forked from community/device-mgt-core
Merge branch 'master' of https://github.com/wso2/carbon-device-mgt
commit
b20cf7336c
@ -0,0 +1,356 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
*
|
||||||
|
* WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
* Version 2.0 (the "License"); you may not use this file except
|
||||||
|
* in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing,
|
||||||
|
* software distributed under the License is distributed on an
|
||||||
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
* KIND, either express or implied. See the License for the
|
||||||
|
* specific language governing permissions and limitations
|
||||||
|
* under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.wso2.carbon.device.mgt.core.authorization;
|
||||||
|
|
||||||
|
import org.apache.commons.dbcp.BasicDataSource;
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.mockito.Mockito;
|
||||||
|
import org.testng.Assert;
|
||||||
|
import org.testng.annotations.AfterClass;
|
||||||
|
import org.testng.annotations.BeforeClass;
|
||||||
|
import org.testng.annotations.Test;
|
||||||
|
import org.wso2.carbon.CarbonConstants;
|
||||||
|
import org.wso2.carbon.context.PrivilegedCarbonContext;
|
||||||
|
import org.wso2.carbon.device.mgt.common.Device;
|
||||||
|
import org.wso2.carbon.device.mgt.common.DeviceIdentifier;
|
||||||
|
import org.wso2.carbon.device.mgt.common.DeviceManagementException;
|
||||||
|
import org.wso2.carbon.device.mgt.common.DeviceNotFoundException;
|
||||||
|
import org.wso2.carbon.device.mgt.common.EnrolmentInfo;
|
||||||
|
import org.wso2.carbon.device.mgt.common.authorization.DeviceAccessAuthorizationException;
|
||||||
|
import org.wso2.carbon.device.mgt.common.authorization.DeviceAuthorizationResult;
|
||||||
|
import org.wso2.carbon.device.mgt.common.group.mgt.GroupManagementException;
|
||||||
|
import org.wso2.carbon.device.mgt.common.group.mgt.RoleDoesNotExistException;
|
||||||
|
import org.wso2.carbon.device.mgt.common.permission.mgt.PermissionManagementException;
|
||||||
|
import org.wso2.carbon.device.mgt.core.TestDeviceManagementService;
|
||||||
|
import org.wso2.carbon.device.mgt.core.common.TestDataHolder;
|
||||||
|
import org.wso2.carbon.device.mgt.core.config.DeviceConfigurationManager;
|
||||||
|
import org.wso2.carbon.device.mgt.core.internal.DeviceManagementDataHolder;
|
||||||
|
import org.wso2.carbon.device.mgt.core.internal.DeviceManagementServiceComponent;
|
||||||
|
import org.wso2.carbon.device.mgt.core.service.DeviceManagementProviderService;
|
||||||
|
import org.wso2.carbon.device.mgt.core.service.DeviceManagementProviderServiceImpl;
|
||||||
|
import org.wso2.carbon.device.mgt.core.service.GroupManagementProviderService;
|
||||||
|
import org.wso2.carbon.device.mgt.core.service.GroupManagementProviderServiceImpl;
|
||||||
|
import org.wso2.carbon.registry.core.config.RegistryContext;
|
||||||
|
import org.wso2.carbon.registry.core.exceptions.RegistryException;
|
||||||
|
import org.wso2.carbon.registry.core.internal.RegistryDataHolder;
|
||||||
|
import org.wso2.carbon.registry.core.jdbc.realm.InMemoryRealmService;
|
||||||
|
import org.wso2.carbon.registry.core.service.RegistryService;
|
||||||
|
import org.wso2.carbon.user.api.UserStoreException;
|
||||||
|
import org.wso2.carbon.user.api.UserStoreManager;
|
||||||
|
import org.wso2.carbon.user.api.Permission;
|
||||||
|
import org.wso2.carbon.user.core.service.RealmService;
|
||||||
|
import org.wso2.carbon.user.core.tenant.JDBCTenantManager;
|
||||||
|
import org.wso2.carbon.utils.multitenancy.MultitenantConstants;
|
||||||
|
import java.io.InputStream;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Arrays;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Unit tests for DeviceAccessAuthorizationServiceTest
|
||||||
|
*/
|
||||||
|
public class DeviceAccessAuthorizationServiceTest {
|
||||||
|
private static final Log log = LogFactory.getLog(DeviceAccessAuthorizationServiceTest.class);
|
||||||
|
private static final String DEVICE_TYPE = "AUTH_SERVICE_TEST_TYPE";
|
||||||
|
private static final int NO_OF_DEVICES = 5;
|
||||||
|
private static final String ADMIN_USER = "admin";
|
||||||
|
private static final String NON_ADMIN_ALLOWED_USER = "nonAdmin";
|
||||||
|
private static final String NORMAL_USER = "normal";
|
||||||
|
private static final String ADMIN_ROLE = "adminRole";
|
||||||
|
private static final String NON_ADMIN_ROLE = "nonAdminRole";
|
||||||
|
private static final String DEFAULT_GROUP = "defaultGroup";
|
||||||
|
private static final String DEVICE_ID_PREFIX = "AUTH-SERVICE-TEST-DEVICE-ID-";
|
||||||
|
private static final String USER_CLAIM_EMAIL_ADDRESS = "http://wso2.org/claims/emailaddress";
|
||||||
|
private static final String USER_CLAIM_FIRST_NAME = "http://wso2.org/claims/givenname";
|
||||||
|
private static final String USER_CLAIM_LAST_NAME = "http://wso2.org/claims/lastname";
|
||||||
|
private static final String ADMIN_PERMISSION = "/permission/admin";
|
||||||
|
private static final String NON_ADMIN_PERMISSION = "/permission/admin/manage/device-mgt/devices/owning-device/view";
|
||||||
|
private static final String FIRST_NAME = "firstName";
|
||||||
|
private static final String LAST_NAME = "lastName";
|
||||||
|
private static final String EMAIL = "email";
|
||||||
|
private static final String PASSWORD = "password";
|
||||||
|
private DeviceAccessAuthorizationServiceImpl deviceAccessAuthorizationService;
|
||||||
|
private List<DeviceIdentifier> deviceIds = new ArrayList<>();
|
||||||
|
private List<DeviceIdentifier> groupDeviceIds = new ArrayList<>();
|
||||||
|
private Map<String, String> defaultUserClaims;
|
||||||
|
|
||||||
|
@BeforeClass
|
||||||
|
public void init() throws Exception {
|
||||||
|
DeviceConfigurationManager.getInstance().initConfig();
|
||||||
|
log.info("Initializing test environment to test DeviceAccessAuthorization Class");
|
||||||
|
for (int i = 0; i < NO_OF_DEVICES; i++) {
|
||||||
|
deviceIds.add(new DeviceIdentifier(DEVICE_ID_PREFIX + i, DEVICE_TYPE));
|
||||||
|
}
|
||||||
|
List<Device> devices = TestDataHolder.generateDummyDeviceData(this.deviceIds);
|
||||||
|
DeviceManagementProviderService deviceMgtService = new DeviceManagementProviderServiceImpl();
|
||||||
|
DeviceManagementServiceComponent.notifyStartupListeners();
|
||||||
|
DeviceManagementDataHolder.getInstance().setDeviceManagementProvider(deviceMgtService);
|
||||||
|
DeviceManagementDataHolder.getInstance().setRegistryService(getRegistryService());
|
||||||
|
DeviceManagementDataHolder.getInstance().setGroupManagementProviderService(new
|
||||||
|
GroupManagementProviderServiceImpl());
|
||||||
|
DeviceManagementDataHolder.getInstance().setDeviceTaskManagerService(null);
|
||||||
|
deviceMgtService.registerDeviceType(new TestDeviceManagementService(DEVICE_TYPE,
|
||||||
|
MultitenantConstants.SUPER_TENANT_DOMAIN_NAME));
|
||||||
|
for (Device device : devices) {
|
||||||
|
deviceMgtService.enrollDevice(device);
|
||||||
|
}
|
||||||
|
List<Device> returnedDevices = deviceMgtService.getAllDevices(DEVICE_TYPE);
|
||||||
|
for (Device device : returnedDevices) {
|
||||||
|
if (!device.getDeviceIdentifier().startsWith(DEVICE_ID_PREFIX)) {
|
||||||
|
throw new Exception("Incorrect device with ID - " + device.getDeviceIdentifier() + " returned!");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
deviceAccessAuthorizationService = Mockito.mock(DeviceAccessAuthorizationServiceImpl.class,
|
||||||
|
Mockito.CALLS_REAL_METHODS);
|
||||||
|
defaultUserClaims = buildDefaultUserClaims(FIRST_NAME, LAST_NAME, EMAIL);
|
||||||
|
initializeTestEnvironment();
|
||||||
|
//Starting tenant flow
|
||||||
|
PrivilegedCarbonContext.startTenantFlow();
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setTenantId(MultitenantConstants.SUPER_TENANT_ID, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
private RegistryService getRegistryService() throws RegistryException, UserStoreException {
|
||||||
|
RealmService realmService = new InMemoryRealmService();
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(ADMIN_USER);
|
||||||
|
BasicDataSource dataSource = new BasicDataSource();
|
||||||
|
String connectionUrl = "jdbc:h2:./target/databasetest/CARBON_TEST";
|
||||||
|
dataSource.setUrl(connectionUrl);
|
||||||
|
dataSource.setDriverClassName("org.h2.Driver");
|
||||||
|
JDBCTenantManager jdbcTenantManager = new JDBCTenantManager(dataSource,
|
||||||
|
MultitenantConstants.SUPER_TENANT_DOMAIN_NAME);
|
||||||
|
realmService.setTenantManager(jdbcTenantManager);
|
||||||
|
RegistryDataHolder.getInstance().setRealmService(realmService);
|
||||||
|
DeviceManagementDataHolder.getInstance().setRealmService(realmService);
|
||||||
|
InputStream is = this.getClass().getClassLoader().getResourceAsStream("carbon-home/repository/conf/registry.xml");
|
||||||
|
RegistryContext context = RegistryContext.getBaseInstance(is, realmService);
|
||||||
|
context.setSetup(true);
|
||||||
|
return context.getEmbeddedRegistryService();
|
||||||
|
}
|
||||||
|
|
||||||
|
private void initializeTestEnvironment() throws UserStoreException, GroupManagementException,
|
||||||
|
RoleDoesNotExistException, DeviceNotFoundException {
|
||||||
|
//creating UI permission
|
||||||
|
Permission adminPermission = new Permission(ADMIN_PERMISSION, CarbonConstants.UI_PERMISSION_ACTION);
|
||||||
|
Permission deviceViewPermission = new Permission(NON_ADMIN_PERMISSION, CarbonConstants.UI_PERMISSION_ACTION);
|
||||||
|
UserStoreManager userStoreManager = DeviceManagementDataHolder.getInstance().getRealmService()
|
||||||
|
.getTenantUserRealm(MultitenantConstants.SUPER_TENANT_ID).getUserStoreManager();
|
||||||
|
//Adding a non Admin User
|
||||||
|
userStoreManager.addUser(NON_ADMIN_ALLOWED_USER, PASSWORD, null, defaultUserClaims, null);
|
||||||
|
//Adding a normal user
|
||||||
|
userStoreManager.addUser(NORMAL_USER, PASSWORD, null, defaultUserClaims, null);
|
||||||
|
//Adding role with permission to Admin user
|
||||||
|
userStoreManager.addRole(ADMIN_ROLE, new String[]{ADMIN_USER}, new Permission[]{adminPermission});
|
||||||
|
//Adding role with permission to non Admin user
|
||||||
|
userStoreManager.addRole(NON_ADMIN_ROLE, new String[]{NON_ADMIN_ALLOWED_USER},
|
||||||
|
new Permission[]{deviceViewPermission});
|
||||||
|
//Creating default group
|
||||||
|
GroupManagementProviderService groupManagementProviderService = DeviceManagementDataHolder.getInstance()
|
||||||
|
.getGroupManagementProviderService();
|
||||||
|
groupManagementProviderService.createDefaultGroup(DEFAULT_GROUP);
|
||||||
|
int groupId = groupManagementProviderService.getGroup(DEFAULT_GROUP).getGroupId();
|
||||||
|
//Sharing group with admin and non admin roles
|
||||||
|
groupManagementProviderService.manageGroupSharing(groupId, new ArrayList<>(Arrays.asList(ADMIN_ROLE,
|
||||||
|
NON_ADMIN_ROLE)));
|
||||||
|
//Adding first 2 devices to the group
|
||||||
|
groupDeviceIds.add(deviceIds.get(0));
|
||||||
|
groupDeviceIds.add(deviceIds.get(1));
|
||||||
|
groupManagementProviderService.addDevices(groupId, groupDeviceIds);
|
||||||
|
}
|
||||||
|
|
||||||
|
private Map<String, String> buildDefaultUserClaims(String firstName, String lastName, String emailAddress) {
|
||||||
|
Map<String, String> defaultUserClaims = new HashMap<>();
|
||||||
|
defaultUserClaims.put(USER_CLAIM_FIRST_NAME, firstName);
|
||||||
|
defaultUserClaims.put(USER_CLAIM_LAST_NAME, lastName);
|
||||||
|
defaultUserClaims.put(USER_CLAIM_EMAIL_ADDRESS, emailAddress);
|
||||||
|
if (log.isDebugEnabled()) {
|
||||||
|
log.debug("Default claim map is created for new user: " + defaultUserClaims.toString());
|
||||||
|
}
|
||||||
|
return defaultUserClaims;
|
||||||
|
}
|
||||||
|
|
||||||
|
//Admin User test cases
|
||||||
|
@Test(description = "Check authorization giving a device identifier and username")
|
||||||
|
public void userAuthDevIdUserName() throws Exception {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(ADMIN_USER);
|
||||||
|
for (DeviceIdentifier deviceId : deviceIds) {
|
||||||
|
Assert.assertTrue(deviceAccessAuthorizationService.isUserAuthorized(deviceId, ADMIN_USER),
|
||||||
|
"Device access authorization for admin user failed");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization for multiple device identifiers and username")
|
||||||
|
public void userAuthDevIdUserNameResult() throws DeviceAccessAuthorizationException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(ADMIN_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(deviceIds, ADMIN_USER);
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getAuthorizedDevices().size(), 5,
|
||||||
|
"Expected 5 authorized devices for admin user");
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getUnauthorizedDevices().size(), 0,
|
||||||
|
"Expected 0 un-authorized devices for admin user");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization by device identifier")
|
||||||
|
public void userAuthDevId() throws Exception {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(ADMIN_USER);
|
||||||
|
for (DeviceIdentifier deviceId : deviceIds) {
|
||||||
|
Assert.assertTrue(deviceAccessAuthorizationService.isUserAuthorized(deviceId),
|
||||||
|
"Authorize user from device identifier failed");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization by multiple device identifiers")
|
||||||
|
public void userAuthDevIdResult() throws Exception {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(ADMIN_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(deviceIds);
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getAuthorizedDevices().size(), 5,
|
||||||
|
"Expected 5 authorized devices for admin user");
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getUnauthorizedDevices().size(), 0,
|
||||||
|
"Expected 0 un-authorized devices for admin user");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Check current user is a device administrator")
|
||||||
|
public void isDevAdminAdminUser() throws DeviceAccessAuthorizationException, UserStoreException,
|
||||||
|
PermissionManagementException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(ADMIN_USER);
|
||||||
|
Assert.assertTrue(deviceAccessAuthorizationService.isDeviceAdminUser(),
|
||||||
|
"Admin user failed to authorize as admin");
|
||||||
|
}
|
||||||
|
|
||||||
|
//Non admin user tests
|
||||||
|
@Test(description = "Check authorization by device identifier and permission Allowed test case")
|
||||||
|
public void userAuthDevIdPermission() throws DeviceAccessAuthorizationException, UserStoreException,
|
||||||
|
PermissionManagementException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
Assert.assertTrue(deviceAccessAuthorizationService.isUserAuthorized(deviceIds.get(0),
|
||||||
|
new String[]{NON_ADMIN_PERMISSION}), "Non admin user with permissions attempt to access failed");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Check authorization by device identifier and permission Not-allowed test case")
|
||||||
|
public void userAuthFalseDevIdPermission() throws DeviceAccessAuthorizationException, UserStoreException,
|
||||||
|
PermissionManagementException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
Assert.assertFalse(deviceAccessAuthorizationService.isUserAuthorized(deviceIds.get(3),
|
||||||
|
new String[]{NON_ADMIN_PERMISSION}), "Non admin user accessing not allowed device authorized");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization by giving a device identifier, username and permission Allowed test case")
|
||||||
|
public void userAuthDevIdUserNamePermission() throws DeviceAccessAuthorizationException, UserStoreException,
|
||||||
|
PermissionManagementException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
Assert.assertTrue(deviceAccessAuthorizationService.isUserAuthorized(deviceIds.get(0), NON_ADMIN_ALLOWED_USER,
|
||||||
|
new String[]{NON_ADMIN_PERMISSION}), "Non admin user with permissions attempt to access failed");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization by giving a device identifier, username and permission Not-allowed test case")
|
||||||
|
public void userAuthFalseDevIdUserNamePermission() throws DeviceAccessAuthorizationException, UserStoreException,
|
||||||
|
PermissionManagementException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
Assert.assertFalse(deviceAccessAuthorizationService.isUserAuthorized(deviceIds.get(3), NON_ADMIN_ALLOWED_USER,
|
||||||
|
new String[]{NON_ADMIN_PERMISSION}), "Non admin user accessing not allowed device authorized");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization by giving device identifiers and permission")
|
||||||
|
public void userAuthDevIdPermissionResult() throws DeviceAccessAuthorizationException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(deviceIds, new String[]{NON_ADMIN_PERMISSION});
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getAuthorizedDevices().size(), 2,
|
||||||
|
"Non admin user authentication to 2 devices in a shared group failed");
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getUnauthorizedDevices().size(), 3,
|
||||||
|
"Non admin user authentication to 3 devices in a non-shared group failed");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization by giving device identifiers, username and permission")
|
||||||
|
public void userAuthDevIdUserNamePermissionResult() throws DeviceAccessAuthorizationException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(deviceIds, NON_ADMIN_ALLOWED_USER, new String[]{NON_ADMIN_PERMISSION});
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getAuthorizedDevices().size(), 2,
|
||||||
|
"Non admin user authentication to 2 devices in a shared group failed");
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getUnauthorizedDevices().size(), 3,
|
||||||
|
"Non admin user authentication to 3 devices in a non-shared group failed");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Authorization for device admin called by normal user")
|
||||||
|
public void isDevAdminNormalUser() throws DeviceAccessAuthorizationException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NORMAL_USER);
|
||||||
|
Assert.assertFalse(deviceAccessAuthorizationService.isDeviceAdminUser(), "Normal user allowed as admin user");
|
||||||
|
}
|
||||||
|
|
||||||
|
//Check branches of isUserAuthorized
|
||||||
|
@Test(description = "Checking branch - user is device owner")
|
||||||
|
public void nonAdminDeviceOwner() throws DeviceAccessAuthorizationException, DeviceManagementException {
|
||||||
|
|
||||||
|
//Creating a temporary device
|
||||||
|
Device device = new Device();
|
||||||
|
EnrolmentInfo enrolmentInfo = new EnrolmentInfo(NON_ADMIN_ALLOWED_USER, EnrolmentInfo.OwnerShip.BYOD, null);
|
||||||
|
device.setEnrolmentInfo(enrolmentInfo);
|
||||||
|
device.setName("temp");
|
||||||
|
device.setType(DEVICE_TYPE);
|
||||||
|
device.setDeviceIdentifier("1234");
|
||||||
|
DeviceManagementDataHolder.getInstance().getDeviceManagementProvider().enrollDevice(device);
|
||||||
|
|
||||||
|
//temporary device identifier
|
||||||
|
DeviceIdentifier deviceIdentifier = new DeviceIdentifier();
|
||||||
|
deviceIdentifier.setType(DEVICE_TYPE);
|
||||||
|
deviceIdentifier.setId("1234");
|
||||||
|
|
||||||
|
List<DeviceIdentifier> tempList = new ArrayList<>();
|
||||||
|
tempList.add(deviceIdentifier);
|
||||||
|
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(tempList, NON_ADMIN_ALLOWED_USER, new String[]{NON_ADMIN_PERMISSION});
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getAuthorizedDevices().size(), 1,
|
||||||
|
"Non admin device owner failed to access device");
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getUnauthorizedDevices().size(), 0,
|
||||||
|
"Non admin device owner failed to access device");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "Check authorization without giving permissions")
|
||||||
|
public void userAuthWithoutPermissions() throws DeviceAccessAuthorizationException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(deviceIds, NON_ADMIN_ALLOWED_USER, null);
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getAuthorizedDevices().size(), 0,
|
||||||
|
"Non admin user try authentication without permission failed");
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult.getUnauthorizedDevices().size(), 5,
|
||||||
|
"Non admin user try authentication without permission failed");
|
||||||
|
}
|
||||||
|
|
||||||
|
//check Exception cases
|
||||||
|
@Test(description = "check a null username in isUserAuthorized method")
|
||||||
|
public void callUserAuthWithoutUsername() throws DeviceAccessAuthorizationException {
|
||||||
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setUsername(NON_ADMIN_ALLOWED_USER);
|
||||||
|
DeviceAuthorizationResult deviceAuthorizationResult = deviceAccessAuthorizationService.
|
||||||
|
isUserAuthorized(deviceIds, "", new String[]{NON_ADMIN_PERMISSION});
|
||||||
|
Assert.assertEquals(deviceAuthorizationResult, null,
|
||||||
|
"Not null result for empty username in isUserAuthorized method");
|
||||||
|
}
|
||||||
|
|
||||||
|
@AfterClass
|
||||||
|
public void clearAll() {
|
||||||
|
PrivilegedCarbonContext.endTenantFlow();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -0,0 +1,244 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
*
|
||||||
|
* WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
* Version 2.0 (the "License"); you may not use this file except
|
||||||
|
* in compliance with the License.
|
||||||
|
* you may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing,
|
||||||
|
* software distributed under the License is distributed on an
|
||||||
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
* KIND, either express or implied. See the License for the
|
||||||
|
* specific language governing permissions and limitations
|
||||||
|
* under the License.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.wso2.carbon.device.mgt.core.geo.service;
|
||||||
|
|
||||||
|
import org.mockito.Mockito;
|
||||||
|
|
||||||
|
import org.testng.Assert;
|
||||||
|
import org.testng.annotations.BeforeClass;
|
||||||
|
import org.testng.annotations.Test;
|
||||||
|
import org.wso2.carbon.device.mgt.common.Device;
|
||||||
|
import org.wso2.carbon.device.mgt.common.DeviceIdentifier;
|
||||||
|
import org.wso2.carbon.device.mgt.common.DeviceManagementConstants;
|
||||||
|
import org.wso2.carbon.device.mgt.common.DeviceManagementException;
|
||||||
|
import org.wso2.carbon.device.mgt.common.geo.service.Alert;
|
||||||
|
import org.wso2.carbon.device.mgt.common.geo.service.GeoFence;
|
||||||
|
import org.wso2.carbon.device.mgt.common.geo.service.GeoLocationBasedServiceException;
|
||||||
|
import org.wso2.carbon.device.mgt.core.TestDeviceManagementService;
|
||||||
|
import org.wso2.carbon.device.mgt.core.common.TestDataHolder;
|
||||||
|
import org.wso2.carbon.device.mgt.core.internal.DeviceManagementDataHolder;
|
||||||
|
import org.wso2.carbon.device.mgt.core.service.DeviceManagementProviderService;
|
||||||
|
import org.wso2.carbon.event.processor.stub.EventProcessorAdminServiceStub;
|
||||||
|
import org.wso2.carbon.identity.jwt.client.extension.exception.JWTClientException;
|
||||||
|
import org.wso2.carbon.utils.multitenancy.MultitenantConstants;
|
||||||
|
|
||||||
|
import java.rmi.RemoteException;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
public class GeoLocationProviderServiceTest {
|
||||||
|
|
||||||
|
private static final String DEVICE_TYPE = "GL_TEST_TYPE";
|
||||||
|
private static final String DEVICE_ID = "GL-TEST-DEVICE-ID-1";
|
||||||
|
private static final String SAMPLE_GEO_JSON = "12121";
|
||||||
|
private static final String SAMPLE_AREA_NAME = "CUSTOM_NAME";
|
||||||
|
private static final String SAMPLE_QUERY_NAME = "QUERY_NAME";
|
||||||
|
private static final String SAMPLE_PROXIMITY_DISATANCE = "100";
|
||||||
|
private static final String SAMPLE_PROXIMITY_TIME = "50";
|
||||||
|
private static final String SAMPLE_SPEED_ALERT_VALUE = "120";
|
||||||
|
private static final String SAMPLE_STATIONARY_TIME = "1500";
|
||||||
|
private static final String SAMPLE_FLUCTUATION_RADIUS = "2000";
|
||||||
|
|
||||||
|
private EventProcessorAdminServiceStub mockEventProcessorAdminServiceStub;
|
||||||
|
private GeoLocationProviderServiceImpl geoLocationProviderServiceImpl;
|
||||||
|
|
||||||
|
@BeforeClass
|
||||||
|
public void init() throws Exception {
|
||||||
|
initMocks();
|
||||||
|
enrollDevice();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test (description = "Create a sample geo exit-alert with relevant details.")
|
||||||
|
public void createGeoExitAlert() throws GeoLocationBasedServiceException {
|
||||||
|
Boolean result = geoLocationProviderServiceImpl.
|
||||||
|
createGeoAlert(getExitAlert(), getDeviceIdentifier(), DeviceManagementConstants.GeoServices.ALERT_TYPE_EXIT);
|
||||||
|
Assert.assertEquals(result, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test (description = "Create a sample geo within-alert with relevant details.")
|
||||||
|
public void createGeoWithinAlert() throws GeoLocationBasedServiceException {
|
||||||
|
Boolean result = geoLocationProviderServiceImpl.
|
||||||
|
createGeoAlert(getWithinAlert(), getDeviceIdentifier(), DeviceManagementConstants.GeoServices.ALERT_TYPE_WITHIN);
|
||||||
|
Assert.assertEquals(result, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test (description = "Create a sample geo proximity-alert with relevant details.")
|
||||||
|
public void createGeoProximityAlert() throws GeoLocationBasedServiceException {
|
||||||
|
Boolean result = geoLocationProviderServiceImpl.
|
||||||
|
createGeoAlert(getProximityAlert(), getDeviceIdentifier(), DeviceManagementConstants.GeoServices.ALERT_TYPE_PROXIMITY);
|
||||||
|
Assert.assertEquals(result, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test (description = "Create a sample geo speed-alert with relevant details.")
|
||||||
|
public void createGeoSpeedAlert() throws GeoLocationBasedServiceException {
|
||||||
|
Boolean result = geoLocationProviderServiceImpl.
|
||||||
|
createGeoAlert(getSpeedAlert(), getDeviceIdentifier(), DeviceManagementConstants.GeoServices.ALERT_TYPE_SPEED);
|
||||||
|
Assert.assertEquals(result, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test (description = "Create a sample geo stationary-alert with relevant details.")
|
||||||
|
public void createGeoStationaryAlert() throws GeoLocationBasedServiceException {
|
||||||
|
Boolean result = geoLocationProviderServiceImpl.
|
||||||
|
createGeoAlert(getStationaryAlert(), getDeviceIdentifier(), DeviceManagementConstants.GeoServices.ALERT_TYPE_STATIONARY);
|
||||||
|
Assert.assertEquals(result, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test (description = "Create a sample geo traffic-alert with relevant details.")
|
||||||
|
public void createGeoTrafficAlert() throws GeoLocationBasedServiceException {
|
||||||
|
Boolean result = geoLocationProviderServiceImpl.
|
||||||
|
createGeoAlert(getTrafficAlert(), getDeviceIdentifier(), DeviceManagementConstants.GeoServices.ALERT_TYPE_TRAFFIC);
|
||||||
|
Assert.assertEquals(result, Boolean.TRUE);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(dependsOnMethods = "createGeoSpeedAlert", description = "retrieve saved geo speed-alert.")
|
||||||
|
public void getGeoSpeedAlerts() throws GeoLocationBasedServiceException {
|
||||||
|
String result;
|
||||||
|
result = geoLocationProviderServiceImpl.getSpeedAlerts(getDeviceIdentifier());
|
||||||
|
Assert.assertNotNull(result);
|
||||||
|
Assert.assertEquals(result, "{'speedLimit':" + SAMPLE_SPEED_ALERT_VALUE + "}");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(dependsOnMethods = "createGeoTrafficAlert" , description = "retrieve saved geo exit-alert.")
|
||||||
|
public void getGeoTrafficAlerts() throws GeoLocationBasedServiceException {
|
||||||
|
List<GeoFence> geoFences;
|
||||||
|
geoFences = geoLocationProviderServiceImpl.getTrafficAlerts(getDeviceIdentifier());
|
||||||
|
Assert.assertNotNull(geoFences);
|
||||||
|
GeoFence geoFenceNode = geoFences.get(0);
|
||||||
|
Assert.assertEquals(geoFenceNode.getGeoJson(), "{\n" +
|
||||||
|
" \"" + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON + "\": \"" + SAMPLE_GEO_JSON + "\"\n" +
|
||||||
|
"}");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(dependsOnMethods = "createGeoStationaryAlert", description = "retrieve saved geo stationary-alert.")
|
||||||
|
public void getGeoStationaryAlerts() throws GeoLocationBasedServiceException {
|
||||||
|
List<GeoFence> geoFences;
|
||||||
|
geoFences = geoLocationProviderServiceImpl.getStationaryAlerts(getDeviceIdentifier());
|
||||||
|
Assert.assertNotNull(geoFences);
|
||||||
|
GeoFence geoFenceNode = geoFences.get(0);
|
||||||
|
Assert.assertEquals(geoFenceNode.getAreaName(), SAMPLE_AREA_NAME);
|
||||||
|
Assert.assertEquals(geoFenceNode.getQueryName(), SAMPLE_QUERY_NAME);
|
||||||
|
Assert.assertEquals(geoFenceNode.getStationaryTime(), SAMPLE_STATIONARY_TIME);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void initMocks() throws JWTClientException, RemoteException {
|
||||||
|
mockEventProcessorAdminServiceStub = Mockito.mock(EventProcessorAdminServiceStub.class);
|
||||||
|
geoLocationProviderServiceImpl = Mockito.mock(GeoLocationProviderServiceImpl.class, Mockito.CALLS_REAL_METHODS);
|
||||||
|
Mockito.doReturn(mockEventProcessorAdminServiceStub).
|
||||||
|
when(geoLocationProviderServiceImpl).getEventProcessorAdminServiceStub();
|
||||||
|
Mockito.doReturn("success").
|
||||||
|
when(mockEventProcessorAdminServiceStub).validateExecutionPlan(Mockito.anyString());
|
||||||
|
}
|
||||||
|
|
||||||
|
private DeviceIdentifier getDeviceIdentifier() {
|
||||||
|
DeviceIdentifier deviceIdentifier = new DeviceIdentifier();
|
||||||
|
deviceIdentifier.setId("1234");
|
||||||
|
deviceIdentifier.setType("TEST");
|
||||||
|
return deviceIdentifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Alert getWithinAlert() {
|
||||||
|
Alert alert = new Alert();
|
||||||
|
alert.setDeviceId(DEVICE_ID);
|
||||||
|
alert.setCepAction("CEP_ACTION");
|
||||||
|
alert.setParseData("{\n" +
|
||||||
|
" \" " + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON + "\": \"" + SAMPLE_GEO_JSON + "\"\n" +
|
||||||
|
"}");
|
||||||
|
alert.setCustomName(SAMPLE_AREA_NAME);
|
||||||
|
alert.setExecutionPlan("EXECUTION_PLAN");
|
||||||
|
alert.setQueryName(SAMPLE_QUERY_NAME);
|
||||||
|
return alert;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Alert getExitAlert() {
|
||||||
|
Alert alert = new Alert();
|
||||||
|
alert.setDeviceId(DEVICE_ID);
|
||||||
|
alert.setQueryName(SAMPLE_QUERY_NAME);
|
||||||
|
alert.setCustomName(SAMPLE_AREA_NAME);
|
||||||
|
alert.setStationeryTime(SAMPLE_STATIONARY_TIME);
|
||||||
|
alert.setFluctuationRadius(SAMPLE_FLUCTUATION_RADIUS);
|
||||||
|
alert.setParseData("{\n" +
|
||||||
|
" \" " + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON + "\": \"" + SAMPLE_GEO_JSON + "\"\n" +
|
||||||
|
"}");
|
||||||
|
alert.setExecutionPlan("EXECUTION_PLAN");
|
||||||
|
return alert;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Alert getProximityAlert() {
|
||||||
|
Alert alert = new Alert();
|
||||||
|
alert.setDeviceId(DEVICE_ID);
|
||||||
|
alert.setProximityTime(SAMPLE_PROXIMITY_TIME);
|
||||||
|
alert.setProximityDistance(SAMPLE_PROXIMITY_DISATANCE);
|
||||||
|
alert.setParseData("{\n" +
|
||||||
|
" \" " + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON + "\": \"" + SAMPLE_GEO_JSON + "\"\n" +
|
||||||
|
"}");
|
||||||
|
return alert;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Alert getSpeedAlert() {
|
||||||
|
Alert alert = new Alert();
|
||||||
|
alert.setDeviceId(DEVICE_ID);
|
||||||
|
alert.setParseData("{\n" +
|
||||||
|
" \"" + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON + "\": \"" + SAMPLE_GEO_JSON + "\",\n" +
|
||||||
|
" \"" + DeviceManagementConstants.GeoServices.SPEED_ALERT_VALUE + "\": \"" + SAMPLE_SPEED_ALERT_VALUE + "\"\n" +
|
||||||
|
"}");
|
||||||
|
return alert;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Alert getStationaryAlert() {
|
||||||
|
Alert alert = new Alert();
|
||||||
|
alert.setDeviceId(DEVICE_ID);
|
||||||
|
alert.setQueryName(SAMPLE_QUERY_NAME);
|
||||||
|
alert.setCustomName(SAMPLE_AREA_NAME);
|
||||||
|
alert.setStationeryTime(SAMPLE_STATIONARY_TIME);
|
||||||
|
alert.setFluctuationRadius(SAMPLE_FLUCTUATION_RADIUS);
|
||||||
|
alert.setParseData("{\n" +
|
||||||
|
" \"" + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON + "\": \"" + SAMPLE_GEO_JSON + "\"\n" +
|
||||||
|
"}");
|
||||||
|
return alert;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Alert getTrafficAlert() {
|
||||||
|
Alert alert = new Alert();
|
||||||
|
alert.setDeviceId(DEVICE_ID);
|
||||||
|
alert.setParseData("{\n" +
|
||||||
|
" \"" + DeviceManagementConstants.GeoServices.GEO_FENCE_GEO_JSON +"\": \"" + SAMPLE_GEO_JSON + "\"\n" +
|
||||||
|
"}");
|
||||||
|
alert.setCustomName(SAMPLE_AREA_NAME);
|
||||||
|
alert.setExecutionPlan("EXECUTION_PLAN");
|
||||||
|
alert.setQueryName(SAMPLE_QUERY_NAME);
|
||||||
|
return alert;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void enrollDevice() throws Exception {
|
||||||
|
DeviceIdentifier deviceIdentifier = new DeviceIdentifier(DEVICE_ID, DEVICE_TYPE);
|
||||||
|
Device device = TestDataHolder.generateDummyDeviceData(deviceIdentifier);
|
||||||
|
DeviceManagementProviderService deviceMgtService = DeviceManagementDataHolder.getInstance().
|
||||||
|
getDeviceManagementProvider();
|
||||||
|
deviceMgtService.registerDeviceType(new TestDeviceManagementService(DEVICE_TYPE,
|
||||||
|
MultitenantConstants.SUPER_TENANT_DOMAIN_NAME));
|
||||||
|
deviceMgtService.enrollDevice(device);
|
||||||
|
|
||||||
|
Device returnedDevice = deviceMgtService.getDevice(deviceIdentifier);
|
||||||
|
|
||||||
|
if (!returnedDevice.getDeviceIdentifier().equals(deviceIdentifier.getId())) {
|
||||||
|
throw new Exception("Incorrect device with ID - " + device.getDeviceIdentifier() + " returned!");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -1,53 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright (c) 2015, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
|
||||||
*
|
|
||||||
* WSO2 Inc. licenses this file to you under the Apache License,
|
|
||||||
* Version 2.0 (the "License"); you may not use this file except
|
|
||||||
* in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing,
|
|
||||||
* software distributed under the License is distributed on an
|
|
||||||
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
||||||
* KIND, either express or implied. See the License for the
|
|
||||||
* specific language governing permissions and limitations
|
|
||||||
* under the License.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
package org.wso2.carbon.device.mgt.extensions.device.type.template.config.exception;
|
|
||||||
|
|
||||||
public class InvalidConfigurationStateException extends RuntimeException {
|
|
||||||
|
|
||||||
private static final long serialVersionUID = -3151279411229070297L;
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException(int errorCode, String message) {
|
|
||||||
super(message);
|
|
||||||
}
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException(int errorCode, String message, Throwable cause) {
|
|
||||||
super(message, cause);
|
|
||||||
}
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException(String msg, Exception nestedEx) {
|
|
||||||
super(msg, nestedEx);
|
|
||||||
}
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException(String message, Throwable cause) {
|
|
||||||
super(message, cause);
|
|
||||||
}
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException(String msg) {
|
|
||||||
super(msg);
|
|
||||||
}
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException() {
|
|
||||||
super();
|
|
||||||
}
|
|
||||||
|
|
||||||
public InvalidConfigurationStateException(Throwable cause) {
|
|
||||||
super(cause);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
@ -0,0 +1,124 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
*
|
||||||
|
* WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
* Version 2.0 (the "License"); you may not use this file except
|
||||||
|
* in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing,
|
||||||
|
* software distributed under the License is distributed on an
|
||||||
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
* KIND, either express or implied. See the License for the
|
||||||
|
* specific language governing permissions and limitations
|
||||||
|
* under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.wso2.carbon.device.mgt.extensions.device.type.template;
|
||||||
|
|
||||||
|
import org.testng.annotations.BeforeTest;
|
||||||
|
import org.testng.annotations.Test;
|
||||||
|
import org.wso2.carbon.base.MultitenantConstants;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.config.DataSource;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.config.DeviceTypeConfiguration;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.config.exception.DeviceTypeConfigurationException;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.exception.DeviceTypeDeployerPayloadException;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.utils.Utils;
|
||||||
|
import org.xml.sax.SAXException;
|
||||||
|
|
||||||
|
import javax.xml.bind.JAXBException;
|
||||||
|
import javax.xml.parsers.ParserConfigurationException;
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.URL;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This class tests the negative scenarios in {@link DeviceTypeManager} initialization;
|
||||||
|
*/
|
||||||
|
public class DeviceTypeManagerNegativeTest {
|
||||||
|
private DeviceTypeConfiguration defectiveDeviceTypeConfiguration1;
|
||||||
|
private DeviceTypeConfiguration defectiveDeviceTypeConfiguration2;
|
||||||
|
private DeviceTypeConfiguration androidDeviceTypeConfiguration;
|
||||||
|
private DeviceTypeConfigIdentifier deviceTypeConfigIdentifier;
|
||||||
|
private final String DEFECTIVE_DEVICE_TYPE = "defectiveDeviceType";
|
||||||
|
private final String TABLE_NAME = "DEFECTIVE_DEVICE";
|
||||||
|
|
||||||
|
@BeforeTest
|
||||||
|
public void setup()
|
||||||
|
throws SAXException, JAXBException, ParserConfigurationException, DeviceTypeConfigurationException,
|
||||||
|
IOException {
|
||||||
|
ClassLoader classLoader = getClass().getClassLoader();
|
||||||
|
URL resourceUrl = classLoader.getResource(Utils.DEVICE_TYPE_FOLDER + "defective-devicetype.xml");
|
||||||
|
File configurationFile = null;
|
||||||
|
if (resourceUrl != null) {
|
||||||
|
configurationFile = new File(resourceUrl.getFile());
|
||||||
|
}
|
||||||
|
if (configurationFile != null) {
|
||||||
|
defectiveDeviceTypeConfiguration1 = Utils.getDeviceTypeConfiguration(configurationFile.getAbsoluteFile());
|
||||||
|
}
|
||||||
|
deviceTypeConfigIdentifier = new DeviceTypeConfigIdentifier(DEFECTIVE_DEVICE_TYPE,
|
||||||
|
MultitenantConstants.SUPER_TENANT_DOMAIN_NAME);
|
||||||
|
|
||||||
|
resourceUrl = classLoader.getResource(Utils.DEVICE_TYPE_FOLDER + "defective-devicetype2.xml");
|
||||||
|
if (resourceUrl != null) {
|
||||||
|
configurationFile = new File(resourceUrl.getFile());
|
||||||
|
}
|
||||||
|
if (configurationFile != null) {
|
||||||
|
defectiveDeviceTypeConfiguration2 = Utils.getDeviceTypeConfiguration(configurationFile.getAbsoluteFile());
|
||||||
|
}
|
||||||
|
|
||||||
|
resourceUrl = classLoader.getResource(Utils.DEVICE_TYPE_FOLDER + "android.xml");
|
||||||
|
if (resourceUrl != null) {
|
||||||
|
configurationFile = new File(resourceUrl.getFile());
|
||||||
|
}
|
||||||
|
if (configurationFile != null) {
|
||||||
|
androidDeviceTypeConfiguration = Utils.getDeviceTypeConfiguration(configurationFile.getAbsoluteFile());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behaviour of the DeviceTypeManager creation without defining the "
|
||||||
|
+ "datasource but by specifying the table id", expectedExceptions = { DeviceTypeDeployerPayloadException
|
||||||
|
.class}, expectedExceptionsMessageRegExp = "Could not find the datasource related with the table id "
|
||||||
|
+ TABLE_NAME + " for the device type " + DEFECTIVE_DEVICE_TYPE)
|
||||||
|
public void testWithoutDataSource() {
|
||||||
|
new DeviceTypeManager(deviceTypeConfigIdentifier, defectiveDeviceTypeConfiguration1);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behaviour of the DeviceTypeManager creation without defining the "
|
||||||
|
+ "table config",expectedExceptions = { DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Could not find the table config with the table id " + TABLE_NAME
|
||||||
|
+ " for the device type " + DEFECTIVE_DEVICE_TYPE,
|
||||||
|
dependsOnMethods = {"testWithoutDataSource"})
|
||||||
|
public void testWithoutTableConfig() {
|
||||||
|
DataSource dataSource = new DataSource();
|
||||||
|
defectiveDeviceTypeConfiguration1.setDataSource(dataSource);
|
||||||
|
new DeviceTypeManager(deviceTypeConfigIdentifier, defectiveDeviceTypeConfiguration1);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behaviour of the DeviceTypeManager creation without defining the "
|
||||||
|
+ "correct table as per the device details",
|
||||||
|
expectedExceptions = { DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Could not find definition for table: " + TABLE_NAME)
|
||||||
|
public void testWithoutTable() {
|
||||||
|
new DeviceTypeManager(deviceTypeConfigIdentifier, defectiveDeviceTypeConfiguration2);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behaviour of the DeviceTypeManager creation without having the "
|
||||||
|
+ "actual datasource", expectedExceptions = {DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Error while looking up the data source.*")
|
||||||
|
public void testWithoutProperDataSource() {
|
||||||
|
new DeviceTypeManager(deviceTypeConfigIdentifier, androidDeviceTypeConfiguration);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behaviour of the DeviceTypeManager creation without having the "
|
||||||
|
+ "actual datasource", expectedExceptions = {DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Error while looking up the data source.*")
|
||||||
|
public void testWithSetupParameters() {
|
||||||
|
System.setProperty("setup", "true");
|
||||||
|
new DeviceTypeManager(deviceTypeConfigIdentifier, androidDeviceTypeConfiguration);
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,65 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
*
|
||||||
|
* WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
* Version 2.0 (the "License"); you may not use this file except
|
||||||
|
* in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing,
|
||||||
|
* software distributed under the License is distributed on an
|
||||||
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
* KIND, either express or implied. See the License for the
|
||||||
|
* specific language governing permissions and limitations
|
||||||
|
* under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.wso2.carbon.device.mgt.extensions.device.type.template.dao;
|
||||||
|
|
||||||
|
import org.testng.annotations.Test;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.config.Table;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.exception.DeviceTypeDeployerPayloadException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This class tests the negative scenarios related with {@link DeviceDAODefinition}
|
||||||
|
*/
|
||||||
|
public class DeviceDAODefinitionNegativeTest {
|
||||||
|
private final String DEVICE_TABLE_NAME = "DEVICE_TABLE";
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behavior of the DeviceDAODefinition when the table is null",
|
||||||
|
expectedExceptions = { DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Table is null. Cannot create DeviceDAODefinition")
|
||||||
|
public void testWhenTableIsNull() {
|
||||||
|
new DeviceDAODefinition(null);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behavior of the DeviceDAODefinition when the table name is null",
|
||||||
|
expectedExceptions = { DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Missing deviceTableName")
|
||||||
|
public void testWhenTableNameIsNull() {
|
||||||
|
new DeviceDAODefinition(new Table());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behavior of the DeviceDAODefinition when the primary key is null",
|
||||||
|
expectedExceptions = { DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Missing primaryKey for the table " + DEVICE_TABLE_NAME)
|
||||||
|
public void testWhenPrimaryKeyIsEmpty() {
|
||||||
|
Table deviceTable = new Table();
|
||||||
|
deviceTable.setName(DEVICE_TABLE_NAME);
|
||||||
|
deviceTable.setPrimaryKey("");
|
||||||
|
new DeviceDAODefinition(deviceTable);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behavior of the DeviceDAODefinition when the attributes is null",
|
||||||
|
expectedExceptions = { DeviceTypeDeployerPayloadException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "Table " + DEVICE_TABLE_NAME + " attributes are not specified. "
|
||||||
|
+ "Cannot created DeviceDAODefinition")
|
||||||
|
public void testWhenAttributesIsNull() {
|
||||||
|
Table deviceTable = new Table();
|
||||||
|
deviceTable.setName(DEVICE_TABLE_NAME);
|
||||||
|
deviceTable.setPrimaryKey("primaryKey");
|
||||||
|
new DeviceDAODefinition(deviceTable);
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,84 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
*
|
||||||
|
* WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
* Version 2.0 (the "License"); you may not use this file except
|
||||||
|
* in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing,
|
||||||
|
* software distributed under the License is distributed on an
|
||||||
|
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
* KIND, either express or implied. See the License for the
|
||||||
|
* specific language governing permissions and limitations
|
||||||
|
* under the License.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.wso2.carbon.device.mgt.extensions.utils;
|
||||||
|
|
||||||
|
import org.testng.Assert;
|
||||||
|
import org.testng.annotations.BeforeTest;
|
||||||
|
import org.testng.annotations.Test;
|
||||||
|
import org.wso2.carbon.base.MultitenantConstants;
|
||||||
|
import org.wso2.carbon.device.mgt.common.license.mgt.License;
|
||||||
|
import org.wso2.carbon.device.mgt.common.license.mgt.LicenseManagementException;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.device.type.template.util.DeviceSchemaInitializer;
|
||||||
|
import org.wso2.carbon.device.mgt.extensions.license.mgt.file.FileSystemBasedLicenseManager;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.lang.reflect.InvocationTargetException;
|
||||||
|
import java.lang.reflect.Method;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This is a test case for testing common utilities used.
|
||||||
|
*/
|
||||||
|
public class UtilsTest {
|
||||||
|
private FileSystemBasedLicenseManager fileSystemBasedLicenseManager;
|
||||||
|
|
||||||
|
@BeforeTest
|
||||||
|
public void setup() {
|
||||||
|
fileSystemBasedLicenseManager = new FileSystemBasedLicenseManager();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This testcase tests the functionality of the DeviceSchemaInitializer")
|
||||||
|
public void testDeviceSchemaInitializer()
|
||||||
|
throws NoSuchMethodException, InvocationTargetException, IllegalAccessException {
|
||||||
|
String deviceType = "sample2";
|
||||||
|
String expectedDBLocation =
|
||||||
|
System.getProperty("carbon.home") + File.separator + "dbscripts" + File.separator + "cdm"
|
||||||
|
+ File.separator + "plugins" + File.separator + deviceType + File.separator + "h2.sql";
|
||||||
|
DeviceSchemaInitializer deviceSchemaInitializer = new DeviceSchemaInitializer(null, deviceType,
|
||||||
|
MultitenantConstants.SUPER_TENANT_DOMAIN_NAME);
|
||||||
|
Method getDbScriptLocation = DeviceSchemaInitializer.class
|
||||||
|
.getDeclaredMethod("getDbScriptLocation", String.class);
|
||||||
|
getDbScriptLocation.setAccessible(true);
|
||||||
|
|
||||||
|
String dbLocation = (String) getDbScriptLocation.invoke(deviceSchemaInitializer, "h2");
|
||||||
|
Assert.assertEquals(dbLocation, expectedDBLocation,
|
||||||
|
"Expected DB location for the device type is not retrieved");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the getLicense method of the FileBasedLicenseManager")
|
||||||
|
public void testFileBasedLicenseManagerGetLicense() throws LicenseManagementException {
|
||||||
|
License fileBasedLicense = fileSystemBasedLicenseManager.getLicense("test","en_US");
|
||||||
|
Assert.assertEquals(fileBasedLicense.getText(), "This is a file based license",
|
||||||
|
"FileBased License cannot " + "be retrieved by FileBasedLicenseManager");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case tests the behaviour of file based license manager when the relevant license "
|
||||||
|
+ "is missing in file system", expectedExceptions = {LicenseManagementException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "License file not found in the path for the device type test2")
|
||||||
|
public void testFileBasedLicenseManagerGetNonExistingLicense() throws LicenseManagementException {
|
||||||
|
fileSystemBasedLicenseManager.getLicense("test2","en_US");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(description = "This test case make sure the File Based License cannot be added without adding directly to "
|
||||||
|
+ "file system", expectedExceptions = {UnsupportedOperationException.class},
|
||||||
|
expectedExceptionsMessageRegExp = "'addLicense' method is not supported in FileSystemBasedLicenseManager")
|
||||||
|
public void testFileBasedLicenseManagerAddLicense() throws LicenseManagementException {
|
||||||
|
fileSystemBasedLicenseManager.addLicense("test", null);
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,28 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
|
||||||
|
<!--
|
||||||
|
~ Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
~
|
||||||
|
~ WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
~ Version 2.0 (the "License"); you may not use this file except
|
||||||
|
~ in compliance with the License.
|
||||||
|
~ You may obtain a copy of the License at
|
||||||
|
~
|
||||||
|
~ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
~
|
||||||
|
~ Unless required by applicable law or agreed to in writing,
|
||||||
|
~ software distributed under the License is distributed on an
|
||||||
|
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
~ KIND, either express or implied. See the License for the
|
||||||
|
~ specific language governing permissions and limitations
|
||||||
|
~ under the License.
|
||||||
|
-->
|
||||||
|
|
||||||
|
<PlatformConfiguration>
|
||||||
|
<type>sample</type>
|
||||||
|
<configuration>
|
||||||
|
<name>test</name>
|
||||||
|
<contentType>String</contentType>
|
||||||
|
<value>test</value>
|
||||||
|
</configuration>
|
||||||
|
</PlatformConfiguration>
|
@ -0,0 +1,25 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
|
||||||
|
<!--
|
||||||
|
~ Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
~
|
||||||
|
~ WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
~ Version 2.0 (the "License"); you may not use this file except
|
||||||
|
~ in compliance with the License.
|
||||||
|
~ You may obtain a copy of the License at
|
||||||
|
~
|
||||||
|
~ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
~
|
||||||
|
~ Unless required by applicable law or agreed to in writing,
|
||||||
|
~ software distributed under the License is distributed on an
|
||||||
|
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
~ KIND, either express or implied. See the License for the
|
||||||
|
~ specific language governing permissions and limitations
|
||||||
|
~ under the License.
|
||||||
|
-->
|
||||||
|
|
||||||
|
<License>
|
||||||
|
<Language>en_US</Language>
|
||||||
|
<Version>1.0.0</Version>
|
||||||
|
<Text>This is a file based license</Text>
|
||||||
|
</License>
|
@ -0,0 +1,45 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
|
||||||
|
<!--
|
||||||
|
~ Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
~
|
||||||
|
~ WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
~ Version 2.0 (the "License"); you may not use this file except
|
||||||
|
~ in compliance with the License.
|
||||||
|
~ You may obtain a copy of the License at
|
||||||
|
~
|
||||||
|
~ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
~
|
||||||
|
~ Unless required by applicable law or agreed to in writing,
|
||||||
|
~ software distributed under the License is distributed on an
|
||||||
|
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
~ KIND, either express or implied. See the License for the
|
||||||
|
~ specific language governing permissions and limitations
|
||||||
|
~ under the License.
|
||||||
|
-->
|
||||||
|
<DeviceTypeConfiguration name="defective-devicetype">
|
||||||
|
<DeviceDetails table-id="DEFECTIVE_DEVICE"/>
|
||||||
|
|
||||||
|
<Features>
|
||||||
|
<Feature code="bulb">
|
||||||
|
<Name>Control Bulb</Name>
|
||||||
|
<Description>Control Bulb on Arduino Uno</Description>
|
||||||
|
<Operation context="/arduino/device/{deviceId}/bulb" method="POST">
|
||||||
|
<QueryParameters>
|
||||||
|
<Parameter>state</Parameter>
|
||||||
|
</QueryParameters>
|
||||||
|
</Operation>
|
||||||
|
</Feature>
|
||||||
|
</Features>
|
||||||
|
|
||||||
|
<ProvisioningConfig>
|
||||||
|
<SharedWithAllTenants>true</SharedWithAllTenants>
|
||||||
|
</ProvisioningConfig>
|
||||||
|
|
||||||
|
<License>
|
||||||
|
<Language>en_US</Language>
|
||||||
|
<Version>1.0.0</Version>
|
||||||
|
<Text>This is license text</Text>
|
||||||
|
</License>
|
||||||
|
|
||||||
|
</DeviceTypeConfiguration>
|
@ -0,0 +1,55 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
|
||||||
|
<!--
|
||||||
|
~ Copyright (c) 2017, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
|
||||||
|
~
|
||||||
|
~ WSO2 Inc. licenses this file to you under the Apache License,
|
||||||
|
~ Version 2.0 (the "License"); you may not use this file except
|
||||||
|
~ in compliance with the License.
|
||||||
|
~ You may obtain a copy of the License at
|
||||||
|
~
|
||||||
|
~ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
~
|
||||||
|
~ Unless required by applicable law or agreed to in writing,
|
||||||
|
~ software distributed under the License is distributed on an
|
||||||
|
~ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||||
|
~ KIND, either express or implied. See the License for the
|
||||||
|
~ specific language governing permissions and limitations
|
||||||
|
~ under the License.
|
||||||
|
-->
|
||||||
|
<DeviceTypeConfiguration name="defective-devicetype">
|
||||||
|
<DeviceDetails table-id="DEFECTIVE_DEVICE"/>
|
||||||
|
|
||||||
|
<Features>
|
||||||
|
<Feature code="bulb">
|
||||||
|
<Name>Control Bulb</Name>
|
||||||
|
<Description>Control Bulb on Arduino Uno</Description>
|
||||||
|
<Operation context="/arduino/device/{deviceId}/bulb" method="POST">
|
||||||
|
<QueryParameters>
|
||||||
|
<Parameter>state</Parameter>
|
||||||
|
</QueryParameters>
|
||||||
|
</Operation>
|
||||||
|
</Feature>
|
||||||
|
</Features>
|
||||||
|
|
||||||
|
<ProvisioningConfig>
|
||||||
|
<SharedWithAllTenants>true</SharedWithAllTenants>
|
||||||
|
</ProvisioningConfig>
|
||||||
|
|
||||||
|
<License>
|
||||||
|
<Language>en_US</Language>
|
||||||
|
<Version>1.0.0</Version>
|
||||||
|
<Text>This is license text</Text>
|
||||||
|
</License>
|
||||||
|
|
||||||
|
<DataSource>
|
||||||
|
<JndiConfig>
|
||||||
|
<Name>jdbc/MobileAndroidDM_DS</Name>
|
||||||
|
</JndiConfig>
|
||||||
|
<TableConfig>
|
||||||
|
<Table name="AD_DEVICE">
|
||||||
|
</Table>
|
||||||
|
</TableConfig>
|
||||||
|
</DataSource>
|
||||||
|
|
||||||
|
</DeviceTypeConfiguration>
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue