Migrate more ThreadLocals
[aaa.git] / aaa-shiro / impl / src / test / java / org / opendaylight / aaa / shiro / realm / TokenAuthRealmTest.java
1 /*
2  * Copyright (c) 2015, 2017 Brocade Communications Systems, Inc. and others.  All rights reserved.
3  *
4  * This program and the accompanying materials are made available under the
5  * terms of the Eclipse Public License v1.0 which accompanies this distribution,
6  * and is available at http://www.eclipse.org/legal/epl-v10.html
7  */
8
9 package org.opendaylight.aaa.shiro.realm;
10
11 import static org.junit.Assert.assertEquals;
12 import static org.junit.Assert.assertNull;
13 import static org.junit.Assert.assertTrue;
14 import static org.mockito.Mockito.mock;
15 import static org.mockito.Mockito.when;
16
17 import com.google.common.collect.Lists;
18 import java.util.HashMap;
19 import java.util.List;
20 import java.util.Map;
21 import org.apache.shiro.authc.AuthenticationToken;
22 import org.junit.Test;
23 import org.opendaylight.aaa.shiro.realm.util.TokenUtils;
24 import org.opendaylight.aaa.shiro.realm.util.http.header.HeaderUtils;
25 import org.opendaylight.aaa.tokenauthrealm.auth.AuthenticationManager;
26 import org.opendaylight.aaa.tokenauthrealm.auth.TokenAuthenticators;
27
28 public class TokenAuthRealmTest {
29     private final TokenAuthRealm testRealm = new TokenAuthRealm(new AuthenticationManager(), new TokenAuthenticators());
30
31     @Test
32     public void testTokenAuthRealm() {
33         assertEquals("TokenAuthRealm", testRealm.getName());
34     }
35
36     @Test(expected = NullPointerException.class)
37     public void testDoGetAuthorizationInfoPrincipalCollectionNullCacheToken() {
38         testRealm.doGetAuthorizationInfo(null);
39     }
40
41     @Test
42     public void testGetUsernamePasswordDomainString() {
43         final String username = "user";
44         final String password = "password";
45         final String domain = "domain";
46         final String expectedUsernamePasswordString = "user:password:domain";
47         assertEquals(expectedUsernamePasswordString, HeaderUtils.getUsernamePasswordDomainString(
48                 username, password, domain));
49     }
50
51     @Test
52     public void testGetEncodedToken() {
53         final String stringToEncode = "admin1:admin1";
54         final byte[] bytesToEncode = stringToEncode.getBytes();
55         final String expectedToken = org.apache.shiro.codec.Base64.encodeToString(bytesToEncode);
56         assertEquals(expectedToken, HeaderUtils.getEncodedToken(stringToEncode));
57     }
58
59     @Test
60     public void testGetTokenAuthHeader() {
61         final String encodedCredentials = HeaderUtils.getEncodedToken(HeaderUtils.getUsernamePasswordDomainString(
62                 "user1", "password", "sdn"));
63         final String expectedTokenAuthHeader = "Basic " + encodedCredentials;
64         assertEquals(expectedTokenAuthHeader, HeaderUtils.getTokenAuthHeader(encodedCredentials));
65     }
66
67     @Test
68     public void testFormHeadersWithToken() {
69         final String authHeader = HeaderUtils.getEncodedToken(
70                 HeaderUtils.getTokenAuthHeader(
71                         HeaderUtils.getUsernamePasswordDomainString(
72                                 "user1", "password", "sdn")));
73         final Map<String, List<String>> expectedHeaders = new HashMap<>();
74         expectedHeaders.put("Authorization", Lists.newArrayList(authHeader));
75         final Map<String, List<String>> actualHeaders = HeaderUtils.formHeadersWithToken(authHeader);
76         List<String> value;
77         for (String key : expectedHeaders.keySet()) {
78             value = expectedHeaders.get(key);
79             assertTrue(actualHeaders.get(key).equals(value));
80         }
81     }
82
83     @Test
84     public void testFormHeaders() {
85         final String username = "basicUser";
86         final String password = "basicPassword";
87         final String domain = "basicDomain";
88         final String authHeader = HeaderUtils.getTokenAuthHeader(HeaderUtils.getEncodedToken(
89                 HeaderUtils.getUsernamePasswordDomainString(
90                         username, password, domain)));
91         final Map<String, List<String>> expectedHeaders = new HashMap<>();
92         expectedHeaders.put("Authorization", Lists.newArrayList(authHeader));
93         final Map<String, List<String>> actualHeaders = HeaderUtils.formHeaders(username, password, domain);
94         List<String> value;
95         for (String key : expectedHeaders.keySet()) {
96             value = expectedHeaders.get(key);
97             assertTrue(actualHeaders.get(key).equals(value));
98         }
99     }
100
101     @Test(expected = org.apache.shiro.authc.AuthenticationException.class)
102     public void testDoGetAuthenticationInfoAuthenticationToken() {
103         testRealm.doGetAuthenticationInfo(null);
104     }
105
106     @Test
107     public void testExtractUsernameNullUsername() {
108         AuthenticationToken at = mock(AuthenticationToken.class);
109         when(at.getPrincipal()).thenReturn(null);
110         assertNull(TokenUtils.extractUsername(at));
111     }
112
113     @Test(expected = ClassCastException.class)
114     public void testExtractPasswordNullPassword() {
115         AuthenticationToken at = mock(AuthenticationToken.class);
116         when(at.getPrincipal()).thenReturn("username");
117         when(at.getCredentials()).thenReturn(null);
118         TokenUtils.extractPassword(at);
119     }
120
121     @Test(expected = ClassCastException.class)
122     public void testExtractUsernameBadUsernameClass() {
123         AuthenticationToken at = mock(AuthenticationToken.class);
124         when(at.getPrincipal()).thenReturn(1);
125         TokenUtils.extractUsername(at);
126     }
127
128     @Test(expected = ClassCastException.class)
129     public void testExtractPasswordBadPasswordClass() {
130         AuthenticationToken at = mock(AuthenticationToken.class);
131         when(at.getPrincipal()).thenReturn("username");
132         when(at.getCredentials()).thenReturn(1);
133         TokenUtils.extractPassword(at);
134     }
135 }