@Override @Test public void testAuthenticationProvider() throws IOException { super.testAuthenticationProvider(); SecurityAuthProviderConfig config = createAuthConfig("default2", UsernamePasswordAuthenticationProvider.class, null); XMLSecurityConfigValidator validator = new XMLSecurityConfigValidator(getSecurityManager()); try { // getSecurityManager().saveAuthenticationProvider(config/*, false*/); validator.validateAddAuthProvider(config); fail("no user group service should fail"); } catch (SecurityConfigException ex) { assertEquals(USERGROUP_SERVICE_REQUIRED, ex.getId()); assertEquals(0, ex.getArgs().length); } } }
@Test public void testRoleConfig() throws IOException { super.testRoleConfig();
@Test public void testUserGroupConfig() throws IOException { super.testUserGroupConfig(); XMLUserGroupServiceConfig config = (XMLUserGroupServiceConfig)
@Test public void testNamedServices() { SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); Class<?>[] extensionPoints = new Class<?>[] { createPolicyConfig( PasswordValidator.DEFAULT_NAME, PasswordValidatorImpl.class, 1, 10)); fail("passwd policy already exists should fail"); createPolicyConfig("default2", PasswordValidatorImpl.class, 1, 10); createUGConfig( XMLUserGroupService.DEFAULT_NAME, GeoServerUserGroupService.class, getPlainTextPasswordEncoder().getName(), PasswordValidator.DEFAULT_NAME)); fail("user group service already exists should fail"); createUGConfig( "default2", GeoServerUserGroupService.class, getPlainTextPasswordEncoder().getName(), PasswordValidator.DEFAULT_NAME); try { createRoleConfig( XMLRoleService.DEFAULT_NAME, GeoServerRoleService.class,
createAuthConfig( GeoServerAuthenticationProvider.DEFAULT_NAME, UsernamePasswordAuthenticationProvider.class, "default2"); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); try { config.setName("default2");
createUGConfig( XMLUserGroupService.DEFAULT_NAME, MemoryUserGroupService.class, getPlainTextPasswordEncoder().getName(), PasswordValidator.DEFAULT_NAME); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); if (!getSecurityManager().isStrongEncryptionAvailable()) { config.setPasswordEncoderName(getStrongPBEPasswordEncoder().getName()); config.setPasswordEncoderName(getPlainTextPasswordEncoder().getName()); validator.validateRemoveUserGroupService(config); fail("no name should fail"); getSecurityManager().removeUserGroupService(config); } catch (SecurityConfigException ex) { assertEquals(NAME_REQUIRED, ex.getId());
SecurityManagerConfig config = new SecurityManagerConfig(); config.setRoleServiceName(XMLRoleService.DEFAULT_NAME); config.setConfigPasswordEncrypterName(getPBEPasswordEncoder().getName()); config.getAuthProviderNames().add(GeoServerAuthenticationProvider.DEFAULT_NAME); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); validator.validateManagerConfig(config, new SecurityManagerConfig()); if (getSecurityManager().isStrongEncryptionAvailable() == false) { config.setConfigPasswordEncrypterName(getStrongPBEPasswordEncoder().getName()); try { validator.validateManagerConfig(config, new SecurityManagerConfig()); config.setConfigPasswordEncrypterName(getPBEPasswordEncoder().getName()); config.setRoleServiceName("XX");
createRoleConfig( XMLRoleService.DEFAULT_NAME, MemoryRoleService.class, GeoServerRole.ADMIN_ROLE.getAuthority()); SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); try { config.setName(null);
@Test public void testPasswordPolicy() throws IOException { SecurityConfigValidator validator = new SecurityConfigValidator(getSecurityManager()); PasswordPolicyConfig config = createPolicyConfig( PasswordValidator.DEFAULT_NAME, PasswordValidatorImpl.class, -1, 10); validator.validateAddPasswordPolicy(config); fail("invalid max length should fail"); getSecurityManager().savePasswordPolicy(config); } catch (SecurityConfigException ex) { assertEquals(INVALID_MAX_LENGTH, ex.getId());
@Override public void testAuthenticationProvider() throws IOException { super.testAuthenticationProvider(); JDBCConnectAuthProviderConfig config = (JDBCConnectAuthProviderConfig) getAuthConfig("jdbcprov", JDBCConnectAuthProvider.class, "default");
@Override public void testRoleConfig() throws IOException { super.testRoleConfig();
@Override public void testUserGroupConfig() throws IOException { super.testUserGroupConfig();
@Override public void testAuthenticationProvider() throws IOException { super.testAuthenticationProvider(); JDBCConnectAuthProviderConfig config = (JDBCConnectAuthProviderConfig)
public void testRoleConfig() throws IOException { super.testRoleConfig();
public void testUserGroupConfig() throws IOException { super.testUserGroupConfig();