayOutputStream();
\r
54 baos.write(Symm.ENC.getBytes());
\r
55 symmetric.enpass("<pass>", baos);
\r
56 PropAccess ta = new PropAccess();
\r
57 Lur ml = up = new LocalLur(ta,"myname:groupA,groupB","admin:myname,yourname;suser:hisname,hername,m1234%"+baos.toString());
\r
59 Permission admin = new LocalPermission("admin");
\r
60 Permission suser = new LocalPermission("suser");
\r
63 assertTrue(ml.fish(new JUPrincipal("myname"),admin));
\r
64 assertTrue(ml.fish(new JUPrincipal("hisname"),admin));
\r
65 assertFalse(ml.fish(new JUPrincipal("noname"),admin));
\r
66 assertTrue(ml.fish(new JUPrincipal("itsname"),suser));
\r
67 assertTrue(ml.fish(new JUPrincipal("hername"),suser));
\r
68 assertFalse(ml.fish(new JUPrincipal("myname"),suser));
\r
71 // Check validate password
\r
72 assertTrue(up.validate("m1234",Type.PASSWORD, "<pass>".getBytes()));
\r
73 assertFalse(up.validate("m1234",Type.PASSWORD, "badPass".getBytes()));
\r
76 Set<String> set = new TreeSet<String>();
\r
77 List<Permission> perms = new ArrayList<Permission>();
\r
78 ml.fishAll(new JUPrincipal("myname"), perms);
\r
79 for(Permission p : perms) {
\r
80 set.add(p.getKey());
\r
82 assertEquals("[admin, groupA, groupB]",set.toString());
\r
83 UsersDump.write(System.out, up);
\r
88 // Simplistic Principal for testing purposes
\r
89 private static class JUPrincipal implements Principal {
\r
90 private String name;
\r
91 public JUPrincipal(String name) {
\r
95 public String getName() {
\r
101 public void test1() throws IOException {
\r
102 Symm symmetric = Symm.baseCrypt().obtain();
\r
104 ByteArrayOutputStream baos = new ByteArrayOutputStream();
\r
105 baos.write(Symm.ENC.getBytes());
\r
106 symmetric.enpass("<pass>", baos);
\r
107 PropAccess ta = new PropAccess();
\r
108 Lur ml = up = new LocalLur(ta,"myname:groupC,groupD","admin:myname,yourname;suser:hisname1,hername2,m1234%"+baos.toString());
\r
110 Permission admin = new LocalPermission("admin1");
\r
111 Permission suser = new LocalPermission("suser1");
\r
114 assertTrue(ml.fish(new JUPrincipal("myname1"),admin));
\r
115 assertTrue(ml.fish(new JUPrincipal("hisname1"),admin));
\r
116 assertFalse(ml.fish(new JUPrincipal("noname1"),admin));
\r
117 assertTrue(ml.fish(new JUPrincipal("itsname1"),suser));
\r
118 assertTrue(ml.fish(new JUPrincipal("hername1"),suser));
\r
119 assertFalse(ml.fish(new JUPrincipal("myname1"),suser));
\r
122 // Check validate password
\r
123 assertTrue(up.validate("m1234",Type.PASSWORD, "<pass>".getBytes()));
\r
124 assertFalse(up.validate("m1234",Type.PASSWORD, "badPass".getBytes()));
\r
127 Set<String> set = new TreeSet<String>();
\r
128 List<Permission> perms = new ArrayList<Permission>();
\r
129 ml.fishAll(new JUPrincipal("myname"), perms);
\r
130 for(Permission p : perms) {
\r
131 set.add(p.getKey());
\r
133 assertEquals("[admin, groupA, groupB]",set.toString());
\r
134 UsersDump.write(System.out, up);
\r
135 System.out.flush();
\r
139 // Simplistic Principal for testing purposes
\r
140 private static class JUPrincipal2 implements Principal {
\r
141 private String name;
\r
142 public JUPrincipal2(String name) {
\r
146 public String getName() {
\r