|
@@ -29,6 +29,7 @@ import org.junit.Rule;
|
|
|
import org.junit.Test;
|
|
|
|
|
|
import org.junit.rules.ExpectedException;
|
|
|
+import com.google.common.annotations.VisibleForTesting;
|
|
|
|
|
|
import static org.apache.hadoop.fs.azure.AzureNativeFileSystemStore.KEY_USE_SECURE_MODE;
|
|
|
|
|
@@ -38,6 +39,9 @@ import static org.apache.hadoop.fs.azure.AzureNativeFileSystemStore.KEY_USE_SECU
|
|
|
public class TestNativeAzureFileSystemAuthorization
|
|
|
extends AbstractWasbTestBase {
|
|
|
|
|
|
+ @VisibleForTesting
|
|
|
+ protected MockWasbAuthorizerImpl authorizer;
|
|
|
+
|
|
|
@Override
|
|
|
protected AzureBlobStorageTestAccount createTestAccount() throws Exception {
|
|
|
Configuration conf = new Configuration();
|
|
@@ -54,9 +58,8 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Assume.assumeTrue("Test valid when both SecureMode and Authorization are enabled .. skipping",
|
|
|
useSecureMode && useAuthorization);
|
|
|
|
|
|
- Assume.assumeTrue(
|
|
|
- useSecureMode && useAuthorization
|
|
|
- );
|
|
|
+ authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
+ authorizer.init(null);
|
|
|
}
|
|
|
|
|
|
|
|
@@ -66,12 +69,12 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
/**
|
|
|
* Setup up permissions to allow a recursive delete for cleanup purposes.
|
|
|
*/
|
|
|
- private void allowRecursiveDelete(NativeAzureFileSystem fs, MockWasbAuthorizerImpl authorizer, String path) {
|
|
|
+ protected void allowRecursiveDelete(NativeAzureFileSystem fs, String path) {
|
|
|
|
|
|
int index = path.lastIndexOf('/');
|
|
|
String parent = (index == 0) ? "/" : path.substring(0, index);
|
|
|
|
|
|
- authorizer.init(null);
|
|
|
+ authorizer.deleteAllAuthRules();
|
|
|
authorizer.addAuthRule(parent, WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule((path.endsWith("*") ? path : path+"*"), WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -80,7 +83,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
/**
|
|
|
* Setup the expected exception class, and exception message that the test is supposed to fail with
|
|
|
*/
|
|
|
- private void setExpectedFailureMessage(String operation, Path path) {
|
|
|
+ protected void setExpectedFailureMessage(String operation, Path path) {
|
|
|
expectedEx.expect(WasbAuthorizationException.class);
|
|
|
expectedEx.expectMessage(String.format("%s operation for Path : %s not allowed",
|
|
|
operation, path.makeQualified(fs.getUri(), fs.getWorkingDirectory())));
|
|
@@ -98,8 +101,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDir = new Path("/");
|
|
|
Path testPath = new Path(parentDir, "test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -126,8 +127,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDir = new Path("/testCreateAccessCheckPositive/1/2/3");
|
|
|
Path testPath = new Path(parentDir, "test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -137,7 +136,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertPathExists(fs, "testPath was not created", testPath);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, "/testCreateAccessCheckPositive");
|
|
|
+ allowRecursiveDelete(fs, "/testCreateAccessCheckPositive");
|
|
|
fs.delete(new Path("/testCreateAccessCheckPositive"), true);
|
|
|
}
|
|
|
}
|
|
@@ -156,8 +155,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("create", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -186,8 +183,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDir = new Path("/");
|
|
|
Path testPath = new Path(parentDir, "test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.WRITE.toString(), true);
|
|
@@ -219,8 +214,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("create", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), false);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
|
|
|
@@ -229,7 +222,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
}
|
|
|
finally {
|
|
|
/* Provide permissions to cleanup in case the file got created */
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -245,8 +238,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path intermediateFolders = new Path(parentDir, "1/2/3/");
|
|
|
Path testPath = new Path(intermediateFolders, "test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -256,7 +247,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
fs.listStatus(testPath);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -274,8 +265,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("liststatus", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), false);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -285,7 +274,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
fs.listStatus(testPath);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -301,8 +290,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path srcPath = new Path(parentDir, "test1.dat");
|
|
|
Path dstPath = new Path(parentDir, "test2.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true); /* to create parentDir */
|
|
|
authorizer.addAuthRule(parentDir.toString(), WasbAuthorizationOperations.WRITE.toString(), true); /* for rename */
|
|
|
authorizer.addAuthRule(srcPath.toString(), WasbAuthorizationOperations.READ.toString(), true); /* for exists */
|
|
@@ -317,7 +304,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertPathDoesNotExist(fs, "sourcePath exists after rename!", srcPath);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -335,8 +322,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("rename", srcPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true); /* to create parent dir */
|
|
|
authorizer.addAuthRule(parentDir.toString(), WasbAuthorizationOperations.WRITE.toString(), false);
|
|
|
authorizer.addAuthRule(srcPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
@@ -351,7 +336,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
} finally {
|
|
|
ContractTestUtils.assertPathExists(fs, "sourcePath does not exist after rename failure!", srcPath);
|
|
|
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -370,8 +355,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("rename", dstPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true); /* to create parent dir */
|
|
|
authorizer.addAuthRule(parentSrcDir.toString(), WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(parentDstDir.toString(), WasbAuthorizationOperations.WRITE.toString(), false);
|
|
@@ -386,7 +369,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertPathDoesNotExist(fs, "destPath does not exist", dstPath);
|
|
|
} finally {
|
|
|
ContractTestUtils.assertPathExists(fs, "sourcePath does not exist after rename !", srcPath);
|
|
|
- allowRecursiveDelete(fs, authorizer, parentSrcDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentSrcDir.toString());
|
|
|
fs.delete(parentSrcDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -403,8 +386,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDstDir = new Path("/testRenameAccessCheckPositiveDst");
|
|
|
Path dstPath = new Path(parentDstDir, "test2.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true); /* to create parent dirs */
|
|
|
authorizer.addAuthRule(parentSrcDir.toString(), WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(parentDstDir.toString(), WasbAuthorizationOperations.WRITE.toString(), true);
|
|
@@ -420,10 +401,10 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertPathDoesNotExist(fs, "sourcePath does not exist", srcPath);
|
|
|
ContractTestUtils.assertPathExists(fs, "destPath does not exist", dstPath);
|
|
|
} finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, parentSrcDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentSrcDir.toString());
|
|
|
fs.delete(parentSrcDir, true);
|
|
|
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDstDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDstDir.toString());
|
|
|
fs.delete(parentDstDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -438,8 +419,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDir = new Path("/testReadAccessCheckPositive");
|
|
|
Path testPath = new Path(parentDir, "test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -463,7 +442,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
if(inputStream != null) {
|
|
|
inputStream.close();
|
|
|
}
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -481,8 +460,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("read", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), false);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -505,7 +482,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
if (inputStream != null) {
|
|
|
inputStream.close();
|
|
|
}
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -520,8 +497,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDir = new Path("/");
|
|
|
Path testPath = new Path(parentDir, "test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -547,8 +522,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("delete", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -558,7 +531,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
|
|
|
/* Remove permissions for delete to force failure */
|
|
|
- authorizer.init(null);
|
|
|
+ authorizer.deleteAllAuthRules();
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), false);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
|
|
|
@@ -566,7 +539,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
}
|
|
|
finally {
|
|
|
/* Restore permissions to force a successful delete */
|
|
|
- authorizer.init(null);
|
|
|
+ authorizer.deleteAllAuthRules();
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -587,8 +560,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
Path parentDir = new Path("/testDeleteIntermediateFolder");
|
|
|
Path testPath = new Path(parentDir, "1/2/test.dat");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true); // for create and delete
|
|
|
authorizer.addAuthRule("/testDeleteIntermediateFolder*",
|
|
|
WasbAuthorizationOperations.WRITE.toString(), true); // for recursive delete
|
|
@@ -602,7 +573,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertPathDoesNotExist(fs, "testPath exists after deletion!", parentDir);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, parentDir.toString());
|
|
|
+ allowRecursiveDelete(fs, parentDir.toString());
|
|
|
fs.delete(parentDir, true);
|
|
|
}
|
|
|
}
|
|
@@ -616,8 +587,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
Path testPath = new Path("/");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
|
|
|
@@ -635,8 +604,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("getFileStatus", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.READ.toString(), false);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
|
|
|
@@ -652,8 +619,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
Path testPath = new Path("/testMkdirsAccessCheckPositive/1/2/3");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), true);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -663,7 +628,7 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertIsDirectory(fs, testPath);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, "/testMkdirsAccessCheckPositive");
|
|
|
+ allowRecursiveDelete(fs, "/testMkdirsAccessCheckPositive");
|
|
|
fs.delete(new Path("/testMkdirsAccessCheckPositive"), true);
|
|
|
}
|
|
|
}
|
|
@@ -679,8 +644,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
setExpectedFailureMessage("mkdirs", testPath);
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule("/", WasbAuthorizationOperations.WRITE.toString(), false);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
@@ -690,12 +653,11 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
ContractTestUtils.assertPathDoesNotExist(fs, "testPath was not created", testPath);
|
|
|
}
|
|
|
finally {
|
|
|
- allowRecursiveDelete(fs, authorizer, "/testMkdirsAccessCheckNegative");
|
|
|
+ allowRecursiveDelete(fs, "/testMkdirsAccessCheckNegative");
|
|
|
fs.delete(new Path("/testMkdirsAccessCheckNegative"), true);
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-
|
|
|
/**
|
|
|
* Positive test triple slash format (wasb:///) access check
|
|
|
* @throws Throwable
|
|
@@ -705,8 +667,6 @@ public class TestNativeAzureFileSystemAuthorization
|
|
|
|
|
|
Path testPath = new Path("/");
|
|
|
|
|
|
- MockWasbAuthorizerImpl authorizer = new MockWasbAuthorizerImpl(fs);
|
|
|
- authorizer.init(null);
|
|
|
authorizer.addAuthRule(testPath.toString(), WasbAuthorizationOperations.READ.toString(), true);
|
|
|
fs.updateWasbAuthorizer(authorizer);
|
|
|
|