You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ignite.apache.org by ni...@apache.org on 2021/11/23 12:59:50 UTC
[ignite] branch master updated: IGNITE-15951 Fixes preconfigured service deployment authorization. (#9582)
This is an automated email from the ASF dual-hosted git repository.
nizhikov pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ignite.git
The following commit(s) were added to refs/heads/master by this push:
new 83b517a IGNITE-15951 Fixes preconfigured service deployment authorization. (#9582)
83b517a is described below
commit 83b517afcd6b7f138b7a00f6e225e70f9f2d1ba1
Author: Mikhail Petrov <32...@users.noreply.github.com>
AuthorDate: Tue Nov 23 15:59:24 2021 +0300
IGNITE-15951 Fixes preconfigured service deployment authorization. (#9582)
---
.../processors/service/IgniteServiceProcessor.java | 17 +-
.../security/service/ServiceAuthorizationTest.java | 419 +++++++++++++++++++++
.../ignite/testsuites/SecurityTestSuite.java | 4 +-
3 files changed, 437 insertions(+), 3 deletions(-)
diff --git a/modules/core/src/main/java/org/apache/ignite/internal/processors/service/IgniteServiceProcessor.java b/modules/core/src/main/java/org/apache/ignite/internal/processors/service/IgniteServiceProcessor.java
index 8692002..cb9cf6a 100644
--- a/modules/core/src/main/java/org/apache/ignite/internal/processors/service/IgniteServiceProcessor.java
+++ b/modules/core/src/main/java/org/apache/ignite/internal/processors/service/IgniteServiceProcessor.java
@@ -66,6 +66,7 @@ import org.apache.ignite.internal.processors.cluster.ChangeGlobalStateMessage;
import org.apache.ignite.internal.processors.cluster.DiscoveryDataClusterState;
import org.apache.ignite.internal.processors.cluster.IgniteChangeGlobalStateSupport;
import org.apache.ignite.internal.processors.platform.services.PlatformService;
+import org.apache.ignite.internal.processors.security.OperationSecurityContext;
import org.apache.ignite.internal.util.future.GridCompoundFuture;
import org.apache.ignite.internal.util.future.GridFinishedFuture;
import org.apache.ignite.internal.util.future.GridFutureAdapter;
@@ -77,6 +78,7 @@ import org.apache.ignite.lang.IgnitePredicate;
import org.apache.ignite.lang.IgniteUuid;
import org.apache.ignite.marshaller.Marshaller;
import org.apache.ignite.marshaller.jdk.JdkMarshaller;
+import org.apache.ignite.plugin.security.SecurityException;
import org.apache.ignite.plugin.security.SecurityPermission;
import org.apache.ignite.services.Service;
import org.apache.ignite.services.ServiceCallContext;
@@ -98,6 +100,7 @@ import static org.apache.ignite.configuration.DeploymentMode.ISOLATED;
import static org.apache.ignite.configuration.DeploymentMode.PRIVATE;
import static org.apache.ignite.events.EventType.EVT_NODE_JOINED;
import static org.apache.ignite.internal.GridComponent.DiscoveryDataExchangeType.SERVICE_PROC;
+import static org.apache.ignite.plugin.security.SecurityPermission.SERVICE_DEPLOY;
/**
* Ignite service processor.
@@ -373,6 +376,16 @@ public class IgniteServiceProcessor extends ServiceProcessorAdapter implements I
for (ServiceInfo desc : joinData.services()) {
assert desc.topologySnapshot().isEmpty();
+ try (OperationSecurityContext ignored = ctx.security().withContext(data.joiningNodeId())) {
+ if (checkPermissions(desc.name(), SERVICE_DEPLOY) != null) {
+ U.warn(log, "Failed to register service configuration received from joining node :" +
+ " [nodeId=" + data.joiningNodeId() + ", cfgName=" + desc.name() + "]." +
+ " Joining node is not authorized to deploy the service.");
+
+ continue;
+ }
+ }
+
ServiceInfo oldDesc = registeredServices.get(desc.serviceId());
if (oldDesc != null) { // In case of a collision of IgniteUuid.randomUuid() (almost impossible case)
@@ -589,8 +602,8 @@ public class IgniteServiceProcessor extends ServiceProcessorAdapter implements I
err = e;
}
- if (err == null)
- err = checkPermissions(cfg.getName(), SecurityPermission.SERVICE_DEPLOY);
+ if (err == null && (isLocalNodeCoordinator() || ctx.discovery().localJoinFuture().isDone()))
+ err = checkPermissions(cfg.getName(), SERVICE_DEPLOY);
if (err == null) {
try {
diff --git a/modules/core/src/test/java/org/apache/ignite/internal/processors/security/service/ServiceAuthorizationTest.java b/modules/core/src/test/java/org/apache/ignite/internal/processors/security/service/ServiceAuthorizationTest.java
new file mode 100644
index 0000000..1d5e508
--- /dev/null
+++ b/modules/core/src/test/java/org/apache/ignite/internal/processors/security/service/ServiceAuthorizationTest.java
@@ -0,0 +1,419 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.ignite.internal.processors.security.service;
+
+import java.util.Arrays;
+import java.util.Collection;
+import java.util.Collections;
+import java.util.concurrent.atomic.AtomicInteger;
+import java.util.function.Consumer;
+import java.util.function.Function;
+import org.apache.ignite.Ignite;
+import org.apache.ignite.IgniteServices;
+import org.apache.ignite.configuration.IgniteConfiguration;
+import org.apache.ignite.internal.processors.security.AbstractSecurityTest;
+import org.apache.ignite.internal.processors.security.AbstractTestSecurityPluginProvider;
+import org.apache.ignite.internal.processors.security.impl.TestSecurityPluginProvider;
+import org.apache.ignite.internal.util.typedef.G;
+import org.apache.ignite.internal.util.typedef.X;
+import org.apache.ignite.plugin.security.SecurityException;
+import org.apache.ignite.plugin.security.SecurityPermission;
+import org.apache.ignite.services.Service;
+import org.apache.ignite.services.ServiceCallContext;
+import org.apache.ignite.services.ServiceConfiguration;
+import org.apache.ignite.services.ServiceDeploymentException;
+import org.apache.ignite.testframework.GridTestUtils.RunnableX;
+import org.apache.ignite.testframework.ListeningTestLogger;
+import org.apache.ignite.testframework.LogListener;
+import org.junit.Test;
+import org.junit.runner.RunWith;
+import org.junit.runners.Parameterized;
+
+import static org.apache.ignite.plugin.security.SecurityPermission.CACHE_CREATE;
+import static org.apache.ignite.plugin.security.SecurityPermission.JOIN_AS_SERVER;
+import static org.apache.ignite.plugin.security.SecurityPermission.SERVICE_CANCEL;
+import static org.apache.ignite.plugin.security.SecurityPermission.SERVICE_DEPLOY;
+import static org.apache.ignite.plugin.security.SecurityPermission.SERVICE_INVOKE;
+import static org.apache.ignite.plugin.security.SecurityPermission.TASK_CANCEL;
+import static org.apache.ignite.plugin.security.SecurityPermission.TASK_EXECUTE;
+import static org.apache.ignite.plugin.security.SecurityPermissionSetBuilder.create;
+import static org.apache.ignite.testframework.GridTestUtils.assertThrowsAnyCause;
+import static org.apache.ignite.testframework.GridTestUtils.assertThrowsWithCause;
+import static org.apache.ignite.testframework.GridTestUtils.waitForCondition;
+import static org.apache.ignite.testframework.LogListener.matches;
+
+/** Tests permissions that are required to perform service operations. */
+@RunWith(Parameterized.class)
+public class ServiceAuthorizationTest extends AbstractSecurityTest {
+ /** Name of the test service.*/
+ private static final String TEST_SERVICE_NAME = "test-service-name";
+
+ /** Test service call context. */
+ private static final ServiceCallContext SERVICE_CALL_CTX = ServiceCallContext.builder()
+ .put("key", "val")
+ .build();
+
+ /** Error that occurs in case service deployment fails. */
+ private static final String DEPLOYMENT_AUTHORIZATION_FAILED_ERR =
+ "Authorization failed [perm=SERVICE_DEPLOY, name=" + TEST_SERVICE_NAME;
+
+ /** Index of the node that is allowed to perform test operation. */
+ private static final int ALLOWED_NODE_IDX = 1;
+
+ /** Index of the node that is forbidden to perform test operation. */
+ private static final int FORBIDDEN_NODE_IDX = 2;
+
+ /** Instance of the test logger to check logged messages. */
+ private static ListeningTestLogger listeningLog;
+
+ /** Whether a client node is an initiator of the test operations. */
+ @Parameterized.Parameter()
+ public boolean isClient;
+
+ /** */
+ @Parameterized.Parameters(name = "isClient={0}")
+ public static Iterable<Object[]> data() {
+ return Arrays.asList(new Object[] {true}, new Object[] {false});
+ }
+
+ /** {@inheritDoc} */
+ @Override protected IgniteConfiguration getConfiguration(
+ String instanceName,
+ AbstractTestSecurityPluginProvider pluginProv
+ ) throws Exception {
+ return super.getConfiguration(instanceName, pluginProv)
+ .setGridLogger(listeningLog);
+ }
+
+ /** {@inheritDoc} */
+ @Override protected void beforeTestsStarted() throws Exception {
+ listeningLog = new ListeningTestLogger(log);
+ }
+
+ /** {@inheritDoc} */
+ @Override protected void beforeTest() throws Exception {
+ super.beforeTest();
+
+ startGridAllowAll(getTestIgniteInstanceName(0));
+ }
+
+ /** {@inheritDoc} */
+ @Override protected void afterTest() throws Exception {
+ super.afterTest();
+
+ stopAllGrids();
+ }
+
+ /** Tests that all service cancel calls require {@link SecurityPermission#SERVICE_CANCEL} permission. */
+ @Test
+ public void testServiceCancel() throws Exception {
+ startGrid(configuration(ALLOWED_NODE_IDX, SERVICE_DEPLOY, SERVICE_INVOKE, SERVICE_CANCEL));
+ startGrid(configuration(FORBIDDEN_NODE_IDX, SERVICE_DEPLOY, SERVICE_INVOKE));
+
+ checkCancel(srvcs -> srvcs.cancel(TEST_SERVICE_NAME));
+ checkCancel(srvcs -> srvcs.cancelAsync(TEST_SERVICE_NAME).get());
+
+ checkCancel(srvcs -> srvcs.cancelAll(Collections.singleton(TEST_SERVICE_NAME)));
+ checkCancel(srvcs -> srvcs.cancelAllAsync(Collections.singleton(TEST_SERVICE_NAME)).get());
+
+ checkCancel(IgniteServices::cancelAll);
+ checkCancel(srvcs -> srvcs.cancelAllAsync().get());
+ }
+
+ /** Tests that all calls to obtain service instance require {@link SecurityPermission#SERVICE_INVOKE} permission. */
+ @Test
+ public void testServiceInvoke() throws Exception {
+ startGrid(configuration(ALLOWED_NODE_IDX, SERVICE_DEPLOY, SERVICE_INVOKE));
+ startGrid(configuration(FORBIDDEN_NODE_IDX, SERVICE_DEPLOY));
+
+ grid(ALLOWED_NODE_IDX).services().deploy(serviceConfiguration());
+
+ if (!isClient) {
+ checkInvoke(srvcs -> srvcs.service(TEST_SERVICE_NAME), false);
+ checkInvoke(srvcs -> srvcs.services(TEST_SERVICE_NAME), false);
+ }
+
+ checkInvoke(srvcs -> srvcs.serviceProxy(TEST_SERVICE_NAME, TestService.class, false), true);
+ checkInvoke(srvcs -> srvcs.serviceProxy(TEST_SERVICE_NAME, TestService.class, false, getTestTimeout()), true);
+ checkInvoke(srvcs -> srvcs.serviceProxy(TEST_SERVICE_NAME, TestService.class, false, SERVICE_CALL_CTX), true);
+ checkInvoke(srvcs ->
+ srvcs.serviceProxy(TEST_SERVICE_NAME, TestService.class, false, SERVICE_CALL_CTX, getTestTimeout()),
+ true
+ );
+ }
+
+ /** Tests that all service deploy calls require {@link SecurityPermission#SERVICE_DEPLOY} permission. */
+ @Test
+ public void testServiceDeploy() throws Exception {
+ startGrid(configuration(ALLOWED_NODE_IDX, SERVICE_DEPLOY, SERVICE_INVOKE, SERVICE_CANCEL));
+ startGrid(configuration(FORBIDDEN_NODE_IDX, SERVICE_INVOKE));
+
+ checkDeploy(srvcs -> srvcs.deploy(serviceConfiguration()), false);
+ checkDeploy(srvcs -> srvcs.deployAsync(serviceConfiguration()).get(), false);
+
+ checkDeploy(srvcs -> srvcs.deployAll(Collections.singleton(serviceConfiguration())), false);
+ checkDeploy(srvcs -> srvcs.deployAllAsync(Collections.singleton(serviceConfiguration())).get(), false);
+
+ checkDeploy(srvcs -> srvcs.deployMultiple(TEST_SERVICE_NAME, new TestServiceImpl(), isClient ? 1 : 3, 1), false);
+ checkDeploy(srvcs ->
+ srvcs.deployMultipleAsync(TEST_SERVICE_NAME, new TestServiceImpl(), isClient ? 1 : 3, 1).get(),
+ false
+ );
+
+ checkDeploy(srvcs -> srvcs.deployNodeSingleton(TEST_SERVICE_NAME, new TestServiceImpl()), false);
+ checkDeploy(srvcs -> srvcs.deployNodeSingletonAsync(TEST_SERVICE_NAME, new TestServiceImpl()).get(), false);
+
+ checkDeploy(srvcs -> srvcs.deployClusterSingleton(TEST_SERVICE_NAME, new TestServiceImpl()), true);
+ checkDeploy(srvcs -> srvcs.deployClusterSingletonAsync(TEST_SERVICE_NAME, new TestServiceImpl()).get(), true);
+
+ grid(0).createCache(DEFAULT_CACHE_NAME);
+
+ int key = keyForNode(grid(0).affinity(DEFAULT_CACHE_NAME), new AtomicInteger(0), grid(0).cluster().localNode());
+
+ checkDeploy(srvcs ->
+ srvcs.deployKeyAffinitySingleton(TEST_SERVICE_NAME, new TestServiceImpl(), DEFAULT_CACHE_NAME, key),
+ true
+ );
+
+ checkDeploy(srvcs ->
+ srvcs.deployKeyAffinitySingletonAsync(TEST_SERVICE_NAME, new TestServiceImpl(), DEFAULT_CACHE_NAME, key).get(),
+ true
+ );
+ }
+
+ /**
+ * Tests that service deployment that was initiated during new node join process requires
+ * {@link SecurityPermission#SERVICE_DEPLOY} permission.
+ */
+ @Test
+ public void testPreconfiguredServiceDeployment() throws Exception {
+ startClientAllowAll(getTestIgniteInstanceName(1));
+
+ LogListener srvcDeploymentFailedLogLsnr = matches(DEPLOYMENT_AUTHORIZATION_FAILED_ERR).times(2).build();
+
+ listeningLog.registerListener(srvcDeploymentFailedLogLsnr);
+
+ startGrid(configuration(2, SERVICE_INVOKE).setServiceConfiguration(serviceConfiguration()));
+
+ srvcDeploymentFailedLogLsnr.check(getTestTimeout());
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, false);
+
+ startGrid(configuration(3, SERVICE_DEPLOY, SERVICE_INVOKE).setServiceConfiguration(serviceConfiguration()));
+
+ waitForCondition(() -> {
+ for (Ignite node : G.allGrids()) {
+ if (!node.cluster().localNode().isClient() && node.services().service(TEST_SERVICE_NAME) == null)
+ return false;
+ }
+
+ return true;
+ }, getTestTimeout());
+
+ // Tests preconfigured service deployment on coordinator.
+ if (!isClient) {
+ stopAllGrids();
+
+ startGrid(configuration(0, SERVICE_DEPLOY, SERVICE_INVOKE).setServiceConfiguration(serviceConfiguration()));
+
+ assertTrue(waitForCondition(() -> grid(0).services().service(TEST_SERVICE_NAME) != null, getTestTimeout()));
+
+ stopGrid(0);
+
+ srvcDeploymentFailedLogLsnr = matches(DEPLOYMENT_AUTHORIZATION_FAILED_ERR).times(1).build();
+
+ listeningLog.registerListener(srvcDeploymentFailedLogLsnr);
+
+ startGrid(configuration(0, SERVICE_INVOKE).setServiceConfiguration(serviceConfiguration()));
+
+ srvcDeploymentFailedLogLsnr.check(getTestTimeout());
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, false);
+ }
+ }
+
+ /** @return Test service configuration. */
+ private ServiceConfiguration serviceConfiguration() {
+ ServiceConfiguration srvcCfg = new ServiceConfiguration();
+
+ srvcCfg.setMaxPerNodeCount(1);
+ srvcCfg.setName(TEST_SERVICE_NAME);
+ srvcCfg.setService(new TestServiceImpl());
+
+ return srvcCfg;
+ }
+
+ /** @return Ignite node configuration. */
+ private IgniteConfiguration configuration(int idx, SecurityPermission... perms) throws Exception {
+ String name = getTestIgniteInstanceName(idx);
+
+ return getConfiguration(
+ name,
+ new TestSecurityPluginProvider(
+ name,
+ "",
+ create()
+ .defaultAllowAll(false)
+ .appendSystemPermissions(JOIN_AS_SERVER)
+ .appendCachePermissions(DEFAULT_CACHE_NAME, CACHE_CREATE)
+ .appendTaskPermissions(
+ "org.apache.ignite.internal.processors.affinity.GridAffinityUtils$AffinityJob",
+ TASK_EXECUTE, TASK_CANCEL)
+ .appendServicePermissions(TEST_SERVICE_NAME, perms)
+ .build(),
+ null,
+ false
+ )
+ ).setClientMode(isClient);
+ }
+
+ /** Checks that service with specified service name is deployed or not on all nodes. */
+ private void checkServiceOnAllNodes(String name, boolean deployed) {
+ for (Ignite node : G.allGrids()) {
+ if (!node.cluster().localNode().isClient()) {
+ Object srvc = node.services().service(name);
+
+ if (deployed)
+ assertNotNull(srvc);
+ else
+ assertNull(srvc);
+ }
+ }
+ }
+
+ /**
+ * Checks that execution of the specified {@link Runnable} failed and that the exception was caused by the lack of
+ * the specified permission.
+ */
+ private void checkFailed(SecurityPermission perm, RunnableX r) {
+ if (perm == SERVICE_DEPLOY) {
+ Throwable e = assertThrowsWithCause(r, ServiceDeploymentException.class);
+
+ assertEquals(1, X.getSuppressedList(e).stream()
+ .filter(t ->
+ t.getMessage().contains("Authorization failed [perm=SERVICE_DEPLOY, name=" + TEST_SERVICE_NAME))
+ .count());
+ }
+ else {
+ assertThrowsAnyCause(
+ log,
+ () -> {
+ r.run();
+
+ return null;
+ },
+ SecurityException.class,
+ "Authorization failed [perm=" + perm + ", name=" + TEST_SERVICE_NAME
+ );
+ }
+ }
+
+ /**
+ * Uses the specified consumer to perform a service cancellation operation on a node that has the required
+ * permissions to perform this operation and on a node that does not. And checks that in the second case operation
+ * is aborted.
+ */
+ private void checkCancel(Consumer<IgniteServices> c) {
+ grid(ALLOWED_NODE_IDX).services().deploy(serviceConfiguration());
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, true);
+
+ checkFailed(SERVICE_CANCEL, () -> c.accept(grid(FORBIDDEN_NODE_IDX).services()));
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, true);
+
+ c.accept(grid(ALLOWED_NODE_IDX).services());
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, false);
+ }
+
+ /**
+ * Uses the specified function to perform a service obtaining operation on a node that has the required
+ * permissions to perform this operation and on a node that does not. And checks that in the second case operation
+ * is aborted. Note that {@link SecurityPermission#SERVICE_INVOKE} is checked once before returning service
+ * instance to the user.
+ *
+ * @param f Function to perform a service obtaining operation.
+ * @param isProxy Whether invocation result is service proxy.
+ */
+ private void checkInvoke(Function<IgniteServices, Object> f, boolean isProxy) throws Exception {
+ checkFailed(SERVICE_INVOKE, () -> f.apply(grid(FORBIDDEN_NODE_IDX).services()));
+
+ Object res = f.apply(grid(ALLOWED_NODE_IDX).services());
+
+ if (!isProxy) {
+ TestService srvc;
+
+ if (res instanceof Collection) {
+ Collection<TestService> srvcs = (Collection<TestService>)res;
+
+ assertFalse(srvcs.isEmpty());
+
+ srvc = srvcs.iterator().next();
+ }
+ else {
+ assertTrue(res instanceof TestService);
+
+ srvc = (TestService)res;
+ }
+
+ assertTrue(srvc.doWork());
+ }
+ else
+ assertTrue(((TestService)res).doWork());
+ }
+
+ /**
+ * Uses the specified consumer to perform a service deployment operation on a node that has the required
+ * permissions to perform this operation and on a node that does not. And checks that in the second case operation
+ * is aborted.
+ *
+ * @param c Consumer to perform a service deployment operation.
+ * @param isSingleton Whether deployed service is singleton.
+ */
+ private void checkDeploy(Consumer<IgniteServices> c, boolean isSingleton) {
+ grid(ALLOWED_NODE_IDX).services().cancel(TEST_SERVICE_NAME);
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, false);
+
+ checkFailed(SERVICE_DEPLOY, () -> c.accept(grid(FORBIDDEN_NODE_IDX).services()));
+
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, false);
+
+ c.accept(grid(ALLOWED_NODE_IDX).services());
+
+ if (!isSingleton)
+ checkServiceOnAllNodes(TEST_SERVICE_NAME, true);
+ else
+ assertTrue(G.allGrids().stream().anyMatch(ignite -> ignite.services().service(TEST_SERVICE_NAME) != null));
+ }
+
+ /** Test service interface. */
+ public static interface TestService extends Service {
+ /** Dummy test service method. */
+ public boolean doWork();
+ }
+
+ /** Test service implementation. */
+ public static class TestServiceImpl implements TestService {
+ /** {@inheritDoc} */
+ @Override public boolean doWork() {
+ return true;
+ }
+ }
+}
diff --git a/modules/core/src/test/java/org/apache/ignite/testsuites/SecurityTestSuite.java b/modules/core/src/test/java/org/apache/ignite/testsuites/SecurityTestSuite.java
index c56ec9c..2a39956 100644
--- a/modules/core/src/test/java/org/apache/ignite/testsuites/SecurityTestSuite.java
+++ b/modules/core/src/test/java/org/apache/ignite/testsuites/SecurityTestSuite.java
@@ -64,6 +64,7 @@ import org.apache.ignite.internal.processors.security.sandbox.PrivilegedProxyTes
import org.apache.ignite.internal.processors.security.sandbox.SchedulerSandboxTest;
import org.apache.ignite.internal.processors.security.sandbox.SecuritySubjectPermissionsTest;
import org.apache.ignite.internal.processors.security.scheduler.SchedulerRemoteSecurityContextCheckTest;
+import org.apache.ignite.internal.processors.security.service.ServiceAuthorizationTest;
import org.apache.ignite.internal.processors.security.snapshot.SnapshotPermissionCheckTest;
import org.apache.ignite.ssl.MultipleSSLContextsTest;
import org.apache.ignite.tools.junit.JUnitTeamcityReporter;
@@ -128,7 +129,8 @@ import org.junit.runners.Suite;
IgniteSecurityProcessorTest.class,
MultipleSSLContextsTest.class,
MaintenanceModeNodeSecurityTest.class,
- DaemonNodeBasicSecurityTest.class
+ DaemonNodeBasicSecurityTest.class,
+ ServiceAuthorizationTest.class
})
public class SecurityTestSuite {
/** */