JaasAuthenticationProvider now checks that the java.security.auth.login.config is null before attempting to use it.

Also, The loginConfig resource is attempted as a file first as spaces in the path name can cause FileNotFoundExceptions for URLs
This commit is contained in:
Ray Krueger 2005-03-13 22:26:56 +00:00
parent 63aee2e0a9
commit 169449bf24
2 changed files with 124 additions and 142 deletions

View File

@ -23,47 +23,41 @@ import net.sf.acegisecurity.providers.AuthenticationProvider;
import net.sf.acegisecurity.providers.UsernamePasswordAuthenticationToken; import net.sf.acegisecurity.providers.UsernamePasswordAuthenticationToken;
import net.sf.acegisecurity.providers.jaas.event.JaasAuthenticationFailedEvent; import net.sf.acegisecurity.providers.jaas.event.JaasAuthenticationFailedEvent;
import net.sf.acegisecurity.providers.jaas.event.JaasAuthenticationSuccessEvent; import net.sf.acegisecurity.providers.jaas.event.JaasAuthenticationSuccessEvent;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.springframework.beans.BeansException; import org.springframework.beans.BeansException;
import org.springframework.beans.factory.InitializingBean; import org.springframework.beans.factory.InitializingBean;
import org.springframework.context.ApplicationContext; import org.springframework.context.ApplicationContext;
import org.springframework.context.ApplicationContextAware; import org.springframework.context.ApplicationContextAware;
import org.springframework.context.ApplicationContextException;
import org.springframework.core.io.Resource; import org.springframework.core.io.Resource;
import org.springframework.util.Assert; import org.springframework.util.Assert;
import java.io.IOException;
import java.security.Principal;
import java.security.Security;
import java.util.Arrays;
import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;
import javax.security.auth.callback.Callback; import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler; import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.UnsupportedCallbackException; import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.login.Configuration; import javax.security.auth.login.Configuration;
import javax.security.auth.login.LoginContext; import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException; import javax.security.auth.login.LoginException;
import java.io.IOException;
import java.security.Principal;
import java.security.Security;
import java.util.Arrays;
import java.util.HashSet;
import java.util.Iterator;
import java.util.Set;
/** /**
* An {@link AuthenticationProvider} implementation that retrieves user details * An {@link AuthenticationProvider} implementation that retrieves user details
* from a JAAS login configuration. * from a JAAS login configuration.
* * <p/>
* <p> * <p/>
* This <code>AuthenticationProvider</code> is capable of validating {@link * This <code>AuthenticationProvider</code> is capable of validating {@link
* net.sf.acegisecurity.providers.UsernamePasswordAuthenticationToken} * net.sf.acegisecurity.providers.UsernamePasswordAuthenticationToken}
* requests contain the correct username and password. * requests contain the correct username and password.
* </p> * </p>
* * <p/>
* <p> * <p/>
* This implementation is backed by a <a * This implementation is backed by a <a
* href="http://java.sun.com/j2se/1.4.2/docs/guide/security/jaas/JAASRefGuide.html">JAAS</a> * href="http://java.sun.com/j2se/1.4.2/docs/guide/security/jaas/JAASRefGuide.html">JAAS</a>
* configuration. The loginConfig property must be set to a given JAAS * configuration. The loginConfig property must be set to a given JAAS
@ -72,37 +66,37 @@ import javax.security.auth.login.LoginException;
* configuration file containing an index matching the {@link * configuration file containing an index matching the {@link
* #setLoginContextName(java.lang.String) loginContextName} property. * #setLoginContextName(java.lang.String) loginContextName} property.
* </p> * </p>
* * <p/>
* <p> * <p/>
* For example: If this JaasAuthenticationProvider were configured in a Spring * For example: If this JaasAuthenticationProvider were configured in a Spring
* WebApplicationContext the xml to set the loginConfiguration could be as * WebApplicationContext the xml to set the loginConfiguration could be as
* follows... * follows...
* <pre> * <pre>
&lt;property name="loginConfig"&gt; * &lt;property name="loginConfig"&gt;
&lt;value&gt;/WEB-INF/login.conf&lt;/value&gt; * &lt;value&gt;/WEB-INF/login.conf&lt;/value&gt;
&lt;/property&gt; * &lt;/property&gt;
</pre> * </pre>
* </p> * </p>
* * <p/>
* <p> * <p/>
* The loginContextName should coincide with a given index in the loginConfig * The loginContextName should coincide with a given index in the loginConfig
* specifed. The loginConfig file used in the JUnit tests appears as the * specifed. The loginConfig file used in the JUnit tests appears as the
* following... * following...
* <pre> * <pre>
JAASTest { * JAASTest {
net.sf.acegisecurity.providers.jaas.TestLoginModule required; * net.sf.acegisecurity.providers.jaas.TestLoginModule required;
}; * };
</pre> * </pre>
* Using the example login configuration above, the loginContextName property * Using the example login configuration above, the loginContextName property
* would be set as <i>JAASTest</i>... * would be set as <i>JAASTest</i>...
* <pre> * <pre>
&lt;property name="loginContextName"&gt; * &lt;property name="loginContextName"&gt;
&lt;value&gt;JAASTest&lt;/value&gt; * &lt;value&gt;JAASTest&lt;/value&gt;
&lt;/property&gt; * &lt;/property&gt;
</pre> * </pre>
* </p> * </p>
* * <p/>
* <p> * <p/>
* When using JAAS login modules as the authentication source, sometimes the <a * When using JAAS login modules as the authentication source, sometimes the <a
* href="http://java.sun.com/j2se/1.4.2/docs/api/javax/security/auth/login/LoginContext.html">LoginContext</a> * href="http://java.sun.com/j2se/1.4.2/docs/api/javax/security/auth/login/LoginContext.html">LoginContext</a>
* will require <i>CallbackHandler</i>s. The JaasAuthenticationProvider uses * will require <i>CallbackHandler</i>s. The JaasAuthenticationProvider uses
@ -113,24 +107,24 @@ JAASTest {
* CallbackHandler, control is passed to each {@link * CallbackHandler, control is passed to each {@link
* JaasAuthenticationCallbackHandler} for each Callback passed. * JaasAuthenticationCallbackHandler} for each Callback passed.
* </p> * </p>
* * <p/>
* <p> * <p/>
* {{@link JaasAuthenticationCallbackHandler}s are passed to the * {{@link JaasAuthenticationCallbackHandler}s are passed to the
* JaasAuthenticationProvider through the {@link * JaasAuthenticationProvider through the {@link
* #setCallbackHandlers(net.sf.acegisecurity.providers.jaas.JaasAuthenticationCallbackHandler[]) * #setCallbackHandlers(net.sf.acegisecurity.providers.jaas.JaasAuthenticationCallbackHandler[])
* callbackHandlers} property. } * callbackHandlers} property. }
* <pre> * <pre>
&lt;property name="callbackHandlers"&gt; * &lt;property name="callbackHandlers"&gt;
&lt;list&gt; * &lt;list&gt;
&lt;bean class="net.sf.acegisecurity.providers.jaas.TestCallbackHandler"/&gt; * &lt;bean class="net.sf.acegisecurity.providers.jaas.TestCallbackHandler"/&gt;
&lt;bean class="{@link JaasNameCallbackHandler net.sf.acegisecurity.providers.jaas.JaasNameCallbackHandler}"/&gt; * &lt;bean class="{@link JaasNameCallbackHandler net.sf.acegisecurity.providers.jaas.JaasNameCallbackHandler}"/&gt;
&lt;bean class="{@link JaasPasswordCallbackHandler net.sf.acegisecurity.providers.jaas.JaasPasswordCallbackHandler}"/&gt; * &lt;bean class="{@link JaasPasswordCallbackHandler net.sf.acegisecurity.providers.jaas.JaasPasswordCallbackHandler}"/&gt;
&lt;/list&gt; * &lt;/list&gt;
&lt;/property&gt; * &lt;/property&gt;
</pre> * </pre>
* </p> * </p>
* * <p/>
* <p> * <p/>
* After calling LoginContext.login(), the JaasAuthenticationProvider will * After calling LoginContext.login(), the JaasAuthenticationProvider will
* retrieve the returned Principals from the Subject * retrieve the returned Principals from the Subject
* (LoginContext.getSubject().getPrincipals). Each returned principal is then * (LoginContext.getSubject().getPrincipals). Each returned principal is then
@ -141,24 +135,27 @@ JAASTest {
* method. The returned role will be applied to the Authorization object as a * method. The returned role will be applied to the Authorization object as a
* {@link GrantedAuthority}. * {@link GrantedAuthority}.
* </p> * </p>
* * <p/>
* <p> * <p/>
* AuthorityGranters are configured in spring xml as follows... * AuthorityGranters are configured in spring xml as follows...
* <pre> * <pre>
&lt;property name="authorityGranters"&gt; * &lt;property name="authorityGranters"&gt;
&lt;list&gt; * &lt;list&gt;
&lt;bean class="net.sf.acegisecurity.providers.jaas.TestAuthorityGranter"/&gt; * &lt;bean class="net.sf.acegisecurity.providers.jaas.TestAuthorityGranter"/&gt;
&lt;/list&gt; * &lt;/list&gt;
&lt;/property&gt; * &lt;/property&gt;
<p/> * <p/>
</pre> * </pre>
* </p> * </p>
* *
* @author Ray Krueger * @author Ray Krueger
* @version $Id$ * @version $Id$
*/ */
public class JaasAuthenticationProvider implements AuthenticationProvider, public class JaasAuthenticationProvider implements AuthenticationProvider,
InitializingBean, ApplicationContextAware { InitializingBean, ApplicationContextAware {
private static final Log log = LogFactory.getLog(JaasAuthenticationProvider.class);
//~ Instance fields ======================================================== //~ Instance fields ========================================================
private ApplicationContext context; private ApplicationContext context;
@ -172,7 +169,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
//~ Methods ================================================================ //~ Methods ================================================================
public void setApplicationContext(ApplicationContext applicationContext) public void setApplicationContext(ApplicationContext applicationContext)
throws BeansException { throws BeansException {
this.context = applicationContext; this.context = applicationContext;
} }
@ -181,7 +178,6 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
* granted to the Authentication. * granted to the Authentication.
* *
* @param authorityGranters AuthorityGranter array * @param authorityGranters AuthorityGranter array
*
* @see JaasAuthenticationProvider * @see JaasAuthenticationProvider
*/ */
public void setAuthorityGranters(AuthorityGranter[] authorityGranters) { public void setAuthorityGranters(AuthorityGranter[] authorityGranters) {
@ -194,7 +190,6 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
* were ever set. * were ever set.
* *
* @return The AuthorityGranter array, or null * @return The AuthorityGranter array, or null
*
* @see #setAuthorityGranters(net.sf.acegisecurity.providers.jaas.AuthorityGranter[]) * @see #setAuthorityGranters(net.sf.acegisecurity.providers.jaas.AuthorityGranter[])
*/ */
public AuthorityGranter[] getAuthorityGranters() { public AuthorityGranter[] getAuthorityGranters() {
@ -207,8 +202,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
* *
* @param callbackHandlers Array of JAASAuthenticationCallbackHandlers * @param callbackHandlers Array of JAASAuthenticationCallbackHandlers
*/ */
public void setCallbackHandlers( public void setCallbackHandlers(JaasAuthenticationCallbackHandler[] callbackHandlers) {
JaasAuthenticationCallbackHandler[] callbackHandlers) {
this.callbackHandlers = callbackHandlers; this.callbackHandlers = callbackHandlers;
} }
@ -217,7 +211,6 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
* none are set. * none are set.
* *
* @return the JAASAuthenticationCallbackHandlers. * @return the JAASAuthenticationCallbackHandlers.
*
* @see #setCallbackHandlers(net.sf.acegisecurity.providers.jaas.JaasAuthenticationCallbackHandler[]) * @see #setCallbackHandlers(net.sf.acegisecurity.providers.jaas.JaasAuthenticationCallbackHandler[])
*/ */
public JaasAuthenticationCallbackHandler[] getCallbackHandlers() { public JaasAuthenticationCallbackHandler[] getCallbackHandlers() {
@ -228,9 +221,8 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
* Set the JAAS login configuration file. * Set the JAAS login configuration file.
* *
* @param loginConfig <a * @param loginConfig <a
* href="http://www.springframework.org/docs/api/org/springframework/core/io/Resource.html">Spring * href="http://www.springframework.org/docs/api/org/springframework/core/io/Resource.html">Spring
* Resource</a> * Resource</a>
*
* @see <a * @see <a
* href="http://java.sun.com/j2se/1.4.2/docs/guide/security/jaas/JAASRefGuide.html">JAAS * href="http://java.sun.com/j2se/1.4.2/docs/guide/security/jaas/JAASRefGuide.html">JAAS
* Reference</a> * Reference</a>
@ -257,8 +249,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
return loginContextName; return loginContextName;
} }
public void setLoginExceptionResolver( public void setLoginExceptionResolver(LoginExceptionResolver loginExceptionResolver) {
LoginExceptionResolver loginExceptionResolver) {
this.loginExceptionResolver = loginExceptionResolver; this.loginExceptionResolver = loginExceptionResolver;
} }
@ -267,29 +258,36 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
} }
public void afterPropertiesSet() throws Exception { public void afterPropertiesSet() throws Exception {
if (loginConfig == null) { if (loginConfig == null) {
throw new ApplicationContextException("loginConfig must be set on " throw new IllegalArgumentException("loginConfig must be set on "
+ getClass()); + getClass());
} }
if ((loginContextName == null) || "".equals(loginContextName)) { if ((loginContextName == null) || "".equals(loginContextName)) {
throw new ApplicationContextException( throw new IllegalArgumentException("loginContextName must be set on " + getClass());
"loginContextName must be set on " + getClass());
} }
String loginConfigStr = loginConfig.getURL().toString(); String loginConfigStr = null;
boolean allowed = "true".equalsIgnoreCase(Security.getProperty( try {
"policy.allowSystemProperty")); loginConfigStr = loginConfig.getFile().toString();
} catch (IOException e) {
log.debug("Could not resolve loginConfig [" + loginConfig + "] as a File, using URL");
loginConfigStr = loginConfig.getURL().toString();
}
if (allowed) { boolean allowed = "true".equalsIgnoreCase(Security.getProperty("policy.allowSystemProperty"));
if (allowed && (System.getProperty(SYSPROP) == null)) {
log.debug("Setting system property [" + SYSPROP + "] to: " + loginConfigStr);
System.setProperty(SYSPROP, loginConfigStr); System.setProperty(SYSPROP, loginConfigStr);
} else { } else {
setPropertyUsingLoop(loginConfigStr); setPropertyUsingLoop(loginConfigStr);
} }
Assert.notNull(Configuration.getConfiguration(), Assert.notNull(Configuration.getConfiguration(),
"As per http://java.sun.com/j2se/1.5.0/docs/api/javax/security/auth/login/Configuration.html \"If a Configuration object was set via the Configuration.setConfiguration method, then that object is returned. Otherwise, a default Configuration object is returned\". Your JRE returned null to Configuration.getConfiguration()."); "As per http://java.sun.com/j2se/1.5.0/docs/api/javax/security/auth/login/Configuration.html \"If a Configuration object was set via the Configuration.setConfiguration method, then that object is returned. Otherwise, a default Configuration object is returned\". Your JRE returned null to Configuration.getConfiguration().");
} }
/** /**
@ -297,18 +295,17 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
* and credential * and credential
* *
* @param auth The Authentication object to be authenticated. * @param auth The Authentication object to be authenticated.
*
* @return The authenticated Authentication object, with it's * @return The authenticated Authentication object, with it's
* grantedAuthorities set. * grantedAuthorities set.
*
* @throws AuthenticationException This implementation does not handle * @throws AuthenticationException This implementation does not handle
* 'locked' or 'disabled' accounts. This method only throws a * 'locked' or 'disabled' accounts. This method only throws a
* AuthenticationServiceException, with the message of the * AuthenticationServiceException, with the message of the
* LoginException that will be thrown, should the * LoginException that will be thrown, should the
* loginContext.login() method fail. * loginContext.login() method fail.
*/ */
public Authentication authenticate(Authentication auth) public Authentication authenticate(Authentication auth)
throws AuthenticationException { throws AuthenticationException {
if (auth instanceof UsernamePasswordAuthenticationToken) { if (auth instanceof UsernamePasswordAuthenticationToken) {
UsernamePasswordAuthenticationToken token = (UsernamePasswordAuthenticationToken) auth; UsernamePasswordAuthenticationToken token = (UsernamePasswordAuthenticationToken) auth;
@ -331,7 +328,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
Set principals = lc.getSubject().getPrincipals(); Set principals = lc.getSubject().getPrincipals();
for (Iterator iterator = principals.iterator(); for (Iterator iterator = principals.iterator();
iterator.hasNext();) { iterator.hasNext();) {
Principal principal = (Principal) iterator.next(); Principal principal = (Principal) iterator.next();
for (int i = 0; i < authorityGranters.length; i++) { for (int i = 0; i < authorityGranters.length; i++) {
@ -347,8 +344,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
} }
//Convert the authorities set back to an array and apply it to the token. //Convert the authorities set back to an array and apply it to the token.
token.setAuthorities((GrantedAuthority[]) authorities.toArray( token.setAuthorities((GrantedAuthority[]) authorities.toArray(new GrantedAuthority[authorities.size()]));
new GrantedAuthority[authorities.size()]));
//Publish the success event //Publish the success event
context.publishEvent(new JaasAuthenticationSuccessEvent(token)); context.publishEvent(new JaasAuthenticationSuccessEvent(token));
@ -357,7 +353,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
return token; return token;
} catch (LoginException loginException) { } catch (LoginException loginException) {
AcegiSecurityException ase = loginExceptionResolver AcegiSecurityException ase = loginExceptionResolver
.resolveException(loginException); .resolveException(loginException);
context.publishEvent(new JaasAuthenticationFailedEvent(auth, ase)); context.publishEvent(new JaasAuthenticationFailedEvent(auth, ase));
throw ase; throw ase;
@ -389,7 +385,9 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
} }
if (!alreadySet) { if (!alreadySet) {
Security.setProperty(prefix + n, loginConfigStr); String key = prefix + n;
log.debug("Setting security property [" + key + "] to: " + loginConfigStr);
Security.setProperty(key, loginConfigStr);
} }
} }
@ -406,7 +404,7 @@ public class JaasAuthenticationProvider implements AuthenticationProvider,
} }
public void handle(Callback[] callbacks) public void handle(Callback[] callbacks)
throws IOException, UnsupportedCallbackException { throws IOException, UnsupportedCallbackException {
for (int i = 0; i < callbackHandlers.length; i++) { for (int i = 0; i < callbackHandlers.length; i++) {
JaasAuthenticationCallbackHandler handler = callbackHandlers[i]; JaasAuthenticationCallbackHandler handler = callbackHandlers[i];

View File

@ -16,29 +16,18 @@
package net.sf.acegisecurity.providers.jaas; package net.sf.acegisecurity.providers.jaas;
import junit.framework.TestCase; import junit.framework.TestCase;
import net.sf.acegisecurity.*;
import net.sf.acegisecurity.AcegiSecurityException;
import net.sf.acegisecurity.Authentication;
import net.sf.acegisecurity.AuthenticationException;
import net.sf.acegisecurity.GrantedAuthority;
import net.sf.acegisecurity.GrantedAuthorityImpl;
import net.sf.acegisecurity.LockedException;
import net.sf.acegisecurity.providers.TestingAuthenticationToken; import net.sf.acegisecurity.providers.TestingAuthenticationToken;
import net.sf.acegisecurity.providers.UsernamePasswordAuthenticationToken; import net.sf.acegisecurity.providers.UsernamePasswordAuthenticationToken;
import org.springframework.context.ApplicationContext; import org.springframework.context.ApplicationContext;
import org.springframework.context.ApplicationContextException;
import org.springframework.context.support.ClassPathXmlApplicationContext; import org.springframework.context.support.ClassPathXmlApplicationContext;
import javax.security.auth.login.LoginException;
import java.net.URL; import java.net.URL;
import java.security.Security; import java.security.Security;
import java.util.Arrays; import java.util.Arrays;
import java.util.List; import java.util.List;
import javax.security.auth.login.LoginException;
/** /**
* Tests for the JaasAuthenticationProvider * Tests for the JaasAuthenticationProvider
@ -57,27 +46,27 @@ public class JaasAuthenticationProviderTests extends TestCase {
public void testBadPassword() { public void testBadPassword() {
try { try {
jaasProvider.authenticate(new UsernamePasswordAuthenticationToken( jaasProvider.authenticate(new UsernamePasswordAuthenticationToken("user", "asdf"));
"user", "asdf"));
fail("LoginException should have been thrown for the bad password"); fail("LoginException should have been thrown for the bad password");
} catch (AuthenticationException e) {} } catch (AuthenticationException e) {
}
assertNotNull("Failure event not fired", eventCheck.failedEvent); assertNotNull("Failure event not fired", eventCheck.failedEvent);
assertNotNull("Failure event exception was null", assertNotNull("Failure event exception was null",
eventCheck.failedEvent.getException()); eventCheck.failedEvent.getException());
assertNull("Success event was fired", eventCheck.successEvent); assertNull("Success event was fired", eventCheck.successEvent);
} }
public void testBadUser() { public void testBadUser() {
try { try {
jaasProvider.authenticate(new UsernamePasswordAuthenticationToken( jaasProvider.authenticate(new UsernamePasswordAuthenticationToken("asdf", "password"));
"asdf", "password"));
fail("LoginException should have been thrown for the bad user"); fail("LoginException should have been thrown for the bad user");
} catch (AuthenticationException e) {} } catch (AuthenticationException e) {
}
assertNotNull("Failure event not fired", eventCheck.failedEvent); assertNotNull("Failure event not fired", eventCheck.failedEvent);
assertNotNull("Failure event exception was null", assertNotNull("Failure event exception was null",
eventCheck.failedEvent.getException()); eventCheck.failedEvent.getException());
assertNull("Success event was fired", eventCheck.successEvent); assertNull("Success event was fired", eventCheck.successEvent);
} }
@ -102,7 +91,7 @@ public class JaasAuthenticationProviderTests extends TestCase {
try { try {
myJaasProvider.afterPropertiesSet(); myJaasProvider.afterPropertiesSet();
fail("Should have thrown ApplicationContextException"); fail("Should have thrown ApplicationContextException");
} catch (ApplicationContextException expected) { } catch (IllegalArgumentException expected) {
assertTrue(expected.getMessage().startsWith("loginConfig must be set on")); assertTrue(expected.getMessage().startsWith("loginConfig must be set on"));
} }
} }
@ -117,8 +106,8 @@ public class JaasAuthenticationProviderTests extends TestCase {
try { try {
myJaasProvider.afterPropertiesSet(); myJaasProvider.afterPropertiesSet();
fail("Should have thrown ApplicationContextException"); fail("Should have thrown IllegalArgumentException");
} catch (ApplicationContextException expected) { } catch (IllegalArgumentException expected) {
assertTrue(expected.getMessage().startsWith("loginContextName must be set on")); assertTrue(expected.getMessage().startsWith("loginContextName must be set on"));
} }
@ -126,8 +115,8 @@ public class JaasAuthenticationProviderTests extends TestCase {
try { try {
myJaasProvider.afterPropertiesSet(); myJaasProvider.afterPropertiesSet();
fail("Should have thrown ApplicationContextException"); fail("Should have thrown IllegalArgumentException");
} catch (ApplicationContextException expected) { } catch (IllegalArgumentException expected) {
assertTrue(expected.getMessage().startsWith("loginContextName must be set on")); assertTrue(expected.getMessage().startsWith("loginContextName must be set on"));
} }
} }
@ -136,13 +125,12 @@ public class JaasAuthenticationProviderTests extends TestCase {
GrantedAuthorityImpl role1 = new GrantedAuthorityImpl("ROLE_1"); GrantedAuthorityImpl role1 = new GrantedAuthorityImpl("ROLE_1");
GrantedAuthorityImpl role2 = new GrantedAuthorityImpl("ROLE_2"); GrantedAuthorityImpl role2 = new GrantedAuthorityImpl("ROLE_2");
GrantedAuthority[] defaultAuths = new GrantedAuthority[] {role1, role2,}; GrantedAuthority[] defaultAuths = new GrantedAuthority[]{role1, role2, };
UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken("user", UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken("user",
"password", defaultAuths); "password", defaultAuths);
assertTrue(jaasProvider.supports( assertTrue(jaasProvider.supports(UsernamePasswordAuthenticationToken.class));
UsernamePasswordAuthenticationToken.class));
Authentication auth = jaasProvider.authenticate(token); Authentication auth = jaasProvider.authenticate(token);
@ -154,13 +142,13 @@ public class JaasAuthenticationProviderTests extends TestCase {
List list = Arrays.asList(auth.getAuthorities()); List list = Arrays.asList(auth.getAuthorities());
assertTrue("GrantedAuthorities does not contain ROLE_TEST", assertTrue("GrantedAuthorities does not contain ROLE_TEST",
list.contains(new GrantedAuthorityImpl("ROLE_TEST"))); list.contains(new GrantedAuthorityImpl("ROLE_TEST")));
assertTrue("GrantedAuthorities does not contain ROLE_1", assertTrue("GrantedAuthorities does not contain ROLE_1",
list.contains(role1)); list.contains(role1));
assertTrue("GrantedAuthorities does not contain ROLE_2", assertTrue("GrantedAuthorities does not contain ROLE_2",
list.contains(role2)); list.contains(role2));
boolean foundit = false; boolean foundit = false;
@ -170,7 +158,7 @@ public class JaasAuthenticationProviderTests extends TestCase {
if (obj instanceof JaasGrantedAuthority) { if (obj instanceof JaasGrantedAuthority) {
JaasGrantedAuthority grant = (JaasGrantedAuthority) obj; JaasGrantedAuthority grant = (JaasGrantedAuthority) obj;
assertNotNull("Principal was null on JaasGrantedAuthority", assertNotNull("Principal was null on JaasGrantedAuthority",
grant.getPrincipal()); grant.getPrincipal());
foundit = true; foundit = true;
} }
} }
@ -179,7 +167,7 @@ public class JaasAuthenticationProviderTests extends TestCase {
assertNotNull("Success event not fired", eventCheck.successEvent); assertNotNull("Success event not fired", eventCheck.successEvent);
assertEquals("Auth objects are not equal", auth, assertEquals("Auth objects are not equal", auth,
eventCheck.successEvent.getAuthentication()); eventCheck.successEvent.getAuthentication());
assertNull("Failure event was fired", eventCheck.failedEvent); assertNull("Failure event was fired", eventCheck.failedEvent);
} }
@ -187,16 +175,15 @@ public class JaasAuthenticationProviderTests extends TestCase {
public void testLoginExceptionResolver() { public void testLoginExceptionResolver() {
assertNotNull(jaasProvider.getLoginExceptionResolver()); assertNotNull(jaasProvider.getLoginExceptionResolver());
jaasProvider.setLoginExceptionResolver(new LoginExceptionResolver() { jaasProvider.setLoginExceptionResolver(new LoginExceptionResolver() {
public AcegiSecurityException resolveException(LoginException e) { public AcegiSecurityException resolveException(LoginException e) {
return new LockedException("This is just a test!"); return new LockedException("This is just a test!");
} }
}); });
try { try {
jaasProvider.authenticate(new UsernamePasswordAuthenticationToken( jaasProvider.authenticate(new UsernamePasswordAuthenticationToken("user", "password"));
"user", "password")); } catch (LockedException e) {
} catch (LockedException e) {} } catch (Exception e) {
catch (Exception e) {
fail("LockedException should have been thrown and caught"); fail("LockedException should have been thrown and caught");
} }
} }
@ -205,25 +192,22 @@ public class JaasAuthenticationProviderTests extends TestCase {
UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken("user", UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken("user",
"password", null); "password", null);
assertTrue(jaasProvider.supports( assertTrue(jaasProvider.supports(UsernamePasswordAuthenticationToken.class));
UsernamePasswordAuthenticationToken.class));
Authentication auth = jaasProvider.authenticate(token); Authentication auth = jaasProvider.authenticate(token);
assertTrue("Only ROLE_TEST should have been returned", assertTrue("Only ROLE_TEST should have been returned",
auth.getAuthorities().length == 1); auth.getAuthorities().length == 1);
} }
public void testUnsupportedAuthenticationObjectReturnsNull() { public void testUnsupportedAuthenticationObjectReturnsNull() {
assertNull(jaasProvider.authenticate( assertNull(jaasProvider.authenticate(new TestingAuthenticationToken("foo", "bar",
new TestingAuthenticationToken("foo", "bar", new GrantedAuthority[]{})));
new GrantedAuthority[] {})));
} }
protected void setUp() throws Exception { protected void setUp() throws Exception {
String resName = "/" + getClass().getName().replace('.', '/') + ".xml"; String resName = "/" + getClass().getName().replace('.', '/') + ".xml";
context = new ClassPathXmlApplicationContext(resName); context = new ClassPathXmlApplicationContext(resName);
eventCheck = (JaasEventCheck) context.getBean("eventCheck"); eventCheck = (JaasEventCheck) context.getBean("eventCheck");
jaasProvider = (JaasAuthenticationProvider) context.getBean( jaasProvider = (JaasAuthenticationProvider) context.getBean("jaasAuthenticationProvider");
"jaasAuthenticationProvider");
} }
} }