blob: 7ee3e26e310b817d3e0de80d5a9e0a56ebe3887d [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.internal.cache.tier.sockets.command;
import static org.apache.geode.util.internal.UncheckedUtils.uncheckedCast;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.ArgumentMatchers.eq;
import static org.mockito.ArgumentMatchers.isA;
import static org.mockito.Mockito.doReturn;
import static org.mockito.Mockito.doThrow;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.verify;
import static org.mockito.Mockito.when;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.mockito.ArgumentCaptor;
import org.mockito.InjectMocks;
import org.mockito.Mock;
import org.mockito.Mockito;
import org.mockito.MockitoAnnotations;
import org.apache.geode.CancelCriterion;
import org.apache.geode.cache.DataPolicy;
import org.apache.geode.cache.RegionAttributes;
import org.apache.geode.cache.operations.PutOperationContext;
import org.apache.geode.internal.cache.EventIDHolder;
import org.apache.geode.internal.cache.InternalCache;
import org.apache.geode.internal.cache.LocalRegion;
import org.apache.geode.internal.cache.TXManagerImpl;
import org.apache.geode.internal.cache.tier.CachedRegionHelper;
import org.apache.geode.internal.cache.tier.sockets.CacheServerStats;
import org.apache.geode.internal.cache.tier.sockets.Message;
import org.apache.geode.internal.cache.tier.sockets.Part;
import org.apache.geode.internal.cache.tier.sockets.ServerConnection;
import org.apache.geode.internal.security.AuthorizeRequest;
import org.apache.geode.internal.security.SecurityService;
import org.apache.geode.internal.serialization.KnownVersion;
import org.apache.geode.security.NotAuthorizedException;
import org.apache.geode.security.ResourcePermission.Operation;
import org.apache.geode.security.ResourcePermission.Resource;
import org.apache.geode.test.junit.categories.ClientServerTest;
@Category({ClientServerTest.class})
public class Put70Test {
private static final String REGION_NAME = "region1";
private static final String KEY = "key1";
private static final Object CALLBACK_ARG = "arg";
private static final byte[] EVENT = new byte[8];
private static final byte[] VALUE = new byte[8];
private static final byte[] OK_BYTES = new byte[] {0};
@Mock
private SecurityService securityService;
@Mock
private Message message;
@Mock
private ServerConnection serverConnection;
@Mock
private AuthorizeRequest authzRequest;
@Mock
private InternalCache cache;
@Mock
private LocalRegion localRegion;
@Mock
private Part regionNamePart;
@Mock
private Part keyPart;
@Mock
private Part valuePart;
@Mock
private Part oldValuePart;
@Mock
private Part deltaPart;
@Mock
private Part operationPart;
@Mock
private Part flagsPart;
@Mock
private Part eventPart;
@Mock
private Part callbackArgsPart;
@Mock
private PutOperationContext putOperationContext;
@Mock
private Message errorResponseMessage;
@Mock
private Message replyMessage;
@Mock
private RegionAttributes<?, ?> attributes;
@Mock
private EventIDHolder clientEvent;
@Mock
private DataPolicy dataPolicy;
@InjectMocks
private Put70 put70;
private AutoCloseable mockitoMocks;
@Before
public void setUp() throws Exception {
put70 = (Put70) Put70.getCommand();
mockitoMocks = MockitoAnnotations.openMocks(this);
when(
authzRequest.putAuthorize(eq(REGION_NAME), eq(KEY), any(), eq(true), eq(CALLBACK_ARG)))
.thenReturn(putOperationContext);
when(cache.getRegion(isA(String.class))).thenReturn(uncheckedCast(localRegion));
when(cache.getCancelCriterion()).thenReturn(mock(CancelCriterion.class));
when(cache.getCacheTransactionManager()).thenReturn(mock(TXManagerImpl.class));
when(callbackArgsPart.getObject()).thenReturn(CALLBACK_ARG);
when(deltaPart.getObject()).thenReturn(Boolean.FALSE);
when(eventPart.getSerializedForm()).thenReturn(EVENT);
when(flagsPart.getInt()).thenReturn(1);
when(keyPart.getStringOrObject()).thenReturn(KEY);
when(localRegion.basicBridgePut(eq(KEY), eq(VALUE), eq(null), eq(true), eq(CALLBACK_ARG),
any(), eq(true), any())).thenReturn(true);
when(message.getNumberOfParts()).thenReturn(8);
when(message.getPart(eq(0))).thenReturn(regionNamePart);
when(message.getPart(eq(1))).thenReturn(operationPart);
when(message.getPart(eq(2))).thenReturn(flagsPart);
when(message.getPart(eq(3))).thenReturn(keyPart);
when(message.getPart(eq(4))).thenReturn(deltaPart);
when(message.getPart(eq(5))).thenReturn(valuePart);
when(message.getPart(eq(6))).thenReturn(eventPart);
when(message.getPart(eq(7))).thenReturn(callbackArgsPart);
when(operationPart.getObject()).thenReturn(null);
when(oldValuePart.getObject()).thenReturn(mock(Object.class));
when(putOperationContext.getCallbackArg()).thenReturn(CALLBACK_ARG);
when(putOperationContext.getValue()).thenReturn(VALUE);
when(putOperationContext.isObject()).thenReturn(true);
when(regionNamePart.getCachedString()).thenReturn(REGION_NAME);
when(serverConnection.getCache()).thenReturn(cache);
when(serverConnection.getCacheServerStats()).thenReturn(mock(CacheServerStats.class));
when(serverConnection.getAuthzRequest()).thenReturn(authzRequest);
when(serverConnection.getCachedRegionHelper()).thenReturn(mock(CachedRegionHelper.class));
when(serverConnection.getReplyMessage()).thenReturn(replyMessage);
when(serverConnection.getErrorResponseMessage()).thenReturn(errorResponseMessage);
when(serverConnection.getClientVersion()).thenReturn(KnownVersion.CURRENT);
when(valuePart.getSerializedForm()).thenReturn(VALUE);
when(valuePart.isObject()).thenReturn(true);
when(localRegion.getAttributes()).thenReturn(attributes);
when(attributes.getDataPolicy()).thenReturn(dataPolicy);
}
@After
public void after() throws Exception {
mockitoMocks.close();
}
@Test
public void noSecurityShouldSucceed() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(false);
put70.cmdExecute(message, serverConnection, securityService, 0);
verify(replyMessage).send(serverConnection);
}
@Test
public void noRegionNameShouldFail() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(false);
when(regionNamePart.getCachedString()).thenReturn(null);
put70.cmdExecute(message, serverConnection, securityService, 0);
ArgumentCaptor<String> argument = ArgumentCaptor.forClass(String.class);
verify(errorResponseMessage).addStringPart(argument.capture());
assertThat(argument.getValue()).contains("The input region name for the put request is null");
verify(errorResponseMessage).send(serverConnection);
}
@Test
public void noKeyShouldFail() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(false);
when(keyPart.getStringOrObject()).thenReturn(null);
put70.cmdExecute(message, serverConnection, securityService, 0);
ArgumentCaptor<String> argument = ArgumentCaptor.forClass(String.class);
verify(errorResponseMessage).addStringPart(argument.capture());
assertThat(argument.getValue()).contains("The input key for the put request is null");
verify(errorResponseMessage).send(serverConnection);
}
@Test
public void integratedSecurityShouldSucceedIfAuthorized() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(true);
when(securityService.isIntegratedSecurity()).thenReturn(true);
put70.cmdExecute(message, serverConnection, securityService, 0);
verify(securityService).authorize(Resource.DATA, Operation.WRITE, REGION_NAME, KEY);
verify(replyMessage).send(serverConnection);
}
@Test
public void integratedSecurityShouldFailIfNotAuthorized() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(true);
when(securityService.isIntegratedSecurity()).thenReturn(true);
doThrow(new NotAuthorizedException("")).when(securityService).authorize(Resource.DATA,
Operation.WRITE, REGION_NAME, KEY);
put70.cmdExecute(message, serverConnection, securityService, 0);
verify(securityService).authorize(Resource.DATA, Operation.WRITE, REGION_NAME, KEY);
verify(errorResponseMessage).send(serverConnection);
}
@Test
public void oldSecurityShouldSucceedIfAuthorized() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(true);
when(securityService.isIntegratedSecurity()).thenReturn(false);
put70.cmdExecute(message, serverConnection, securityService, 0);
ArgumentCaptor<byte[]> argument = ArgumentCaptor.forClass(byte[].class);
verify(replyMessage).addBytesPart(argument.capture());
assertThat(argument.getValue()).isEqualTo(OK_BYTES);
verify(authzRequest).putAuthorize(eq(REGION_NAME), eq(KEY), eq(VALUE), eq(true),
eq(CALLBACK_ARG));
verify(replyMessage).send(serverConnection);
}
@Test
public void oldSecurityShouldFailIfNotAuthorized() throws Exception {
when(securityService.isClientSecurityRequired()).thenReturn(true);
when(securityService.isIntegratedSecurity()).thenReturn(false);
doThrow(new NotAuthorizedException("")).when(authzRequest).putAuthorize(eq(REGION_NAME),
eq(KEY), eq(VALUE), eq(true), eq(CALLBACK_ARG));
put70.cmdExecute(message, serverConnection, securityService, 0);
verify(authzRequest).putAuthorize(eq(REGION_NAME), eq(KEY), eq(VALUE), eq(true),
eq(CALLBACK_ARG));
ArgumentCaptor<NotAuthorizedException> argument =
ArgumentCaptor.forClass(NotAuthorizedException.class);
verify(errorResponseMessage).addObjPart(argument.capture());
assertThat(argument.getValue()).isExactlyInstanceOf(NotAuthorizedException.class);
verify(errorResponseMessage).send(serverConnection);
}
@Test
public void shouldSetPossibleDuplicateReturnsTrueIfConcurrencyChecksNotEnabled() {
when(attributes.getConcurrencyChecksEnabled()).thenReturn(false);
assertThat(put70.shouldSetPossibleDuplicate(localRegion, clientEvent)).isTrue();
}
@Test
public void shouldSetPossibleDuplicateReturnsTrueIfRecoveredVersionTagForRetriedOperation() {
Put70 spy = Mockito.spy(put70);
when(attributes.getConcurrencyChecksEnabled()).thenReturn(true);
doReturn(true).when(spy).recoverVersionTagForRetriedOperation(clientEvent);
assertThat(spy.shouldSetPossibleDuplicate(localRegion, clientEvent)).isTrue();
}
@Test
public void shouldSetPossibleDuplicateReturnsFalseIfNotRecoveredVersionTagAndNoPersistence() {
Put70 spy = Mockito.spy(put70);
when(attributes.getConcurrencyChecksEnabled()).thenReturn(true);
when(dataPolicy.withPersistence()).thenReturn(false);
doReturn(false).when(spy).recoverVersionTagForRetriedOperation(clientEvent);
assertThat(spy.shouldSetPossibleDuplicate(localRegion, clientEvent)).isFalse();
}
@Test
public void shouldSetPossibleDuplicateReturnsTrueIfNotRecoveredVersionTagAndWithPersistence() {
Put70 spy = Mockito.spy(put70);
when(attributes.getConcurrencyChecksEnabled()).thenReturn(true);
when(dataPolicy.withPersistence()).thenReturn(true);
doReturn(false).when(spy).recoverVersionTagForRetriedOperation(clientEvent);
assertThat(spy.shouldSetPossibleDuplicate(localRegion, clientEvent)).isTrue();
}
}