blob: 1f9b80975e7166acb05de572a499dfb8ef131544 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.management.internal.cli.commands;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_MANAGER;
import static org.apache.geode.test.awaitility.GeodeAwaitility.await;
import static org.assertj.core.api.Assertions.assertThat;
import java.io.Serializable;
import java.util.Properties;
import java.util.Set;
import java.util.stream.Stream;
import org.junit.BeforeClass;
import org.junit.ClassRule;
import org.junit.Rule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.apache.geode.cache.CacheFactory;
import org.apache.geode.cache.RegionShortcut;
import org.apache.geode.cache.execute.FunctionService;
import org.apache.geode.distributed.DistributedMember;
import org.apache.geode.examples.SimpleSecurityManager;
import org.apache.geode.internal.cache.InternalCache;
import org.apache.geode.management.internal.security.ResourceConstants;
import org.apache.geode.management.internal.security.TestFunctions.ReadFunction;
import org.apache.geode.management.internal.security.TestFunctions.WriteFunction;
import org.apache.geode.management.internal.util.ManagementUtils;
import org.apache.geode.test.dunit.rules.ClusterStartupRule;
import org.apache.geode.test.dunit.rules.MemberVM;
import org.apache.geode.test.junit.categories.SecurityTest;
import org.apache.geode.test.junit.rules.GfshCommandRule;
@Category(SecurityTest.class)
public class ExecuteFunctionCommandSecurityTest implements Serializable {
@ClassRule
public static ClusterStartupRule lsRule = new ClusterStartupRule();
@Rule
public GfshCommandRule gfsh = new GfshCommandRule();
private static MemberVM locator;
private static String REPLICATED_REGION = "replicatedRegion";
private static String PARTITIONED_REGION = "partitionedRegion";
@BeforeClass
public static void beforeClass() {
Properties locatorProps = new Properties();
locatorProps.setProperty(SECURITY_MANAGER, SimpleSecurityManager.class.getName());
locator = lsRule.startLocatorVM(0, locatorProps);
Properties serverProps = new Properties();
serverProps.setProperty(ResourceConstants.USER_NAME, "clusterManage");
serverProps.setProperty(ResourceConstants.PASSWORD, "clusterManage");
MemberVM server1 = lsRule.startServerVM(1, serverProps, locator.getPort());
MemberVM server2 = lsRule.startServerVM(2, serverProps, locator.getPort());
Stream.of(server1, server2).forEach(server -> server.invoke(() -> {
FunctionService.registerFunction(new ReadFunction());
FunctionService.registerFunction(new WriteFunction());
InternalCache cache = ClusterStartupRule.getCache();
assertThat(cache).isNotNull();
cache.createRegionFactory(RegionShortcut.REPLICATE).create(REPLICATED_REGION);
cache.createRegionFactory(RegionShortcut.PARTITION).create(PARTITIONED_REGION);
}));
locator.invoke(ExecuteFunctionCommandSecurityTest::waitUntilRegionMBeansAreRegistered);
}
@Test
public void dataReaderCanExecuteReadFunction() throws Exception {
gfsh.secureConnectAndVerify(locator.getPort(), GfshCommandRule.PortType.locator, "dataRead",
"dataRead");
gfsh.executeAndAssertThat("execute function --id=" + new ReadFunction().getId())
.statusIsSuccess();
assertThat(gfsh.getGfshOutput()).contains(ReadFunction.SUCCESS_OUTPUT);
}
@Test
public void dataReaderCanNotExecuteWriteFunction() throws Exception {
gfsh.secureConnectAndVerify(locator.getPort(), GfshCommandRule.PortType.locator, "dataRead",
"dataRead");
gfsh.executeAndAssertThat("execute function --id=" + new WriteFunction().getId())
.containsOutput("dataRead not authorized for DATA:WRITE")
.doesNotContainOutput(WriteFunction.SUCCESS_OUTPUT);
}
@Test
public void dataWriterCanExecuteWriteFunction() throws Exception {
gfsh.secureConnectAndVerify(locator.getPort(), GfshCommandRule.PortType.locator, "dataWrite",
"dataWrite");
gfsh.executeAndAssertThat("execute function --id=" + new WriteFunction().getId())
.statusIsSuccess();
assertThat(gfsh.getGfshOutput()).contains(WriteFunction.SUCCESS_OUTPUT);
}
@Test
@SuppressWarnings("deprecation")
public void dataWriterCanNotExecuteReadFunction() throws Exception {
gfsh.secureConnectAndVerify(locator.getPort(), GfshCommandRule.PortType.locator, "dataWrite",
"dataWrite");
gfsh.executeCommand("execute function --id=" + new ReadFunction().getId());
assertThat(gfsh.getGfshOutput()).contains("dataWrite not authorized for DATA:READ");
assertThat(gfsh.getGfshOutput()).doesNotContain(ReadFunction.SUCCESS_OUTPUT);
}
@Test
@SuppressWarnings("deprecation")
public void readOnlyUserOnReplicatedRegion() throws Exception {
gfsh.secureConnectAndVerify(locator.getPort(), GfshCommandRule.PortType.locator, "dataRead",
"dataRead");
gfsh.executeAndAssertThat(
"execute function --id=" + new ReadFunction().getId() + " --region=" + REPLICATED_REGION)
.statusIsSuccess().containsOutput(ReadFunction.SUCCESS_OUTPUT);
gfsh.executeAndAssertThat(
"execute function --id=" + new WriteFunction().getId() + " --region=" + REPLICATED_REGION)
.statusIsError().tableHasColumnWithExactValuesInAnyOrder("Message",
"Exception: dataRead not authorized for DATA:WRITE");
}
@Test
@SuppressWarnings("deprecation")
public void readOnlyUserOnPartitionedRegion() throws Exception {
gfsh.secureConnectAndVerify(locator.getPort(), GfshCommandRule.PortType.locator, "dataRead",
"dataRead");
gfsh.executeAndAssertThat(
"execute function --id=" + new ReadFunction().getId() + " --region=" + PARTITIONED_REGION)
.statusIsSuccess().containsOutput(ReadFunction.SUCCESS_OUTPUT);
gfsh.executeAndAssertThat(
"execute function --id=" + new WriteFunction().getId() + " --region=" + PARTITIONED_REGION)
.statusIsError().tableHasColumnWithExactValuesInAnyOrder("Message",
"Exception: dataRead not authorized for DATA:WRITE");
}
private static void waitUntilRegionMBeansAreRegistered() {
await().untilAsserted(() -> {
Set<DistributedMember> regionMembers =
ManagementUtils.getRegionAssociatedMembers(REPLICATED_REGION,
(InternalCache) CacheFactory.getAnyInstance(), true);
assertThat(regionMembers).hasSize(2);
});
}
}