You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@karaf.apache.org by da...@apache.org on 2013/12/05 16:47:21 UTC

svn commit: r1548174 - in /karaf/trunk/itests/src/test/java/org/apache/karaf/itests: KarafTestSupport.java SshCommandSecurityTest.java

Author: davidb
Date: Thu Dec  5 15:47:21 2013
New Revision: 1548174

URL: http://svn.apache.org/r1548174
Log:
Added an SSH-client based itest to test some of the command ACLs 

Currently it only tests the ones for the bundle scope, will add more later.

Added:
    karaf/trunk/itests/src/test/java/org/apache/karaf/itests/SshCommandSecurityTest.java
Modified:
    karaf/trunk/itests/src/test/java/org/apache/karaf/itests/KarafTestSupport.java

Modified: karaf/trunk/itests/src/test/java/org/apache/karaf/itests/KarafTestSupport.java
URL: http://svn.apache.org/viewvc/karaf/trunk/itests/src/test/java/org/apache/karaf/itests/KarafTestSupport.java?rev=1548174&r1=1548173&r2=1548174&view=diff
==============================================================================
--- karaf/trunk/itests/src/test/java/org/apache/karaf/itests/KarafTestSupport.java (original)
+++ karaf/trunk/itests/src/test/java/org/apache/karaf/itests/KarafTestSupport.java Thu Dec  5 15:47:21 2013
@@ -15,11 +15,11 @@ package org.apache.karaf.itests;
 
 import static org.junit.Assert.assertTrue;
 import static org.ops4j.pax.exam.CoreOptions.maven;
+import static org.ops4j.pax.exam.karaf.options.KarafDistributionOption.configureSecurity;
 import static org.ops4j.pax.exam.karaf.options.KarafDistributionOption.editConfigurationFilePut;
 import static org.ops4j.pax.exam.karaf.options.KarafDistributionOption.karafDistributionConfiguration;
 import static org.ops4j.pax.exam.karaf.options.KarafDistributionOption.keepRuntimeFolder;
 import static org.ops4j.pax.exam.karaf.options.KarafDistributionOption.replaceConfigurationFile;
-import static org.ops4j.pax.exam.karaf.options.KarafDistributionOption.configureSecurity;
 
 import java.io.ByteArrayOutputStream;
 import java.io.Closeable;
@@ -407,7 +407,7 @@ public class KarafTestSupport {
      * @param featuresBefore
      * @throws Exception
      */
-	private void uninstallNewFeatures(Set<Feature> featuresBefore)
+	protected void uninstallNewFeatures(Set<Feature> featuresBefore)
 			throws Exception {
 		Feature[] features = featureService.listInstalledFeatures();
         for (Feature curFeature : features) {

Added: karaf/trunk/itests/src/test/java/org/apache/karaf/itests/SshCommandSecurityTest.java
URL: http://svn.apache.org/viewvc/karaf/trunk/itests/src/test/java/org/apache/karaf/itests/SshCommandSecurityTest.java?rev=1548174&view=auto
==============================================================================
--- karaf/trunk/itests/src/test/java/org/apache/karaf/itests/SshCommandSecurityTest.java (added)
+++ karaf/trunk/itests/src/test/java/org/apache/karaf/itests/SshCommandSecurityTest.java Thu Dec  5 15:47:21 2013
@@ -0,0 +1,183 @@
+/*
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.karaf.itests;
+
+import java.io.ByteArrayOutputStream;
+import java.io.IOException;
+import java.io.OutputStream;
+import java.io.PipedInputStream;
+import java.io.PipedOutputStream;
+import java.util.Arrays;
+import java.util.HashSet;
+
+import junit.framework.Assert;
+
+import org.apache.karaf.features.Feature;
+import org.apache.sshd.ClientChannel;
+import org.apache.sshd.ClientSession;
+import org.apache.sshd.SshClient;
+import org.apache.sshd.client.future.ConnectFuture;
+import org.junit.After;
+import org.junit.Before;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.ops4j.pax.exam.junit.PaxExam;
+import org.ops4j.pax.exam.spi.reactors.ExamReactorStrategy;
+import org.ops4j.pax.exam.spi.reactors.PerClass;
+
+@RunWith(PaxExam.class)
+@ExamReactorStrategy(PerClass.class)
+public class SshCommandSecurityTest extends KarafTestSupport {
+    private enum Result { OK, NOT_FOUND, NO_CREDENTIALS };
+
+    private static int counter = 0;
+
+    private HashSet<Feature> featuresBefore;
+    private SshClient client;
+    private ClientSession session;
+    private ClientChannel channel;
+
+    @Before
+    public void installSshFeature() throws Exception {
+        featuresBefore = new HashSet<Feature>(Arrays.asList(featureService.listInstalledFeatures()));
+        installAndAssertFeature("ssh");
+    }
+
+    @After
+    public void uninstallSshFeature() throws Exception {
+        uninstallNewFeatures(featuresBefore);
+    }
+
+    @Test
+    public void testBundleCommandSecurityViaSsh() throws Exception {
+        String manageruser = "man" + System.nanoTime() + "_" + counter++;
+        String vieweruser = "view" + System.nanoTime() + "_" + counter++;
+
+        addUsers(manageruser, vieweruser);
+
+        testCommandCredentials(manageruser, "bundle:refresh -f 999\n", Result.NO_CREDENTIALS);
+        testCommandCredentials(manageruser, "bundle:refresh 999\n", Result.OK);
+        testCommandCredentials("karaf", "bundle:refresh -f 999\n", Result.OK);
+        testCommandCredentials(manageruser, "bundle:restart -f 999\n", Result.NO_CREDENTIALS);
+        testCommandCredentials(manageruser, "bundle:restart 999\n", Result.OK);
+        testCommandCredentials("karaf", "bundle:restart -f 999\n", Result.OK);
+        testCommandCredentials(manageruser, "bundle:start -f 999\n", Result.NO_CREDENTIALS);
+        testCommandCredentials(manageruser, "bundle:start 999\n", Result.OK);
+        testCommandCredentials("karaf", "bundle:start -f 999\n", Result.OK);
+        testCommandCredentials(manageruser, "bundle:stop -f 999\n", Result.NO_CREDENTIALS);
+        testCommandCredentials(manageruser, "bundle:stop 999\n", Result.OK);
+        testCommandCredentials("karaf", "bundle:stop -f 999\n", Result.OK);
+        testCommandCredentials(manageruser, "bundle:uninstall -f 999\n", Result.NO_CREDENTIALS);
+        testCommandCredentials(manageruser, "bundle:uninstall 999\n", Result.OK);
+        testCommandCredentials("karaf", "bundle:uninstall -f 999\n", Result.OK);
+        testCommandCredentials(manageruser, "bundle:update -f 999\n", Result.NO_CREDENTIALS);
+        testCommandCredentials(manageruser, "bundle:update 999\n", Result.OK);
+        testCommandCredentials("karaf", "bundle:update -f 999\n", Result.OK);
+        testCommandCredentials(manageruser, "bundle:install xyz\n", Result.NOT_FOUND);
+        testCommandCredentials("karaf", "bundle:install xyz\n", Result.OK);
+    }
+
+    private void testCommandCredentials(String user, String command, Result result) throws Exception, IOException {
+        ByteArrayOutputStream out = new ByteArrayOutputStream();
+        OutputStream pipe = openSshChannel(user, user, out);
+        pipe.write(command.getBytes());
+        pipe.flush();
+
+        closeSshChannel(pipe);
+        String output = new String(out.toByteArray());
+
+        switch(result) {
+        case OK:
+            Assert.assertFalse("Should not contain 'Insufficient credentials' or 'Command not found': " + output,
+                    output.contains("Insufficient credentials") || output.contains("Command not found"));
+            break;
+        case NOT_FOUND:
+            Assert.assertTrue("Should contain 'Command not found': " + output,
+                    output.contains("Command not found"));
+            break;
+        case NO_CREDENTIALS:
+            Assert.assertTrue("Should contain 'Insufficient credentials': " + output,
+                    output.contains("Insufficient credentials"));
+            break;
+        default:
+            Assert.fail("Unexpected enum value: " + result);
+        }
+    }
+
+    private void addUsers(String manageruser, String vieweruser) throws Exception {
+        ByteArrayOutputStream out = new ByteArrayOutputStream();
+        OutputStream pipe = openSshChannel("karaf", "karaf", out);
+        pipe.write(("jaas:realm-manage --realm=karaf"
+                + ";jaas:user-add " + manageruser + " " + manageruser
+                + ";jaas:role-add " + manageruser + " manager"
+                + ";jaas:role-add " + manageruser + " viewer"
+                + ";jaas:user-add " + vieweruser + " " + vieweruser
+                + ";jaas:role-add " + vieweruser + " viewer"
+                + ";jaas:update;jaas:realm-manage --realm=karaf;jaas:user-list\n").getBytes());
+        pipe.flush();
+        closeSshChannel(pipe);
+        System.out.println(new String(out.toByteArray()));
+    }
+
+    private OutputStream openSshChannel(String username, String password, OutputStream ... outputs) throws Exception {
+        client = SshClient.setUpDefaultClient();
+        client.start();
+        ConnectFuture future = client.connect("localhost", 8101).await();
+        session = future.getSession();
+
+        int ret = ClientSession.WAIT_AUTH;
+        while ((ret & ClientSession.WAIT_AUTH) != 0) {
+            session.authPassword(username, password);
+            ret = session.waitFor(ClientSession.WAIT_AUTH | ClientSession.CLOSED | ClientSession.AUTHED, 0);
+        }
+        if ((ret & ClientSession.CLOSED) != 0) {
+            throw new Exception("Could not open SSH channel");
+        }
+        channel = session.createChannel("shell");
+        PipedOutputStream pipe = new PipedOutputStream();
+        channel.setIn(new PipedInputStream(pipe));
+
+        OutputStream out;
+        if (outputs.length >= 1) {
+            out = outputs[0];
+        } else {
+            out = new ByteArrayOutputStream();
+        }
+        channel.setOut(out);
+
+        OutputStream err;
+        if (outputs.length >= 2) {
+            err = outputs[1];
+        } else {
+            err = new ByteArrayOutputStream();
+        }
+        channel.setErr(err);
+        channel.open();
+
+        return pipe;
+    }
+
+    private void closeSshChannel(OutputStream pipe) throws IOException {
+        pipe.write("logout\n".getBytes());
+        pipe.flush();
+
+        channel.waitFor(ClientChannel.CLOSED, 0);
+        session.close(true);
+        client.stop();
+
+        client = null;
+        channel = null;
+        session = null;
+    }
+}