blob: c0df0ce94dabe02fad39f2c4b61a1cd0391ddaf5 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.security;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_MANAGER;
import static org.apache.geode.security.SecurityTestUtil.assertNotAuthorized;
import static org.apache.geode.security.SecurityTestUtil.createClientCache;
import static org.apache.geode.security.SecurityTestUtil.createProxyRegion;
import static org.junit.Assert.assertEquals;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Set;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.apache.geode.cache.Region;
import org.apache.geode.cache.RegionShortcut;
import org.apache.geode.cache.client.ClientCache;
import org.apache.geode.test.dunit.AsyncInvocation;
import org.apache.geode.test.dunit.Host;
import org.apache.geode.test.dunit.VM;
import org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase;
import org.apache.geode.test.junit.categories.SecurityTest;
import org.apache.geode.test.junit.rules.ServerStarterRule;
@Category({SecurityTest.class})
public class ClientGetPutAuthDUnitTest extends JUnit4DistributedTestCase {
private static String REGION_NAME = "AuthRegion";
final Host host = Host.getHost(0);
final VM client1 = host.getVM(1);
final VM client2 = host.getVM(2);
final VM client3 = host.getVM(3);
@Rule
public ServerStarterRule server =
new ServerStarterRule().withProperty(SECURITY_MANAGER, TestSecurityManager.class.getName())
.withProperty(TestSecurityManager.SECURITY_JSON,
"org/apache/geode/management/internal/security/clientServer.json")
.withAutoStart();
@Before
public void before() throws Exception {
Region region =
server.getCache().createRegionFactory(RegionShortcut.REPLICATE).create(REGION_NAME);
for (int i = 0; i < 5; i++) {
region.put("key" + i, "value" + i);
}
}
@Test
public void testGetPutAuthorization() throws InterruptedException {
Map<String, String> allValues = new HashMap<String, String>();
allValues.put("key1", "value1");
allValues.put("key2", "value2");
List<String> keys = new ArrayList<>();
keys.add("key1");
keys.add("key2");
// client1 connects to server as a user not authorized to do any operations
AsyncInvocation ai1 = client1.invokeAsync(() -> {
ClientCache cache = createClientCache("stranger", "1234567", server.getPort());
Region region = createProxyRegion(cache, REGION_NAME);
assertNotAuthorized(() -> region.put("key3", "value3"), "DATA:WRITE:AuthRegion:key3");
assertNotAuthorized(() -> region.get("key3"), "DATA:READ:AuthRegion:key3");
// putall
assertNotAuthorized(() -> region.putAll(allValues), "DATA:WRITE:AuthRegion");
// not authorized for either keys, get no record back
Map keyValues = region.getAll(keys);
assertEquals(0, keyValues.size());
assertNotAuthorized(() -> region.keySetOnServer(), "DATA:READ:AuthRegion");
});
// client2 connects to user as a user authorized to use AuthRegion region
AsyncInvocation ai2 = client2.invokeAsync(() -> {
ClientCache cache = createClientCache("authRegionUser", "1234567", server.getPort());
Region region = createProxyRegion(cache, REGION_NAME);
region.put("key3", "value3");
assertEquals("value3", region.get("key3"));
// put all
region.putAll(allValues);
// get all
Map keyValues = region.getAll(keys);
assertEquals(2, keyValues.size());
// keyset
Set keySet = region.keySetOnServer();
assertEquals(5, keySet.size());
});
// client3 connects to user as a user authorized to use key1 in AuthRegion region
AsyncInvocation ai3 = client3.invokeAsync(() -> {
ClientCache cache = createClientCache("key1User", "1234567", server.getPort());
Region region = createProxyRegion(cache, REGION_NAME);
assertNotAuthorized(() -> region.put("key2", "value1"), "DATA:WRITE:AuthRegion:key2");
assertNotAuthorized(() -> region.get("key2"), "DATA:READ:AuthRegion:key2");
assertNotAuthorized(() -> region.putAll(allValues), "DATA:WRITE:AuthRegion");
// only authorized for one recrod
Map keyValues = region.getAll(keys);
assertEquals(1, keyValues.size());
// keyset
assertNotAuthorized(() -> region.keySetOnServer(), "DATA:READ:AuthRegion");
});
ai1.join();
ai2.join();
ai3.join();
ai1.checkException();
ai2.checkException();
ai3.checkException();
}
}