blob: 4582bd98ccc256ffd07ea6805e8c55c64a15ec61 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.security;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_MANAGER;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_POST_PROCESSOR;
import static org.apache.geode.distributed.ConfigurationProperties.USE_CLUSTER_CONFIGURATION;
import static org.apache.geode.test.dunit.IgnoredException.addIgnoredException;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
import java.util.Properties;
import org.junit.BeforeClass;
import org.junit.ClassRule;
import org.junit.Rule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.apache.geode.GemFireConfigException;
import org.apache.geode.distributed.DistributedSystem;
import org.apache.geode.examples.SimpleSecurityManager;
import org.apache.geode.test.dunit.rules.ClusterStartupRule;
import org.apache.geode.test.dunit.rules.MemberVM;
import org.apache.geode.test.junit.categories.SecurityTest;
import org.apache.geode.test.junit.rules.ServerStarterRule;
@Category({SecurityTest.class})
public class SecurityClusterConfigDUnitTest {
private static MemberVM locator;
@ClassRule
public static ClusterStartupRule cluster = new ClusterStartupRule();
@Rule
public ServerStarterRule serverStarter = new ServerStarterRule();
@BeforeClass
public static void beforeClass() throws Exception {
addIgnoredException(
"A server cannot specify its own security-manager or security-post-processor when using cluster configuration");
addIgnoredException(
"A server must use cluster configuration when joining a secured cluster.");
Properties props = new Properties();
props.setProperty(SECURITY_MANAGER, SimpleSecurityManager.class.getName());
props.setProperty(SECURITY_POST_PROCESSOR, PDXPostProcessor.class.getName());
locator = cluster.startLocatorVM(0, props);
}
@Test
public void testStartServerWithClusterConfig() throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty(USE_CLUSTER_CONFIGURATION, "true");
// initial security properties should only contain initial set of values
this.serverStarter.startServer(props, locator.getPort());
DistributedSystem ds = this.serverStarter.getCache().getDistributedSystem();
// after cache is created, we got the security props passed in by cluster config
Properties secProps = ds.getSecurityProperties();
assertThat(secProps).containsKey("security-username");
assertThat(secProps).containsKey("security-password");
assertThat(secProps).containsKey(SECURITY_MANAGER);
assertThat(secProps).containsKey(SECURITY_POST_PROCESSOR);
}
@Test
public void testStartServerWithSameSecurityManager() throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty(SECURITY_MANAGER, SimpleSecurityManager.class.getName());
props.setProperty(USE_CLUSTER_CONFIGURATION, "true");
// initial security properties should only contain initial set of values
this.serverStarter.startServer(props, locator.getPort());
DistributedSystem ds = this.serverStarter.getCache().getDistributedSystem();
// after cache is created, we got the security props passed in by cluster config
Properties secProps = ds.getSecurityProperties();
assertThat(secProps).containsKey("security-username");
assertThat(secProps).containsKey("security-password");
assertThat(secProps).containsKey(SECURITY_MANAGER);
assertThat(secProps).containsKey(SECURITY_POST_PROCESSOR);
}
@Test
public void serverWithDifferentSecurityManagerShouldThrowGemFireConfigException()
throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty(SECURITY_MANAGER, OtherSimplySecurityManager.class.getName());
props.setProperty(USE_CLUSTER_CONFIGURATION, "true");
// initial security properties should only contain initial set of values
assertThatThrownBy(
() -> this.serverStarter.startServer(props, locator.getPort()))
.isInstanceOf(GemFireConfigException.class).hasMessage(
"A server cannot specify its own security-manager or security-post-processor when using cluster configuration");
}
@Test
public void serverWithDifferentPostProcessorShouldThrowGemFireConfigException() throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty(SECURITY_MANAGER, SimpleSecurityManager.class.getName());
props.setProperty(SECURITY_POST_PROCESSOR, OtherPDXPostProcessor.class.getName());
props.setProperty(USE_CLUSTER_CONFIGURATION, "true");
// initial security properties should only contain initial set of values
assertThatThrownBy(
() -> this.serverStarter.startServer(props, locator.getPort()))
.isInstanceOf(GemFireConfigException.class).hasMessage(
"A server cannot specify its own security-manager or security-post-processor when using cluster configuration");
}
@Test
public void serverConnectingToSecuredLocatorMustUseClusterConfig() throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty(SECURITY_MANAGER, SimpleSecurityManager.class.getName());
props.setProperty(USE_CLUSTER_CONFIGURATION, "false");
assertThatThrownBy(
() -> this.serverStarter.startServer(props, this.cluster.getMember(0).getPort()))
.isInstanceOf(GemFireConfigException.class).hasMessage(
"A server must use cluster configuration when joining a secured cluster.");
}
}