|
@@ -0,0 +1,95 @@
|
|
|
+/*
|
|
|
+ * Licensed to the Apache Software Foundation (ASF) under one
|
|
|
+ * or more contributor license agreements. See the NOTICE file
|
|
|
+ * distributed with this work for additional information
|
|
|
+ * regarding copyright ownership. The ASF licenses this file
|
|
|
+ * to you under the Apache License, Version 2.0 (the
|
|
|
+ * "License"); you may not use this file except in compliance
|
|
|
+ * with the License. You may obtain a copy of the License at
|
|
|
+ *
|
|
|
+ * http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+ *
|
|
|
+ * Unless required by applicable law or agreed to in writing, software
|
|
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ * See the License for the specific language governing permissions and
|
|
|
+ * limitations under the License.
|
|
|
+ */
|
|
|
+package org.apache.ambari.server.checks;
|
|
|
+
|
|
|
+import java.util.HashMap;
|
|
|
+import java.util.Map;
|
|
|
+
|
|
|
+import org.apache.ambari.server.controller.PrereqCheckRequest;
|
|
|
+import org.apache.ambari.server.state.Cluster;
|
|
|
+import org.apache.ambari.server.state.Clusters;
|
|
|
+import org.apache.ambari.server.state.SecurityType;
|
|
|
+import org.apache.ambari.server.state.Service;
|
|
|
+import org.apache.ambari.server.state.stack.PrereqCheckStatus;
|
|
|
+import org.apache.ambari.server.state.stack.PrerequisiteCheck;
|
|
|
+import org.junit.Assert;
|
|
|
+import org.junit.Before;
|
|
|
+import org.junit.Test;
|
|
|
+import org.mockito.Mockito;
|
|
|
+
|
|
|
+import com.google.inject.Provider;
|
|
|
+
|
|
|
+public class KafkaKerberosCheckTest {
|
|
|
+ private final Clusters clusters = Mockito.mock(Clusters.class);
|
|
|
+
|
|
|
+ private final KafkaKerberosCheck kafkaKerberosCheck = new KafkaKerberosCheck();
|
|
|
+
|
|
|
+ @Before
|
|
|
+ public void setup() {
|
|
|
+ kafkaKerberosCheck.clustersProvider = new Provider<Clusters>() {
|
|
|
+
|
|
|
+ @Override
|
|
|
+ public Clusters get() {
|
|
|
+ return clusters;
|
|
|
+ }
|
|
|
+ };
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ public void testIsApplicable() throws Exception {
|
|
|
+ final Cluster cluster = Mockito.mock(Cluster.class);
|
|
|
+ final Map<String, Service> services = new HashMap<>();
|
|
|
+ final Service service = Mockito.mock(Service.class);
|
|
|
+
|
|
|
+ services.put("KAFKA", service);
|
|
|
+
|
|
|
+ Mockito.when(cluster.getServices()).thenReturn(services);
|
|
|
+ Mockito.when(cluster.getClusterId()).thenReturn(1L);
|
|
|
+ Mockito.when(clusters.getCluster("cluster")).thenReturn(cluster);
|
|
|
+
|
|
|
+ Assert.assertTrue(kafkaKerberosCheck.isApplicable(new PrereqCheckRequest("cluster")));
|
|
|
+
|
|
|
+ services.remove("KAFKA");
|
|
|
+ Assert.assertFalse(kafkaKerberosCheck.isApplicable(new PrereqCheckRequest("cluster")));
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ public void testPerform() throws Exception {
|
|
|
+ final Cluster cluster = Mockito.mock(Cluster.class);
|
|
|
+ final Map<String, Service> services = new HashMap<>();
|
|
|
+ final Service service = Mockito.mock(Service.class);
|
|
|
+
|
|
|
+ services.put("KAFKA", service);
|
|
|
+
|
|
|
+ Mockito.when(cluster.getServices()).thenReturn(services);
|
|
|
+ Mockito.when(cluster.getClusterId()).thenReturn(1L);
|
|
|
+ Mockito.when(cluster.getSecurityType()).thenReturn(SecurityType.KERBEROS);
|
|
|
+ Mockito.when(clusters.getCluster("cluster")).thenReturn(cluster);
|
|
|
+
|
|
|
+ PrerequisiteCheck check = new PrerequisiteCheck(null, null);
|
|
|
+
|
|
|
+ kafkaKerberosCheck.perform(check, new PrereqCheckRequest("cluster"));
|
|
|
+ Assert.assertEquals(PrereqCheckStatus.WARNING, check.getStatus());
|
|
|
+
|
|
|
+ check = new PrerequisiteCheck(null, null);
|
|
|
+ Mockito.when(cluster.getSecurityType()).thenReturn(SecurityType.NONE);
|
|
|
+
|
|
|
+ kafkaKerberosCheck.perform(check, new PrereqCheckRequest("cluster"));
|
|
|
+ Assert.assertEquals(PrereqCheckStatus.PASS, check.getStatus());
|
|
|
+ }
|
|
|
+}
|