@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName = "admin_r"; client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.dropRole(requestorUserName, roleName); } });
writePolicyFile(); client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName);
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName1 = "admin_r1"; String roleName2 = "admin_r2"; client.dropRoleIfExists(requestorUserName, roleName1); client.createRole(requestorUserName, roleName1); client.dropRoleIfExists(requestorUserName, roleName2); client.createRole(requestorUserName, roleName2); client.grantTablePrivilege(requestorUserName, roleName1, "server", "db", "table", "ALL"); Set<TSentryPrivilege> listPrivilegesByRoleName = client.listAllPrivilegesByRoleName(requestorUserName, roleName1); assertTrue("Privilege not assigned to role1 !!", listPrivilegesByRoleName.size() == 1); client.grantTablePrivilege(requestorUserName, roleName2, "server", "db", "table", "ALL"); listPrivilegesByRoleName = client.listAllPrivilegesByRoleName(requestorUserName, roleName2); assertTrue("Privilege not assigned to role2 !!", listPrivilegesByRoleName.size() == 1); }}); }
@Test public void testCreateRole() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName = "admin_r"; client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.dropRole(requestorUserName, roleName); }
@Test public void testCreateRole() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName = "admin_r"; client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.dropRole(requestorUserName, roleName); }
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName1 = "admin_r1"; client.dropRoleIfExists(requestorUserName, roleName1); client.createRole(requestorUserName, roleName1); client.grantServerPrivilege(requestorUserName, roleName1, "server", false); Set<TSentryPrivilege> listPrivs = client.listAllPrivilegesByRoleName(requestorUserName, roleName1); assertTrue("Privilege should be all:",listPrivs.iterator().next().getAction().equals("*")); client.revokeServerPrivilege(requestorUserName, roleName1, "server", false); listPrivs = client.listAllPrivilegesByRoleName(requestorUserName, roleName1); assertTrue("Privilege not correctly revoked !!", listPrivs.size() == 0); }}); }
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); String roleName = "admin_r"; setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); Set<TSentryRole> roles = client.listRoles(requestorUserName); assertEquals("Incorrect number of roles", 1, roles.size()); for (TSentryRole role:roles) { assertTrue(role.getRoleName(), role.getRoleName().equalsIgnoreCase(roleName)); } client.dropRole(requestorUserName, roleName); }}); }
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); String roleName = "admin_testdb"; String server = "server1"; String db = "testDB"; setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); Set<TSentryRole> roles = client.listRoles(requestorUserName); assertEquals("Incorrect number of roles", 1, roles.size()); client.grantDatabasePrivilege(requestorUserName, roleName, server, db, AccessConstants.ALL); Set<TSentryPrivilege> privileges = client.listAllPrivilegesByRoleName(requestorUserName, roleName); assertTrue(privileges.size() == 1); client.revokeDatabasePrivilege(requestorUserName, roleName, server, db, AccessConstants.ALL); client.dropRole(requestorUserName, roleName); }}); }
@Override public void runTestAsSubject() throws Exception { // Grant a privilege with Grant Option String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName = "admin_r1"; boolean grantOption = true; boolean withoutGrantOption = false; client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.grantTablePrivilege(requestorUserName, roleName, "server", "db1", "table1", "ALL", grantOption); assertEquals(1, client.listAllPrivilegesByRoleName(requestorUserName, roleName).size()); // Try to revoke the privilege without grantOption and can't revoke the privilege. client.revokeTablePrivilege(requestorUserName, roleName, "server", "db1", "table1", "ALL", withoutGrantOption); assertEquals(1, client.listAllPrivilegesByRoleName(requestorUserName, roleName).size()); // Try to revoke the privilege with grantOption, the privilege will be revoked. client.revokeTablePrivilege(requestorUserName, roleName, "server", "db1", "table1", "ALL", grantOption); assertEquals(0, client.listAllPrivilegesByRoleName(requestorUserName, roleName).size()); }}); }
@Override public void runTestAsSubject() throws Exception { Configuration confWithSmallMaxMsgSize = new Configuration(conf); confWithSmallMaxMsgSize.setLong(ServiceConstants.ClientConfig.SENTRY_POLICY_CLIENT_THRIFT_MAX_MESSAGE_SIZE, 20); // create a client with a small thrift max message size SentryPolicyServiceClient clientWithSmallMaxMsgSize = SentryServiceClientFactory.create(confWithSmallMaxMsgSize); setLocalGroupMapping(ADMIN_USER, REQUESTER_USER_GROUP_NAMES); writePolicyFile(); boolean exceptionThrown = false; try { // client throws exception when message size is larger than the client's thrift max message size. clientWithSmallMaxMsgSize.listRoles(ADMIN_USER); } catch (SentryUserException e) { exceptionThrown = true; Assert.assertTrue(e.getMessage().contains("Thrift exception occurred")); Assert.assertTrue(e.getCause().getMessage().contains("Length exceeded max allowed")); } finally { Assert.assertEquals(true, exceptionThrown); clientWithSmallMaxMsgSize.close(); } // client can still talk with sentry server when message size is smaller. client.dropRoleIfExists(ADMIN_USER, ROLE_NAME); client.listRoles(ADMIN_USER); client.createRole(ADMIN_USER, ROLE_NAME); client.listRoles(ADMIN_USER); } });
writePolicyFile(); client.dropRoleIfExists(requestorUserName, roleName1); client.createRole(requestorUserName, roleName1); client.dropRoleIfExists(requestorUserName, roleName2); client.createRole(requestorUserName, roleName2);
@Override public void runTestAsSubject() throws Exception { // Grant a privilege with 'Grant Option'. String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); String roleName = "admin_r1"; boolean grantOption = true; boolean withoutGrantOption = false; client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.grantTablePrivilege(requestorUserName, roleName, "server", "db1", "table1", "ALL", grantOption); assertEquals(1, client.listAllPrivilegesByRoleName(requestorUserName, roleName).size()); // Grant a privilege without 'Grant Option'. client.grantTablePrivilege(requestorUserName, roleName, "server", "db1", "table1", "ALL", withoutGrantOption); assertEquals(2, client.listAllPrivilegesByRoleName(requestorUserName, roleName).size()); // Use 'grantOption = null', the two privileges will be revoked. client.revokeTablePrivilege(requestorUserName, roleName, "server", "db1", "table1", "ALL", null); assertEquals(0, client.listAllPrivilegesByRoleName(requestorUserName, roleName).size()); }}); }
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); String roleName = "admin_testdb"; String server = "server1"; String uri = "file://u/w/h/t/partition=value/"; setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); // Creating associated role client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); Set<TSentryRole> roles = client.listRoles(requestorUserName); assertEquals("Incorrect number of roles", 1, roles.size()); client.grantURIPrivilege(requestorUserName, roleName, server, uri); Set<TSentryPrivilege> privileges = client.listAllPrivilegesByRoleName(requestorUserName, roleName); assertTrue(privileges.size() == 1); // Revoking the same privilege client.revokeURIPrivilege(requestorUserName, roleName, server, uri); privileges = client.listAllPrivilegesByRoleName(requestorUserName, roleName); assertTrue(privileges.size() == 0); // Clean up client.dropRole(requestorUserName, roleName); }}); }
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); String roleName = "admin_r"; setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.listRoles(requestorUserName); stopSentryService(); server = new SentryServiceFactory().create(conf); startSentryService(); client.listRoles(requestorUserName); client.dropRole(requestorUserName, roleName); } });
@Override public void runTestAsSubject() throws Exception { String requestorUserName = ADMIN_USER; Set<String> requestorUserGroupNames = Sets.newHashSet(ADMIN_GROUP); String roleName = "admin_testdb"; String groupName = "group1"; setLocalGroupMapping(requestorUserName, requestorUserGroupNames); writePolicyFile(); client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); Set<TSentryRole> roles = client.listRoles(requestorUserName); assertEquals("Incorrect number of roles", 1, roles.size()); client.grantRoleToGroup(requestorUserName, groupName, roleName); Set<TSentryRole> groupRoles = client.listRolesByGroupName(requestorUserName, groupName); assertTrue(groupRoles.size() == 1); for (TSentryRole role:groupRoles) { assertTrue(role.getRoleName(), role.getRoleName().equalsIgnoreCase(roleName)); assertTrue(role.getGroups().size() == 1); for (TSentryGroup group :role.getGroups()) { assertTrue(group.getGroupName(), group.getGroupName().equalsIgnoreCase(groupName)); } } client.dropRole(requestorUserName, roleName); }}); }
String group2 = "g2"; client.dropRoleIfExists(requestorUserName, roleName1); client.createRole(requestorUserName, roleName1); client.grantRoleToGroup(requestorUserName, group1, roleName1); client.grantTablePrivilege(requestorUserName, roleName1, "server", "db2", "table4", "ALL"); client.dropRoleIfExists(requestorUserName, roleName2); client.createRole(requestorUserName, roleName2); client.grantRoleToGroup(requestorUserName, group1, roleName2);
String group2 = "g2"; client.dropRoleIfExists(requestorUserName, roleName1); client.createRole(requestorUserName, roleName1); client.grantRoleToGroup(requestorUserName, group1, roleName1); client.dropRoleIfExists(requestorUserName, roleName2); client.createRole(requestorUserName, roleName2); client.grantRoleToGroup(requestorUserName, group1, roleName2);
client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.grantRoleToGroup(requestorUserName, ADMIN_GROUP, roleName);
client.dropRoleIfExists(requestorUserName, roleName); client.createRole(requestorUserName, roleName); client.grantRoleToGroup(requestorUserName, ADMIN_GROUP, roleName);
String roleName2 = "admin_r2"; client.dropRoleIfExists(requestorUserName, roleName1); client.createRole(requestorUserName, roleName1); client.dropRoleIfExists(requestorUserName, roleName2); client.createRole(requestorUserName, roleName2);