Search in sources :

Example 1 with NetworkFirewallRule

use of org.apache.qpid.server.security.access.firewall.NetworkFirewallRule in project qpid-broker-j by apache.

the class NetworkFirewallRuleTest method testEqualsAndHashCode.

public void testEqualsAndHashCode() {
    NetworkFirewallRule rule = new NetworkFirewallRule(LOCALHOST_IP, OTHER_IP_1);
    NetworkFirewallRule equalRule = new NetworkFirewallRule(LOCALHOST_IP, OTHER_IP_1);
    assertTrue(rule.equals(rule));
    assertTrue(rule.equals(equalRule));
    assertTrue(equalRule.equals(rule));
    assertTrue(rule.hashCode() == equalRule.hashCode());
    assertFalse("Different networks should cause rules to be unequal", rule.equals(new NetworkFirewallRule(LOCALHOST_IP, OTHER_IP_2)));
}
Also used : NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule)

Example 2 with NetworkFirewallRule

use of org.apache.qpid.server.security.access.firewall.NetworkFirewallRule in project qpid-broker-j by apache.

the class MessagingACLTest method configureACL.

private void configureACL(String... rules) throws Exception {
    EventLoggerProvider eventLoggerProvider = mock(EventLoggerProvider.class);
    EventLogger eventLogger = mock(EventLogger.class);
    when(eventLoggerProvider.getEventLogger()).thenReturn(eventLogger);
    List<AclRule> aclRules = new ArrayList<>();
    try (StringReader stringReader = new StringReader(Arrays.stream(rules).collect(Collectors.joining(LINE_SEPARATOR)))) {
        RuleSet ruleSet = AclFileParser.parse(stringReader, eventLoggerProvider);
        final List<Rule> parsedRules = ruleSet.getAllRules();
        for (final Rule rule : parsedRules) {
            aclRules.add(new AclRule() {

                @Override
                public String getIdentity() {
                    return rule.getIdentity();
                }

                @Override
                public ObjectType getObjectType() {
                    return rule.getAction().getObjectType();
                }

                @Override
                public LegacyOperation getOperation() {
                    return rule.getAction().getOperation();
                }

                @Override
                public Map<ObjectProperties.Property, String> getAttributes() {
                    Map<ObjectProperties.Property, String> attributes = new HashMap<>(rule.getAction().getProperties().asPropertyMap());
                    FirewallRule firewallRule = rule.getAclAction().getFirewallRule();
                    if (firewallRule != null) {
                        if (firewallRule instanceof HostnameFirewallRule) {
                            attributes.put(ObjectProperties.Property.FROM_HOSTNAME, "127.0.0.1");
                        } else if (firewallRule instanceof NetworkFirewallRule) {
                            // tests use only 127.0.0.1 at the moment
                            attributes.put(ObjectProperties.Property.FROM_NETWORK, "127.0.0.1");
                        }
                    }
                    return attributes;
                }

                @Override
                public RuleOutcome getOutcome() {
                    return rule.getRuleOutcome();
                }
            });
        }
    }
    configureACL(aclRules.toArray(new AclRule[aclRules.size()]));
}
Also used : NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule) RuleSet(org.apache.qpid.server.security.access.config.RuleSet) LegacyOperation(org.apache.qpid.server.security.access.config.LegacyOperation) EventLoggerProvider(org.apache.qpid.server.logging.EventLoggerProvider) EventLogger(org.apache.qpid.server.logging.EventLogger) ArrayList(java.util.ArrayList) ObjectProperties(org.apache.qpid.server.security.access.config.ObjectProperties) ObjectType(org.apache.qpid.server.security.access.config.ObjectType) HostnameFirewallRule(org.apache.qpid.server.security.access.firewall.HostnameFirewallRule) StringReader(java.io.StringReader) RuleOutcome(org.apache.qpid.server.security.access.plugins.RuleOutcome) AclRule(org.apache.qpid.server.security.access.plugins.AclRule) AclRule(org.apache.qpid.server.security.access.plugins.AclRule) NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule) Rule(org.apache.qpid.server.security.access.config.Rule) FirewallRule(org.apache.qpid.server.security.access.firewall.FirewallRule) HostnameFirewallRule(org.apache.qpid.server.security.access.firewall.HostnameFirewallRule) Map(java.util.Map) HashMap(java.util.HashMap) NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule) FirewallRule(org.apache.qpid.server.security.access.firewall.FirewallRule) HostnameFirewallRule(org.apache.qpid.server.security.access.firewall.HostnameFirewallRule)

Example 3 with NetworkFirewallRule

use of org.apache.qpid.server.security.access.firewall.NetworkFirewallRule in project qpid-broker-j by apache.

the class NetworkFirewallRuleTest method testMultipleNetworks.

public void testMultipleNetworks() throws Exception {
    String[] ipAddressesInRule = new String[] { OTHER_IP_1, OTHER_IP_2 };
    _networkFirewallRule = new NetworkFirewallRule(ipAddressesInRule);
    assertFalse(_networkFirewallRule.matches(_addressNotInRule));
    for (String ipAddressInRule : ipAddressesInRule) {
        assertTrue(_networkFirewallRule.matches(InetAddress.getByName(ipAddressInRule)));
    }
}
Also used : NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule)

Example 4 with NetworkFirewallRule

use of org.apache.qpid.server.security.access.firewall.NetworkFirewallRule in project qpid-broker-j by apache.

the class NetworkFirewallRuleTest method testNetMask.

public void testNetMask() throws Exception {
    String ipAddressInRule = "192.168.23.0/24";
    _networkFirewallRule = new NetworkFirewallRule(ipAddressInRule);
    assertFalse(_networkFirewallRule.matches(InetAddress.getByName("192.168.24.1")));
    assertTrue(_networkFirewallRule.matches(InetAddress.getByName("192.168.23.0")));
    assertTrue(_networkFirewallRule.matches(InetAddress.getByName("192.168.23.255")));
}
Also used : NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule)

Example 5 with NetworkFirewallRule

use of org.apache.qpid.server.security.access.firewall.NetworkFirewallRule in project qpid-broker-j by apache.

the class NetworkFirewallRuleTest method testIpRule.

public void testIpRule() throws Exception {
    String ipAddressInRule = OTHER_IP_1;
    _networkFirewallRule = new NetworkFirewallRule(ipAddressInRule);
    assertFalse(_networkFirewallRule.matches(_addressNotInRule));
    assertTrue(_networkFirewallRule.matches(InetAddress.getByName(ipAddressInRule)));
}
Also used : NetworkFirewallRule(org.apache.qpid.server.security.access.firewall.NetworkFirewallRule)

Aggregations

NetworkFirewallRule (org.apache.qpid.server.security.access.firewall.NetworkFirewallRule)5 StringReader (java.io.StringReader)1 ArrayList (java.util.ArrayList)1 HashMap (java.util.HashMap)1 Map (java.util.Map)1 EventLogger (org.apache.qpid.server.logging.EventLogger)1 EventLoggerProvider (org.apache.qpid.server.logging.EventLoggerProvider)1 LegacyOperation (org.apache.qpid.server.security.access.config.LegacyOperation)1 ObjectProperties (org.apache.qpid.server.security.access.config.ObjectProperties)1 ObjectType (org.apache.qpid.server.security.access.config.ObjectType)1 Rule (org.apache.qpid.server.security.access.config.Rule)1 RuleSet (org.apache.qpid.server.security.access.config.RuleSet)1 FirewallRule (org.apache.qpid.server.security.access.firewall.FirewallRule)1 HostnameFirewallRule (org.apache.qpid.server.security.access.firewall.HostnameFirewallRule)1 AclRule (org.apache.qpid.server.security.access.plugins.AclRule)1 RuleOutcome (org.apache.qpid.server.security.access.plugins.RuleOutcome)1