authorization check for more Kafka operations
[dmaap/kafka11aaf.git] / src / test / java / org / onap / dmaap / kafkaAuthorize / KafkaCustomAuthorizerTest.java
index 3075327..ae76534 100644 (file)
  *******************************************************************************/
 package org.onap.dmaap.kafkaAuthorize;
 
+import static org.junit.Assert.assertNotNull;
 import static org.junit.Assert.assertTrue;
 
+import org.apache.kafka.common.acl.AclOperation;
 import org.apache.kafka.common.security.auth.KafkaPrincipal;
 import org.junit.Before;
 import org.junit.Test;
@@ -31,6 +33,7 @@ import org.mockito.MockitoAnnotations;
 import org.onap.dmaap.commonauth.kafka.base.authorization.AuthorizationProvider;
 import org.onap.dmaap.commonauth.kafka.base.authorization.AuthorizationProviderFactory;
 import org.powermock.api.mockito.PowerMockito;
+import org.powermock.core.classloader.annotations.PowerMockIgnore;
 import org.powermock.core.classloader.annotations.PrepareForTest;
 import org.powermock.modules.junit4.PowerMockRunner;
 
@@ -40,6 +43,7 @@ import kafka.security.auth.Resource;
 import kafka.security.auth.ResourceType;
 
 @RunWith(PowerMockRunner.class)
+@PowerMockIgnore({"javax.net.ssl.*", "javax.security.auth.*"})
 @PrepareForTest({ AuthorizationProviderFactory.class })
 public class KafkaCustomAuthorizerTest {
        @Mock
@@ -57,7 +61,11 @@ public class KafkaCustomAuthorizerTest {
        @Mock
        AuthorizationProvider provider;
 
-       KafkaCustomAuthorizer authorizer = new KafkaCustomAuthorizer();
+       KafkaCustomAuthorizer authorizer;
+       
+       static {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+       }
 
        @Before
        public void setUp() throws Exception {
@@ -77,17 +85,127 @@ public class KafkaCustomAuthorizerTest {
 
        @Test
        public void testAuthorizerSuccess() {
+
+               
                PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
                                .thenReturn(true);
+               authorizer = new KafkaCustomAuthorizer();
                assertTrue(authorizer.authorize(arg0, arg1, arg2));
 
        }
 
        @Test
        public void testAuthorizerFailure() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.CREATE);
+               System.setProperty("msgRtr.topicfactory.aaf", "org.onap.dmaap.mr.topicFactory|:org.onap.dmaap.mr.topic:");
+               PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
+                               .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
+               try {
+                       authorizer.authorize(arg0, arg1, arg2);
+               } catch (Exception e) {
+                       assertTrue(true);
+               }
+
+       }
+       
+       @Test
+       public void testAuthorizerFailure1() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(resourceType.name()).thenReturn("Cluster");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.CREATE);
+               System.setProperty("msgRtr.topicfactory.aaf", "org.onap.dmaap.mr.topicFactory|:org.onap.dmaap.mr.topic:");
+               PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
+                               .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
+               try {
+                       authorizer.authorize(arg0, arg1, arg2);
+               } catch (Exception e) {
+                       assertTrue(true);
+               }
+
+       }
+       
+       @Test
+       public void testAuthorizerFailure2() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(resourceType.name()).thenReturn("Topic");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.WRITE);
+               PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
+                               .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
+               try {
+                       authorizer.authorize(arg0, arg1, arg2);
+               } catch (Exception e) {
+                       assertTrue(true);
+               }
+
+       }
+       
+       @Test
+       public void testAuthorizerFailure3() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(resourceType.name()).thenReturn("Topic");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.DESCRIBE);
+               PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
+                               .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
+               try {
+                       authorizer.authorize(arg0, arg1, arg2);
+               } catch (Exception e) {
+                       assertTrue(true);
+               }
+
+       }
+       @Test
+       public void testAuthorizerFailure4() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(resourceType.name()).thenReturn("Topic");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.READ);
+               PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
+                               .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
+               try {
+                       authorizer.authorize(arg0, arg1, arg2);
+               } catch (Exception e) {
+                       assertTrue(true);
+               }
+
+       }
+       
+       @Test
+       public void testAuthorizerFailure5() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(resourceType.name()).thenReturn("Cluster");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.IDEMPOTENT_WRITE);
+               System.setProperty("msgRtr.topicfactory.aaf", "org.onap.dmaap.mr.topicFactory|:org.onap.dmaap.mr.topic:");
+               PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
+                               .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
+               try {
+                       authorizer.authorize(arg0, arg1, arg2);
+               } catch (Exception e) {
+                       assertTrue(true);
+               }
 
+       }
+       
+       @Test
+       public void testAuthorizerFailure6() {
+               System.setProperty("CADI_PROPERTIES", "src/test/resources/cadi.properties");
+               PowerMockito.when(arg2.name()).thenReturn("org.onap.dmaap.mr.testtopic");
+               PowerMockito.when(arg1.toJava()).thenReturn(AclOperation.DELETE);
+               System.setProperty("msgRtr.topicfactory.aaf", "org.onap.dmaap.mr.topicFactory|:org.onap.dmaap.mr.topic:");
                PowerMockito.when(provider.hasPermission("fullName", "namespace.topic", ":topic.namespace.Topic", "pub"))
                                .thenReturn(false);
+               authorizer = new KafkaCustomAuthorizer();
                try {
                        authorizer.authorize(arg0, arg1, arg2);
                } catch (Exception e) {
@@ -95,5 +213,6 @@ public class KafkaCustomAuthorizerTest {
                }
 
        }
+       
 
 }