/* * Licensed to the Apache Software Foundation (ASF) under one or more contributor license * agreements. See the NOTICE file distributed with this work for additional information regarding * copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance with the License. You may obtain a * copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express * or implied. See the License for the specific language governing permissions and limitations under * the License. */ package org.apache.geode.internal.cache.tier.sockets.command; import static org.assertj.core.api.Assertions.assertThat; import static org.mockito.Matchers.*; import static org.mockito.Mockito.*; import org.junit.Before; import org.junit.Test; import org.junit.experimental.categories.Category; import org.mockito.ArgumentCaptor; import org.mockito.InjectMocks; import org.mockito.Mock; import org.mockito.MockitoAnnotations; import org.apache.geode.CancelCriterion; import org.apache.geode.cache.Cache; import org.apache.geode.cache.operations.GetOperationContext; import org.apache.geode.cache.operations.RemoveAllOperationContext; import org.apache.geode.internal.cache.LocalRegion; import org.apache.geode.internal.cache.PartitionedRegion; import org.apache.geode.internal.cache.tier.CachedRegionHelper; import org.apache.geode.internal.cache.tier.sockets.CacheServerStats; import org.apache.geode.internal.cache.tier.sockets.ChunkedMessage; import org.apache.geode.internal.cache.tier.sockets.Message; import org.apache.geode.internal.cache.tier.sockets.ObjectPartList; import org.apache.geode.internal.cache.tier.sockets.Part; import org.apache.geode.internal.cache.tier.sockets.ServerConnection; import org.apache.geode.internal.cache.tier.sockets.VersionedObjectList; import org.apache.geode.internal.security.AuthorizeRequest; import org.apache.geode.internal.security.SecurityService; import org.apache.geode.security.NotAuthorizedException; import org.apache.geode.test.junit.categories.UnitTest; @Category(UnitTest.class) public class RemoveAllTest { private static final String REGION_NAME = "region1"; private static final Object[] KEYS = new Object[] {"key1", "key2", "key3"}; private static final byte[] EVENT = new byte[8]; private static final Object CALLBACK_ARG = "arg"; @Mock private SecurityService securityService; @Mock private Message message; @Mock private ServerConnection serverConnection; @Mock private AuthorizeRequest authzRequest; @Mock private Cache cache; @Mock private Part regionNamePart; @Mock private Part callbackArgPart; @Mock private Part numberofKeysPart; @Mock private Part flagsPart; @Mock private Part eventPart; @Mock private Part keyPart; @Mock private Part timeoutPart; @Mock private ChunkedMessage chunkedResponseMessage; @InjectMocks private RemoveAll removeAll; @Before public void setUp() throws Exception { this.removeAll = new RemoveAll(); MockitoAnnotations.initMocks(this); when(this.authzRequest.removeAllAuthorize(any(), any(), any())) .thenReturn(mock(RemoveAllOperationContext.class)); when(this.cache.getRegion(isA(String.class))).thenReturn(mock(PartitionedRegion.class)); when(this.cache.getCancelCriterion()).thenReturn(mock(CancelCriterion.class)); when(this.callbackArgPart.getObject()).thenReturn(CALLBACK_ARG); when(this.eventPart.getSerializedForm()).thenReturn(EVENT); when(this.flagsPart.getInt()).thenReturn(0); when(this.keyPart.getStringOrObject()).thenReturn(KEYS); when(this.message.getPart(eq(0))).thenReturn(this.regionNamePart); when(this.message.getPart(eq(1))).thenReturn(this.eventPart); when(this.message.getPart(eq(2))).thenReturn(this.flagsPart); when(this.message.getPart(eq(3))).thenReturn(this.callbackArgPart); when(this.message.getPart(eq(4))).thenReturn(this.numberofKeysPart); when(this.message.getPart(eq(5))).thenReturn(this.keyPart); when(this.message.getPart(eq(6))).thenReturn(this.timeoutPart); when(this.numberofKeysPart.getInt()).thenReturn(1); when(this.regionNamePart.getString()).thenReturn(REGION_NAME); when(this.serverConnection.getCache()).thenReturn(this.cache); when(this.serverConnection.getCacheServerStats()).thenReturn(mock(CacheServerStats.class)); when(this.serverConnection.getAuthzRequest()).thenReturn(this.authzRequest); when(this.serverConnection.getCachedRegionHelper()).thenReturn(mock(CachedRegionHelper.class)); when(this.serverConnection.getChunkedResponseMessage()).thenReturn(this.chunkedResponseMessage); when(this.timeoutPart.getInt()).thenReturn(5); } @Test public void noSecurityShouldSucceed() throws Exception { when(this.securityService.isClientSecurityRequired()).thenReturn(false); this.removeAll.cmdExecute(this.message, this.serverConnection, 0); verify(this.chunkedResponseMessage).sendChunk(eq(this.serverConnection)); } @Test public void integratedSecurityShouldSucceedIfAuthorized() throws Exception { when(this.securityService.isClientSecurityRequired()).thenReturn(true); when(this.securityService.isIntegratedSecurity()).thenReturn(true); this.removeAll.cmdExecute(this.message, this.serverConnection, 0); for (Object key : KEYS) { verify(this.securityService).authorizeRegionWrite(eq(REGION_NAME)); } verify(this.chunkedResponseMessage).sendChunk(eq(this.serverConnection)); } @Test public void integratedSecurityShouldFailIfNotAuthorized() throws Exception { when(this.securityService.isClientSecurityRequired()).thenReturn(true); when(this.securityService.isIntegratedSecurity()).thenReturn(true); for (Object key : KEYS) { doThrow(new NotAuthorizedException("")).when(this.securityService) .authorizeRegionRead(eq(REGION_NAME), eq(key.toString())); } this.removeAll.cmdExecute(this.message, this.serverConnection, 0); for (Object key : KEYS) { verify(this.securityService).authorizeRegionWrite(eq(REGION_NAME)); } verify(this.chunkedResponseMessage).sendChunk(eq(this.serverConnection)); } @Test public void oldSecurityShouldSucceedIfAuthorized() throws Exception { when(this.securityService.isClientSecurityRequired()).thenReturn(true); when(this.securityService.isIntegratedSecurity()).thenReturn(false); this.removeAll.cmdExecute(this.message, this.serverConnection, 0); for (Object key : KEYS) { verify(this.authzRequest).removeAllAuthorize(eq(REGION_NAME), any(), any()); } verify(this.chunkedResponseMessage).sendChunk(eq(this.serverConnection)); } @Test public void oldSecurityShouldFailIfNotAuthorized() throws Exception { when(this.securityService.isClientSecurityRequired()).thenReturn(true); when(this.securityService.isIntegratedSecurity()).thenReturn(false); for (Object key : KEYS) { doThrow(new NotAuthorizedException("")).when(this.authzRequest).getAuthorize(eq(REGION_NAME), eq(key.toString()), eq(null)); } this.removeAll.cmdExecute(this.message, this.serverConnection, 0); for (Object key : KEYS) { verify(this.authzRequest).removeAllAuthorize(eq(REGION_NAME), any(), any()); } verify(this.chunkedResponseMessage).sendChunk(eq(this.serverConnection)); } }