/* * Licensed to the Apache Software Foundation (ASF) under one or more contributor license * agreements. See the NOTICE file distributed with this work for additional information regarding * copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance with the License. You may obtain a * copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express * or implied. See the License for the specific language governing permissions and limitations under * the License. */ package org.apache.geode.security; import static org.junit.Assert.*; import java.util.ArrayList; import java.util.HashMap; import java.util.List; import java.util.Map; import java.util.Set; import org.junit.Test; import org.junit.experimental.categories.Category; import org.apache.geode.cache.Region; import org.apache.geode.cache.client.ClientCache; import org.apache.geode.test.dunit.AsyncInvocation; import org.apache.geode.test.junit.categories.DistributedTest; import org.apache.geode.test.junit.categories.FlakyTest; import org.apache.geode.test.junit.categories.SecurityTest; @Category({DistributedTest.class, SecurityTest.class, FlakyTest.class}) public class IntegratedClientGetPutAuthDistributedTest extends AbstractSecureServerDUnitTest { @Test public void testGetPutAuthorization() throws InterruptedException { Map<String, String> allValues = new HashMap<String, String>(); allValues.put("key1", "value1"); allValues.put("key2", "value2"); List<String> keys = new ArrayList<>(); keys.add("key1"); keys.add("key2"); // client1 connects to server as a user not authorized to do any operations AsyncInvocation ai1 = client1.invokeAsync(() -> { ClientCache cache = createClientCache("stranger", "1234567", serverPort); Region region = cache.getRegion(REGION_NAME); assertNotAuthorized(() -> region.put("key3", "value3"), "DATA:WRITE:AuthRegion:key3"); assertNotAuthorized(() -> region.get("key3"), "DATA:READ:AuthRegion:key3"); // putall assertNotAuthorized(() -> region.putAll(allValues), "DATA:WRITE:AuthRegion"); // not authorized for either keys, get no record back Map keyValues = region.getAll(keys); assertEquals(0, keyValues.size()); assertNotAuthorized(() -> region.keySetOnServer(), "DATA:READ:AuthRegion"); }); // client2 connects to user as a user authorized to use AuthRegion region AsyncInvocation ai2 = client2.invokeAsync(() -> { ClientCache cache = createClientCache("authRegionUser", "1234567", serverPort); Region region = cache.getRegion(REGION_NAME); region.put("key3", "value3"); assertEquals("value3", region.get("key3")); // put all region.putAll(allValues); // get all Map keyValues = region.getAll(keys); assertEquals(2, keyValues.size()); // keyset Set keySet = region.keySetOnServer(); assertEquals(5, keySet.size()); }); // client3 connects to user as a user authorized to use key1 in AuthRegion region AsyncInvocation ai3 = client3.invokeAsync(() -> { ClientCache cache = createClientCache("key1User", "1234567", serverPort); Region region = cache.getRegion(REGION_NAME); assertNotAuthorized(() -> region.put("key2", "value1"), "DATA:WRITE:AuthRegion:key2"); assertNotAuthorized(() -> region.get("key2"), "DATA:READ:AuthRegion:key2"); assertNotAuthorized(() -> region.putAll(allValues), "DATA:WRITE:AuthRegion"); // only authorized for one recrod Map keyValues = region.getAll(keys); assertEquals(1, keyValues.size()); // keyset assertNotAuthorized(() -> region.keySetOnServer(), "DATA:READ:AuthRegion"); }); ai1.join(); ai2.join(); ai3.join(); ai1.checkException(); ai2.checkException(); ai3.checkException(); } }