Author: coheigea
Date: Tue Dec 23 08:12:51 2008
New Revision: 729018

URL: http://svn.apache.org/viewvc?rev=729018&view=rev
Log:
Added some loose unit testing for creating BinarySecurityTokens as per the 
Kerberos Token Profile

Added:
    webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java  
 (with props)
Modified:
    
webservices/wss4j/trunk/src/org/apache/ws/security/message/token/BinarySecurity.java
    webservices/wss4j/trunk/test/wssec/PackageTests.java

Modified: 
webservices/wss4j/trunk/src/org/apache/ws/security/message/token/BinarySecurity.java
URL: 
http://svn.apache.org/viewvc/webservices/wss4j/trunk/src/org/apache/ws/security/message/token/BinarySecurity.java?rev=729018&r1=729017&r2=729018&view=diff
==============================================================================
--- 
webservices/wss4j/trunk/src/org/apache/ws/security/message/token/BinarySecurity.java
 (original)
+++ 
webservices/wss4j/trunk/src/org/apache/ws/security/message/token/BinarySecurity.java
 Tue Dec 23 08:12:51 2008
@@ -112,7 +112,7 @@
      * 
      * @param type 
      */
-    protected void setValueType(String type) {
+    public void setValueType(String type) {
         this.element.setAttributeNS(null, "ValueType", type);
     }
 
@@ -132,7 +132,7 @@
      * 
      * @param encoding 
      */
-    protected void setEncodingType(String encoding) {
+    public void setEncodingType(String encoding) {
         this.element.setAttributeNS(null, "EncodingType", encoding);
     }
 
@@ -160,7 +160,7 @@
      * 
      * @param data 
      */
-    protected void setToken(byte[] data) {
+    public void setToken(byte[] data) {
         if (data == null) {
             throw new IllegalArgumentException("data == null");
         }

Modified: webservices/wss4j/trunk/test/wssec/PackageTests.java
URL: 
http://svn.apache.org/viewvc/webservices/wss4j/trunk/test/wssec/PackageTests.java?rev=729018&r1=729017&r2=729018&view=diff
==============================================================================
--- webservices/wss4j/trunk/test/wssec/PackageTests.java (original)
+++ webservices/wss4j/trunk/test/wssec/PackageTests.java Tue Dec 23 08:12:51 
2008
@@ -82,6 +82,8 @@
         suite.addTestSuite(TestWSSecuritySignatureParts.class);
         suite.addTestSuite(TestWSSecurityUTSignature.class);
         suite.addTestSuite(TestWSSecurityWSS60.class);
+        suite.addTestSuite(TestWSSecurityWSS86.class);
+        suite.addTestSuite(TestWSSecurityKerberosTokenProfile.class);
         
         return suite;
     }

Added: 
webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java
URL: 
http://svn.apache.org/viewvc/webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java?rev=729018&view=auto
==============================================================================
--- webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java 
(added)
+++ webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java 
Tue Dec 23 08:12:51 2008
@@ -0,0 +1,265 @@
+/*
+ * Copyright  2003-2004 The Apache Software Foundation.
+ *
+ *  Licensed under the Apache License, Version 2.0 (the "License");
+ *  you may not use this file except in compliance with the License.
+ *  You may obtain a copy of the License at
+ *
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *  Unless required by applicable law or agreed to in writing, software
+ *  distributed under the License is distributed on an "AS IS" BASIS,
+ *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  See the License for the specific language governing permissions and
+ *  limitations under the License.
+ *
+ */
+
+package wssec;
+
+import junit.framework.Test;
+import junit.framework.TestCase;
+import junit.framework.TestSuite;
+import org.apache.axis.Message;
+import org.apache.axis.MessageContext;
+import org.apache.axis.client.AxisClient;
+import org.apache.axis.configuration.NullProvider;
+import org.apache.axis.message.SOAPEnvelope;
+import org.apache.axis.utils.XMLUtils;
+import org.apache.commons.logging.Log;
+import org.apache.commons.logging.LogFactory;
+import org.apache.ws.security.WSEncryptionPart;
+import org.apache.ws.security.WSPasswordCallback;
+import org.apache.ws.security.WSSecurityEngine;
+import org.apache.ws.security.WSSConfig;
+import org.apache.ws.security.WSConstants;
+import org.apache.ws.security.components.crypto.Crypto;
+import org.apache.ws.security.components.crypto.CryptoFactory;
+import org.apache.ws.security.message.WSSecSignature;
+import org.apache.ws.security.message.WSSecHeader;
+import org.apache.ws.security.message.WSSecTimestamp;
+import org.apache.ws.security.message.token.BinarySecurity;
+import org.apache.ws.security.util.WSSecurityUtil;
+import org.w3c.dom.Document;
+
+import javax.security.auth.callback.Callback;
+import javax.security.auth.callback.CallbackHandler;
+import javax.security.auth.callback.UnsupportedCallbackException;
+import java.io.ByteArrayInputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.PrintWriter;
+import java.util.Vector;
+
+/**
+ * This is a test for the Kerberos Token Profile 1.1
+ */
+public class TestWSSecurityKerberosTokenProfile extends TestCase implements 
CallbackHandler {
+    private static Log log = 
LogFactory.getLog(TestWSSecurityKerberosTokenProfile.class);
+    private static final String AP_REQ = 
+        
"http://docs.oasis-open.org/wss/oasiswss-kerberos-token-profile-1.1#Kerberosv5_AP_REQ";;
+    private static final String BASE64_NS = 
+        WSConstants.SOAPMESSAGE_NS + "#Base64Binary";
+    static final String soapMsg = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>" 
+ "<SOAP-ENV:Envelope 
xmlns:SOAP-ENV=\"http://schemas.xmlsoap.org/soap/envelope/\"; 
xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\"; 
xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\";>" + "<SOAP-ENV:Body>" + 
"<add xmlns=\"http://ws.apache.org/counter/counter_port_type\";>" + "<value 
xmlns=\"\">15</value>" + "</add>" + "</SOAP-ENV:Body>\r\n       \r\n" + 
"</SOAP-ENV:Envelope>";
+    static final WSSecurityEngine secEngine = new WSSecurityEngine();
+    static final Crypto crypto = CryptoFactory.getInstance();
+    MessageContext msgContext;
+    Message message;
+
+    /**
+     * TestWSSecurity constructor
+     * <p/>
+     * 
+     * @param name name of the test
+     */
+    public TestWSSecurityKerberosTokenProfile(String name) {
+        super(name);
+    }
+
+    /**
+     * JUnit suite
+     * <p/>
+     * 
+     * @return a junit test suite
+     */
+    public static Test suite() {
+        return new TestSuite(TestWSSecurityKerberosTokenProfile.class);
+    }
+
+    /**
+     * Main method
+     * <p/>
+     * 
+     * @param args command line args
+     */
+    public static void main(String[] args) {
+        junit.textui.TestRunner.run(suite());
+    }
+
+    /**
+     * Setup method
+     * <p/>
+     * 
+     * @throws Exception Thrown when there is a problem in setup
+     */
+    protected void setUp() throws Exception {
+        AxisClient tmpEngine = new AxisClient(new NullProvider());
+        msgContext = new MessageContext(tmpEngine);
+        message = getSOAPMessage();
+    }
+
+    /**
+     * Constructs a soap envelope
+     * <p/>
+     * 
+     * @return soap envelope
+     * @throws Exception if there is any problem constructing the soap envelope
+     */
+    protected Message getSOAPMessage() throws Exception {
+        InputStream in = new ByteArrayInputStream(soapMsg.getBytes());
+        Message msg = new Message(in);
+        msg.setMessageContext(msgContext);
+        return msg;
+    }
+
+    /**
+     * A unit test for creating BinarySecurityTokens
+     */
+    public void testCreateBinarySecurityToken() throws Exception {
+        SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+        Document doc = unsignedEnvelope.getAsDocument();
+        WSSConfig.getNewInstance();
+
+        WSSecHeader secHeader = new WSSecHeader();
+        secHeader.insertSecurityHeader(doc);
+        
+        BinarySecurity bst = new BinarySecurity(doc);
+        bst.setValueType(AP_REQ);
+        bst.setEncodingType(BASE64_NS);
+        bst.setToken("12345678".getBytes());
+        WSSecurityUtil.prependChildElement(secHeader.getSecurityHeader(), 
bst.getElement());
+        
+        Message msg = SOAPUtil.toAxisMessage(doc);
+        if (log.isDebugEnabled()) {
+            XMLUtils.PrettyElementToWriter(msg.getSOAPEnvelope().getAsDOM(), 
new PrintWriter(System.out));
+        }
+        
+        assertTrue(AP_REQ.equals(bst.getValueType()));
+        assertTrue(BASE64_NS.equals(bst.getEncodingType()));
+        assertTrue(bst.getToken() != null);
+    }
+    
+    
+    /**
+     * A test for signing a Kerberos BST
+     */
+    public void testSignBST() throws Exception {
+        SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+        Document doc = unsignedEnvelope.getAsDocument();
+        WSSConfig.getNewInstance();
+
+        WSSecHeader secHeader = new WSSecHeader();
+        secHeader.insertSecurityHeader(doc);
+        
+        BinarySecurity bst = new BinarySecurity(doc);
+        bst.setValueType(AP_REQ);
+        bst.setEncodingType(BASE64_NS);
+        bst.setToken("12345678".getBytes());
+        bst.setID("Id-" + bst.hashCode());
+        WSSecurityUtil.prependChildElement(secHeader.getSecurityHeader(), 
bst.getElement());
+        
+        WSSecSignature sign = new WSSecSignature();
+        sign.setUserInfo("16c73ab6-b892-458f-abf5-2f875f74882e", "security");
+        sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+        
+        Vector parts = new Vector();
+        WSEncryptionPart encP =
+            new WSEncryptionPart(bst.getID());
+        parts.add(encP);
+        sign.setParts(parts);
+        
+        Document signedDoc = sign.build(doc, crypto, secHeader);
+        
+        Message msg = SOAPUtil.toAxisMessage(signedDoc);
+        if (log.isDebugEnabled()) {
+            XMLUtils.PrettyElementToWriter(msg.getSOAPEnvelope().getAsDOM(), 
new PrintWriter(System.out));
+        }
+        
+        verify(signedDoc);
+    }
+    
+    /**
+     * A test for signing a Kerberos BST as well as a Timestamp
+     */
+    public void testSignBSTTimestamp() throws Exception {
+        SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+        Document doc = unsignedEnvelope.getAsDocument();
+        WSSConfig.getNewInstance();
+
+        WSSecHeader secHeader = new WSSecHeader();
+        secHeader.insertSecurityHeader(doc);
+        
+        BinarySecurity bst = new BinarySecurity(doc);
+        bst.setValueType(AP_REQ);
+        bst.setEncodingType(BASE64_NS);
+        bst.setToken("12345678".getBytes());
+        bst.setID("Id-" + bst.hashCode());
+        WSSecurityUtil.prependChildElement(secHeader.getSecurityHeader(), 
bst.getElement());
+        
+        WSSecTimestamp timestamp = new WSSecTimestamp();
+        timestamp.setTimeToLive(600);
+        timestamp.build(doc, secHeader);
+        
+        WSSecSignature sign = new WSSecSignature();
+        sign.setUserInfo("16c73ab6-b892-458f-abf5-2f875f74882e", "security");
+        sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+        
+        Vector parts = new Vector();
+        parts.add(new WSEncryptionPart(bst.getID()));
+        parts.add(new WSEncryptionPart(timestamp.getId()));
+        sign.setParts(parts);
+        
+        Document signedDoc = sign.build(doc, crypto, secHeader);
+        
+        Message msg = SOAPUtil.toAxisMessage(signedDoc);
+        if (log.isDebugEnabled()) {
+            XMLUtils.PrettyElementToWriter(msg.getSOAPEnvelope().getAsDOM(), 
new PrintWriter(System.out));
+        }
+        
+        verify(signedDoc);
+    }
+    
+    /**
+     * Verifies the soap envelope
+     * <p/>
+     * 
+     * @param doc 
+     * @throws Exception Thrown when there is a problem in verification
+     */
+    private void verify(Document doc) throws Exception {
+        secEngine.processSecurityHeader(doc, null, this, crypto);
+        SOAPUtil.updateSOAPMessage(doc, message);
+        if (log.isDebugEnabled()) {
+            log.debug("Verfied and decrypted message:");
+            
XMLUtils.PrettyElementToWriter(message.getSOAPEnvelope().getAsDOM(), new 
PrintWriter(System.out));
+        }
+    }
+
+    public void handle(Callback[] callbacks)
+            throws IOException, UnsupportedCallbackException {
+        for (int i = 0; i < callbacks.length; i++) {
+            if (callbacks[i] instanceof WSPasswordCallback) {
+                WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+                /*
+                 * here call a function/method to lookup the password for
+                 * the given identifier (e.g. a user name or keystore alias)
+                 * e.g.: 
pc.setPassword(passStore.getPassword(pc.getIdentfifier))
+                 * for Testing we supply a fixed name here.
+                 */
+                pc.setPassword("security");
+            } else {
+                throw new UnsupportedCallbackException(callbacks[i], 
"Unrecognized Callback");
+            }
+        }
+    }
+}

Propchange: 
webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java
------------------------------------------------------------------------------
    svn:eol-style = native

Propchange: 
webservices/wss4j/trunk/test/wssec/TestWSSecurityKerberosTokenProfile.java
------------------------------------------------------------------------------
    svn:keywords = Rev Date



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to