DelegationIsAllowedSubResourceTest.java revision d1b57e78cf72f41c7c6a52bd7c2a6d6aa4da6ba4
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
5f5d1b4cc970b7f06ff8ef6526128e9a27303d88nd * Copyright (c) 2009 Sun Microsystems Inc. All Rights Reserved
acc36ab93565d2880447d535da6ca6e5feac7a70nd * The contents of this file are subject to the terms
db479b48bd4d75423ed4a45e15b75089d1a8ad72fielding * of the Common Development and Distribution License
db479b48bd4d75423ed4a45e15b75089d1a8ad72fielding * (the License). You may not use this file except in
db479b48bd4d75423ed4a45e15b75089d1a8ad72fielding * compliance with the License.
db479b48bd4d75423ed4a45e15b75089d1a8ad72fielding * You can obtain a copy of the License at
db479b48bd4d75423ed4a45e15b75089d1a8ad72fielding * https://opensso.dev.java.net/public/CDDLv1.0.html or
acc36ab93565d2880447d535da6ca6e5feac7a70nd * See the License for the specific language governing
acc36ab93565d2880447d535da6ca6e5feac7a70nd * permission and limitations under the License.
acc36ab93565d2880447d535da6ca6e5feac7a70nd * When distributing Covered Code, include this CDDL
acc36ab93565d2880447d535da6ca6e5feac7a70nd * Header Notice in each file and include the License file
acc36ab93565d2880447d535da6ca6e5feac7a70nd * If applicable, add the following below the CDDL Header,
acc36ab93565d2880447d535da6ca6e5feac7a70nd * with the fields enclosed by brackets [] replaced by
acc36ab93565d2880447d535da6ca6e5feac7a70nd * your own identifying information:
7db9f691a00ead175b03335457ca296a33ddf31bnd * "Portions Copyrighted [year] [name of copyright owner]"
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive * $Id: DelegationIsAllowedSubResourceTest.java,v 1.3 2009/12/22 18:00:24 veiming Exp $
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive * Portions Copyrighted 2014 ForgeRock AS
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8sliveimport com.sun.identity.delegation.DelegationEvaluator;
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8sliveimport com.sun.identity.delegation.DelegationPermission;
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8sliveimport com.sun.identity.entitlement.opensso.OpenSSOUserSubject;
9b4686eb1b0da187469acf6032db0ab3967ed8ddrbowenimport com.sun.identity.entitlement.opensso.SubjectUtils;
9b4686eb1b0da187469acf6032db0ab3967ed8ddrbowen * @author dennis
9b4686eb1b0da187469acf6032db0ab3967ed8ddrbowen "DelegationIsAllowedSubResourceTest";
9b4686eb1b0da187469acf6032db0ab3967ed8ddrbowen "DelegationIsAllowedSubResourceTestUser1";
9b4686eb1b0da187469acf6032db0ab3967ed8ddrbowen "DelegationIsAllowedSubResourceTestPrivilege";
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive private static final String PRIVILEGE_NAME1 = PRIVILEGE_NAME + "1";
193ba167383a0599478b84ea51ac9ddec2bc0328rbowen "DelegationIsAllowedSubResourceTestDelegationPrivilege";
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive "http://www.www.delegationisallowedsubresourcetest.com.com";
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive private static final String DELEGATED_RESOURCE = DELEGATED_RESOURCE_BASE +
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive private SSOToken adminToken = (SSOToken) AccessController.doPrivileged(
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive private Subject adminSubject = SubjectUtils.createSubject(adminToken);
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive private boolean migrated = EntitlementConfiguration.getInstance(
96aee4c18ac74113f91235b99233431769cd1e31jsl public void setup()
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive ApplicationTypeManager.getAppplicationType(adminSubject,
27b42eee5c7ea26114f3cc43da7940de7f5731aferikabele ApplicationTypeManager.URL_APPLICATION_TYPE_NAME));
96aee4c18ac74113f91235b99233431769cd1e31jsl ApplicationManager.saveApplication(adminSubject, "/", appl);
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive PrivilegeManager pm = PrivilegeManager.getInstance("/", adminSubject);
53bf1cfe583762b91a0022a3f072a7897d825df1rbowen ApplicationPrivilegeManager.getInstance("/", adminSubject);
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive private void createPrivilege() throws EntitlementException {
96aee4c18ac74113f91235b99233431769cd1e31jsl PrivilegeManager pm = PrivilegeManager.getInstance("/", adminSubject);
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive Map<String, Boolean> actionValues = new HashMap<String, Boolean>();
53bf1cfe583762b91a0022a3f072a7897d825df1rbowen "id=isallowedtestdummy,ou=user," + SMSEntry.getRootSuffix());
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive throws SMSException, EntitlementException, SSOException,
b6e82ec3e4e7edb7cb3680da11b2cc390fc0deb8jsl Set<SubjectImplementation> subjects = new HashSet<SubjectImplementation>();
35702d372b14ed702a8ea6bf3ba7fb0f6838cea8slive Map<String, Set<String>> appRes = new HashMap<String, Set<String>>();
0335f6ccd1c6e42c576a393335a365d67df6d3cerbowen ap.setActionValues(ApplicationPrivilege.PossibleAction.READ);
0335f6ccd1c6e42c576a393335a365d67df6d3cerbowen ApplicationPrivilegeManager.getInstance("/", adminSubject);
0335f6ccd1c6e42c576a393335a365d67df6d3cerbowen SSOToken token = AuthUtils.authenticate("/", USER1, USER1);
0335f6ccd1c6e42c576a393335a365d67df6d3cerbowen DelegationPermission dp = new DelegationPermission("/",
b47bddbe88fb1489893591d69d4ccab9b873af68humbedooh DelegationEvaluator de = new DelegationEvaluator();
0335f6ccd1c6e42c576a393335a365d67df6d3cerbowen if (!de.isAllowed(token, dp, Collections.EMPTY_MAP, true)) {
0335f6ccd1c6e42c576a393335a365d67df6d3cerbowen "DelegationIsAllowedSubResourceTest.test: failed");