|
@@ -15,6 +15,11 @@
|
|
|
|
|
|
package org.acegisecurity.context;
|
|
|
|
|
|
+import java.util.Random;
|
|
|
+
|
|
|
+import org.acegisecurity.providers.UsernamePasswordAuthenticationToken;
|
|
|
+
|
|
|
+import junit.framework.ComparisonFailure;
|
|
|
import junit.framework.TestCase;
|
|
|
|
|
|
|
|
@@ -26,6 +31,7 @@ import junit.framework.TestCase;
|
|
|
*/
|
|
|
public class SecurityContextHolderTests extends TestCase {
|
|
|
//~ Constructors ===========================================================
|
|
|
+ private static int errors = 0;
|
|
|
|
|
|
public SecurityContextHolderTests() {
|
|
|
super();
|
|
@@ -38,23 +44,28 @@ public class SecurityContextHolderTests extends TestCase {
|
|
|
//~ Methods ================================================================
|
|
|
|
|
|
public final void setUp() throws Exception {
|
|
|
- super.setUp();
|
|
|
+ SecurityContextHolder.setStrategyName(SecurityContextHolder.MODE_INHERITABLETHREADLOCAL);
|
|
|
}
|
|
|
|
|
|
public static void main(String[] args) {
|
|
|
junit.textui.TestRunner.run(SecurityContextHolderTests.class);
|
|
|
}
|
|
|
|
|
|
- public void testContextHolderGetterSetter() {
|
|
|
+ public void testContextHolderGetterSetterClearer() {
|
|
|
SecurityContext sc = new SecurityContextImpl();
|
|
|
+ sc.setAuthentication(new UsernamePasswordAuthenticationToken("Foobar","pass"));
|
|
|
SecurityContextHolder.setContext(sc);
|
|
|
assertEquals(sc, SecurityContextHolder.getContext());
|
|
|
+ SecurityContextHolder.clearContext();
|
|
|
+ assertNotSame(sc, SecurityContextHolder.getContext());
|
|
|
+ SecurityContextHolder.clearContext();
|
|
|
}
|
|
|
|
|
|
public void testNeverReturnsNull() {
|
|
|
assertNotNull(SecurityContextHolder.getContext());
|
|
|
+ SecurityContextHolder.clearContext();
|
|
|
}
|
|
|
-
|
|
|
+
|
|
|
public void testRejectsNulls() {
|
|
|
try {
|
|
|
SecurityContextHolder.setContext(null);
|
|
@@ -63,4 +74,170 @@ public class SecurityContextHolderTests extends TestCase {
|
|
|
assertTrue(true);
|
|
|
}
|
|
|
}
|
|
|
+
|
|
|
+ public void testSynchronizationCustomStrategyLoading() {
|
|
|
+ SecurityContextHolder.setStrategyName(InheritableThreadLocalSecurityContextHolderStrategy.class.getName());
|
|
|
+ assertEquals("SecurityContextHolder[strategy='org.acegisecurity.context.InheritableThreadLocalSecurityContextHolderStrategy']", new SecurityContextHolder().toString());
|
|
|
+ loadStartAndWaitForThreads(true, "Main_", 10, false, true);
|
|
|
+ assertEquals("Thread errors detected; review log output for details", 0, errors);
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testSynchronizationInheritableThreadLocal() throws Exception {
|
|
|
+ SecurityContextHolder.clearContext();
|
|
|
+ SecurityContextHolder.setStrategyName(SecurityContextHolder.MODE_INHERITABLETHREADLOCAL);
|
|
|
+ loadStartAndWaitForThreads(true, "Main_", 10, false, true);
|
|
|
+ assertEquals("Thread errors detected; review log output for details", 0, errors);
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testSynchronizationThreadLocal() throws Exception {
|
|
|
+ SecurityContextHolder.clearContext();
|
|
|
+ SecurityContextHolder.setStrategyName(SecurityContextHolder.MODE_THREADLOCAL);
|
|
|
+ loadStartAndWaitForThreads(true, "Main_", 10, false, false);
|
|
|
+ assertEquals("Thread errors detected; review log output for details", 0, errors);
|
|
|
+ }
|
|
|
+
|
|
|
+ public void testSynchronizationGlobal() throws Exception {
|
|
|
+ SecurityContextHolder.clearContext();
|
|
|
+ SecurityContextHolder.setStrategyName(SecurityContextHolder.MODE_GLOBAL);
|
|
|
+ loadStartAndWaitForThreads(true, "Main_", 10, true, false);
|
|
|
+ assertEquals("Thread errors detected; review log output for details", 0, errors);
|
|
|
+ }
|
|
|
+
|
|
|
+ private void loadStartAndWaitForThreads(boolean topLevelThread, String prefix, int createThreads, boolean expectAllThreadsToUseIdenticalAuthentication, boolean expectChildrenToShareAuthenticationWithParent) {
|
|
|
+ Thread[] threads = new Thread[createThreads];
|
|
|
+ errors = 0;
|
|
|
+
|
|
|
+ if (topLevelThread) {
|
|
|
+ // PARENT (TOP-LEVEL) THREAD CREATION
|
|
|
+ if (expectChildrenToShareAuthenticationWithParent) {
|
|
|
+ // An InheritableThreadLocal
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ if (i % 2 == 0) {
|
|
|
+ // Don't inject auth into current thread; neither current thread or child will have authentication
|
|
|
+ threads[i] = makeThread(prefix + "Unauth_Parent_" + i, true, false, false, true, null);
|
|
|
+ } else {
|
|
|
+ // Inject auth into current thread, but not child; current thread will have auth, child will also have auth
|
|
|
+ threads[i] = makeThread(prefix + "Auth_Parent_" + i, true, true, false, true, prefix + "Auth_Parent_" + i);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ } else if (expectAllThreadsToUseIdenticalAuthentication) {
|
|
|
+ // A global
|
|
|
+ SecurityContextHolder.getContext().setAuthentication(new UsernamePasswordAuthenticationToken("GLOBAL_USERNAME","pass"));
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ if (i % 2 == 0) {
|
|
|
+ // Don't inject auth into current thread;both current thread and child will have same authentication
|
|
|
+ threads[i] = makeThread(prefix + "Unauth_Parent_" + i, true, false, true, true, "GLOBAL_USERNAME");
|
|
|
+ } else {
|
|
|
+ // Inject auth into current thread; current thread will have auth, child will also have auth
|
|
|
+ threads[i] = makeThread(prefix + "Auth_Parent_" + i, true, true, true, true, "GLOBAL_USERNAME");
|
|
|
+ }
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ // A standard ThreadLocal
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ if (i % 2 == 0) {
|
|
|
+ // Don't inject auth into current thread; neither current thread or child will have authentication
|
|
|
+ threads[i] = makeThread(prefix + "Unauth_Parent_" + i, true, false, false, false, null);
|
|
|
+ } else {
|
|
|
+ // Inject auth into current thread, but not child; current thread will have auth, child will not have auth
|
|
|
+ threads[i] = makeThread(prefix + "Auth_Parent_" + i, true, true, false, false, prefix + "Auth_Parent_" + i);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ // CHILD THREAD CREATION
|
|
|
+ if (expectChildrenToShareAuthenticationWithParent || expectAllThreadsToUseIdenticalAuthentication) {
|
|
|
+ // The children being created are all expected to have security (ie an InheritableThreadLocal/global AND auth was injected into parent)
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ String expectedUsername = prefix;
|
|
|
+ if (expectAllThreadsToUseIdenticalAuthentication) {
|
|
|
+ expectedUsername = "GLOBAL_USERNAME";
|
|
|
+ }
|
|
|
+ // Don't inject auth into current thread; the current thread will obtain auth from its parent
|
|
|
+ // NB: As topLevelThread = true, no further child threads will be created
|
|
|
+ threads[i] = makeThread(prefix + "->child->Inherited_Auth_Child_" + i, false, false, expectAllThreadsToUseIdenticalAuthentication, false, expectedUsername);
|
|
|
+ }
|
|
|
+ } else {
|
|
|
+ // The children being created are NOT expected to have security (ie not an InheritableThreadLocal OR auth was not injected into parent)
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ // Don't inject auth into current thread; neither current thread or child will have authentication
|
|
|
+ // NB: As topLevelThread = true, no further child threads will be created
|
|
|
+ threads[i] = makeThread(prefix + "->child->Unauth_Child_" + i, false, false, false, false, null);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ // Start and execute the threads
|
|
|
+ startAndRun(threads);
|
|
|
+ }
|
|
|
+
|
|
|
+ private void startAndRun(Thread[] threads) {
|
|
|
+ // Start them up
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ threads[i].start();
|
|
|
+ }
|
|
|
+
|
|
|
+ // Wait for them to finish
|
|
|
+ while (stillRunning(threads)) {
|
|
|
+ try {
|
|
|
+ Thread.sleep(250);
|
|
|
+ } catch (InterruptedException ignore) {}
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ private boolean stillRunning(Thread[] threads) {
|
|
|
+ for (int i = 0; i < threads.length; i++) {
|
|
|
+ if (threads[i].isAlive()) {
|
|
|
+ return true;
|
|
|
+ }
|
|
|
+ }
|
|
|
+ return false;
|
|
|
+ }
|
|
|
+
|
|
|
+ private Thread makeThread(final String threadIdentifier, final boolean topLevelThread, final boolean injectAuthIntoCurrentThread, final boolean expectAllThreadsToUseIdenticalAuthentication, final boolean expectChildrenToShareAuthenticationWithParent, final String expectedUsername) {
|
|
|
+ final Random rnd = new Random();
|
|
|
+
|
|
|
+ Thread t = new Thread(new Runnable() {
|
|
|
+ public void run() {
|
|
|
+ if (injectAuthIntoCurrentThread) {
|
|
|
+ // Set authentication in this thread
|
|
|
+ SecurityContextHolder.getContext().setAuthentication(new UsernamePasswordAuthenticationToken(expectedUsername,"pass"));
|
|
|
+ //System.out.println(threadIdentifier + " - set to " + SecurityContextHolder.getContext().getAuthentication());
|
|
|
+ } else {
|
|
|
+ //System.out.println(threadIdentifier + " - not set (currently " + SecurityContextHolder.getContext().getAuthentication() + ")");
|
|
|
+ }
|
|
|
+
|
|
|
+ // Do some operations in current thread, checking authentication is as expected in the current thread (ie another thread doesn't change it)
|
|
|
+ for (int i = 0; i < 25; i++) {
|
|
|
+ String currentUsername = SecurityContextHolder.getContext().getAuthentication() == null ? null : SecurityContextHolder.getContext().getAuthentication().getName();
|
|
|
+
|
|
|
+ if (i % 7 == 0) {
|
|
|
+ System.out.println(threadIdentifier + " at " + i + " username " + currentUsername);
|
|
|
+ }
|
|
|
+
|
|
|
+ try {
|
|
|
+ TestCase.assertEquals("Failed on iteration " + i + "; Authentication was '" + currentUsername + "' but principal was expected to contain username '" + expectedUsername + "'", expectedUsername, currentUsername);
|
|
|
+ } catch (ComparisonFailure err) {
|
|
|
+ errors++;
|
|
|
+ throw err;
|
|
|
+ }
|
|
|
+
|
|
|
+ try {
|
|
|
+ Thread.sleep(rnd.nextInt(250));
|
|
|
+ } catch (InterruptedException ignore) {}
|
|
|
+ }
|
|
|
+
|
|
|
+ // Load some children threads, checking the authentication is as expected in the children (ie another thread doesn't change it)
|
|
|
+ if (topLevelThread) {
|
|
|
+ // Make four children, but we don't want the children to have any more children (so anti-nature, huh?)
|
|
|
+ if (injectAuthIntoCurrentThread && expectChildrenToShareAuthenticationWithParent) {
|
|
|
+ loadStartAndWaitForThreads(false, threadIdentifier, 4, expectAllThreadsToUseIdenticalAuthentication, true);
|
|
|
+ } else {
|
|
|
+ loadStartAndWaitForThreads(false, threadIdentifier, 4, expectAllThreadsToUseIdenticalAuthentication, false);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }, threadIdentifier);
|
|
|
+ return t;
|
|
|
+ }
|
|
|
}
|