org.gradle.integtests.resolve.http.HttpAuthenticationDependencyResolutionIntegrationTest.groovy Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of gradle-api Show documentation
Show all versions of gradle-api Show documentation
Gradle 6.9.1 API redistribution.
/*
* Copyright 2012 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.gradle.integtests.resolve.http
import org.gradle.authentication.http.BasicAuthentication
import org.gradle.authentication.http.DigestAuthentication
import org.gradle.integtests.fixtures.AbstractHttpDependencyResolutionTest
import org.gradle.test.fixtures.server.http.AuthScheme
import org.gradle.test.fixtures.server.http.HttpServer
import org.hamcrest.CoreMatchers
import spock.lang.Issue
import spock.lang.Unroll
import static org.gradle.test.fixtures.server.http.AuthScheme.BASIC
import static org.gradle.test.fixtures.server.http.AuthScheme.DIGEST
import static org.gradle.test.fixtures.server.http.AuthScheme.HEADER
import static org.gradle.test.fixtures.server.http.AuthScheme.HIDE_UNAUTHORIZED
import static org.gradle.test.fixtures.server.http.AuthScheme.NTLM
class HttpAuthenticationDependencyResolutionIntegrationTest extends AbstractHttpDependencyResolutionTest {
static String badCredentials = "credentials{username 'testuser'; password 'bad'}"
def setup() {
// by setting this to >1, we assert that an authentication error is NOT going to cause retries
maxHttpRetries = 3
}
@Unroll
def "can resolve dependencies using #authSchemeName scheme from #authScheme authenticated HTTP ivy repository"() {
given:
def moduleA = ivyHttpRepo.module('group', 'projectA', '1.2').publish()
ivyHttpRepo.module('group', 'projectB', '2.1').publish()
ivyHttpRepo.module('group', 'projectB', '2.2').publish()
def moduleB = ivyHttpRepo.module('group', 'projectB', '2.3').publish()
ivyHttpRepo.module('group', 'projectB', '3.0').publish()
and:
buildFile << """
repositories {
ivy {
url "${ivyHttpRepo.uri}"
credentials {
password 'password'
username 'username'
}
${configuredAuthentication}
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
compile 'group:projectB:2.+'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar','projectB-2.3.jar']
}
}
"""
when:
serverAuthScheme = authScheme
and:
moduleA.ivy.expectGet('username', 'password')
moduleA.jar.expectGet('username', 'password')
server.expectGetDirectoryListing("/repo/group/projectB/", 'username', 'password', moduleB.backingModule.moduleDir.parentFile)
moduleB.ivy.expectGet('username', 'password')
moduleB.jar.expectGet('username', 'password')
then:
succeeds('listJars')
and:
server.authenticationAttempts.asList() == authenticationAttempts
where:
authSchemeName | configuredAuthentication | authScheme | authenticationAttempts
'basic' | 'authentication { auth(BasicAuthentication) }' | BASIC | ['Basic']
'digest' | 'authentication { auth(DigestAuthentication) }' | DIGEST | ['None', 'Digest']
'default' | '' | BASIC | ['None', 'Basic']
'default' | '' | DIGEST | ['None', 'Digest']
'default' | '' | NTLM | ['None', 'NTLM']
'basic' | 'authentication { auth(BasicAuthentication) }' | HIDE_UNAUTHORIZED | ['Basic']
'basic and digest' | 'authentication { basic(BasicAuthentication)\ndigest(DigestAuthentication) }' | DIGEST | ['Basic', 'Digest']
}
@Unroll
public void "can resolve dependencies using #authSchemeName scheme from #authScheme authenticated HTTP maven repository"() {
given:
def moduleA = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
mavenHttpRepo.module('group', 'projectB', '2.0').publish()
mavenHttpRepo.module('group', 'projectB', '2.2').publish()
def moduleB = mavenHttpRepo.module('group', 'projectB', '2.3').publish()
mavenHttpRepo.module('group', 'projectB', '3.0').publish()
def moduleC = mavenHttpRepo.module('group', 'projectC', '3.1-SNAPSHOT').publish()
def moduleD = mavenHttpRepo.module('group', 'projectD', '4-SNAPSHOT').withNonUniqueSnapshots().publish()
and:
buildFile << """
repositories {
maven {
url "${mavenHttpRepo.uri}"
credentials {
password 'password'
username 'username'
}
${configuredAuthentication}
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
compile 'group:projectB:2.+'
compile 'group:projectC:3.1-SNAPSHOT'
compile 'group:projectD:4-SNAPSHOT'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar', 'projectB-2.3.jar', 'projectC-3.1-SNAPSHOT.jar', 'projectD-4-SNAPSHOT.jar']
}
}
"""
when:
serverAuthScheme = authScheme
and:
moduleA.pom.expectGet('username', 'password')
moduleA.artifact.expectGet('username', 'password')
moduleB.rootMetaData.expectGet('username', 'password')
moduleB.pom.expectGet('username', 'password')
moduleB.artifact.expectGet('username', 'password')
moduleC.metaData.expectGet('username', 'password')
moduleC.pom.expectGet('username', 'password')
moduleC.artifact.expectGet('username', 'password')
moduleD.metaData.expectGet('username', 'password')
moduleD.pom.expectGet('username', 'password')
moduleD.artifact.expectGet('username', 'password')
then:
succeeds('listJars')
and:
server.authenticationAttempts.asList() == authenticationAttempts
where:
authSchemeName | configuredAuthentication | authScheme | authenticationAttempts
'basic' | 'authentication { auth(BasicAuthentication) }' | BASIC | ['Basic']
'digest' | 'authentication { auth(DigestAuthentication) }' | DIGEST | ['None', 'Digest']
'default' | '' | BASIC | ['None', 'Basic']
'default' | '' | DIGEST | ['None', 'Digest']
'default' | '' | NTLM | ['None', 'NTLM']
'basic' | 'authentication { auth(BasicAuthentication) }' | HIDE_UNAUTHORIZED | ['Basic']
'basic and digest' | 'authentication { basic(BasicAuthentication)\ndigest(DigestAuthentication) }' | DIGEST | ['Basic', 'Digest']
}
@Unroll
@Issue("gradle/gradle#5571")
public void "can resolve dependencies from HTTP Maven repository authenticating with HTTP header"() {
given:
def moduleA = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
and:
buildFile << """
repositories {
maven {
url "${mavenHttpRepo.uri}"
credentials(org.gradle.api.credentials.HttpHeaderCredentials) {
name = "TestHttpHeaderName"
value = "TestHttpHeaderValue"
}
authentication { header(HttpHeaderAuthentication) }
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
when:
serverAuthScheme = HEADER
and:
moduleA.pom.expectGet()
moduleA.artifact.expectGet()
then:
succeeds('listJars')
and:
server.allHeaders.every { it.get("TestHttpHeaderName") == "TestHttpHeaderValue" }
}
@Unroll
@Issue("gradle/gradle#5571")
void "can resolve dependencies from HTTP Maven repository authenticating with HTTP header with redirect"() {
given:
HttpServer redirectServer = new HttpServer()
redirectServer.start()
def moduleA = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
and:
buildFile << """
repositories {
maven {
url "${redirectServer.uri}/repo"
credentials(org.gradle.api.credentials.HttpHeaderCredentials) {
name = "TestHttpHeaderName"
value = "TestHttpHeaderValue"
}
authentication { header(HttpHeaderAuthentication) }
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
when:
redirectServer.authenticationScheme = HEADER
and:
redirectServer.expectGetRedirected(moduleA.pom.uri.path, moduleA.pom.uri.toString())
redirectServer.expectGetRedirected(moduleA.artifact.uri.path, moduleA.artifact.uri.toString())
moduleA.pom.expectGet()
moduleA.artifact.expectGet()
then:
succeeds('listJars')
and:
redirectServer.allHeaders.every { it.get("TestHttpHeaderName") == "TestHttpHeaderValue" }
// These headers should not be propagated to other hosts
server.allHeaders.every { it.get("TestHttpHeaderName") == null }
cleanup:
redirectServer.stop()
}
@Unroll
def "reports failure resolving with #credsName credentials from #authScheme authenticated HTTP ivy repository"() {
given:
def module = ivyHttpRepo.module('group', 'projectA', '1.2').publish()
when:
settingsFile << 'rootProject.name = "publish"'
buildFile << """
repositories {
ivy {
url "${ivyHttpRepo.uri}"
$creds
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
and:
serverAuthScheme = authScheme
server.allowGetOrHead('/repo/group/projectA/1.2/ivy-1.2.xml', 'username', 'password', module.ivyFile)
then:
fails 'listJars'
and:
failure
.assertHasDescription('Execution failed for task \':listJars\'.')
.assertResolutionFailure(':compile')
.assertThatCause(CoreMatchers.containsString('Received status code 401 from server: Unauthorized'))
where:
authScheme | credsName | creds
BASIC | 'missing' | ''
DIGEST | 'missing' | ''
NTLM | 'missing' | ''
BASIC | 'bad' | badCredentials
DIGEST | 'bad' | badCredentials
NTLM | 'bad' | badCredentials
}
@Unroll
def "reports failure resolving with #credsName credentials from #authScheme authenticated HTTP maven repository"() {
given:
def module = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
when:
settingsFile << 'rootProject.name = "publish"'
buildFile << """
repositories {
maven {
url "${mavenHttpRepo.uri}"
$creds
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
and:
serverAuthScheme = authScheme
module.pom.allowGetOrHead('username', 'password')
then:
fails 'listJars'
and:
failure
.assertHasDescription('Execution failed for task \':listJars\'.')
.assertResolutionFailure(':compile')
.assertThatCause(CoreMatchers.containsString('Received status code 401 from server: Unauthorized'))
where:
authScheme | credsName | creds
BASIC | 'missing' | ''
DIGEST | 'missing' | ''
NTLM | 'missing' | ''
BASIC | 'bad' | badCredentials
DIGEST | 'bad' | badCredentials
NTLM | 'bad' | badCredentials
}
@Unroll
def "reports failure resolving with #configuredAuthScheme from #authScheme authenticated HTTP ivy repository"() {
given:
def module = ivyHttpRepo.module('group', 'projectA', '1.2').publish()
when:
settingsFile << 'rootProject.name = "publish"'
buildFile << """
repositories {
ivy {
url "${ivyHttpRepo.uri}"
credentials {
username = 'username'
password = 'password'
}
authentication {
auth(${configuredAuthScheme})
}
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
and:
serverAuthScheme = authScheme
server.allowGetOrHead('/repo/group/projectA/1.2/ivy-1.2.xml', 'username', 'password', module.ivyFile)
then:
fails 'listJars'
and:
failure
.assertHasDescription('Execution failed for task \':listJars\'.')
.assertResolutionFailure(':compile')
.assertThatCause(CoreMatchers.containsString('Received status code 401 from server: Unauthorized'))
where:
authScheme | configuredAuthScheme
BASIC | DigestAuthentication.class.getSimpleName()
DIGEST | BasicAuthentication.class.getSimpleName()
}
@Unroll
def "reports failure resolving with #configuredAuthScheme from #authScheme authenticated HTTP maven repository"() {
given:
def module = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
when:
settingsFile << 'rootProject.name = "publish"'
buildFile << """
repositories {
maven {
url "${mavenHttpRepo.uri}"
credentials {
username = 'username'
password = 'password'
}
authentication {
auth(${configuredAuthScheme})
}
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
and:
serverAuthScheme = authScheme
module.pom.allowGetOrHead('username', 'password')
then:
fails 'listJars'
and:
failure
.assertHasDescription('Execution failed for task \':listJars\'.')
.assertResolutionFailure(':compile')
.assertThatCause(CoreMatchers.containsString('Received status code 401 from server: Unauthorized'))
where:
authScheme | configuredAuthScheme
BASIC | DigestAuthentication.class.getSimpleName()
DIGEST | BasicAuthentication.class.getSimpleName()
}
def "fails resolving from preemptive authenticated HTTP ivy repository"() {
given:
def module = ivyHttpRepo.module('group', 'projectA', '1.2').publish()
when:
settingsFile << 'rootProject.name = "publish"'
buildFile << """
repositories {
ivy {
url "${ivyHttpRepo.uri}"
credentials {
username = 'username'
password = 'password'
}
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
and:
serverAuthScheme = HIDE_UNAUTHORIZED
server.allowGetOrHead('/repo/group/projectA/1.2/ivy-1.2.xml', 'username', 'password', module.ivyFile)
server.allowGetOrHead('/repo/group/projectA/1.2/projectA-1.2.jar', 'username', 'password', module.jarFile)
then:
fails 'listJars'
and:
failure
.assertHasDescription('Execution failed for task \':listJars\'.')
.assertResolutionFailure(':compile')
.assertThatCause(CoreMatchers.containsString('Could not find group:projectA:1.2'))
}
def "fails resolving from preemptive authenticated HTTP maven repository"() {
given:
def module = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
when:
settingsFile << 'rootProject.name = "publish"'
buildFile << """
repositories {
maven {
url "${mavenHttpRepo.uri}"
credentials {
username = 'username'
password = 'password'
}
}
}
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task listJars {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
and:
serverAuthScheme = HIDE_UNAUTHORIZED
module.pom.allowGetOrHead('username', 'password')
module.artifact.allowGetOrHead('username', 'password')
then:
fails 'listJars'
and:
failure
.assertHasDescription('Execution failed for task \':listJars\'.')
.assertResolutionFailure(':compile')
.assertThatCause(CoreMatchers.containsString('Could not find group:projectA:1.2'))
}
@Issue("https://github.com/gradle/gradle/issues/6014")
def "repository credentials should be considered when retrieving modules from dependency cache"() {
given:
def module = mavenHttpRepo.module('group', 'projectA', '1.2').publish()
settingsFile << 'rootProject.name = "publish"'
def baseBuild = """
configurations { compile }
dependencies {
compile 'group:projectA:1.2'
}
task resolve {
doLast {
assert configurations.compile.collect { it.name } == ['projectA-1.2.jar']
}
}
"""
when:
buildFile.text = baseBuild + """
repositories {
maven {
url "${mavenHttpRepo.uri}"
credentials {
username = 'username'
password = 'password'
}
}
}
"""
serverAuthScheme = BASIC
module.pom.allowGetOrHead('username', 'password')
module.artifact.allowGetOrHead('username', 'password')
then:
succeeds 'resolve'
when:
server.resetExpectations()
buildFile.text = baseBuild + """
repositories {
maven {
url "${mavenHttpRepo.uri}"
}
}
"""
then:
// Resolution should not succeed without resolving from the remote repository
succeeds 'resolve'
}
void setServerAuthScheme(AuthScheme authScheme) {
server.authenticationScheme = authScheme
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy