2020import static org .apache .hadoop .crypto .key .kms .server .KMSConfiguration .*;
2121import static org .apache .hadoop .crypto .key .kms .server .KeyAuthorizationKeyProvider .KEY_ACL ;
2222import static org .apache .hadoop .crypto .key .kms .server .KeyAuthorizationKeyProvider .KeyOpType ;
23+ import static org .junit .jupiter .api .Assertions .assertEquals ;
24+ import static org .junit .jupiter .api .Assertions .assertFalse ;
25+ import static org .junit .jupiter .api .Assertions .assertNotNull ;
26+ import static org .junit .jupiter .api .Assertions .assertTrue ;
2327
2428import org .apache .hadoop .conf .Configuration ;
2529import org .apache .hadoop .security .UserGroupInformation ;
2630import org .apache .hadoop .security .authorize .AccessControlList ;
27- import org .junit .Assert ;
28- import org .junit .Rule ;
29- import org .junit .rules .Timeout ;
30- import org .junit .Test ;
31+ import org .junit .jupiter .api .Test ;
32+ import org .junit .jupiter .api .Timeout ;
3133
3234import java .util .Collection ;
3335import java .util .HashMap ;
3436import java .util .HashSet ;
3537
38+ @ Timeout (180 )
3639public class TestKMSACLs {
37- @ Rule
38- public final Timeout globalTimeout = new Timeout (180000 );
39-
4040 @ Test
4141 public void testDefaults () {
4242 final KMSACLs acls = new KMSACLs (new Configuration (false ));
4343 for (KMSACLs .Type type : KMSACLs .Type .values ()) {
44- Assert . assertTrue (acls .hasAccess (type ,
44+ assertTrue (acls .hasAccess (type ,
4545 UserGroupInformation .createRemoteUser ("foo" )));
4646 }
4747 }
@@ -54,9 +54,9 @@ public void testCustom() {
5454 }
5555 final KMSACLs acls = new KMSACLs (conf );
5656 for (KMSACLs .Type type : KMSACLs .Type .values ()) {
57- Assert . assertTrue (acls .hasAccess (type ,
57+ assertTrue (acls .hasAccess (type ,
5858 UserGroupInformation .createRemoteUser (type .toString ())));
59- Assert . assertFalse (acls .hasAccess (type ,
59+ assertFalse (acls .hasAccess (type ,
6060 UserGroupInformation .createRemoteUser ("foo" )));
6161 }
6262 }
@@ -72,16 +72,16 @@ public void testKeyAclConfigurationLoad() {
7272 conf .set (DEFAULT_KEY_ACL_PREFIX + "ALL" , "invalid" );
7373 conf .set (WHITELIST_KEY_ACL_PREFIX + "ALL" , "invalid" );
7474 final KMSACLs acls = new KMSACLs (conf );
75- Assert . assertTrue ("expected key ACL size is 2 but got "
76- + acls .keyAcls .size (), acls . keyAcls . size () == 2 );
77- Assert . assertTrue ("expected whitelist ACL size is 1 but got "
78- + acls .whitelistKeyAcls .size (), acls . whitelistKeyAcls . size () == 1 );
79- Assert . assertFalse ("ALL should not be allowed for whitelist ACLs." ,
80- acls . whitelistKeyAcls . containsKey ( KeyOpType . ALL ) );
81- Assert . assertTrue ("expected default ACL size is 1 but got "
82- + acls .defaultKeyAcls .size (), acls . defaultKeyAcls . size () == 1 );
83- Assert . assertTrue ("ALL should not be allowed for default ACLs." ,
84- acls . defaultKeyAcls . size () == 1 );
75+ assertTrue (acls . keyAcls . size () == 2 , "expected key ACL size is 2 but got "
76+ + acls .keyAcls .size ());
77+ assertTrue (acls . whitelistKeyAcls . size () == 1 , "expected whitelist ACL size is 1 but got "
78+ + acls .whitelistKeyAcls .size ());
79+ assertFalse (acls . whitelistKeyAcls . containsKey ( KeyOpType . ALL ) ,
80+ " ALL should not be allowed for whitelist ACLs." );
81+ assertTrue (acls . defaultKeyAcls . size () == 1 , "expected default ACL size is 1 but got "
82+ + acls .defaultKeyAcls .size ());
83+ assertTrue (acls . defaultKeyAcls . size () == 1 ,
84+ "ALL should not be allowed for default ACLs." );
8585 }
8686
8787 @ Test
@@ -98,15 +98,15 @@ public void testKeyAclDuplicateEntries() {
9898 conf .set (WHITELIST_KEY_ACL_PREFIX + "DECRYPT_EEK" , "whitelist1" );
9999 conf .set (WHITELIST_KEY_ACL_PREFIX + "DECRYPT_EEK" , "*" );
100100 final KMSACLs acls = new KMSACLs (conf );
101- Assert . assertTrue ("expected key ACL size is 2 but got "
102- + acls .keyAcls .size (), acls . keyAcls . size () == 2 );
101+ assertTrue (acls . keyAcls . size () == 2 , "expected key ACL size is 2 but got "
102+ + acls .keyAcls .size ());
103103 assertKeyAcl ("test_key_1" , acls , KeyOpType .DECRYPT_EEK , "decrypt2" );
104104 assertKeyAcl ("test_key_2" , acls , KeyOpType .ALL , "all1" , "all3" );
105105 assertDefaultKeyAcl (acls , KeyOpType .MANAGEMENT );
106106 assertDefaultKeyAcl (acls , KeyOpType .DECRYPT_EEK );
107107 AccessControlList acl = acls .whitelistKeyAcls .get (KeyOpType .DECRYPT_EEK );
108- Assert . assertNotNull (acl );
109- Assert . assertTrue (acl .isAllAllowed ());
108+ assertNotNull (acl );
109+ assertTrue (acl .isAllAllowed ());
110110 }
111111
112112 @ Test
@@ -163,8 +163,8 @@ public void testKeyAclReload() {
163163 conf .set (DEFAULT_KEY_ACL_PREFIX + "DECRYPT_EEK" , "*" );
164164 acls .setKeyACLs (conf );
165165 AccessControlList acl = acls .defaultKeyAcls .get (KeyOpType .DECRYPT_EEK );
166- Assert . assertTrue (acl .isAllAllowed ());
167- Assert . assertTrue (acl .getUsers ().isEmpty ());
166+ assertTrue (acl .isAllAllowed ());
167+ assertTrue (acl .getUsers ().isEmpty ());
168168 // everything else should still be the same.
169169 assertDefaultKeyAcl (acls , KeyOpType .READ , "read2" );
170170 assertDefaultKeyAcl (acls , KeyOpType .MANAGEMENT , "mgmt1" , "mgmt2" );
@@ -181,10 +181,10 @@ public void testKeyAclReload() {
181181 conf .set (DEFAULT_KEY_ACL_PREFIX + "DECRYPT_EEK" , "new" );
182182 acls .setKeyACLs (conf );
183183 assertDefaultKeyAcl (acls , KeyOpType .DECRYPT_EEK , "new" );
184- Assert . assertTrue (acls .keyAcls .isEmpty ());
185- Assert . assertTrue (acls .whitelistKeyAcls .isEmpty ());
186- Assert . assertEquals ("Got unexpected sized acls:"
187- + acls .defaultKeyAcls , 1 , acls . defaultKeyAcls . size () );
184+ assertTrue (acls .keyAcls .isEmpty ());
185+ assertTrue (acls .whitelistKeyAcls .isEmpty ());
186+ assertEquals (1 , acls . defaultKeyAcls . size (), "Got unexpected sized acls:"
187+ + acls .defaultKeyAcls );
188188 }
189189
190190 private void assertDefaultKeyAcl (final KMSACLs acls , final KeyOpType op ,
@@ -201,23 +201,22 @@ private void assertWhitelistKeyAcl(final KMSACLs acls, final KeyOpType op,
201201
202202 private void assertKeyAcl (final String keyName , final KMSACLs acls ,
203203 final KeyOpType op , final String ... names ) {
204- Assert . assertTrue (acls .keyAcls .containsKey (keyName ));
204+ assertTrue (acls .keyAcls .containsKey (keyName ));
205205 final HashMap <KeyOpType , AccessControlList > keyacl =
206206 acls .keyAcls .get (keyName );
207- Assert . assertNotNull (keyacl .get (op ));
207+ assertNotNull (keyacl .get (op ));
208208 assertAcl (keyacl .get (op ), op , names );
209209 }
210210
211211 private void assertAcl (final AccessControlList acl ,
212212 final KeyOpType op , final String ... names ) {
213- Assert . assertNotNull (acl );
214- Assert . assertFalse (acl .isAllAllowed ());
213+ assertNotNull (acl );
214+ assertFalse (acl .isAllAllowed ());
215215 final Collection <String > actual = acl .getUsers ();
216216 final HashSet <String > expected = new HashSet <>();
217217 for (String name : names ) {
218218 expected .add (name );
219219 }
220- Assert .assertEquals ("defaultKeyAcls don't match for op:" + op ,
221- expected , actual );
220+ assertEquals (expected , actual , "defaultKeyAcls don't match for op:" + op );
222221 }
223222}
0 commit comments