test_webhcat_server.py 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469
  1. #!/usr/bin/env python
  2. '''
  3. Licensed to the Apache Software Foundation (ASF) under one
  4. or more contributor license agreements. See the NOTICE file
  5. distributed with this work for additional information
  6. regarding copyright ownership. The ASF licenses this file
  7. to you under the Apache License, Version 2.0 (the
  8. "License"); you may not use this file except in compliance
  9. with the License. You may obtain a copy of the License at
  10. http://www.apache.org/licenses/LICENSE-2.0
  11. Unless required by applicable law or agreed to in writing, software
  12. distributed under the License is distributed on an "AS IS" BASIS,
  13. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. See the License for the specific language governing permissions and
  15. limitations under the License.
  16. '''
  17. import json
  18. from mock.mock import MagicMock, patch
  19. from stacks.utils.RMFTestCase import *
  20. @patch("os.path.isfile", new = MagicMock(return_value=True))
  21. @patch("glob.glob", new = MagicMock(return_value=["one", "two"]))
  22. class TestWebHCatServer(RMFTestCase):
  23. COMMON_SERVICES_PACKAGE_DIR = "HIVE/0.12.0.2.0/package"
  24. STACK_VERSION = "2.0.6"
  25. def test_configure_default(self):
  26. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  27. classname = "WebHCatServer",
  28. command = "configure",
  29. config_file="default.json",
  30. hdp_stack_version = self.STACK_VERSION,
  31. target = RMFTestCase.TARGET_COMMON_SERVICES
  32. )
  33. self.assert_configure_default()
  34. self.assertNoMoreResources()
  35. def test_start_default(self):
  36. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  37. classname = "WebHCatServer",
  38. command = "start",
  39. config_file="default.json",
  40. hdp_stack_version = self.STACK_VERSION,
  41. target = RMFTestCase.TARGET_COMMON_SERVICES
  42. )
  43. self.assert_configure_default()
  44. self.assertResourceCalled('Execute', 'cd /var/run/webhcat ; env HADOOP_HOME=/usr /usr/lib/hcatalog/sbin/webhcat_server.sh start',
  45. not_if = 'ls /var/run/webhcat/webhcat.pid >/dev/null 2>&1 && ps -p `cat /var/run/webhcat/webhcat.pid` >/dev/null 2>&1',
  46. user = 'hcat'
  47. )
  48. self.assertNoMoreResources()
  49. def test_stop_default(self):
  50. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  51. classname = "WebHCatServer",
  52. command = "stop",
  53. config_file="default.json",
  54. hdp_stack_version = self.STACK_VERSION,
  55. target = RMFTestCase.TARGET_COMMON_SERVICES
  56. )
  57. self.assertResourceCalled('Execute', 'env HADOOP_HOME=/usr /usr/lib/hcatalog/sbin/webhcat_server.sh stop',
  58. user = 'hcat',
  59. )
  60. self.assertResourceCalled('File', '/var/run/webhcat/webhcat.pid',
  61. action = ['delete'],
  62. )
  63. self.assertNoMoreResources()
  64. def test_configure_secured(self):
  65. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  66. classname = "WebHCatServer",
  67. command = "configure",
  68. config_file="secured.json",
  69. hdp_stack_version = self.STACK_VERSION,
  70. target = RMFTestCase.TARGET_COMMON_SERVICES
  71. )
  72. self.assert_configure_secured()
  73. self.assertNoMoreResources()
  74. def test_start_secured(self):
  75. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  76. classname = "WebHCatServer",
  77. command = "start",
  78. config_file="secured.json",
  79. hdp_stack_version = self.STACK_VERSION,
  80. target = RMFTestCase.TARGET_COMMON_SERVICES
  81. )
  82. self.assert_configure_secured()
  83. self.assertResourceCalled('Execute', 'cd /var/run/webhcat ; env HADOOP_HOME=/usr /usr/lib/hcatalog/sbin/webhcat_server.sh start',
  84. not_if = 'ls /var/run/webhcat/webhcat.pid >/dev/null 2>&1 && ps -p `cat /var/run/webhcat/webhcat.pid` >/dev/null 2>&1',
  85. user = 'hcat'
  86. )
  87. self.assertNoMoreResources()
  88. def test_stop_secured(self):
  89. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  90. classname = "WebHCatServer",
  91. command = "stop",
  92. config_file="secured.json",
  93. hdp_stack_version = self.STACK_VERSION,
  94. target = RMFTestCase.TARGET_COMMON_SERVICES
  95. )
  96. self.assertResourceCalled('Execute', 'env HADOOP_HOME=/usr /usr/lib/hcatalog/sbin/webhcat_server.sh stop',
  97. user = 'hcat',
  98. )
  99. self.assertResourceCalled('File', '/var/run/webhcat/webhcat.pid',
  100. action = ['delete'],
  101. )
  102. self.assertNoMoreResources()
  103. def assert_configure_default(self):
  104. self.assertResourceCalled('HdfsDirectory', '/apps/webhcat',
  105. security_enabled = False,
  106. keytab = UnknownConfigurationMock(),
  107. conf_dir = '/etc/hadoop/conf',
  108. hdfs_user = 'hdfs',
  109. kinit_path_local = "/usr/bin/kinit",
  110. mode = 0755,
  111. owner = 'hcat',
  112. bin_dir = '/usr/bin',
  113. action = ['create_delayed'],
  114. )
  115. self.assertResourceCalled('HdfsDirectory', '/user/hcat',
  116. security_enabled = False,
  117. keytab = UnknownConfigurationMock(),
  118. conf_dir = '/etc/hadoop/conf',
  119. hdfs_user = 'hdfs',
  120. kinit_path_local = "/usr/bin/kinit",
  121. mode = 0755,
  122. owner = 'hcat',
  123. bin_dir = '/usr/bin',
  124. action = ['create_delayed'],
  125. )
  126. self.assertResourceCalled('HdfsDirectory', None,
  127. security_enabled = False,
  128. keytab = UnknownConfigurationMock(),
  129. conf_dir = '/etc/hadoop/conf',
  130. hdfs_user = 'hdfs',
  131. kinit_path_local = "/usr/bin/kinit",
  132. bin_dir = '/usr/bin',
  133. action = ['create'],
  134. )
  135. self.assertResourceCalled('Directory', '/var/run/webhcat',
  136. owner = 'hcat',
  137. group = 'hadoop',
  138. recursive = True,
  139. mode = 0755,
  140. )
  141. self.assertResourceCalled('Directory', '/var/log/webhcat',
  142. owner = 'hcat',
  143. group = 'hadoop',
  144. recursive = True,
  145. mode = 0755,
  146. )
  147. self.assertResourceCalled('Directory', '/etc/hcatalog/conf',
  148. owner = 'hcat',
  149. group = 'hadoop',
  150. recursive = True,
  151. )
  152. self.assertResourceCalled('CopyFromLocal', '/usr/lib/hadoop-mapreduce/hadoop-streaming-*.jar',
  153. owner='hcat',
  154. mode=0755,
  155. dest_dir='/apps/webhcat',
  156. kinnit_if_needed='',
  157. hadoop_conf_dir='/etc/hadoop/conf',
  158. hadoop_bin_dir='/usr/bin',
  159. hdfs_user='hdfs'
  160. )
  161. self.assertResourceCalled('CopyFromLocal', '/usr/share/HDP-webhcat/pig.tar.gz',
  162. owner='hcat',
  163. mode=0755,
  164. dest_dir='/apps/webhcat',
  165. kinnit_if_needed='',
  166. hadoop_conf_dir='/etc/hadoop/conf',
  167. hadoop_bin_dir='/usr/bin',
  168. hdfs_user='hdfs'
  169. )
  170. self.assertResourceCalled('CopyFromLocal', '/usr/share/HDP-webhcat/hive.tar.gz',
  171. owner='hcat',
  172. mode=0755,
  173. dest_dir='/apps/webhcat',
  174. kinnit_if_needed='',
  175. hadoop_bin_dir='/usr/bin',
  176. hadoop_conf_dir='/etc/hadoop/conf',
  177. hdfs_user='hdfs'
  178. )
  179. self.assertResourceCalled('CopyFromLocal', '/usr/share/HDP-webhcat/sqoop*.tar.gz',
  180. owner='hcat',
  181. mode=0755,
  182. dest_dir='/apps/webhcat',
  183. kinnit_if_needed='',
  184. hadoop_bin_dir='/usr/bin',
  185. hadoop_conf_dir='/etc/hadoop/conf',
  186. hdfs_user='hdfs'
  187. )
  188. self.assertResourceCalled('XmlConfig', 'webhcat-site.xml',
  189. owner = 'hcat',
  190. group = 'hadoop',
  191. conf_dir = '/etc/hcatalog/conf',
  192. configurations = self.getConfig()['configurations']['webhcat-site'],
  193. configuration_attributes = self.getConfig()['configuration_attributes']['webhcat-site']
  194. )
  195. self.assertResourceCalled('File', '/etc/hcatalog/conf/webhcat-env.sh',
  196. content = InlineTemplate(self.getConfig()['configurations']['webhcat-env']['content']),
  197. owner = 'hcat',
  198. group = 'hadoop',
  199. )
  200. self.assertResourceCalled('Directory', '/etc/hive-webhcat/conf',
  201. cd_access = 'a',
  202. recursive=True
  203. )
  204. self.assertResourceCalled('File', '/etc/hcatalog/conf/webhcat-log4j.properties',
  205. content = 'log4jproperties\nline2',
  206. owner = 'hcat',
  207. group = 'hadoop',
  208. mode = 0644,
  209. )
  210. def assert_configure_secured(self):
  211. self.assertResourceCalled('HdfsDirectory', '/apps/webhcat',
  212. security_enabled = True,
  213. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  214. conf_dir = '/etc/hadoop/conf',
  215. hdfs_user = 'hdfs',
  216. kinit_path_local = '/usr/bin/kinit',
  217. mode = 0755,
  218. owner = 'hcat',
  219. bin_dir = '/usr/bin',
  220. action = ['create_delayed'],
  221. )
  222. self.assertResourceCalled('HdfsDirectory', '/user/hcat',
  223. security_enabled = True,
  224. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  225. conf_dir = '/etc/hadoop/conf',
  226. hdfs_user = 'hdfs',
  227. kinit_path_local = '/usr/bin/kinit',
  228. mode = 0755,
  229. owner = 'hcat',
  230. bin_dir = '/usr/bin',
  231. action = ['create_delayed'],
  232. )
  233. self.assertResourceCalled('HdfsDirectory', None,
  234. security_enabled = True,
  235. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  236. conf_dir = '/etc/hadoop/conf',
  237. hdfs_user = 'hdfs',
  238. kinit_path_local = '/usr/bin/kinit',
  239. bin_dir = '/usr/bin',
  240. action = ['create'],
  241. )
  242. self.assertResourceCalled('Directory', '/var/run/webhcat',
  243. owner = 'hcat',
  244. group = 'hadoop',
  245. recursive = True,
  246. mode = 0755,
  247. )
  248. self.assertResourceCalled('Directory', '/var/log/webhcat',
  249. owner = 'hcat',
  250. group = 'hadoop',
  251. recursive = True,
  252. mode = 0755,
  253. )
  254. self.assertResourceCalled('Directory', '/etc/hcatalog/conf',
  255. owner = 'hcat',
  256. group = 'hadoop',
  257. recursive = True,
  258. )
  259. self.assertResourceCalled('Execute', '/usr/bin/kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs;',
  260. path = ['/bin'],
  261. user = 'hcat',
  262. )
  263. self.assertResourceCalled('CopyFromLocal', '/usr/lib/hadoop-mapreduce/hadoop-streaming-*.jar',
  264. owner='hcat',
  265. mode=0755,
  266. dest_dir='/apps/webhcat',
  267. kinnit_if_needed='/usr/bin/kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs;',
  268. hadoop_conf_dir='/etc/hadoop/conf',
  269. hadoop_bin_dir='/usr/bin',
  270. hdfs_user='hdfs'
  271. )
  272. self.assertResourceCalled('CopyFromLocal', '/usr/share/HDP-webhcat/pig.tar.gz',
  273. owner='hcat',
  274. mode=0755,
  275. dest_dir='/apps/webhcat',
  276. kinnit_if_needed='/usr/bin/kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs;',
  277. hadoop_conf_dir='/etc/hadoop/conf',
  278. hadoop_bin_dir='/usr/bin',
  279. hdfs_user='hdfs'
  280. )
  281. self.assertResourceCalled('CopyFromLocal', '/usr/share/HDP-webhcat/hive.tar.gz',
  282. owner='hcat',
  283. mode=0755,
  284. dest_dir='/apps/webhcat',
  285. kinnit_if_needed='/usr/bin/kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs;',
  286. hadoop_conf_dir='/etc/hadoop/conf',
  287. hadoop_bin_dir='/usr/bin',
  288. hdfs_user='hdfs'
  289. )
  290. self.assertResourceCalled('CopyFromLocal', '/usr/share/HDP-webhcat/sqoop*.tar.gz',
  291. owner='hcat',
  292. mode=0755,
  293. dest_dir='/apps/webhcat',
  294. kinnit_if_needed='/usr/bin/kinit -kt /etc/security/keytabs/hdfs.headless.keytab hdfs;',
  295. hadoop_conf_dir='/etc/hadoop/conf',
  296. hadoop_bin_dir='/usr/bin',
  297. hdfs_user='hdfs'
  298. )
  299. self.assertResourceCalled('XmlConfig', 'webhcat-site.xml',
  300. owner = 'hcat',
  301. group = 'hadoop',
  302. conf_dir = '/etc/hcatalog/conf',
  303. configurations = self.getConfig()['configurations']['webhcat-site'],
  304. configuration_attributes = self.getConfig()['configuration_attributes']['webhcat-site']
  305. )
  306. self.assertResourceCalled('File', '/etc/hcatalog/conf/webhcat-env.sh',
  307. content = InlineTemplate(self.getConfig()['configurations']['webhcat-env']['content']),
  308. owner = 'hcat',
  309. group = 'hadoop',
  310. )
  311. self.assertResourceCalled('Directory', '/etc/hive-webhcat/conf',
  312. cd_access = 'a',
  313. recursive=True
  314. )
  315. self.assertResourceCalled('File', '/etc/hcatalog/conf/webhcat-log4j.properties',
  316. content = 'log4jproperties\nline2',
  317. owner = 'hcat',
  318. group = 'hadoop',
  319. mode = 0644,
  320. )
  321. @patch("resource_management.libraries.functions.security_commons.build_expectations")
  322. @patch("resource_management.libraries.functions.security_commons.get_params_from_filesystem")
  323. @patch("resource_management.libraries.functions.security_commons.validate_security_config_properties")
  324. @patch("resource_management.libraries.functions.security_commons.cached_kinit_executor")
  325. @patch("resource_management.libraries.script.Script.put_structured_out")
  326. def test_security_status(self, put_structured_out_mock, cached_kinit_executor_mock, validate_security_config_mock, get_params_mock, build_exp_mock):
  327. # Test that function works when is called with correct parameters
  328. security_params = {
  329. 'webhcat-site': {
  330. "templeton.kerberos.secret": "secret",
  331. "templeton.kerberos.keytab": 'path/to/keytab',
  332. "templeton.kerberos.principal": "principal"
  333. },
  334. "hive-site": {
  335. "hive.server2.authentication": "KERBEROS",
  336. "hive.metastore.sasl.enabled": "true",
  337. "hive.security.authorization.enabled": "true"
  338. }
  339. }
  340. result_issues = []
  341. webhcat_props_value_check = {"templeton.kerberos.secret": "secret"}
  342. webhcat_props_empty_check = ["templeton.kerberos.keytab",
  343. "templeton.kerberos.principal"]
  344. webhcat_props_read_check = ["templeton.kerberos.keytab"]
  345. hive_props_value_check = {"hive.server2.authentication": "KERBEROS",
  346. "hive.metastore.sasl.enabled": "true",
  347. "hive.security.authorization.enabled": "true"}
  348. hive_props_empty_check = None
  349. hive_props_read_check = None
  350. get_params_mock.return_value = security_params
  351. validate_security_config_mock.return_value = result_issues
  352. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  353. classname = "WebHCatServer",
  354. command = "security_status",
  355. config_file="../../2.1/configs/secured.json",
  356. hdp_stack_version = self.STACK_VERSION,
  357. target = RMFTestCase.TARGET_COMMON_SERVICES
  358. )
  359. build_exp_mock.assert_called_with('hive-site', hive_props_value_check, hive_props_empty_check, hive_props_read_check)
  360. # get_params_mock.assert_called_with(status_params.hive_conf_dir, {'hive-site.xml': "XML"})
  361. get_params_mock.assert_called_with('/etc/hive-webhcat/conf', {'webhcat-site.xml': "XML"})
  362. put_structured_out_mock.assert_called_with({"securityState": "SECURED_KERBEROS"})
  363. self.assertTrue(cached_kinit_executor_mock.call_count, 2)
  364. cached_kinit_executor_mock.assert_called_with('/usr/bin/kinit',
  365. self.config_dict['configurations']['hive-env']['webhcat_user'],
  366. security_params['webhcat-site']['templeton.kerberos.keytab'],
  367. security_params['webhcat-site']['templeton.kerberos.principal'],
  368. self.config_dict['hostname'],
  369. '/tmp')
  370. # Testing that the exception throw by cached_executor is caught
  371. cached_kinit_executor_mock.reset_mock()
  372. cached_kinit_executor_mock.side_effect = Exception("Invalid command")
  373. try:
  374. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  375. classname = "WebHCatServer",
  376. command = "security_status",
  377. config_file="../../2.1/configs/secured.json",
  378. hdp_stack_version = self.STACK_VERSION,
  379. target = RMFTestCase.TARGET_COMMON_SERVICES
  380. )
  381. except:
  382. self.assertTrue(True)
  383. # Testing with a security_params which doesn't contains startup
  384. empty_security_params = {}
  385. cached_kinit_executor_mock.reset_mock()
  386. get_params_mock.reset_mock()
  387. put_structured_out_mock.reset_mock()
  388. get_params_mock.return_value = empty_security_params
  389. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  390. classname = "WebHCatServer",
  391. command = "security_status",
  392. config_file="../../2.1/configs/secured.json",
  393. hdp_stack_version = self.STACK_VERSION,
  394. target = RMFTestCase.TARGET_COMMON_SERVICES
  395. )
  396. put_structured_out_mock.assert_called_with({"securityIssuesFound": "Keytab file or principal are not set property."})
  397. # Testing with not empty result_issues
  398. result_issues_with_params = {
  399. 'hive-site': "Something bad happened"
  400. }
  401. validate_security_config_mock.reset_mock()
  402. get_params_mock.reset_mock()
  403. validate_security_config_mock.return_value = result_issues_with_params
  404. get_params_mock.return_value = security_params
  405. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  406. classname = "WebHCatServer",
  407. command = "security_status",
  408. config_file="../../2.1/configs/secured.json",
  409. hdp_stack_version = self.STACK_VERSION,
  410. target = RMFTestCase.TARGET_COMMON_SERVICES
  411. )
  412. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  413. # Testing with security_enable = false
  414. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  415. classname = "WebHCatServer",
  416. command = "security_status",
  417. config_file="../../2.1/configs/default.json",
  418. hdp_stack_version = self.STACK_VERSION,
  419. target = RMFTestCase.TARGET_COMMON_SERVICES
  420. )
  421. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  422. def test_pre_rolling_restart(self):
  423. config_file = self.get_src_folder()+"/test/python/stacks/2.0.6/configs/default.json"
  424. with open(config_file, "r") as f:
  425. json_content = json.load(f)
  426. version = '2.2.1.0-3242'
  427. json_content['commandParams']['version'] = version
  428. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/webhcat_server.py",
  429. classname = "WebHCatServer",
  430. command = "pre_rolling_restart",
  431. config_dict = json_content,
  432. hdp_stack_version = self.STACK_VERSION,
  433. target = RMFTestCase.TARGET_COMMON_SERVICES)
  434. self.assertResourceCalled('Execute',
  435. 'hdp-select set hive-webhcat %s' % version,)
  436. self.assertNoMoreResources()