blob: ca09ad59672df3997d1cdcec1c75b91fb5c64669 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.management.internal.cli.commands;
import static org.apache.geode.management.internal.cli.commands.AlterQueryServiceCommand.AUTHORIZER_NAME;
import static org.apache.geode.management.internal.cli.commands.AlterQueryServiceCommand.COMMAND_NAME;
import static org.apache.geode.management.internal.cli.functions.AlterQueryServiceFunction.SECURITY_NOT_ENABLED_MESSAGE;
import static org.assertj.core.api.Assertions.assertThat;
import java.util.ArrayList;
import java.util.List;
import java.util.Objects;
import java.util.stream.IntStream;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
import org.apache.geode.cache.query.internal.QueryConfigurationService;
import org.apache.geode.cache.query.internal.QueryConfigurationServiceImpl;
import org.apache.geode.cache.query.security.MethodInvocationAuthorizer;
import org.apache.geode.cache.query.security.UnrestrictedMethodAuthorizer;
import org.apache.geode.test.dunit.rules.ClusterStartupRule;
import org.apache.geode.test.dunit.rules.MemberVM;
import org.apache.geode.test.junit.rules.GfshCommandRule;
public class AlterQueryServiceCommandWithoutSecurityDUnitTest {
private static MemberVM locator;
private static List<MemberVM> servers = new ArrayList<>();
@Rule
public GfshCommandRule gfsh = new GfshCommandRule();
@Rule
public ClusterStartupRule cluster = new ClusterStartupRule();
@Before
public void setUp() throws Exception {
locator = cluster.startLocatorVM(0);
IntStream.range(0, 2)
.forEach(i -> servers.add(i, cluster.startServerVM(i + 1, locator.getPort())));
gfsh.connectAndVerify(locator);
}
private void verifyNoOpAuthorizer() {
servers.forEach(s -> s.invoke(() -> {
MethodInvocationAuthorizer methodAuthorizer = Objects
.requireNonNull(ClusterStartupRule.getCache()).getService(QueryConfigurationService.class)
.getMethodAuthorizer();
assertThat(methodAuthorizer).isEqualTo(QueryConfigurationServiceImpl.getNoOpAuthorizer());
}));
}
@Test
public void alterQueryServiceCommandDoesNotUpdateMethodAuthorizerWhenSecurityIsNotEnabled() {
verifyNoOpAuthorizer();
String authorizerName = UnrestrictedMethodAuthorizer.class.getName();
gfsh.executeAndAssertThat(COMMAND_NAME + " --" + AUTHORIZER_NAME + "=" + authorizerName)
.statusIsError().containsOutput(SECURITY_NOT_ENABLED_MESSAGE);
verifyNoOpAuthorizer();
}
}