| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.pulsar.client.admin.internal; |
| |
| import static org.assertj.core.api.Assertions.assertThat; |
| import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException; |
| import com.google.gson.Gson; |
| import com.google.gson.JsonObject; |
| import java.io.IOException; |
| import java.util.Collections; |
| import java.util.HashMap; |
| import java.util.Map; |
| import lombok.Cleanup; |
| import lombok.SneakyThrows; |
| import org.apache.pulsar.client.admin.PulsarAdmin; |
| import org.apache.pulsar.client.admin.PulsarAdminBuilder; |
| import org.apache.pulsar.client.api.Authentication; |
| import org.apache.pulsar.client.api.AuthenticationDataProvider; |
| import org.apache.pulsar.client.api.EncodedAuthenticationParameterSupport; |
| import org.apache.pulsar.client.api.PulsarClientException; |
| import org.apache.pulsar.client.impl.auth.AuthenticationDisabled; |
| import org.apache.pulsar.client.impl.conf.ClientConfigurationData; |
| import org.testng.Assert; |
| import org.testng.annotations.Test; |
| |
| /** |
| * Unit tests for {@link PulsarAdminBuilder}. |
| */ |
| public class PulsarAdminBuilderImplTest { |
| |
| private static final String MOCK_AUTH_SECRET_PLUGIN_CLASS = MockAuthenticationSecret.class.getName(); |
| |
| private static final String AUTH_PLUGIN_CLASS_PROP = "authPluginClassName"; |
| |
| private static final String AUTH_PARAMS_PROP = "authParams"; |
| |
| private static final String AUTH_PARAM_MAP_PROP = "authParamMap"; |
| |
| @Test |
| public void testBuildFailsWhenServiceUrlNotSet() { |
| assertThatIllegalArgumentException().isThrownBy(() -> PulsarAdmin.builder().build()) |
| .withMessageContaining("Service URL needs to be specified"); |
| } |
| |
| @Test |
| public void testGetPropertiesFromConf() throws Exception { |
| Map<String, Object> config = new HashMap<>(); |
| config.put("serviceUrl", "pulsar://localhost:6650"); |
| config.put("requestTimeoutMs", 10); |
| config.put("autoCertRefreshSeconds", 20); |
| config.put("connectionTimeoutMs", 30); |
| config.put("readTimeoutMs", 40); |
| PulsarAdminBuilder adminBuilder = PulsarAdmin.builder().loadConf(config); |
| @Cleanup |
| PulsarAdminImpl admin = (PulsarAdminImpl) adminBuilder.build(); |
| ClientConfigurationData clientConfigData = admin.getClientConfigData(); |
| Assert.assertEquals(clientConfigData.getRequestTimeoutMs(), 10); |
| Assert.assertEquals(clientConfigData.getAutoCertRefreshSeconds(), 20); |
| Assert.assertEquals(clientConfigData.getConnectionTimeoutMs(), 30); |
| Assert.assertEquals(clientConfigData.getReadTimeoutMs(), 40); |
| } |
| |
| @Test |
| public void testLoadConfSetsAuthUsingAuthParamsProp() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| confProps.put(AUTH_PARAMS_PROP, secretAuthParams("pass1")); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertAuthWithSecret(auth, "pass1"); |
| } |
| |
| @Test |
| public void testLoadConfSetsAuthUsingAuthParamMapProp() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| confProps.put(AUTH_PARAM_MAP_PROP, secretAuthParamMap("pass1")); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertAuthWithSecret(auth, "pass1"); |
| } |
| |
| @Test |
| public void testLoadConfSetsAuthUsingAuthParamsPropWhenBothPropsAvailable() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| confProps.put(AUTH_PARAMS_PROP, secretAuthParams("pass1")); |
| confProps.put(AUTH_PARAM_MAP_PROP, secretAuthParamMap("pass2")); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertAuthWithSecret(auth, "pass1"); |
| } |
| |
| private void assertAuthWithSecret(Authentication authentication, String secret) { |
| assertThat(authentication).isInstanceOfSatisfying(MockAuthenticationSecret.class, |
| (auth) -> assertThat(auth.getSecret()).isEqualTo(secret)); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenNoPropsAvailable() { |
| Authentication auth = createAdminAndGetAuth(Collections.emptyMap()); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenEmptyAuthParamsSpecified() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| confProps.put(AUTH_PARAMS_PROP, ""); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenNullAuthParamsSpecified() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| confProps.put(AUTH_PARAMS_PROP, null); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenNullParamMapSpecified() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| confProps.put(AUTH_PARAM_MAP_PROP, null); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenOnlyPluginClassNameAvailable() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PLUGIN_CLASS_PROP, MOCK_AUTH_SECRET_PLUGIN_CLASS); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenOnlyAuthParamsAvailable() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PARAMS_PROP, secretAuthParams("pass1")); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| @Test |
| public void testLoadConfAuthNotSetWhenOnlyAuthParamMapAvailable() { |
| Map<String, Object> confProps = new HashMap<>(); |
| confProps.put(AUTH_PARAM_MAP_PROP, secretAuthParamMap("pass2")); |
| Authentication auth = createAdminAndGetAuth(confProps); |
| assertThatAuthIsNotSet(auth); |
| } |
| |
| private void assertThatAuthIsNotSet(Authentication authentication) { |
| // getAuthentication() returns disabled when null |
| assertThat(authentication).isInstanceOf(AuthenticationDisabled.class); |
| } |
| |
| @SneakyThrows |
| private Authentication createAdminAndGetAuth(Map<String, Object> confProps) { |
| try (PulsarAdmin admin = PulsarAdmin.builder().serviceHttpUrl("http://localhost:8080").loadConf(confProps).build()) { |
| return ((PulsarAdminImpl)admin).auth; |
| } |
| } |
| |
| private String secretAuthParams(String secret) { |
| return String.format("{\"secret\":\"%s\"}", secret); |
| } |
| |
| private Map<String, String> secretAuthParamMap(String secret) { |
| return Collections.singletonMap("secret", secret); |
| } |
| |
| static public class MockAuthenticationSecret implements Authentication, EncodedAuthenticationParameterSupport { |
| |
| private String secret; |
| |
| @Override |
| public String getAuthMethodName() { |
| return "mock-secret"; |
| } |
| |
| @Override |
| public AuthenticationDataProvider getAuthData() throws PulsarClientException { |
| return null; |
| } |
| |
| @Override |
| public void configure(Map<String, String> authParams) { |
| configure(new Gson().toJson(authParams)); |
| } |
| |
| @Override |
| public void configure(String encodedAuthParamString) { |
| JsonObject params = new Gson().fromJson(encodedAuthParamString, JsonObject.class); |
| secret = params.get("secret").getAsString(); |
| } |
| |
| @Override |
| public void start() throws PulsarClientException { |
| } |
| |
| @Override |
| public void close() throws IOException { |
| } |
| |
| public String getSecret() { |
| return secret; |
| } |
| } |
| |
| } |