/*
* Licensed to the Apache Software Foundation (ASF) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for additional information regarding
* copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License. You may obtain a
* copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
package org.apache.geode.security;
import static org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER;
import static org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_PORT;
import static org.apache.geode.distributed.ConfigurationProperties.JMX_MANAGER_START;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_MANAGER;
import static org.apache.geode.distributed.ConfigurationProperties.SECURITY_POST_PROCESSOR;
import static org.assertj.core.api.Java6Assertions.assertThatThrownBy;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertTrue;
import org.apache.geode.GemFireConfigException;
import org.apache.geode.distributed.DistributedSystem;
import org.apache.geode.internal.i18n.LocalizedStrings;
import org.apache.geode.test.dunit.IgnoredException;
import org.apache.geode.test.dunit.internal.JUnit4DistributedTestCase;
import org.apache.geode.test.dunit.rules.LocatorServerStartupRule;
import org.apache.geode.test.dunit.rules.ServerStarterRule;
import org.apache.geode.test.junit.categories.DistributedTest;
import org.apache.geode.test.junit.categories.FlakyTest;
import org.apache.geode.test.junit.categories.SecurityTest;
import org.junit.Before;
import org.junit.Ignore;
import org.junit.Rule;
import org.junit.Test;
import org.junit.experimental.categories.Category;
import java.util.Properties;
@Category({DistributedTest.class, SecurityTest.class})
public class SecurityClusterConfigDUnitTest extends JUnit4DistributedTestCase {
@Rule
public LocatorServerStartupRule lsRule = new LocatorServerStartupRule();
@Before
public void before() throws Exception {
IgnoredException
.addIgnoredException(LocalizedStrings.GEMFIRE_CACHE_SECURITY_MISCONFIGURATION.toString());
IgnoredException
.addIgnoredException(LocalizedStrings.GEMFIRE_CACHE_SECURITY_MISCONFIGURATION_2.toString());
Properties props = new Properties();
props.setProperty(SECURITY_MANAGER, SimpleTestSecurityManager.class.getName());
props.setProperty(JMX_MANAGER, "false");
props.setProperty(JMX_MANAGER_START, "false");
props.setProperty(JMX_MANAGER_PORT, 0 + "");
props.setProperty(SECURITY_POST_PROCESSOR, PDXPostProcessor.class.getName());
lsRule.startLocatorVM(0, props);
}
@Category(FlakyTest.class) // GEODE-1977
@Test
public void testStartServerWithClusterConfig() throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty("use-cluster-configuration", "true");
// initial security properties should only contain initial set of values
ServerStarterRule serverStarter = new ServerStarterRule(props);
serverStarter.startServer(lsRule.getMember(0).getPort());
DistributedSystem ds = serverStarter.cache.getDistributedSystem();
// after cache is created, we got the security props passed in by cluster config
Properties secProps = ds.getSecurityProperties();
assertEquals(4, secProps.size());
assertTrue(secProps.containsKey("security-manager"));
assertTrue(secProps.containsKey("security-post-processor"));
}
@Test
public void testStartServerWithSameSecurityManager() throws Exception {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty("use-cluster-configuration", "true");
props.setProperty(SECURITY_MANAGER, SimpleTestSecurityManager.class.getName());
// initial security properties should only contain initial set of values
ServerStarterRule serverStarter = new ServerStarterRule(props);
serverStarter.startServer(lsRule.getMember(0).getPort());
DistributedSystem ds = serverStarter.cache.getDistributedSystem();
// after cache is created, we got the security props passed in by cluster config
Properties secProps = ds.getSecurityProperties();
assertTrue(secProps.containsKey("security-manager"));
assertTrue(secProps.containsKey("security-post-processor"));
}
@Category(FlakyTest.class) // GEODE-1975
@Test
public void serverWithDifferentSecurityManagerShouldThrowException() {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty("security-manager", "mySecurityManager");
props.setProperty("use-cluster-configuration", "true");
// initial security properties should only contain initial set of values
ServerStarterRule serverStarter = new ServerStarterRule(props);
assertThatThrownBy(() -> serverStarter.startServer(lsRule.getMember(0).getPort()))
.isInstanceOf(GemFireConfigException.class)
.hasMessage(LocalizedStrings.GEMFIRE_CACHE_SECURITY_MISCONFIGURATION.toLocalizedString());
}
@Test
public void serverWithDifferentPostProcessorShouldThrowException() {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty(SECURITY_POST_PROCESSOR, "this-is-not-ok");
props.setProperty("use-cluster-configuration", "true");
// initial security properties should only contain initial set of values
ServerStarterRule serverStarter = new ServerStarterRule(props);
assertThatThrownBy(() -> serverStarter.startServer(lsRule.getMember(0).getPort()))
.isInstanceOf(GemFireConfigException.class)
.hasMessage(LocalizedStrings.GEMFIRE_CACHE_SECURITY_MISCONFIGURATION.toLocalizedString());
}
@Category(FlakyTest.class) // GEODE-1974
@Test
public void serverConnectingToSecuredLocatorMustUseClusterConfig() {
Properties props = new Properties();
// the following are needed for peer-to-peer authentication
props.setProperty("security-username", "cluster");
props.setProperty("security-password", "cluster");
props.setProperty("security-manager", "mySecurityManager");
props.setProperty("use-cluster-configuration", "false");
ServerStarterRule serverStarter = new ServerStarterRule(props);
assertThatThrownBy(() -> serverStarter.startServer(lsRule.getMember(0).getPort()))
.isInstanceOf(GemFireConfigException.class)
.hasMessage(LocalizedStrings.GEMFIRE_CACHE_SECURITY_MISCONFIGURATION_2.toLocalizedString());
}
}