|
@@ -43,12 +43,11 @@ import org.apache.hadoop.fs.FileSystemTestHelper;
|
|
|
import org.apache.hadoop.fs.Path;
|
|
|
import org.apache.hadoop.security.UserGroupInformation;
|
|
|
import org.apache.hadoop.security.authorize.ProxyUsers;
|
|
|
-import org.junit.Assert;
|
|
|
-import static org.junit.Assert.assertEquals;
|
|
|
-import static org.junit.Assert.assertFalse;
|
|
|
-import static org.junit.Assert.assertTrue;
|
|
|
-import org.junit.BeforeClass;
|
|
|
-import org.junit.Test;
|
|
|
+import static org.junit.jupiter.api.Assertions.assertEquals;
|
|
|
+import static org.junit.jupiter.api.Assertions.assertFalse;
|
|
|
+import static org.junit.jupiter.api.Assertions.assertTrue;
|
|
|
+import org.junit.jupiter.api.BeforeAll;
|
|
|
+import org.junit.jupiter.api.Test;
|
|
|
|
|
|
/**
|
|
|
* This class tests the ACLs system through the full code path. It overlaps
|
|
@@ -89,7 +88,7 @@ public class TestAclsEndToEnd {
|
|
|
private MiniDFSCluster cluster;
|
|
|
private DistributedFileSystem fs;
|
|
|
|
|
|
- @BeforeClass
|
|
|
+ @BeforeAll
|
|
|
public static void captureUser() throws IOException {
|
|
|
realUgi = UserGroupInformation.getCurrentUser();
|
|
|
realUser = System.getProperty("user.name");
|
|
@@ -174,7 +173,7 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
kmsDir = new File(fsHelper.getTestRootDir()).getAbsoluteFile();
|
|
|
|
|
|
- Assert.assertTrue(kmsDir.mkdirs());
|
|
|
+ assertTrue(kmsDir.mkdirs());
|
|
|
}
|
|
|
|
|
|
writeConf(kmsDir, conf);
|
|
@@ -412,14 +411,14 @@ public class TestAclsEndToEnd {
|
|
|
setup(conf);
|
|
|
|
|
|
// Create a test key
|
|
|
- assertTrue("Exception during creation of key " + KEY1 + " by "
|
|
|
- + keyadminUgi.getUserName(), createKey(keyadminUgi, KEY1, conf));
|
|
|
+ assertTrue(createKey(keyadminUgi, KEY1, conf),
|
|
|
+ "Exception during creation of key " + KEY1 + " by " + keyadminUgi.getUserName());
|
|
|
|
|
|
// Fail to create a test key
|
|
|
- assertFalse("Allowed creation of key " + KEY2 + " by "
|
|
|
- + hdfsUgi.getUserName(), createKey(hdfsUgi, KEY2, conf));
|
|
|
- assertFalse("Allowed creation of key " + KEY2 + " by "
|
|
|
- + userUgi.getUserName(), createKey(userUgi, KEY2, conf));
|
|
|
+ assertFalse(createKey(hdfsUgi, KEY2, conf),
|
|
|
+ "Allowed creation of key " + KEY2 + " by " + hdfsUgi.getUserName());
|
|
|
+ assertFalse(createKey(userUgi, KEY2, conf),
|
|
|
+ "Allowed creation of key " + KEY2 + " by " + userUgi.getUserName());
|
|
|
|
|
|
// Create a directory and chown it to the normal user.
|
|
|
fs.mkdirs(ZONE1);
|
|
@@ -427,50 +426,57 @@ public class TestAclsEndToEnd {
|
|
|
userUgi.getPrimaryGroupName());
|
|
|
|
|
|
// Create an EZ
|
|
|
- assertTrue("Exception during creation of EZ " + ZONE1 + " by "
|
|
|
- + hdfsUgi.getUserName() + " using key " + KEY1,
|
|
|
- createEncryptionZone(hdfsUgi, KEY1, ZONE1));
|
|
|
+ assertTrue(createEncryptionZone(hdfsUgi, KEY1, ZONE1),
|
|
|
+ "Exception during creation of EZ " + ZONE1 + " by "
|
|
|
+ + hdfsUgi.getUserName() + " using key " + KEY1);
|
|
|
|
|
|
// Fail to create an EZ
|
|
|
- assertFalse("Allowed creation of EZ " + ZONE2 + " by "
|
|
|
- + keyadminUgi.getUserName() + " using key " + KEY1,
|
|
|
- createEncryptionZone(keyadminUgi, KEY1, ZONE2));
|
|
|
- assertFalse("Allowed creation of EZ " + ZONE2 + " by "
|
|
|
- + userUgi.getUserName() + " using key " + KEY1,
|
|
|
- createEncryptionZone(userUgi, KEY1, ZONE2));
|
|
|
+ assertFalse(createEncryptionZone(keyadminUgi, KEY1, ZONE2),
|
|
|
+ "Allowed creation of EZ " + ZONE2 + " by "
|
|
|
+ + keyadminUgi.getUserName() + " using key " + KEY1);
|
|
|
+ assertFalse(createEncryptionZone(userUgi, KEY1, ZONE2),
|
|
|
+ "Allowed creation of EZ " + ZONE2 + " by "
|
|
|
+ + userUgi.getUserName() + " using key " + KEY1);
|
|
|
|
|
|
// Create a file in the zone
|
|
|
- assertTrue("Exception during creation of file " + FILE1 + " by "
|
|
|
- + userUgi.getUserName(), createFile(userUgi, FILE1, TEXT));
|
|
|
+ assertTrue(createFile(userUgi, FILE1, TEXT),
|
|
|
+ "Exception during creation of file " + FILE1 + " by "
|
|
|
+ + userUgi.getUserName());
|
|
|
|
|
|
// Fail to create a file in the zone
|
|
|
- assertFalse("Allowed creation of file " + FILE1A + " by "
|
|
|
- + hdfsUgi.getUserName(), createFile(hdfsUgi, FILE1A, TEXT));
|
|
|
- assertFalse("Allowed creation of file " + FILE1A + " by "
|
|
|
- + keyadminUgi.getUserName(), createFile(keyadminUgi, FILE1A, TEXT));
|
|
|
+ assertFalse(createFile(hdfsUgi, FILE1A, TEXT),
|
|
|
+ "Allowed creation of file " + FILE1A + " by "
|
|
|
+ + hdfsUgi.getUserName());
|
|
|
+ assertFalse(createFile(keyadminUgi, FILE1A, TEXT),
|
|
|
+ "Allowed creation of file " + FILE1A + " by "
|
|
|
+ + keyadminUgi.getUserName());
|
|
|
|
|
|
// Read a file in the zone
|
|
|
- assertTrue("Exception while reading file " + FILE1 + " by "
|
|
|
- + userUgi.getUserName(), compareFile(userUgi, FILE1, TEXT));
|
|
|
+ assertTrue(compareFile(userUgi, FILE1, TEXT),
|
|
|
+ "Exception while reading file " + FILE1 + " by "
|
|
|
+ + userUgi.getUserName());
|
|
|
|
|
|
// Fail to read a file in the zone
|
|
|
- assertFalse("Allowed reading of file " + FILE1 + " by "
|
|
|
- + hdfsUgi.getUserName(), compareFile(hdfsUgi, FILE1, TEXT));
|
|
|
- assertFalse("Allowed reading of file " + FILE1 + " by "
|
|
|
- + keyadminUgi.getUserName(), compareFile(keyadminUgi, FILE1, TEXT));
|
|
|
+ assertFalse(compareFile(hdfsUgi, FILE1, TEXT),
|
|
|
+ "Allowed reading of file " + FILE1 + " by "
|
|
|
+ + hdfsUgi.getUserName());
|
|
|
+ assertFalse(compareFile(keyadminUgi, FILE1, TEXT),
|
|
|
+ "Allowed reading of file " + FILE1 + " by "
|
|
|
+ + keyadminUgi.getUserName());
|
|
|
|
|
|
// Remove the zone
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
|
// Fail to remove the key
|
|
|
- assertFalse("Allowed deletion of file " + FILE1 + " by "
|
|
|
- + hdfsUgi.getUserName(), deleteKey(hdfsUgi, KEY1));
|
|
|
- assertFalse("Allowed deletion of file " + FILE1 + " by "
|
|
|
- + userUgi.getUserName(), deleteKey(userUgi, KEY1));
|
|
|
+ assertFalse(deleteKey(hdfsUgi, KEY1), "Allowed deletion of file " + FILE1 + " by "
|
|
|
+ + hdfsUgi.getUserName());
|
|
|
+ assertFalse(deleteKey(userUgi, KEY1), "Allowed deletion of file " + FILE1 + " by "
|
|
|
+ + userUgi.getUserName());
|
|
|
|
|
|
// Remove
|
|
|
- assertTrue("Exception during deletion of file " + FILE1 + " by "
|
|
|
- + keyadminUgi.getUserName(), deleteKey(keyadminUgi, KEY1));
|
|
|
+ assertTrue(deleteKey(keyadminUgi, KEY1),
|
|
|
+ "Exception during deletion of file " + FILE1 + " by "
|
|
|
+ + keyadminUgi.getUserName());
|
|
|
} finally {
|
|
|
fs.delete(ZONE1, true);
|
|
|
fs.delete(ZONE2, true);
|
|
@@ -495,8 +501,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation with correct config"
|
|
|
- + " using whitelist key ACLs", createKey(realUgi, KEY1, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY1, conf),
|
|
|
+ "Exception during key creation with correct config using whitelist key ACLs");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -512,8 +518,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation with correct config"
|
|
|
- + " using default key ACLs", createKey(realUgi, KEY2, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY2, conf),
|
|
|
+ "Exception during key creation with correct config using default key ACLs");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -531,8 +537,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertFalse("Allowed key creation with blacklist for CREATE",
|
|
|
- createKey(realUgi, KEY3, conf));
|
|
|
+ assertFalse(createKey(realUgi, KEY3, conf),
|
|
|
+ "Allowed key creation with blacklist for CREATE");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -547,8 +553,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertFalse("Allowed key creation without CREATE KMS ACL",
|
|
|
- createKey(realUgi, KEY3, conf));
|
|
|
+ assertFalse(createKey(realUgi, KEY3, conf),
|
|
|
+ "Allowed key creation without CREATE KMS ACL");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -562,8 +568,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertFalse("Allowed key creation without MANAGMENT key ACL",
|
|
|
- createKey(realUgi, KEY3, conf));
|
|
|
+ assertFalse(createKey(realUgi, KEY3, conf),
|
|
|
+ "Allowed key creation without MANAGMENT key ACL");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -581,8 +587,9 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertFalse("Allowed key creation when default key ACL should have been"
|
|
|
- + " overridden by key ACL", createKey(realUgi, KEY3, conf));
|
|
|
+ assertFalse(createKey(realUgi, KEY3, conf),
|
|
|
+ "Allowed key creation when default key ACL should have been"
|
|
|
+ + " overridden by key ACL");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -596,8 +603,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation with default KMS ACLs",
|
|
|
- createKey(realUgi, KEY3, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY3, conf),
|
|
|
+ "Exception during key creation with default KMS ACLs");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -620,8 +627,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation",
|
|
|
- createKey(realUgi, KEY1, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY1, conf),
|
|
|
+ "Exception during key creation");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -647,8 +654,9 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE1);
|
|
|
|
|
|
- assertTrue("Exception during zone creation with correct config using"
|
|
|
- + " whitelist key ACLs", createEncryptionZone(realUgi, KEY1, ZONE1));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE1),
|
|
|
+ "Exception during zone creation with correct config using"
|
|
|
+ + " whitelist key ACLs");
|
|
|
} finally {
|
|
|
fs.delete(ZONE1, true);
|
|
|
teardown();
|
|
@@ -671,8 +679,9 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE2);
|
|
|
|
|
|
- assertTrue("Exception during zone creation with correct config using"
|
|
|
- + " default key ACLs", createEncryptionZone(realUgi, KEY1, ZONE2));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE2),
|
|
|
+ "Exception during zone creation with correct config using"
|
|
|
+ + " default key ACLs");
|
|
|
} finally {
|
|
|
fs.delete(ZONE2, true);
|
|
|
teardown();
|
|
@@ -697,9 +706,9 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE3);
|
|
|
|
|
|
- assertFalse("Allowed creation of zone when default key ACLs should have"
|
|
|
- + " been overridden by key ACL",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE3));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE3),
|
|
|
+ "Allowed creation of zone when default key ACLs should have"
|
|
|
+ + " been overridden by key ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE3, true);
|
|
|
teardown();
|
|
@@ -724,8 +733,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE3);
|
|
|
|
|
|
- assertFalse("Allowed zone creation of zone with blacklisted GET_METADATA",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE3));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE3),
|
|
|
+ "Allowed zone creation of zone with blacklisted GET_METADATA");
|
|
|
} finally {
|
|
|
fs.delete(ZONE3, true);
|
|
|
teardown();
|
|
@@ -750,8 +759,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE3);
|
|
|
|
|
|
- assertFalse("Allowed zone creation of zone with blacklisted GENERATE_EEK",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE3));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE3),
|
|
|
+ "Allowed zone creation of zone with blacklisted GENERATE_EEK");
|
|
|
} finally {
|
|
|
fs.delete(ZONE3, true);
|
|
|
teardown();
|
|
@@ -771,8 +780,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE3);
|
|
|
|
|
|
- assertTrue("Exception during zone creation with default KMS ACLs",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE3));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE3),
|
|
|
+ "Exception during zone creation with default KMS ACLs");
|
|
|
} finally {
|
|
|
fs.delete(ZONE3, true);
|
|
|
teardown();
|
|
@@ -794,8 +803,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE4);
|
|
|
|
|
|
- assertFalse("Allowed zone creation without GET_METADATA KMS ACL",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE4));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE4),
|
|
|
+ "Allowed zone creation without GET_METADATA KMS ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE4, true);
|
|
|
teardown();
|
|
@@ -817,8 +826,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE4);
|
|
|
|
|
|
- assertFalse("Allowed zone creation without GENERATE_EEK KMS ACL",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE4));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE4),
|
|
|
+ "Allowed zone creation without GENERATE_EEK KMS ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE4, true);
|
|
|
teardown();
|
|
@@ -839,8 +848,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE4);
|
|
|
|
|
|
- assertFalse("Allowed zone creation without READ ACL",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE4));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE4),
|
|
|
+ "Allowed zone creation without READ ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE4, true);
|
|
|
teardown();
|
|
@@ -861,8 +870,8 @@ public class TestAclsEndToEnd {
|
|
|
|
|
|
fs.mkdirs(ZONE4);
|
|
|
|
|
|
- assertFalse("Allowed zone creation without GENERATE_EEK ACL",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE4));
|
|
|
+ assertFalse(createEncryptionZone(realUgi, KEY1, ZONE4),
|
|
|
+ "Allowed zone creation without GENERATE_EEK ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE4, true);
|
|
|
teardown();
|
|
@@ -896,20 +905,20 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation",
|
|
|
- createKey(realUgi, KEY1, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY1, conf),
|
|
|
+ "Exception during key creation");
|
|
|
fs.mkdirs(ZONE1);
|
|
|
- assertTrue("Exception during zone creation",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE1));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE1),
|
|
|
+ "Exception during zone creation");
|
|
|
fs.mkdirs(ZONE2);
|
|
|
- assertTrue("Exception during zone creation",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE2));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE2),
|
|
|
+ "Exception during zone creation");
|
|
|
fs.mkdirs(ZONE3);
|
|
|
- assertTrue("Exception during zone creation",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE3));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE3),
|
|
|
+ "Exception during zone creation");
|
|
|
fs.mkdirs(ZONE4);
|
|
|
- assertTrue("Exception during zone creation",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE4));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE4),
|
|
|
+ "Exception during zone creation");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
fs.delete(ZONE2, true);
|
|
@@ -941,8 +950,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertTrue("Exception during file creation with correct config"
|
|
|
- + " using whitelist ACL", createFile(realUgi, FILE1, TEXT));
|
|
|
+ assertTrue(createFile(realUgi, FILE1, TEXT),
|
|
|
+ "Exception during file creation with correct config" + " using whitelist ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE1, true);
|
|
|
teardown();
|
|
@@ -963,8 +972,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertTrue("Exception during file creation with correct config"
|
|
|
- + " using whitelist ACL", createFile(realUgi, FILE2, TEXT));
|
|
|
+ assertTrue(createFile(realUgi, FILE2, TEXT),
|
|
|
+ "Exception during file creation with correct config using whitelist ACL");
|
|
|
} finally {
|
|
|
fs.delete(ZONE2, true);
|
|
|
teardown();
|
|
@@ -987,8 +996,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation when default key ACLs should have been"
|
|
|
- + " overridden by key ACL", createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Allowed file creation when default key ACLs should have been overridden by key ACL");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1014,8 +1023,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation with blacklist for GENERATE_EEK",
|
|
|
- createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Allowed file creation with blacklist for GENERATE_EEK");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1041,8 +1050,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation with blacklist for DECRYPT_EEK",
|
|
|
- createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Allowed file creation with blacklist for DECRYPT_EEK");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1062,8 +1071,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertTrue("Exception during file creation with default KMS ACLs",
|
|
|
- createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertTrue(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Exception during file creation with default KMS ACLs");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1086,8 +1095,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation without GENERATE_EEK KMS ACL",
|
|
|
- createFile(realUgi, FILE4, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE4, TEXT),
|
|
|
+ "Allowed file creation without GENERATE_EEK KMS ACL");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1110,8 +1119,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation without DECRYPT_EEK KMS ACL",
|
|
|
- createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Allowed file creation without DECRYPT_EEK KMS ACL");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1133,8 +1142,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation without GENERATE_EEK key ACL",
|
|
|
- createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Allowed file creation without GENERATE_EEK key ACL");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1156,8 +1165,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file creation without DECRYPT_EEK key ACL",
|
|
|
- createFile(realUgi, FILE3, TEXT));
|
|
|
+ assertFalse(createFile(realUgi, FILE3, TEXT),
|
|
|
+ "Allowed file creation without DECRYPT_EEK key ACL");
|
|
|
} catch (Exception ex) {
|
|
|
fs.delete(ZONE3, true);
|
|
|
|
|
@@ -1198,13 +1207,13 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation",
|
|
|
- createKey(realUgi, KEY1, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY1, conf),
|
|
|
+ "Exception during key creation");
|
|
|
fs.mkdirs(ZONE1);
|
|
|
- assertTrue("Exception during zone creation",
|
|
|
- createEncryptionZone(realUgi, KEY1, ZONE1));
|
|
|
- assertTrue("Exception during file creation",
|
|
|
- createFile(realUgi, FILE1, TEXT));
|
|
|
+ assertTrue(createEncryptionZone(realUgi, KEY1, ZONE1),
|
|
|
+ "Exception during zone creation");
|
|
|
+ assertTrue(createFile(realUgi, FILE1, TEXT),
|
|
|
+ "Exception during file creation");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1229,8 +1238,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertTrue("Exception while reading file with correct config with"
|
|
|
- + " whitelist ACLs", compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertTrue(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Exception while reading file with correct config with whitelist ACLs");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1250,8 +1259,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertTrue("Exception while reading file with correct config"
|
|
|
- + " with default ACLs", compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertTrue(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Exception while reading file with correct config with default ACLs");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1273,8 +1282,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file read when default key ACLs should have been"
|
|
|
- + " overridden by key ACL", compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertFalse(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Allowed file read when default key ACLs should have been overridden by key ACL");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1296,8 +1305,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file read with blacklist for DECRYPT_EEK",
|
|
|
- compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertFalse(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Allowed file read with blacklist for DECRYPT_EEK");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1315,8 +1324,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertTrue("Exception while reading file with default KMS ACLs",
|
|
|
- compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertTrue(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Exception while reading file with default KMS ACLs");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1335,8 +1344,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file read without DECRYPT_EEK KMS ACL",
|
|
|
- compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertFalse(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Allowed file read without DECRYPT_EEK KMS ACL");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1351,8 +1360,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false, false);
|
|
|
|
|
|
- assertFalse("Allowed file read without DECRYPT_EEK key ACL",
|
|
|
- compareFile(realUgi, FILE1, TEXT));
|
|
|
+ assertFalse(compareFile(realUgi, FILE1, TEXT),
|
|
|
+ "Allowed file read without DECRYPT_EEK key ACL");
|
|
|
} catch (Throwable ex) {
|
|
|
fs.delete(ZONE1, true);
|
|
|
|
|
@@ -1379,12 +1388,12 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf);
|
|
|
|
|
|
- assertTrue("Exception during key creation",
|
|
|
- createKey(realUgi, KEY1, conf));
|
|
|
- assertTrue("Exception during key creation",
|
|
|
- createKey(realUgi, KEY2, conf));
|
|
|
- assertTrue("Exception during key creation",
|
|
|
- createKey(realUgi, KEY3, conf));
|
|
|
+ assertTrue(createKey(realUgi, KEY1, conf),
|
|
|
+ "Exception during key creation");
|
|
|
+ assertTrue(createKey(realUgi, KEY2, conf),
|
|
|
+ "Exception during key creation");
|
|
|
+ assertTrue(createKey(realUgi, KEY3, conf),
|
|
|
+ "Exception during key creation");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1405,8 +1414,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertTrue("Exception during key deletion with correct config"
|
|
|
- + " using whitelist key ACLs", deleteKey(realUgi, KEY1));
|
|
|
+ assertTrue(deleteKey(realUgi, KEY1), "Exception during key deletion with correct config"
|
|
|
+ + " using whitelist key ACLs");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1422,8 +1431,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertTrue("Exception during key deletion with correct config"
|
|
|
- + " using default key ACLs", deleteKey(realUgi, KEY2));
|
|
|
+ assertTrue(deleteKey(realUgi, KEY2), "Exception during key deletion with correct config"
|
|
|
+ + " using default key ACLs");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1441,8 +1450,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertFalse("Allowed key deletion with blacklist for DELETE",
|
|
|
- deleteKey(realUgi, KEY3));
|
|
|
+ assertFalse(deleteKey(realUgi, KEY3),
|
|
|
+ "Allowed key deletion with blacklist for DELETE");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1457,8 +1466,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertFalse("Allowed key deletion without DELETE KMS ACL",
|
|
|
- deleteKey(realUgi, KEY3));
|
|
|
+ assertFalse(deleteKey(realUgi, KEY3),
|
|
|
+ "Allowed key deletion without DELETE KMS ACL");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1473,8 +1482,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertFalse("Allowed key deletion without MANAGMENT key ACL",
|
|
|
- deleteKey(realUgi, KEY3));
|
|
|
+ assertFalse(deleteKey(realUgi, KEY3),
|
|
|
+ "Allowed key deletion without MANAGMENT key ACL");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1492,8 +1501,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertFalse("Allowed key deletion when default key ACL should have been"
|
|
|
- + " overridden by key ACL", deleteKey(realUgi, KEY3));
|
|
|
+ assertFalse(deleteKey(realUgi, KEY3),
|
|
|
+ "Allowed key deletion when default key ACL should have been overridden by key ACL");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1507,8 +1516,8 @@ public class TestAclsEndToEnd {
|
|
|
try {
|
|
|
setup(conf, false);
|
|
|
|
|
|
- assertTrue("Exception during key deletion with default KMS ACLs",
|
|
|
- deleteKey(realUgi, KEY3));
|
|
|
+ assertTrue(deleteKey(realUgi, KEY3),
|
|
|
+ "Exception during key deletion with default KMS ACLs");
|
|
|
} finally {
|
|
|
teardown();
|
|
|
}
|
|
@@ -1596,8 +1605,8 @@ public class TestAclsEndToEnd {
|
|
|
FSDataInputStream din = cluster.getFileSystem().open(file);
|
|
|
BufferedReader in = new BufferedReader(new InputStreamReader(din));
|
|
|
|
|
|
- assertEquals("The text read does not match the text written",
|
|
|
- text, in.readLine());
|
|
|
+ assertEquals(text, in.readLine(),
|
|
|
+ "The text read does not match the text written");
|
|
|
}
|
|
|
});
|
|
|
}
|