blob: 3b219ed37d15ee956d2048631be801bd5a4d6e48 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.security.query;
import java.util.Arrays;
import java.util.List;
import org.junit.Before;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import org.junit.runner.RunWith;
import org.junit.runners.Parameterized;
import org.apache.geode.cache.query.QueryService;
import org.apache.geode.security.query.data.QueryTestObject;
import org.apache.geode.test.junit.categories.SecurityTest;
import org.apache.geode.test.junit.runners.CategoryWithParameterizedRunnerFactory;
@Category({SecurityTest.class})
@RunWith(Parameterized.class)
@Parameterized.UseParametersRunnerFactory(CategoryWithParameterizedRunnerFactory.class)
public class QuerySecurityRetrictedButMethodsDoNotExistDUnitTest extends QuerySecurityBase {
@Parameterized.Parameters
public static Object[] usersAllowed() {
return new Object[] {"dataReader", "dataReaderRegion", "clusterManagerDataReader",
"clusterManagerDataReaderRegion", "super-user"};
}
@Parameterized.Parameter
public String user;
@Before
public void configureCache() {
createClientCache(specificUserClient, user, userPerms.getUserPassword(user));
createProxyRegion(specificUserClient, regionName);
keys = new Object[] {"key-0", "key-1"};
values = new Object[] {new QueryTestObject(1, "John"), new QueryTestObject(3, "Beth")};
putIntoRegion(superUserClient, keys, values, regionName);
}
@Test
public void executingMethodThatDoesNotExistOnResultsWillReturnUndefinedAsAResult() {
String query = "select r.getInterestListRegex() from /" + regionName + " r";
List<Object> expectedResults = Arrays.asList(QueryService.UNDEFINED, QueryService.UNDEFINED);
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
}
@Test
public void cloneExecutedOnQRegionWillReturnEmptyResults() {
String query = "select * from /" + regionName + ".clone";
List<Object> expectedResults = Arrays.asList();
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
}
@Test
public void executingMethodThatDoesNotExistOnQRegionWillReturnEmptyResult() {
String query = "select * from /" + regionName + ".getKey('" + keys[0] + "')";
List<Object> expectedResults = Arrays.asList();
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
}
@Test
public void executingCreateOnRegionWillResultInUndefinedButNotModifyRegion() throws Exception {
String query = "select r.create('key2', 15) from /" + regionName + " r";
List<Object> expectedResults = Arrays.asList(QueryService.UNDEFINED, QueryService.UNDEFINED);
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
executeAndConfirmRegionMatches(specificUserClient, regionName, Arrays.asList(values));
}
@Test
public void executingDestroyKeyOnRegionWillReturnEmptyResultsAndNotModifyRegion()
throws Exception {
String query = "select * from /" + regionName + ".destroyKey('" + keys[0] + "')";
List<Object> expectedResults = Arrays.asList();
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
executeAndConfirmRegionMatches(specificUserClient, regionName, Arrays.asList(values));
}
@Test
public void executingPutIfAbsentOnRegionWillReturnEmptyResultsAndNotModifyRegion()
throws Exception {
String query = "select * from /" + regionName + ".putIfAbsent('key-2', 'something')";
List<Object> expectedResults = Arrays.asList();
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
executeAndConfirmRegionMatches(specificUserClient, regionName, Arrays.asList(values));
}
@Test
public void executingReplaceOnRegionWillReturnEmptyResultsAndNotModifyRegion() throws Exception {
String query = "select * from /" + regionName + ".replace('key-0', 'something')";
List<Object> expectedResults = Arrays.asList();
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
executeAndConfirmRegionMatches(specificUserClient, regionName, Arrays.asList(values));
}
@Test
public void checkUserAuthorizationsForSelectGetInterestListRegexParenRegionQuery() {
String query = "select r.getInterestListRegex() from /" + regionName + " r";
List<Object> expectedResults = Arrays.asList(QueryService.UNDEFINED, QueryService.UNDEFINED);
executeQueryWithCheckForAccessPermissions(specificUserClient, query, regionName,
expectedResults);
}
}