@Override public Void run() throws Exception { provider.deleteKey(name); provider.flush(); return null; } });
@Override public void deleteKey(String name) throws IOException { writeLock.lock(); try { doAccessCheck(name, KeyOpType.MANAGEMENT); provider.deleteKey(name); } finally { writeLock.unlock(); } }
@Override public KeyVersion run() throws Exception { try { kpExt.deleteKey(barKv.getName()); Assert.fail("User should NOT be Authorized to " + "perform any other operation !!"); } catch (IOException ioe) { } return kpExt.decryptEncryptedKey(barEKv); } });
@Override public KeyVersion run() throws Exception { try { kpExt.deleteKey(barKv.getName()); Assert.fail("User should NOT be Authorized to " + "perform any other operation !!"); } catch (IOException ioe) { } return kpExt.decryptEncryptedKey(barEKv); } });
@Override public EncryptedKeyVersion run() throws Exception { try { kpExt.deleteKey(barKv.getName()); Assert.fail("User should NOT be Authorized to " + "perform any other operation !!"); } catch (IOException ioe) { } return kpExt.generateEncryptedKey(barKv.getName()); } });
@Override public EncryptedKeyVersion run() throws Exception { try { kpExt.deleteKey(barKv.getName()); Assert.fail("User should NOT be Authorized to " + "perform any other operation !!"); } catch (IOException ioe) { } return kpExt.generateEncryptedKey(barKv.getName()); } });
@Override public Void run() throws Exception { Options opt = newOptions(conf); Map<String, String> m = new HashMap<String, String>(); m.put("key.acl.name", "testKey"); opt.setAttributes(m); try { KeyVersion kv = kpExt.createKey("foo", SecureRandom.getSeed(16), opt); kpExt.rollNewVersion(kv.getName()); kpExt.rollNewVersion(kv.getName(), SecureRandom.getSeed(16)); EncryptedKeyVersion ekv = kpExt.generateEncryptedKey(kv.getName()); kpExt.decryptEncryptedKey(ekv); kpExt.deleteKey(kv.getName()); } catch (IOException ioe) { Assert.fail("User should be Allowed to do everything !!"); } return null; } }
@Override public Void run() throws Exception { Options opt = newOptions(conf); Map<String, String> m = new HashMap<String, String>(); m.put("key.acl.name", "testKey"); opt.setAttributes(m); try { KeyVersion kv = kpExt.createKey("foo", SecureRandom.getSeed(16), opt); kpExt.rollNewVersion(kv.getName()); kpExt.rollNewVersion(kv.getName(), SecureRandom.getSeed(16)); EncryptedKeyVersion ekv = kpExt.generateEncryptedKey(kv.getName()); kpExt.decryptEncryptedKey(ekv); kpExt.deleteKey(kv.getName()); } catch (IOException ioe) { Assert.fail("User should be Allowed to do everything !!"); } return null; } }
@Override public KeyVersion run() throws Exception { Options opt = newOptions(conf); Map<String, String> m = new HashMap<String, String>(); m.put("key.acl.name", "testKey"); opt.setAttributes(m); try { KeyVersion kv = kpExt.createKey("foo", SecureRandom.getSeed(16), opt); kpExt.rollNewVersion(kv.getName()); kpExt.rollNewVersion(kv.getName(), SecureRandom.getSeed(16)); kpExt.deleteKey(kv.getName()); } catch (IOException ioe) { Assert.fail("User should be Authorized !!"); } KeyVersion retkv = null; try { retkv = kpExt.createKey("bar", SecureRandom.getSeed(16), opt); kpExt.generateEncryptedKey(retkv.getName()); Assert.fail("User should NOT be Authorized to generate EEK !!"); } catch (IOException ioe) { } Assert.assertNotNull(retkv); return retkv; } }
@Override public KeyVersion run() throws Exception { Options opt = newOptions(conf); Map<String, String> m = new HashMap<String, String>(); m.put("key.acl.name", "testKey"); opt.setAttributes(m); try { KeyVersion kv = kpExt.createKey("foo", SecureRandom.getSeed(16), opt); kpExt.rollNewVersion(kv.getName()); kpExt.rollNewVersion(kv.getName(), SecureRandom.getSeed(16)); kpExt.deleteKey(kv.getName()); } catch (IOException ioe) { Assert.fail("User should be Authorized !!"); } KeyVersion retkv = null; try { retkv = kpExt.createKey("bar", SecureRandom.getSeed(16), opt); kpExt.generateEncryptedKey(retkv.getName()); Assert.fail("User should NOT be Authorized to generate EEK !!"); } catch (IOException ioe) { } Assert.assertNotNull(retkv); return retkv; } }