20
20
import static org .apache .hadoop .crypto .key .kms .server .KMSConfiguration .*;
21
21
import static org .apache .hadoop .crypto .key .kms .server .KeyAuthorizationKeyProvider .KEY_ACL ;
22
22
import static org .apache .hadoop .crypto .key .kms .server .KeyAuthorizationKeyProvider .KeyOpType ;
23
+ import static org .junit .jupiter .api .Assertions .assertEquals ;
24
+ import static org .junit .jupiter .api .Assertions .assertFalse ;
25
+ import static org .junit .jupiter .api .Assertions .assertNotNull ;
26
+ import static org .junit .jupiter .api .Assertions .assertTrue ;
23
27
24
28
import org .apache .hadoop .conf .Configuration ;
25
29
import org .apache .hadoop .security .UserGroupInformation ;
26
30
import org .apache .hadoop .security .authorize .AccessControlList ;
27
- import org .junit .Assert ;
28
- import org .junit .Rule ;
29
- import org .junit .rules .Timeout ;
30
- import org .junit .Test ;
31
+ import org .junit .jupiter .api .Test ;
32
+ import org .junit .jupiter .api .Timeout ;
31
33
32
34
import java .util .Collection ;
33
35
import java .util .HashMap ;
34
36
import java .util .HashSet ;
35
37
38
+ @ Timeout (180 )
36
39
public class TestKMSACLs {
37
- @ Rule
38
- public final Timeout globalTimeout = new Timeout (180000 );
39
-
40
40
@ Test
41
41
public void testDefaults () {
42
42
final KMSACLs acls = new KMSACLs (new Configuration (false ));
43
43
for (KMSACLs .Type type : KMSACLs .Type .values ()) {
44
- Assert . assertTrue (acls .hasAccess (type ,
44
+ assertTrue (acls .hasAccess (type ,
45
45
UserGroupInformation .createRemoteUser ("foo" )));
46
46
}
47
47
}
@@ -54,9 +54,9 @@ public void testCustom() {
54
54
}
55
55
final KMSACLs acls = new KMSACLs (conf );
56
56
for (KMSACLs .Type type : KMSACLs .Type .values ()) {
57
- Assert . assertTrue (acls .hasAccess (type ,
57
+ assertTrue (acls .hasAccess (type ,
58
58
UserGroupInformation .createRemoteUser (type .toString ())));
59
- Assert . assertFalse (acls .hasAccess (type ,
59
+ assertFalse (acls .hasAccess (type ,
60
60
UserGroupInformation .createRemoteUser ("foo" )));
61
61
}
62
62
}
@@ -72,16 +72,16 @@ public void testKeyAclConfigurationLoad() {
72
72
conf .set (DEFAULT_KEY_ACL_PREFIX + "ALL" , "invalid" );
73
73
conf .set (WHITELIST_KEY_ACL_PREFIX + "ALL" , "invalid" );
74
74
final KMSACLs acls = new KMSACLs (conf );
75
- Assert . assertTrue ("expected key ACL size is 2 but got "
76
- + acls .keyAcls .size (), acls . keyAcls . size () == 2 );
77
- Assert . assertTrue ("expected whitelist ACL size is 1 but got "
78
- + acls .whitelistKeyAcls .size (), acls . whitelistKeyAcls . size () == 1 );
79
- Assert . assertFalse ("ALL should not be allowed for whitelist ACLs." ,
80
- acls . whitelistKeyAcls . containsKey ( KeyOpType . ALL ) );
81
- Assert . assertTrue ("expected default ACL size is 1 but got "
82
- + acls .defaultKeyAcls .size (), acls . defaultKeyAcls . size () == 1 );
83
- Assert . assertTrue ("ALL should not be allowed for default ACLs." ,
84
- acls . defaultKeyAcls . size () == 1 );
75
+ assertTrue (acls . keyAcls . size () == 2 , "expected key ACL size is 2 but got "
76
+ + acls .keyAcls .size ());
77
+ assertTrue (acls . whitelistKeyAcls . size () == 1 , "expected whitelist ACL size is 1 but got "
78
+ + acls .whitelistKeyAcls .size ());
79
+ assertFalse (acls . whitelistKeyAcls . containsKey ( KeyOpType . ALL ) ,
80
+ " ALL should not be allowed for whitelist ACLs." );
81
+ assertTrue (acls . defaultKeyAcls . size () == 1 , "expected default ACL size is 1 but got "
82
+ + acls .defaultKeyAcls .size ());
83
+ assertTrue (acls . defaultKeyAcls . size () == 1 ,
84
+ "ALL should not be allowed for default ACLs." );
85
85
}
86
86
87
87
@ Test
@@ -98,15 +98,15 @@ public void testKeyAclDuplicateEntries() {
98
98
conf .set (WHITELIST_KEY_ACL_PREFIX + "DECRYPT_EEK" , "whitelist1" );
99
99
conf .set (WHITELIST_KEY_ACL_PREFIX + "DECRYPT_EEK" , "*" );
100
100
final KMSACLs acls = new KMSACLs (conf );
101
- Assert . assertTrue ("expected key ACL size is 2 but got "
102
- + acls .keyAcls .size (), acls . keyAcls . size () == 2 );
101
+ assertTrue (acls . keyAcls . size () == 2 , "expected key ACL size is 2 but got "
102
+ + acls .keyAcls .size ());
103
103
assertKeyAcl ("test_key_1" , acls , KeyOpType .DECRYPT_EEK , "decrypt2" );
104
104
assertKeyAcl ("test_key_2" , acls , KeyOpType .ALL , "all1" , "all3" );
105
105
assertDefaultKeyAcl (acls , KeyOpType .MANAGEMENT );
106
106
assertDefaultKeyAcl (acls , KeyOpType .DECRYPT_EEK );
107
107
AccessControlList acl = acls .whitelistKeyAcls .get (KeyOpType .DECRYPT_EEK );
108
- Assert . assertNotNull (acl );
109
- Assert . assertTrue (acl .isAllAllowed ());
108
+ assertNotNull (acl );
109
+ assertTrue (acl .isAllAllowed ());
110
110
}
111
111
112
112
@ Test
@@ -163,8 +163,8 @@ public void testKeyAclReload() {
163
163
conf .set (DEFAULT_KEY_ACL_PREFIX + "DECRYPT_EEK" , "*" );
164
164
acls .setKeyACLs (conf );
165
165
AccessControlList acl = acls .defaultKeyAcls .get (KeyOpType .DECRYPT_EEK );
166
- Assert . assertTrue (acl .isAllAllowed ());
167
- Assert . assertTrue (acl .getUsers ().isEmpty ());
166
+ assertTrue (acl .isAllAllowed ());
167
+ assertTrue (acl .getUsers ().isEmpty ());
168
168
// everything else should still be the same.
169
169
assertDefaultKeyAcl (acls , KeyOpType .READ , "read2" );
170
170
assertDefaultKeyAcl (acls , KeyOpType .MANAGEMENT , "mgmt1" , "mgmt2" );
@@ -181,10 +181,10 @@ public void testKeyAclReload() {
181
181
conf .set (DEFAULT_KEY_ACL_PREFIX + "DECRYPT_EEK" , "new" );
182
182
acls .setKeyACLs (conf );
183
183
assertDefaultKeyAcl (acls , KeyOpType .DECRYPT_EEK , "new" );
184
- Assert . assertTrue (acls .keyAcls .isEmpty ());
185
- Assert . assertTrue (acls .whitelistKeyAcls .isEmpty ());
186
- Assert . assertEquals ("Got unexpected sized acls:"
187
- + acls .defaultKeyAcls , 1 , acls . defaultKeyAcls . size () );
184
+ assertTrue (acls .keyAcls .isEmpty ());
185
+ assertTrue (acls .whitelistKeyAcls .isEmpty ());
186
+ assertEquals (1 , acls . defaultKeyAcls . size (), "Got unexpected sized acls:"
187
+ + acls .defaultKeyAcls );
188
188
}
189
189
190
190
private void assertDefaultKeyAcl (final KMSACLs acls , final KeyOpType op ,
@@ -201,23 +201,22 @@ private void assertWhitelistKeyAcl(final KMSACLs acls, final KeyOpType op,
201
201
202
202
private void assertKeyAcl (final String keyName , final KMSACLs acls ,
203
203
final KeyOpType op , final String ... names ) {
204
- Assert . assertTrue (acls .keyAcls .containsKey (keyName ));
204
+ assertTrue (acls .keyAcls .containsKey (keyName ));
205
205
final HashMap <KeyOpType , AccessControlList > keyacl =
206
206
acls .keyAcls .get (keyName );
207
- Assert . assertNotNull (keyacl .get (op ));
207
+ assertNotNull (keyacl .get (op ));
208
208
assertAcl (keyacl .get (op ), op , names );
209
209
}
210
210
211
211
private void assertAcl (final AccessControlList acl ,
212
212
final KeyOpType op , final String ... names ) {
213
- Assert . assertNotNull (acl );
214
- Assert . assertFalse (acl .isAllAllowed ());
213
+ assertNotNull (acl );
214
+ assertFalse (acl .isAllAllowed ());
215
215
final Collection <String > actual = acl .getUsers ();
216
216
final HashSet <String > expected = new HashSet <>();
217
217
for (String name : names ) {
218
218
expected .add (name );
219
219
}
220
- Assert .assertEquals ("defaultKeyAcls don't match for op:" + op ,
221
- expected , actual );
220
+ assertEquals (expected , actual , "defaultKeyAcls don't match for op:" + op );
222
221
}
223
222
}
0 commit comments