/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.knox.gateway.deploy; import java.io.File; import java.io.IOException; import java.net.URL; import java.util.Collections; import java.util.Enumeration; import java.util.HashMap; import java.util.Map; import java.util.UUID; import javax.xml.parsers.ParserConfigurationException; import javax.xml.xpath.XPathConstants; import javax.xml.xpath.XPathExpressionException; import javax.xml.xpath.XPathFactory; import org.apache.commons.io.FileUtils; import org.apache.knox.gateway.GatewayTestConfig; import org.apache.knox.gateway.config.GatewayConfig; import org.apache.knox.gateway.filter.XForwardedHeaderFilter; import org.apache.knox.gateway.filter.rewrite.api.UrlRewriteServletFilter; import org.apache.knox.gateway.services.DefaultGatewayServices; import org.apache.knox.gateway.services.ServiceLifecycleException; import org.apache.knox.gateway.topology.Application; import org.apache.knox.gateway.topology.Param; import org.apache.knox.gateway.topology.Provider; import org.apache.knox.gateway.topology.Service; import org.apache.knox.gateway.topology.Topology; import org.apache.knox.gateway.util.XmlUtils; import org.apache.knox.test.TestUtils; import org.apache.knox.test.log.NoOpAppender; import org.apache.log4j.Appender; import org.jboss.shrinkwrap.api.spec.EnterpriseArchive; import org.jboss.shrinkwrap.api.spec.WebArchive; import org.junit.Test; import org.w3c.dom.Document; import org.w3c.dom.Node; import org.xml.sax.SAXException; import static org.apache.knox.test.TestUtils.LOG_ENTER; import static org.apache.knox.test.TestUtils.LOG_EXIT; import static org.apache.knox.test.TestUtils.LONG_TIMEOUT; import static org.apache.knox.test.TestUtils.MEDIUM_TIMEOUT; import static org.hamcrest.CoreMatchers.is; import static org.hamcrest.CoreMatchers.notNullValue; import static org.hamcrest.CoreMatchers.nullValue; import static org.hamcrest.MatcherAssert.assertThat; import static org.hamcrest.core.IsEqual.equalTo; import static org.hamcrest.core.IsNot.not; import static org.hamcrest.xml.HasXPath.hasXPath; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.fail; public class DeploymentFactoryFuncTest { @Test( timeout = LONG_TIMEOUT ) public void testGenericProviderDeploymentContributor() throws ParserConfigurationException, SAXException, IOException { LOG_ENTER(); GatewayTestConfig config = new GatewayTestConfig(); File targetDir = new File( System.getProperty( "user.dir" ), "target" ); File gatewayDir = new File( targetDir, "gateway-home-" + UUID.randomUUID() ); gatewayDir.mkdirs(); config.setGatewayHomeDir( gatewayDir.getAbsolutePath() ); File deployDir = new File( config.getGatewayDeploymentDir() ); deployDir.mkdirs(); // ((GatewayTestConfig) config).setDeploymentDir( "clusters" ); DefaultGatewayServices srvcs = new DefaultGatewayServices(); Map<String,String> options = new HashMap<>(); options.put("persist-master", "false"); options.put("master", "password"); try { DeploymentFactory.setGatewayServices(srvcs); srvcs.init(config, options); } catch (ServiceLifecycleException e) { e.printStackTrace(); // I18N not required. } Topology topology = new Topology(); topology.setName( "test-cluster" ); Service service = new Service(); service.setRole( "WEBHDFS" ); service.addUrl( "http://localhost:50070/test-service-url" ); topology.addService( service ); Provider provider = new Provider(); provider.setRole( "federation" ); provider.setName( "HeaderPreAuth" ); provider.setEnabled( true ); Param param = new Param(); param.setName( "filter" ); param.setValue( "org.opensource.ExistingFilter" ); provider.addParam( param ); param = new Param(); param.setName( "test-param-name" ); param.setValue( "test-param-value" ); provider.addParam( param ); topology.addProvider( provider ); EnterpriseArchive war = DeploymentFactory.createDeployment( config, topology ); Document gateway = XmlUtils.readXml( war.get( "%2F/WEB-INF/gateway.xml" ).getAsset().openStream() ); //by default the first filter will be the X-Forwarded header filter assertThat( gateway, hasXPath( "/gateway/resource[1]/filter[1]/role", equalTo( "xforwardedheaders" ) ) ); assertThat( gateway, hasXPath( "/gateway/resource[1]/filter[1]/name", equalTo( "XForwardedHeaderFilter" ) ) ); assertThat( gateway, hasXPath( "/gateway/resource[1]/filter[1]/class", equalTo( "org.apache.knox.gate