test_apptimelineserver.py 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422
  1. #!/usr/bin/env python
  2. '''
  3. Licensed to the Apache Software Foundation (ASF) under one
  4. or more contributor license agreements. See the NOTICE file
  5. distributed with this work for additional information
  6. regarding copyright ownership. The ASF licenses this file
  7. to you under the Apache License, Version 2.0 (the
  8. "License"); you may not use this file except in compliance
  9. with the License. You may obtain a copy of the License at
  10. http://www.apache.org/licenses/LICENSE-2.0
  11. Unless required by applicable law or agreed to in writing, software
  12. distributed under the License is distributed on an "AS IS" BASIS,
  13. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. See the License for the specific language governing permissions and
  15. limitations under the License.
  16. '''
  17. import json
  18. import os
  19. from mock.mock import MagicMock, call, patch
  20. from stacks.utils.RMFTestCase import *
  21. import resource_management.libraries.functions
  22. origin_exists = os.path.exists
  23. @patch("platform.linux_distribution", new = MagicMock(return_value="Linux"))
  24. @patch.object(resource_management.libraries.functions, "check_process_status", new = MagicMock())
  25. @patch.object(os.path, "exists", new=MagicMock(
  26. side_effect=lambda *args: origin_exists(args[0])
  27. if args[0][-2:] == "j2" else True))
  28. class TestAppTimelineServer(RMFTestCase):
  29. COMMON_SERVICES_PACKAGE_DIR = "YARN/2.1.0.2.0/package"
  30. STACK_VERSION = "2.0.6"
  31. def test_configure_default(self):
  32. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  33. classname="ApplicationTimelineServer",
  34. command="configure",
  35. config_file="default.json",
  36. hdp_stack_version = self.STACK_VERSION,
  37. target = RMFTestCase.TARGET_COMMON_SERVICES
  38. )
  39. self.assert_configure_default()
  40. self.assertNoMoreResources()
  41. def test_start_default(self):
  42. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  43. classname="ApplicationTimelineServer",
  44. command="start",
  45. config_file="default.json",
  46. hdp_stack_version = self.STACK_VERSION,
  47. target = RMFTestCase.TARGET_COMMON_SERVICES
  48. )
  49. self.assert_configure_default()
  50. self.assertResourceCalled('File', '/var/log/hadoop-yarn/timeline/leveldb-timeline-store.ldb/LOCK',
  51. only_if='ls /var/log/hadoop-yarn/timeline/leveldb-timeline-store.ldb/LOCK',
  52. action=['delete'],
  53. ignore_failures=True)
  54. self.assertResourceCalled('File', '/var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid',
  55. action = ['delete'],
  56. not_if = "ambari-sudo.sh su yarn -l -s /bin/bash -c '[RMF_EXPORT_PLACEHOLDER]ls /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid && ps -p `cat /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid`'",
  57. )
  58. self.assertResourceCalled('Execute', 'ulimit -c unlimited; export HADOOP_LIBEXEC_DIR=/usr/lib/hadoop/libexec && /usr/lib/hadoop-yarn/sbin/yarn-daemon.sh --config /etc/hadoop/conf start timelineserver',
  59. not_if = "ambari-sudo.sh su yarn -l -s /bin/bash -c '[RMF_EXPORT_PLACEHOLDER]ls /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid && ps -p `cat /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid`'",
  60. user = 'yarn',
  61. )
  62. self.assertResourceCalled('Execute', "ambari-sudo.sh su yarn -l -s /bin/bash -c '[RMF_EXPORT_PLACEHOLDER]ls /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid && ps -p `cat /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid`'",
  63. not_if = "ambari-sudo.sh su yarn -l -s /bin/bash -c '[RMF_EXPORT_PLACEHOLDER]ls /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid && ps -p `cat /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid`'",
  64. tries = 5,
  65. try_sleep = 1,
  66. )
  67. self.assertNoMoreResources()
  68. def test_stop_default(self):
  69. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  70. classname="ApplicationTimelineServer",
  71. command="stop",
  72. config_file="default.json",
  73. hdp_stack_version = self.STACK_VERSION,
  74. target = RMFTestCase.TARGET_COMMON_SERVICES
  75. )
  76. self.assertResourceCalled('Execute', 'export HADOOP_LIBEXEC_DIR=/usr/lib/hadoop/libexec && /usr/lib/hadoop-yarn/sbin/yarn-daemon.sh --config /etc/hadoop/conf stop timelineserver',
  77. user='yarn')
  78. self.assertNoMoreResources()
  79. def assert_configure_default(self):
  80. self.assertResourceCalled('Directory', '/var/run/hadoop-yarn',
  81. owner = 'yarn',
  82. group = 'hadoop',
  83. recursive = True,
  84. cd_access = 'a',
  85. )
  86. self.assertResourceCalled('Directory', '/var/run/hadoop-yarn/yarn',
  87. owner = 'yarn',
  88. group = 'hadoop',
  89. recursive = True,
  90. cd_access = 'a',
  91. )
  92. self.assertResourceCalled('Directory', '/var/log/hadoop-yarn/yarn',
  93. owner = 'yarn',
  94. group = 'hadoop',
  95. recursive = True,
  96. cd_access = 'a',
  97. )
  98. self.assertResourceCalled('Directory', '/var/run/hadoop-mapreduce',
  99. owner = 'mapred',
  100. group = 'hadoop',
  101. recursive = True,
  102. cd_access = 'a',
  103. )
  104. self.assertResourceCalled('Directory', '/var/run/hadoop-mapreduce/mapred',
  105. owner = 'mapred',
  106. group = 'hadoop',
  107. recursive = True,
  108. cd_access = 'a',
  109. )
  110. self.assertResourceCalled('Directory', '/var/log/hadoop-mapreduce',
  111. owner = 'mapred',
  112. group = 'hadoop',
  113. recursive = True,
  114. cd_access = 'a',
  115. )
  116. self.assertResourceCalled('Directory', '/var/log/hadoop-mapreduce/mapred',
  117. owner = 'mapred',
  118. group = 'hadoop',
  119. recursive = True,
  120. cd_access = 'a',
  121. )
  122. self.assertResourceCalled('Directory', '/var/log/hadoop-yarn',
  123. owner = 'yarn',
  124. recursive = True,
  125. ignore_failures = True,
  126. cd_access = 'a',
  127. )
  128. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  129. owner = 'hdfs',
  130. group = 'hadoop',
  131. mode = 0644,
  132. conf_dir = '/etc/hadoop/conf',
  133. configurations = self.getConfig()['configurations']['core-site'],
  134. configuration_attributes = self.getConfig()['configuration_attributes']['core-site']
  135. )
  136. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  137. owner = 'hdfs',
  138. group = 'hadoop',
  139. mode = 0644,
  140. conf_dir = '/etc/hadoop/conf',
  141. configurations = self.getConfig()['configurations']['hdfs-site'],
  142. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  143. )
  144. self.assertResourceCalled('XmlConfig', 'mapred-site.xml',
  145. owner = 'yarn',
  146. group = 'hadoop',
  147. mode = 0644,
  148. conf_dir = '/etc/hadoop/conf',
  149. configurations = self.getConfig()['configurations']['mapred-site'],
  150. configuration_attributes = self.getConfig()['configuration_attributes']['mapred-site']
  151. )
  152. self.assertResourceCalled('XmlConfig', 'yarn-site.xml',
  153. owner = 'yarn',
  154. group = 'hadoop',
  155. mode = 0644,
  156. conf_dir = '/etc/hadoop/conf',
  157. configurations = self.getConfig()['configurations']['yarn-site'],
  158. configuration_attributes = self.getConfig()['configuration_attributes']['yarn-site']
  159. )
  160. self.assertResourceCalled('XmlConfig', 'capacity-scheduler.xml',
  161. owner = 'yarn',
  162. group = 'hadoop',
  163. mode = 0644,
  164. conf_dir = '/etc/hadoop/conf',
  165. configurations = self.getConfig()['configurations']['capacity-scheduler'],
  166. configuration_attributes = self.getConfig()['configuration_attributes']['capacity-scheduler']
  167. )
  168. self.assertResourceCalled('Directory', '/var/log/hadoop-yarn/timeline',
  169. owner = 'yarn',
  170. group = 'hadoop',
  171. recursive = True,
  172. cd_access='a'
  173. )
  174. self.assertResourceCalled('HdfsResource', None,
  175. security_enabled = False,
  176. hadoop_bin_dir = '/usr/bin',
  177. keytab = UnknownConfigurationMock(),
  178. default_fs = 'hdfs://c6401.ambari.apache.org:8020',
  179. dfs_type = '',
  180. hdfs_site = self.getConfig()['configurations']['hdfs-site'],
  181. kinit_path_local = '/usr/bin/kinit',
  182. principal_name = UnknownConfigurationMock(),
  183. user = 'hdfs',
  184. action = ['execute'],
  185. hadoop_conf_dir = '/etc/hadoop/conf',
  186. )
  187. self.assertResourceCalled('File', '/etc/hadoop/conf/yarn.exclude',
  188. owner = 'yarn',
  189. group = 'hadoop',
  190. )
  191. self.assertResourceCalled('File', '/etc/security/limits.d/yarn.conf',
  192. content = Template('yarn.conf.j2'),
  193. mode = 0644,
  194. )
  195. self.assertResourceCalled('File', '/etc/security/limits.d/mapreduce.conf',
  196. content = Template('mapreduce.conf.j2'),
  197. mode = 0644,
  198. )
  199. self.assertResourceCalled('File', '/etc/hadoop/conf/yarn-env.sh',
  200. content = InlineTemplate(self.getConfig()['configurations']['yarn-env']['content']),
  201. owner = 'yarn',
  202. group = 'hadoop',
  203. mode = 0755,
  204. )
  205. self.assertResourceCalled('File', '/usr/lib/hadoop-yarn/bin/container-executor',
  206. group = 'hadoop',
  207. mode = 02050,
  208. )
  209. self.assertResourceCalled('File', '/etc/hadoop/conf/container-executor.cfg',
  210. content = Template('container-executor.cfg.j2'),
  211. group = 'hadoop',
  212. mode = 0644,
  213. )
  214. self.assertResourceCalled('Directory', '/cgroups_test/cpu',
  215. group = 'hadoop',
  216. recursive = True,
  217. mode = 0755,
  218. cd_access="a"
  219. )
  220. self.assertResourceCalled('File', '/etc/hadoop/conf/mapred-env.sh',
  221. content = InlineTemplate(self.getConfig()['configurations']['mapred-env']['content']),
  222. mode = 0755,
  223. owner = 'hdfs',
  224. )
  225. self.assertResourceCalled('File', '/etc/hadoop/conf/taskcontroller.cfg',
  226. content = Template('taskcontroller.cfg.j2'),
  227. owner = 'hdfs',
  228. )
  229. self.assertResourceCalled('XmlConfig', 'mapred-site.xml',
  230. owner = 'mapred',
  231. group = 'hadoop',
  232. conf_dir = '/etc/hadoop/conf',
  233. configurations = self.getConfig()['configurations']['mapred-site'],
  234. configuration_attributes = self.getConfig()['configuration_attributes']['mapred-site']
  235. )
  236. self.assertResourceCalled('XmlConfig', 'capacity-scheduler.xml',
  237. owner = 'hdfs',
  238. group = 'hadoop',
  239. conf_dir = '/etc/hadoop/conf',
  240. configurations = self.getConfig()['configurations']['capacity-scheduler'],
  241. configuration_attributes = self.getConfig()['configuration_attributes']['capacity-scheduler']
  242. )
  243. self.assertResourceCalled('File', '/etc/hadoop/conf/fair-scheduler.xml',
  244. owner = 'mapred',
  245. group = 'hadoop',
  246. )
  247. self.assertResourceCalled('File', '/etc/hadoop/conf/ssl-client.xml.example',
  248. owner = 'mapred',
  249. group = 'hadoop',
  250. )
  251. self.assertResourceCalled('File', '/etc/hadoop/conf/ssl-server.xml.example',
  252. owner = 'mapred',
  253. group = 'hadoop',
  254. )
  255. def test_status(self):
  256. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  257. classname="ApplicationTimelineServer",
  258. command="status",
  259. config_file="default.json",
  260. hdp_stack_version = self.STACK_VERSION,
  261. target = RMFTestCase.TARGET_COMMON_SERVICES
  262. )
  263. self.assertResourceCalled('Execute', 'mv /var/run/hadoop-yarn/yarn/yarn-yarn-historyserver.pid /var/run/hadoop-yarn/yarn/yarn-yarn-timelineserver.pid',
  264. only_if = 'test -e /var/run/hadoop-yarn/yarn/yarn-yarn-historyserver.pid',
  265. )
  266. self.assertNoMoreResources()
  267. @patch("resource_management.libraries.functions.security_commons.build_expectations")
  268. @patch("resource_management.libraries.functions.security_commons.get_params_from_filesystem")
  269. @patch("resource_management.libraries.functions.security_commons.validate_security_config_properties")
  270. @patch("resource_management.libraries.functions.security_commons.cached_kinit_executor")
  271. @patch("resource_management.libraries.script.Script.put_structured_out")
  272. def test_security_status(self, put_structured_out_mock, cached_kinit_executor_mock, validate_security_config_mock, get_params_mock, build_exp_mock):
  273. # Test that function works when is called with correct parameters
  274. security_params = {
  275. 'yarn-site': {
  276. 'yarn.timeline-service.keytab': '/path/to/applicationtimeline/keytab',
  277. 'yarn.timeline-service.principal': 'applicationtimeline_principal',
  278. 'yarn.timeline-service.http-authentication.kerberos.keytab': 'path/to/timeline/kerberos/keytab',
  279. 'yarn.timeline-service.http-authentication.kerberos.principal': 'timeline_principal'
  280. }
  281. }
  282. result_issues = []
  283. props_value_check = {"yarn.timeline-service.enabled": "true",
  284. "yarn.timeline-service.http-authentication.type": "kerberos",
  285. "yarn.acl.enable": "true"}
  286. props_empty_check = ["yarn.timeline-service.principal",
  287. "yarn.timeline-service.keytab",
  288. "yarn.timeline-service.http-authentication.kerberos.principal",
  289. "yarn.timeline-service.http-authentication.kerberos.keytab"]
  290. props_read_check = ["yarn.timeline-service.keytab",
  291. "yarn.timeline-service.http-authentication.kerberos.keytab"]
  292. get_params_mock.return_value = security_params
  293. validate_security_config_mock.return_value = result_issues
  294. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  295. classname="ApplicationTimelineServer",
  296. command="security_status",
  297. config_file="secured.json",
  298. hdp_stack_version = self.STACK_VERSION,
  299. target = RMFTestCase.TARGET_COMMON_SERVICES
  300. )
  301. build_exp_mock.assert_called_with('yarn-site', props_value_check, props_empty_check, props_read_check)
  302. put_structured_out_mock.assert_called_with({"securityState": "SECURED_KERBEROS"})
  303. self.assertTrue(cached_kinit_executor_mock.call_count, 2)
  304. cached_kinit_executor_mock.assert_called_with('/usr/bin/kinit',
  305. self.config_dict['configurations']['yarn-env']['yarn_user'],
  306. security_params['yarn-site']['yarn.timeline-service.http-authentication.kerberos.keytab'],
  307. security_params['yarn-site']['yarn.timeline-service.http-authentication.kerberos.principal'],
  308. self.config_dict['hostname'],
  309. '/tmp')
  310. # Testing that the exception throw by cached_executor is caught
  311. cached_kinit_executor_mock.reset_mock()
  312. cached_kinit_executor_mock.side_effect = Exception("Invalid command")
  313. try:
  314. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  315. classname="ApplicationTimelineServer",
  316. command="security_status",
  317. config_file="secured.json",
  318. hdp_stack_version = self.STACK_VERSION,
  319. target = RMFTestCase.TARGET_COMMON_SERVICES
  320. )
  321. except:
  322. self.assertTrue(True)
  323. # Testing with a security_params which doesn't contains yarn-site
  324. empty_security_params = {}
  325. cached_kinit_executor_mock.reset_mock()
  326. get_params_mock.reset_mock()
  327. put_structured_out_mock.reset_mock()
  328. get_params_mock.return_value = empty_security_params
  329. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  330. classname="ApplicationTimelineServer",
  331. command="security_status",
  332. config_file="secured.json",
  333. hdp_stack_version = self.STACK_VERSION,
  334. target = RMFTestCase.TARGET_COMMON_SERVICES
  335. )
  336. put_structured_out_mock.assert_called_with({"securityIssuesFound": "Keytab file or principal are not set property."})
  337. # Testing with not empty result_issues
  338. result_issues_with_params = {
  339. 'yarn-site': "Something bad happened"
  340. }
  341. validate_security_config_mock.reset_mock()
  342. get_params_mock.reset_mock()
  343. validate_security_config_mock.return_value = result_issues_with_params
  344. get_params_mock.return_value = security_params
  345. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  346. classname="ApplicationTimelineServer",
  347. command="security_status",
  348. config_file="secured.json",
  349. hdp_stack_version = self.STACK_VERSION,
  350. target = RMFTestCase.TARGET_COMMON_SERVICES
  351. )
  352. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  353. # Testing with security_enable = false
  354. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  355. classname="ApplicationTimelineServer",
  356. command="security_status",
  357. config_file="default.json",
  358. hdp_stack_version = self.STACK_VERSION,
  359. target = RMFTestCase.TARGET_COMMON_SERVICES
  360. )
  361. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  362. @patch.object(resource_management.libraries.functions, "get_hdp_version", new = MagicMock(return_value='2.3.0.0-1234'))
  363. def test_pre_upgrade_restart_23(self):
  364. config_file = self.get_src_folder()+"/test/python/stacks/2.0.6/configs/default.json"
  365. with open(config_file, "r") as f:
  366. json_content = json.load(f)
  367. version = '2.3.0.0-1234'
  368. json_content['commandParams']['version'] = version
  369. mocks_dict = {}
  370. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/application_timeline_server.py",
  371. classname = "ApplicationTimelineServer",
  372. command = "pre_upgrade_restart",
  373. config_dict = json_content,
  374. hdp_stack_version = self.STACK_VERSION,
  375. target = RMFTestCase.TARGET_COMMON_SERVICES,
  376. call_mocks = [(0, None, ''), (0, None, '')],
  377. mocks_dict = mocks_dict)
  378. self.assertResourceCalled('Execute', ('ambari-python-wrap', '/usr/bin/hdp-select', 'set', 'hadoop-yarn-timelineserver', version), sudo=True)
  379. self.assertNoMoreResources()
  380. self.assertEquals(1, mocks_dict['call'].call_count)
  381. self.assertEquals(1, mocks_dict['checked_call'].call_count)
  382. self.assertEquals(
  383. ('ambari-python-wrap', '/usr/bin/conf-select', 'set-conf-dir', '--package', 'hadoop', '--stack-version', '2.3.0.0-1234', '--conf-version', '0'),
  384. mocks_dict['checked_call'].call_args_list[0][0][0])
  385. self.assertEquals(
  386. ('ambari-python-wrap', '/usr/bin/conf-select', 'create-conf-dir', '--package', 'hadoop', '--stack-version', '2.3.0.0-1234', '--conf-version', '0'),
  387. mocks_dict['call'].call_args_list[0][0][0])