blob: b147d67a86381b7b73bca82a25096a54a6337e5e [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.geode.security;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_MANAGER;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_PEER_AUTH_INIT;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
import java.io.IOException;
import java.util.Properties;
import org.junit.BeforeClass;
import org.junit.ClassRule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.apache.geode.distributed.DistributedMember;
import org.apache.geode.test.dunit.rules.ClusterStartupRule;
import org.apache.geode.test.dunit.rules.MemberVM;
import org.apache.geode.test.junit.categories.SecurityTest;
import org.apache.geode.test.junit.rules.ServerStarterRule;
/**
* this test specifically uses a peer-auth-init that doesn't produce credentials that has
* security-username or security-password. It produces a property that its SecurityManager
* knows how to authenticate/authorize. It's just to show that we can pass in properties
* other than security-username and security-password. But this will be doable only in peer/client
* case. For gfsh/rest, we still expected the credentials to be wrapped as expected.
*/
@Category({SecurityTest.class})
public class IntegratedSecurityPeerAuthDUnitTest {
@ClassRule
public static ClusterStartupRule cluster = new ClusterStartupRule();
private static MemberVM locator;
@BeforeClass
public static void beforeClass() throws Exception {
Properties properties = new Properties();
properties.put(SECURITY_MANAGER, MySecurityManager.class.getName());
locator = cluster.startLocatorVM(0, properties);
}
@Test
public void startServer1WithPeerAuthInit_success() throws IOException {
Properties props = new Properties();
props.setProperty(SECURITY_PEER_AUTH_INIT, MyAuthInit.class.getName());
props.setProperty("security-name", "server-1");
cluster.startServerVM(1, props, locator.getPort());
}
@Test
public void startServer2_not_authorized() {
Properties props = new Properties();
props.setProperty(SECURITY_PEER_AUTH_INIT, MyAuthInit.class.getName());
props.setProperty("security-name", "server-2");
int locatorPort = locator.getPort();
cluster.getVM(2).invoke(() -> {
ServerStarterRule server = new ServerStarterRule();
server.withProperties(props).withConnectionToLocator(locatorPort).withAutoStart();
assertThatThrownBy(() -> server.before()).isInstanceOf(GemFireSecurityException.class)
.hasMessageContaining("server-2 not authorized for CLUSTER:MANAGE");
});
}
@Test
public void startServer3_not_authenticated() {
Properties props = new Properties();
props.setProperty(SECURITY_PEER_AUTH_INIT, MyAuthInit.class.getName());
props.setProperty("security-name", "server-3");
int locatorPort = locator.getPort();
cluster.getVM(3).invoke(() -> {
ServerStarterRule server = new ServerStarterRule();
server.withProperties(props).withConnectionToLocator(locatorPort).withAutoStart();
assertThatThrownBy(() -> server.before()).isInstanceOf(GemFireSecurityException.class)
.hasMessageContaining("Authentication error");
});
}
public static class MyAuthInit implements AuthInitialize {
@Override
public Properties getCredentials(Properties securityProps, DistributedMember server,
boolean isPeer) throws AuthenticationFailedException {
Properties properties = new Properties();
properties.setProperty("name", securityProps.getProperty("security-name"));
return properties;
}
}
public static class MySecurityManager implements SecurityManager {
@Override
public Object authenticate(Properties credentials) throws AuthenticationFailedException {
// server1 and server2 are authenticated, server3 is not
String name = credentials.getProperty("name");
if ("server-3".equals(name)) {
throw new AuthenticationFailedException("server-3 is not authenticated");
}
return name;
}
@Override
public boolean authorize(Object principal, ResourcePermission permission) {
// server-1 and server-2 are authenticated, but only server-1 is authorized
return ("server-1".equals(principal));
}
}
}