FileBasedTrustManagerProviderTestCase.java revision ea1068c292e9b341af6d6b563cd8988a96be20a9
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at legal-notices/CDDLv1_0.txt
* or http://forgerock.org/license/CDDLv1.0.html.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at legal-notices/CDDLv1_0.txt.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2006-2008 Sun Microsystems, Inc.
* Portions Copyright 2014-2015 ForgeRock AS
*/
package org.opends.server.extensions;
import java.io.File;
import java.io.FileWriter;
import java.util.List;
import org.testng.annotations.BeforeClass;
import org.testng.annotations.DataProvider;
import org.testng.annotations.Test;
import org.opends.server.TestCaseUtils;
import org.opends.server.admin.server.AdminTestCaseUtils;
import org.opends.server.admin.std.meta.FileBasedTrustManagerProviderCfgDefn;
import org.opends.server.admin.std.server.FileBasedTrustManagerProviderCfg;
import org.forgerock.opendj.config.server.ConfigException;
import org.opends.server.core.DirectoryServer;
import org.opends.server.types.Entry;
import org.opends.server.types.InitializationException;
import static org.opends.server.util.ServerConstants.*;
/**
* A set of test cases for the file-based trust manager provider.
*/
public class FileBasedTrustManagerProviderTestCase
extends ExtensionsTestCase
{
/**
* Ensures that the Directory Server is running.
*
* @throws Exception If an unexpected problem occurs.
*/
@BeforeClass
public void startServer()
throws Exception
{
TestCaseUtils.startServer();
FileWriter writer = new FileWriter(DirectoryServer.getInstanceRoot() +
File.separator + "config" +
File.separator + "server.pin");
writer.write("password" + EOL);
writer.close();
writer = new FileWriter(DirectoryServer.getInstanceRoot() + File.separator +
"config" + File.separator + "empty");
writer.close();
System.setProperty("org.opends.server.trustStorePIN", "password");
}
/**
* Retrieves a set of valid configurations that can be used to
* initialize the file-based trust manager provider.
*
* @throws Exception If an unexpected problem occurs.
*/
@DataProvider(name = "validConfigs")
public Object[][] getValidConfigurations()
throws Exception
{
List<Entry> entries = TestCaseUtils.makeEntries(
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin: password",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin-file: config/server.pin",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin-property: org.opends.server.trustStorePIN",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin: password",
"ds-cfg-trust-store-type: JKS");
Object[][] configEntries = new Object[entries.size()][1];
for (int i=0; i < configEntries.length; i++)
{
configEntries[i] = new Object[] { entries.get(i) };
}
return configEntries;
}
/**
* Tests initialization with an valid configurations.
*
* @param e The configuration entry to use to initialize the identity
* mapper.
*
* @throws Exception If an unexpected problem occurs.
*/
@Test(dataProvider = "validConfigs")
public void testVvalidConfigs(Entry e)
throws Exception
{
FileBasedTrustManagerProviderCfg configuration =
AdminTestCaseUtils.getConfiguration(
FileBasedTrustManagerProviderCfgDefn.getInstance(), e);
FileBasedTrustManagerProvider provider = new FileBasedTrustManagerProvider();
provider.initializeTrustManagerProvider(configuration);
provider.finalizeTrustManagerProvider();
}
/**
* Retrieves a set of invalid configurations that cannot be used to
* initialize the file-based trust manager provider.
*
* @throws Exception If an unexpected problem occurs.
*/
@DataProvider(name = "invalidConfigs")
public Object[][] getInvalidConfigurations()
throws Exception
{
List<Entry> entries = TestCaseUtils.makeEntries(
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-pin: password",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/nosuchfile",
"ds-cfg-trust-store-pin: password",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin-file: config/nosuchfile",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin-file: config/empty",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin-property: nosuchproperty",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin-environment-variable: nosuchenv",
"",
"dn: cn=Trust Manager Provider,cn=SSL,cn=config",
"objectClass: top",
"objectClass: ds-cfg-trust-manager-provider",
"objectClass: ds-cfg-file-based-trust-manager-provider",
"cn: Trust Manager Provider",
"ds-cfg-java-class: org.opends.server.extensions." +
"FileBasedTrustManagerProvider",
"ds-cfg-enabled: true",
"ds-cfg-trust-store-file: config/server.truststore",
"ds-cfg-trust-store-pin: password",
"ds-cfg-trust-store-type: invalid");
Object[][] configEntries = new Object[entries.size()][1];
for (int i=0; i < configEntries.length; i++)
{
configEntries[i] = new Object[] { entries.get(i) };
}
return configEntries;
}
/**
* Tests initialization with an invalid configuration.
*
* @param e The configuration entry to use to initialize the identity
* mapper.
*
* @throws Exception If an unexpected problem occurs.
*/
@Test(dataProvider = "invalidConfigs",
expectedExceptions = { ConfigException.class,
InitializationException.class })
public void testInvalidConfigs(Entry e)
throws Exception
{
FileBasedTrustManagerProviderCfg configuration =
AdminTestCaseUtils.getConfiguration(
FileBasedTrustManagerProviderCfgDefn.getInstance(), e);
FileBasedTrustManagerProvider provider =
new FileBasedTrustManagerProvider();
provider.initializeTrustManagerProvider(configuration);
for (StringBuilder sb : e.toLDIF())
{
System.err.println(sb.toString());
}
}
}