24
24
import org .apache .hadoop .conf .Configuration ;
25
25
import org .apache .hadoop .security .UserGroupInformation ;
26
26
import org .apache .hadoop .security .authorize .AccessControlList ;
27
- import org .junit .Assert ;
28
- import org .junit .Rule ;
29
- import org .junit .rules .Timeout ;
30
- import org .junit .Test ;
27
+ import org .junit .jupiter .api .Assertions ;
28
+ import org .junit .jupiter .api .Test ;
29
+ import org .junit .jupiter .api .Timeout ;
31
30
32
31
import java .util .Collection ;
33
32
import java .util .HashMap ;
34
33
import java .util .HashSet ;
35
34
35
+ @ Timeout (180 )
36
36
public class TestKMSACLs {
37
- @ Rule
38
- public final Timeout globalTimeout = new Timeout (180000 );
39
-
40
37
@ Test
41
38
public void testDefaults () {
42
39
final KMSACLs acls = new KMSACLs (new Configuration (false ));
43
40
for (KMSACLs .Type type : KMSACLs .Type .values ()) {
44
- Assert .assertTrue (acls .hasAccess (type ,
41
+ Assertions .assertTrue (acls .hasAccess (type ,
45
42
UserGroupInformation .createRemoteUser ("foo" )));
46
43
}
47
44
}
@@ -54,9 +51,9 @@ public void testCustom() {
54
51
}
55
52
final KMSACLs acls = new KMSACLs (conf );
56
53
for (KMSACLs .Type type : KMSACLs .Type .values ()) {
57
- Assert .assertTrue (acls .hasAccess (type ,
54
+ Assertions .assertTrue (acls .hasAccess (type ,
58
55
UserGroupInformation .createRemoteUser (type .toString ())));
59
- Assert .assertFalse (acls .hasAccess (type ,
56
+ Assertions .assertFalse (acls .hasAccess (type ,
60
57
UserGroupInformation .createRemoteUser ("foo" )));
61
58
}
62
59
}
@@ -72,16 +69,16 @@ public void testKeyAclConfigurationLoad() {
72
69
conf .set (DEFAULT_KEY_ACL_PREFIX + "ALL" , "invalid" );
73
70
conf .set (WHITELIST_KEY_ACL_PREFIX + "ALL" , "invalid" );
74
71
final KMSACLs acls = new KMSACLs (conf );
75
- Assert .assertTrue ("expected key ACL size is 2 but got "
76
- + acls .keyAcls .size (), acls . keyAcls . size () == 2 );
77
- Assert .assertTrue ("expected whitelist ACL size is 1 but got "
78
- + acls .whitelistKeyAcls .size (), acls . whitelistKeyAcls . size () == 1 );
79
- Assert .assertFalse ("ALL should not be allowed for whitelist ACLs." ,
80
- acls .whitelistKeyAcls .containsKey (KeyOpType .ALL ));
81
- Assert .assertTrue ("expected default ACL size is 1 but got "
82
- + acls .defaultKeyAcls .size (), acls . defaultKeyAcls . size () == 1 );
83
- Assert .assertTrue ("ALL should not be allowed for default ACLs." ,
84
- acls .defaultKeyAcls .size () == 1 );
72
+ Assertions .assertTrue (acls . keyAcls . size () == 2 , "expected key ACL size is 2 but got "
73
+ + acls .keyAcls .size ());
74
+ Assertions .assertTrue (acls . whitelistKeyAcls . size () == 1 , "expected whitelist ACL size is 1 but got "
75
+ + acls .whitelistKeyAcls .size ());
76
+ Assertions .assertFalse (
77
+ acls .whitelistKeyAcls .containsKey (KeyOpType .ALL ), "ALL should not be allowed for whitelist ACLs." );
78
+ Assertions .assertTrue (acls . defaultKeyAcls . size () == 1 , "expected default ACL size is 1 but got "
79
+ + acls .defaultKeyAcls .size ());
80
+ Assertions .assertTrue (
81
+ acls .defaultKeyAcls .size () == 1 , "ALL should not be allowed for default ACLs." );
85
82
}
86
83
87
84
@ Test
@@ -98,15 +95,15 @@ public void testKeyAclDuplicateEntries() {
98
95
conf .set (WHITELIST_KEY_ACL_PREFIX + "DECRYPT_EEK" , "whitelist1" );
99
96
conf .set (WHITELIST_KEY_ACL_PREFIX + "DECRYPT_EEK" , "*" );
100
97
final KMSACLs acls = new KMSACLs (conf );
101
- Assert .assertTrue ("expected key ACL size is 2 but got "
102
- + acls .keyAcls .size (), acls . keyAcls . size () == 2 );
98
+ Assertions .assertTrue (acls . keyAcls . size () == 2 , "expected key ACL size is 2 but got "
99
+ + acls .keyAcls .size ());
103
100
assertKeyAcl ("test_key_1" , acls , KeyOpType .DECRYPT_EEK , "decrypt2" );
104
101
assertKeyAcl ("test_key_2" , acls , KeyOpType .ALL , "all1" , "all3" );
105
102
assertDefaultKeyAcl (acls , KeyOpType .MANAGEMENT );
106
103
assertDefaultKeyAcl (acls , KeyOpType .DECRYPT_EEK );
107
104
AccessControlList acl = acls .whitelistKeyAcls .get (KeyOpType .DECRYPT_EEK );
108
- Assert .assertNotNull (acl );
109
- Assert .assertTrue (acl .isAllAllowed ());
105
+ Assertions .assertNotNull (acl );
106
+ Assertions .assertTrue (acl .isAllAllowed ());
110
107
}
111
108
112
109
@ Test
@@ -163,8 +160,8 @@ public void testKeyAclReload() {
163
160
conf .set (DEFAULT_KEY_ACL_PREFIX + "DECRYPT_EEK" , "*" );
164
161
acls .setKeyACLs (conf );
165
162
AccessControlList acl = acls .defaultKeyAcls .get (KeyOpType .DECRYPT_EEK );
166
- Assert .assertTrue (acl .isAllAllowed ());
167
- Assert .assertTrue (acl .getUsers ().isEmpty ());
163
+ Assertions .assertTrue (acl .isAllAllowed ());
164
+ Assertions .assertTrue (acl .getUsers ().isEmpty ());
168
165
// everything else should still be the same.
169
166
assertDefaultKeyAcl (acls , KeyOpType .READ , "read2" );
170
167
assertDefaultKeyAcl (acls , KeyOpType .MANAGEMENT , "mgmt1" , "mgmt2" );
@@ -181,10 +178,10 @@ public void testKeyAclReload() {
181
178
conf .set (DEFAULT_KEY_ACL_PREFIX + "DECRYPT_EEK" , "new" );
182
179
acls .setKeyACLs (conf );
183
180
assertDefaultKeyAcl (acls , KeyOpType .DECRYPT_EEK , "new" );
184
- Assert .assertTrue (acls .keyAcls .isEmpty ());
185
- Assert .assertTrue (acls .whitelistKeyAcls .isEmpty ());
186
- Assert .assertEquals ("Got unexpected sized acls:"
187
- + acls .defaultKeyAcls , 1 , acls . defaultKeyAcls . size () );
181
+ Assertions .assertTrue (acls .keyAcls .isEmpty ());
182
+ Assertions .assertTrue (acls .whitelistKeyAcls .isEmpty ());
183
+ Assertions .assertEquals (1 , acls . defaultKeyAcls . size (), "Got unexpected sized acls:"
184
+ + acls .defaultKeyAcls );
188
185
}
189
186
190
187
private void assertDefaultKeyAcl (final KMSACLs acls , final KeyOpType op ,
@@ -201,23 +198,23 @@ private void assertWhitelistKeyAcl(final KMSACLs acls, final KeyOpType op,
201
198
202
199
private void assertKeyAcl (final String keyName , final KMSACLs acls ,
203
200
final KeyOpType op , final String ... names ) {
204
- Assert .assertTrue (acls .keyAcls .containsKey (keyName ));
201
+ Assertions .assertTrue (acls .keyAcls .containsKey (keyName ));
205
202
final HashMap <KeyOpType , AccessControlList > keyacl =
206
203
acls .keyAcls .get (keyName );
207
- Assert .assertNotNull (keyacl .get (op ));
204
+ Assertions .assertNotNull (keyacl .get (op ));
208
205
assertAcl (keyacl .get (op ), op , names );
209
206
}
210
207
211
208
private void assertAcl (final AccessControlList acl ,
212
209
final KeyOpType op , final String ... names ) {
213
- Assert .assertNotNull (acl );
214
- Assert .assertFalse (acl .isAllAllowed ());
210
+ Assertions .assertNotNull (acl );
211
+ Assertions .assertFalse (acl .isAllAllowed ());
215
212
final Collection <String > actual = acl .getUsers ();
216
213
final HashSet <String > expected = new HashSet <>();
217
214
for (String name : names ) {
218
215
expected .add (name );
219
216
}
220
- Assert .assertEquals ("defaultKeyAcls don't match for op:" + op ,
221
- expected , actual );
217
+ Assertions .assertEquals (
218
+ expected , actual , "defaultKeyAcls don't match for op:" + op );
222
219
}
223
220
}
0 commit comments