public void itestNoAuthenticatorWithCredentials(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authenticator = gen.getAuthenticator(); String authInit = gen.getAuthInit(); getLogWriter().info("testNoAuthenticatorWithCredentials: Using scheme: " + gen.classCode()); getLogWriter().info("testNoAuthenticatorWithCredentials: Using authinit: " + authInit); // Start the servers with no authenticator Integer locPort1 = SecurityTestUtil.getLocatorPort(); Integer locPort2 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = (Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, null, extraProps, javaProps}); Integer port2 = (Integer) server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, null, extraProps, javaProps}); // Clients should connect successfully and work properly with // valid/invalid credentials when none are required on the server side Properties credentials1 = gen.getValidCredentials(3); Properties javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testNoAuthenticatorWithCredentials: For first client credentials: " + credentials1 + " : " + javaProps1); Properties credentials2 = gen.getInvalidCredentials(5); Properties javaProps2 = gen.getJavaProperties(); getLogWriter() .info( "testNoAuthenticatorWithCredentials: For second client credentials: " + credentials2 + " : " + javaProps2); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2)}); // Verify that the puts succeeded client2.invoke(SecurityTestUtil.class, "doGets", new Object[] {new Integer(2)}); }
public void itestCredentialsWithFailover(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authenticator = gen.getAuthenticator(); String authInit = gen.getAuthInit(); getLogWriter().info("testCredentialsWithFailover: Using scheme: " + gen.classCode()); getLogWriter().info("testCredentialsWithFailover: Using authenticator: " + authenticator); getLogWriter().info("testCredentialsWithFailover: Using authinit: " + authInit); // Start the first server Integer locPort1 = SecurityTestUtil.getLocatorPort(); Integer locPort2 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = (Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, authenticator, extraProps, javaProps}); // Get a port for second server but do not start it // This forces the clients to connect to the first server Integer port2 = new Integer(AvailablePort.getRandomAvailablePort(AvailablePort.SOCKET)); // Start the clients with valid credentials Properties credentials1 = gen.getValidCredentials(5); Properties javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testCredentialsWithFailover: For first client credentials: " + credentials1 + " : " + javaProps1); Properties credentials2 = gen.getValidCredentials(6); Properties javaProps2 = gen.getJavaProperties(); getLogWriter() .info( "testCredentialsWithFailover: For second client credentials: " + credentials2 + " : " + javaProps2); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2)}); // Verify that the puts succeeded client2.invoke(SecurityTestUtil.class, "doGets", new Object[] {new Integer(2)}); // start the second one and stop the first server to force a failover server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, port2, authenticator, extraProps, javaProps}); server1.invoke(SecurityTestUtil.class, "closeCache"); // Perform some create/update operations from client1 client1.invoke(SecurityTestUtil.class, "doNPuts", new Object[] {new Integer(4)}); // Verify that the creates/updates succeeded client2.invoke(SecurityTestUtil.class, "doNGets", new Object[] {new Integer(4)}); // Try to connect client2 with no credentials // Verify that the creation of region throws security exception if (gen.classCode().equals(ClassCode.SSL)) { // For SSL the exception may not come since the server can close socket // before handshake message is sent from client. However exception // should come in any region operations. client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, null, null, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NOFORCE_AUTHREQ_EXCEPTION) }); client2.invoke( SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2), new Integer(SecurityTestUtil.OTHER_EXCEPTION)}); } else { client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, null, null, port1, port2, null, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); } // Now try to connect client1 with invalid credentials // Verify that the creation of region throws security exception credentials1 = gen.getInvalidCredentials(7); javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testCredentialsWithFailover: For first client invalid credentials: " + credentials1 + " : " + javaProps1); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); if (multiUser) { client1.invoke(SecurityTestUtil.class, "doProxyCacheClose"); client2.invoke(SecurityTestUtil.class, "doProxyCacheClose"); client1.invoke(SecurityTestUtil.class, "doSimplePut", new Object[] {"CacheClosedException"}); client2.invoke(SecurityTestUtil.class, "doSimpleGet", new Object[] {"CacheClosedException"}); } }
public void itestInvalidAuthenticator(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authInit = gen.getAuthInit(); getLogWriter().info("testInvalidAuthenticator: Using scheme: " + gen.classCode()); getLogWriter().info("testInvalidAuthenticator: Using authinit: " + authInit); // Start the server with invalid authenticator Integer locPort1 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = (Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] { locPort1, locString, "com.gemstone.gemfire.none", extraProps, javaProps }); // Trying to create the region on client should throw a security exception Properties credentials = gen.getValidCredentials(1); javaProps = gen.getJavaProperties(); getLogWriter() .info( "testInvalidAuthenticator: For first client credentials: " + credentials + " : " + javaProps); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials, javaProps, port1, null, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); client1.invoke(SecurityTestUtil.class, "closeCache"); // Also test with invalid credentials credentials = gen.getInvalidCredentials(1); javaProps = gen.getJavaProperties(); getLogWriter() .info( "testInvalidAuthenticator: For first client credentials: " + credentials + " : " + javaProps); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials, javaProps, port1, null, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); }
public void itestInvalidCredentials(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authenticator = gen.getAuthenticator(); String authInit = gen.getAuthInit(); getLogWriter().info("testInvalidCredentials: Using scheme: " + gen.classCode()); getLogWriter().info("testInvalidCredentials: Using authenticator: " + authenticator); getLogWriter().info("testInvalidCredentials: Using authinit: " + authInit); // Start the servers Integer locPort1 = SecurityTestUtil.getLocatorPort(); Integer locPort2 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = ((Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, authenticator, extraProps, javaProps})); Integer port2 = ((Integer) server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, authenticator, extraProps, javaProps})); // Start first client with valid credentials Properties credentials1 = gen.getValidCredentials(1); Properties javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testInvalidCredentials: For first client credentials: " + credentials1 + " : " + javaProps1); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2)}); // Start second client with invalid credentials // Trying to create the region on client2 should throw a security // exception Properties credentials2 = gen.getInvalidCredentials(1); Properties javaProps2 = gen.getJavaProperties(); getLogWriter() .info( "testInvalidCredentials: For second client credentials: " + credentials2 + " : " + javaProps2); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, null, multiUser, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); }
public void itestNoCredentials(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authenticator = gen.getAuthenticator(); String authInit = gen.getAuthInit(); getLogWriter().info("testNoCredentials: Using scheme: " + gen.classCode()); getLogWriter().info("testNoCredentials: Using authenticator: " + authenticator); getLogWriter().info("testNoCredentials: Using authinit: " + authInit); // Start the servers Integer locPort1 = SecurityTestUtil.getLocatorPort(); Integer locPort2 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = ((Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, authenticator, extraProps, javaProps})); Integer port2 = ((Integer) server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, authenticator, extraProps, javaProps})); // Start first client with valid credentials Properties credentials1 = gen.getValidCredentials(1); Properties javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testNoCredentials: For first client credentials: " + credentials1 + " : " + javaProps1); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2)}); // Trying to create the region on client2 if (gen.classCode().equals(ClassCode.SSL)) { // For SSL the exception may not come since the server can close socket // before handshake message is sent from client. However exception // should come in any region operations. client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, null, null, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); client2.invoke( SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2), new Integer(SecurityTestUtil.OTHER_EXCEPTION)}); } else { client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, null, null, port1, port2, null, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); } }
public void itestValidCredentials(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authenticator = gen.getAuthenticator(); String authInit = gen.getAuthInit(); getLogWriter().info("testValidCredentials: Using scheme: " + gen.classCode()); getLogWriter().info("testValidCredentials: Using authenticator: " + authenticator); getLogWriter().info("testValidCredentials: Using authinit: " + authInit); // Start the servers Integer locPort1 = SecurityTestUtil.getLocatorPort(); Integer locPort2 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = (Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, authenticator, extraProps, javaProps}); Integer port2 = (Integer) server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, authenticator, extraProps, javaProps}); // Start the clients with valid credentials Properties credentials1 = gen.getValidCredentials(1); Properties javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testValidCredentials: For first client credentials: " + credentials1 + " : " + javaProps1); Properties credentials2 = gen.getValidCredentials(2); Properties javaProps2 = gen.getJavaProperties(); getLogWriter() .info( "testValidCredentials: For second client credentials: " + credentials2 + " : " + javaProps2); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2)}); // Verify that the puts succeeded client2.invoke(SecurityTestUtil.class, "doGets", new Object[] {new Integer(2)}); if (multiUser) { client1.invoke(SecurityTestUtil.class, "doProxyCacheClose"); client2.invoke(SecurityTestUtil.class, "doProxyCacheClose"); client1.invoke(SecurityTestUtil.class, "doSimplePut", new Object[] {"CacheClosedException"}); client2.invoke(SecurityTestUtil.class, "doSimpleGet", new Object[] {"CacheClosedException"}); } }
public void itestCredentialsForNotifications(Boolean multiUser) { CredentialGenerator gen = new DummyCredentialGenerator(); Properties extraProps = gen.getSystemProperties(); Properties javaProps = gen.getJavaProperties(); String authenticator = gen.getAuthenticator(); String authInit = gen.getAuthInit(); getLogWriter().info("testCredentialsForNotifications: Using scheme: " + gen.classCode()); getLogWriter().info("testCredentialsForNotifications: Using authenticator: " + authenticator); getLogWriter().info("testCredentialsForNotifications: Using authinit: " + authInit); // Start the first server Integer locPort1 = SecurityTestUtil.getLocatorPort(); Integer locPort2 = SecurityTestUtil.getLocatorPort(); String locString = SecurityTestUtil.getLocatorString(); Integer port1 = (Integer) server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, authenticator, extraProps, javaProps}); // Get a port for second server but do not start it // This forces the clients to connect to the first server Integer port2 = new Integer(AvailablePort.getRandomAvailablePort(AvailablePort.SOCKET)); // Start the clients with valid credentials Properties credentials1 = gen.getValidCredentials(3); Properties javaProps1 = gen.getJavaProperties(); getLogWriter() .info( "testCredentialsForNotifications: For first client credentials: " + credentials1 + " : " + javaProps1); Properties credentials2 = gen.getValidCredentials(4); Properties javaProps2 = gen.getJavaProperties(); getLogWriter() .info( "testCredentialsForNotifications: For second client credentials: " + credentials2 + " : " + javaProps2); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Set up zero forward connections to check notification handshake only Object zeroConns = new Integer(0); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Register interest on all keys on second client client2.invoke(ClientAuthenticationDUnitTest.class, "registerAllInterest"); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2)}); // Verify that the puts succeeded client2.invoke(SecurityTestUtil.class, "doLocalGets", new Object[] {new Integer(2)}); // start the second one and stop the first server to force a failover server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, port2, authenticator, extraProps, javaProps}); server1.invoke(SecurityTestUtil.class, "closeCache"); // Wait for failover to complete pause(500); // Perform some create/update operations from client1 client1.invoke(SecurityTestUtil.class, "doNPuts", new Object[] {new Integer(4)}); // Verify that the creates/updates succeeded client2.invoke(SecurityTestUtil.class, "doNLocalGets", new Object[] {new Integer(4)}); // Try to connect client1 with no credentials // Verify that the creation of region throws security exception server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, port1, authenticator, extraProps, javaProps}); if (gen.classCode().equals(ClassCode.SSL)) { // For SSL the exception may not come since the server can close socket // before handshake message is sent from client. However exception // should come in any region operations. client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, null, null, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.NOFORCE_AUTHREQ_EXCEPTION) }); client1.invoke( SecurityTestUtil.class, "doPuts", new Object[] {new Integer(2), new Integer(SecurityTestUtil.OTHER_EXCEPTION)}); } else { client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, null, null, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); } // Now try to connect client2 with invalid credentials // Verify that the creation of region throws security exception credentials2 = gen.getInvalidCredentials(3); javaProps2 = gen.getJavaProperties(); getLogWriter() .info( "testCredentialsForNotifications: For second client invalid credentials: " + credentials2 + " : " + javaProps2); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); // Now try to connect client2 with invalid auth-init method // Trying to create the region on client with valid credentials should // throw a security exception client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { "com.gemstone.none", credentials1, javaProps1, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); // Now start the servers with invalid authenticator method. // Skip this test for a scheme which does not have an authInit in the // first place (e.g. SSL) since that will fail with AuthReqEx before // authenticator is even invoked. if (authInit != null && authInit.length() > 0) { server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] { locPort1, locString, port1, "com.gemstone.gemfire.none", extraProps, javaProps }); server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] { locPort2, locString, port2, "com.gemstone.gemfire.none", extraProps, javaProps }); // Trying to create the region on client with valid/invalid credentials // should throw a security exception client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHFAIL_EXCEPTION) }); } else { getLogWriter() .info( "testCredentialsForNotifications: Skipping invalid authenticator for scheme [" + gen.classCode() + "] which has no authInit"); } // Try connection with null auth-init on clients. // Skip this test for a scheme which does not have an authInit in the // first place (e.g. SSL). if (authInit != null && authInit.length() > 0) { server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, port1, authenticator, extraProps, javaProps}); server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, port2, authenticator, extraProps, javaProps}); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, credentials2, javaProps2, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); // Now also try with invalid credentials on client2 client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { null, credentials2, javaProps2, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.AUTHREQ_EXCEPTION) }); } else { getLogWriter() .info( "testCredentialsForNotifications: Skipping null authInit for scheme [" + gen.classCode() + "] which has no authInit"); } // Try connection with null authenticator on server and sending // valid/invalid credentials. // If the scheme does not have an authenticator in the first place (e.g. // SSL) then skip it since this test is useless. if (authenticator != null && authenticator.length() > 0) { server1.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort1, locString, port1, null, extraProps, javaProps}); server2.invoke( ClientAuthenticationDUnitTest.class, "createCacheServer", new Object[] {locPort2, locString, port2, null, extraProps, javaProps}); client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Register interest on all keys on second client client2.invoke(ClientAuthenticationDUnitTest.class, "registerAllInterest"); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doPuts", new Object[] {new Integer(4)}); // Verify that the puts succeeded client2.invoke(SecurityTestUtil.class, "doLocalGets", new Object[] {new Integer(4)}); // Now also try with valid credentials on client2 client1.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials2, javaProps2, port1, port2, null, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); client2.invoke( ClientAuthenticationDUnitTest.class, "createCacheClient", new Object[] { authInit, credentials1, javaProps1, port1, port2, zeroConns, multiUser, new Integer(SecurityTestUtil.NO_EXCEPTION) }); // Register interest on all keys on second client client2.invoke(ClientAuthenticationDUnitTest.class, "registerAllInterest"); // Perform some put operations from client1 client1.invoke(SecurityTestUtil.class, "doNPuts", new Object[] {new Integer(4)}); // Verify that the puts succeeded client2.invoke(SecurityTestUtil.class, "doNLocalGets", new Object[] {new Integer(4)}); } else { getLogWriter() .info( "testCredentialsForNotifications: Skipping scheme [" + gen.classCode() + "] which has no authenticator"); } }