test_hbase_master.py 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677
  1. #!/usr/bin/env python
  2. '''
  3. Licensed to the Apache Software Foundation (ASF) under one
  4. or more contributor license agreements. See the NOTICE file
  5. distributed with this work for additional information
  6. regarding copyright ownership. The ASF licenses this file
  7. to you under the Apache License, Version 2.0 (the
  8. "License"); you may not use this file except in compliance
  9. with the License. You may obtain a copy of the License at
  10. http://www.apache.org/licenses/LICENSE-2.0
  11. Unless required by applicable law or agreed to in writing, software
  12. distributed under the License is distributed on an "AS IS" BASIS,
  13. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. See the License for the specific language governing permissions and
  15. limitations under the License.
  16. '''
  17. from mock.mock import MagicMock, patch
  18. from stacks.utils.RMFTestCase import *
  19. @patch("platform.linux_distribution", new = MagicMock(return_value="Linux"))
  20. @patch("os.path.exists", new = MagicMock(return_value=True))
  21. class TestHBaseMaster(RMFTestCase):
  22. COMMON_SERVICES_PACKAGE_DIR = "HBASE/0.96.0.2.0/package"
  23. STACK_VERSION = "2.0.6"
  24. def test_configure_default(self):
  25. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  26. classname = "HbaseMaster",
  27. command = "configure",
  28. config_file="default.json",
  29. hdp_stack_version = self.STACK_VERSION,
  30. target = RMFTestCase.TARGET_COMMON_SERVICES
  31. )
  32. self.assert_configure_default()
  33. self.assertNoMoreResources()
  34. def test_start_default(self):
  35. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  36. classname = "HbaseMaster",
  37. command = "start",
  38. config_file="default.json",
  39. hdp_stack_version = self.STACK_VERSION,
  40. target = RMFTestCase.TARGET_COMMON_SERVICES
  41. )
  42. self.assert_configure_default()
  43. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf start master',
  44. not_if = 'ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1',
  45. user = 'hbase'
  46. )
  47. self.assertNoMoreResources()
  48. def test_stop_default(self):
  49. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  50. classname = "HbaseMaster",
  51. command = "stop",
  52. config_file="default.json",
  53. hdp_stack_version = self.STACK_VERSION,
  54. target = RMFTestCase.TARGET_COMMON_SERVICES
  55. )
  56. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf stop master',
  57. on_timeout = '! ( ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1 ) || ambari-sudo.sh -H -E kill -9 `cat /var/run/hbase/hbase-hbase-master.pid`',
  58. timeout = 30,
  59. user = 'hbase',
  60. )
  61. self.assertResourceCalled('Execute', 'rm -f /var/run/hbase/hbase-hbase-master.pid',
  62. )
  63. self.assertNoMoreResources()
  64. def test_decom_default(self):
  65. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  66. classname = "HbaseMaster",
  67. command = "decommission",
  68. config_file="default.json",
  69. hdp_stack_version = self.STACK_VERSION,
  70. target = RMFTestCase.TARGET_COMMON_SERVICES
  71. )
  72. self.assertResourceCalled('File', '/usr/lib/hbase/bin/draining_servers.rb',
  73. content = StaticFile('draining_servers.rb'),
  74. mode = 0755,
  75. )
  76. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb add host1',
  77. logoutput = True,
  78. user = 'hbase',
  79. )
  80. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/region_mover.rb unload host1',
  81. logoutput = True,
  82. user = 'hbase',
  83. )
  84. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb add host2',
  85. logoutput = True,
  86. user = 'hbase',
  87. )
  88. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/region_mover.rb unload host2',
  89. logoutput = True,
  90. user = 'hbase',
  91. )
  92. self.assertNoMoreResources()
  93. def test_decom_default_draining_only(self):
  94. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  95. classname = "HbaseMaster",
  96. command = "decommission",
  97. config_file="default.hbasedecom.json",
  98. hdp_stack_version = self.STACK_VERSION,
  99. target = RMFTestCase.TARGET_COMMON_SERVICES
  100. )
  101. self.assertResourceCalled('File', '/usr/lib/hbase/bin/draining_servers.rb',
  102. content = StaticFile('draining_servers.rb'),
  103. mode = 0755,
  104. )
  105. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb remove host1',
  106. logoutput = True,
  107. user = 'hbase',
  108. )
  109. self.assertNoMoreResources()
  110. def test_configure_secured(self):
  111. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  112. classname = "HbaseMaster",
  113. command = "configure",
  114. config_file="secured.json",
  115. hdp_stack_version = self.STACK_VERSION,
  116. target = RMFTestCase.TARGET_COMMON_SERVICES
  117. )
  118. self.assert_configure_secured()
  119. self.assertNoMoreResources()
  120. def test_start_secured(self):
  121. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  122. classname = "HbaseMaster",
  123. command = "start",
  124. config_file="secured.json",
  125. hdp_stack_version = self.STACK_VERSION,
  126. target = RMFTestCase.TARGET_COMMON_SERVICES
  127. )
  128. self.assert_configure_secured()
  129. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf start master',
  130. not_if = 'ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1',
  131. user = 'hbase',
  132. )
  133. self.assertNoMoreResources()
  134. def test_stop_secured(self):
  135. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  136. classname = "HbaseMaster",
  137. command = "stop",
  138. config_file="secured.json",
  139. hdp_stack_version = self.STACK_VERSION,
  140. target = RMFTestCase.TARGET_COMMON_SERVICES
  141. )
  142. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf stop master',
  143. on_timeout = '! ( ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1 ) || ambari-sudo.sh -H -E kill -9 `cat /var/run/hbase/hbase-hbase-master.pid`',
  144. timeout = 30,
  145. user = 'hbase',
  146. )
  147. self.assertResourceCalled('Execute', 'rm -f /var/run/hbase/hbase-hbase-master.pid',
  148. )
  149. self.assertNoMoreResources()
  150. def test_decom_secure(self):
  151. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  152. classname = "HbaseMaster",
  153. command = "decommission",
  154. config_file="secured.json",
  155. hdp_stack_version = self.STACK_VERSION,
  156. target = RMFTestCase.TARGET_COMMON_SERVICES
  157. )
  158. self.assertResourceCalled('File', '/usr/lib/hbase/bin/draining_servers.rb',
  159. content = StaticFile('draining_servers.rb'),
  160. mode = 0755,
  161. )
  162. self.assertResourceCalled('Execute', '/usr/bin/kinit -kt /etc/security/keytabs/hbase.headless.keytab hbase; /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb add host1',
  163. logoutput = True,
  164. user = 'hbase',
  165. )
  166. self.assertResourceCalled('Execute', '/usr/bin/kinit -kt /etc/security/keytabs/hbase.headless.keytab hbase; /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/region_mover.rb unload host1',
  167. logoutput = True,
  168. user = 'hbase',
  169. )
  170. self.assertNoMoreResources()
  171. def assert_configure_default(self):
  172. self.assertResourceCalled('Directory', '/etc/hbase',
  173. mode = 0755
  174. )
  175. self.assertResourceCalled('Directory', '/etc/hbase/conf',
  176. owner = 'hbase',
  177. group = 'hadoop',
  178. recursive = True,
  179. )
  180. self.assertResourceCalled('Directory', '/hadoop/hbase',
  181. owner = 'hbase',
  182. mode = 0775,
  183. recursive = True,
  184. cd_access='a'
  185. )
  186. self.assertResourceCalled('Directory', '/hadoop/hbase/local',
  187. owner = 'hbase',
  188. group = 'hadoop',
  189. mode=0775,
  190. recursive = True,
  191. )
  192. self.assertResourceCalled('Directory', '/hadoop/hbase/local/jars',
  193. owner = 'hbase',
  194. group = 'hadoop',
  195. mode=0775,
  196. recursive = True,
  197. )
  198. self.assertResourceCalled('XmlConfig', 'hbase-site.xml',
  199. owner = 'hbase',
  200. group = 'hadoop',
  201. conf_dir = '/etc/hbase/conf',
  202. configurations = self.getConfig()['configurations']['hbase-site'],
  203. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-site']
  204. )
  205. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  206. owner = 'hbase',
  207. group = 'hadoop',
  208. conf_dir = '/etc/hbase/conf',
  209. configurations = self.getConfig()['configurations']['core-site'],
  210. configuration_attributes = self.getConfig()['configuration_attributes']['core-site']
  211. )
  212. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  213. owner = 'hbase',
  214. group = 'hadoop',
  215. conf_dir = '/etc/hbase/conf',
  216. configurations = self.getConfig()['configurations']['hdfs-site'],
  217. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  218. )
  219. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  220. owner = 'hdfs',
  221. group = 'hadoop',
  222. conf_dir = '/etc/hadoop/conf',
  223. configurations = self.getConfig()['configurations']['hdfs-site'],
  224. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  225. )
  226. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-policy.xml',
  227. owner = 'hbase',
  228. group = 'hadoop'
  229. )
  230. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-env.sh',
  231. owner = 'hbase',
  232. content = InlineTemplate(self.getConfig()['configurations']['hbase-env']['content']),
  233. )
  234. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hadoop-metrics2-hbase.properties',
  235. owner = 'hbase',
  236. template_tag = 'GANGLIA-MASTER',
  237. )
  238. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/regionservers',
  239. owner = 'hbase',
  240. template_tag = None,
  241. )
  242. self.assertResourceCalled('Directory', '/var/run/hbase',
  243. owner = 'hbase',
  244. recursive = True,
  245. )
  246. self.assertResourceCalled('Directory', '/var/log/hbase',
  247. owner = 'hbase',
  248. recursive = True,
  249. )
  250. self.assertResourceCalled('File',
  251. '/etc/hbase/conf/log4j.properties',
  252. mode=0644,
  253. group='hadoop',
  254. owner='hbase',
  255. content='log4jproperties\nline2'
  256. )
  257. self.assertResourceCalled('HdfsDirectory', 'hdfs://c6401.ambari.apache.org:8020/apps/hbase/data',
  258. security_enabled = False,
  259. keytab = UnknownConfigurationMock(),
  260. conf_dir = '/etc/hadoop/conf',
  261. hdfs_user = 'hdfs',
  262. kinit_path_local = "/usr/bin/kinit",
  263. owner = 'hbase',
  264. bin_dir = '/usr/bin',
  265. action = ['create_delayed'],
  266. )
  267. self.assertResourceCalled('HdfsDirectory', '/apps/hbase/staging',
  268. security_enabled = False,
  269. keytab = UnknownConfigurationMock(),
  270. conf_dir = '/etc/hadoop/conf',
  271. hdfs_user = 'hdfs',
  272. kinit_path_local = "/usr/bin/kinit",
  273. mode = 0711,
  274. owner = 'hbase',
  275. bin_dir = '/usr/bin',
  276. action = ['create_delayed'],
  277. )
  278. self.assertResourceCalled('HdfsDirectory', None,
  279. security_enabled = False,
  280. keytab = UnknownConfigurationMock(),
  281. conf_dir = '/etc/hadoop/conf',
  282. hdfs_user = 'hdfs',
  283. kinit_path_local = "/usr/bin/kinit",
  284. bin_dir = '/usr/bin',
  285. action = ['create'],
  286. )
  287. def assert_configure_secured(self):
  288. self.assertResourceCalled('Directory', '/etc/hbase',
  289. mode = 0755
  290. )
  291. self.assertResourceCalled('Directory', '/etc/hbase/conf',
  292. owner = 'hbase',
  293. group = 'hadoop',
  294. recursive = True,
  295. )
  296. self.assertResourceCalled('Directory', '/hadoop/hbase',
  297. owner = 'hbase',
  298. mode = 0775,
  299. recursive = True,
  300. cd_access='a'
  301. )
  302. self.assertResourceCalled('Directory', '/hadoop/hbase/local',
  303. owner = 'hbase',
  304. group = 'hadoop',
  305. mode=0775,
  306. recursive = True
  307. )
  308. self.assertResourceCalled('Directory', '/hadoop/hbase/local/jars',
  309. owner = 'hbase',
  310. group = 'hadoop',
  311. mode=0775,
  312. recursive = True,
  313. )
  314. self.assertResourceCalled('XmlConfig', 'hbase-site.xml',
  315. owner = 'hbase',
  316. group = 'hadoop',
  317. conf_dir = '/etc/hbase/conf',
  318. configurations = self.getConfig()['configurations']['hbase-site'],
  319. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-site']
  320. )
  321. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  322. owner = 'hbase',
  323. group = 'hadoop',
  324. conf_dir = '/etc/hbase/conf',
  325. configurations = self.getConfig()['configurations']['core-site'],
  326. configuration_attributes = self.getConfig()['configuration_attributes']['core-site']
  327. )
  328. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  329. owner = 'hbase',
  330. group = 'hadoop',
  331. conf_dir = '/etc/hbase/conf',
  332. configurations = self.getConfig()['configurations']['hdfs-site'],
  333. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  334. )
  335. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  336. owner = 'hdfs',
  337. group = 'hadoop',
  338. conf_dir = '/etc/hadoop/conf',
  339. configurations = self.getConfig()['configurations']['hdfs-site'],
  340. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  341. )
  342. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-policy.xml',
  343. owner = 'hbase',
  344. group = 'hadoop',
  345. )
  346. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-env.sh',
  347. owner = 'hbase',
  348. content = InlineTemplate(self.getConfig()['configurations']['hbase-env']['content']),
  349. )
  350. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hadoop-metrics2-hbase.properties',
  351. owner = 'hbase',
  352. template_tag = 'GANGLIA-MASTER',
  353. )
  354. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/regionservers',
  355. owner = 'hbase',
  356. template_tag = None,
  357. )
  358. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hbase_master_jaas.conf',
  359. owner = 'hbase',
  360. template_tag = None,
  361. )
  362. self.assertResourceCalled('Directory', '/var/run/hbase',
  363. owner = 'hbase',
  364. recursive = True,
  365. )
  366. self.assertResourceCalled('Directory', '/var/log/hbase',
  367. owner = 'hbase',
  368. recursive = True,
  369. )
  370. self.assertResourceCalled('File',
  371. '/etc/hbase/conf/log4j.properties',
  372. mode=0644,
  373. group='hadoop',
  374. owner='hbase',
  375. content='log4jproperties\nline2'
  376. )
  377. self.assertResourceCalled('HdfsDirectory', 'hdfs://c6401.ambari.apache.org:8020/apps/hbase/data',
  378. security_enabled = True,
  379. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  380. conf_dir = '/etc/hadoop/conf',
  381. hdfs_user = 'hdfs',
  382. kinit_path_local = '/usr/bin/kinit',
  383. owner = 'hbase',
  384. bin_dir = '/usr/bin',
  385. action = ['create_delayed'],
  386. )
  387. self.assertResourceCalled('HdfsDirectory', '/apps/hbase/staging',
  388. security_enabled = True,
  389. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  390. conf_dir = '/etc/hadoop/conf',
  391. hdfs_user = 'hdfs',
  392. kinit_path_local = '/usr/bin/kinit',
  393. mode = 0711,
  394. owner = 'hbase',
  395. bin_dir = '/usr/bin',
  396. action = ['create_delayed'],
  397. )
  398. self.assertResourceCalled('HdfsDirectory', None,
  399. security_enabled = True,
  400. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  401. conf_dir = '/etc/hadoop/conf',
  402. hdfs_user = 'hdfs',
  403. kinit_path_local = '/usr/bin/kinit',
  404. bin_dir = '/usr/bin',
  405. action = ['create'],
  406. )
  407. def test_start_default_22(self):
  408. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  409. classname = "HbaseMaster",
  410. command = "start",
  411. config_file="hbase-2.2.json",
  412. hdp_stack_version = self.STACK_VERSION,
  413. target = RMFTestCase.TARGET_COMMON_SERVICES)
  414. self.assertResourceCalled('Directory', '/etc/hbase',
  415. mode = 0755)
  416. self.assertResourceCalled('Directory', '/etc/hbase/conf',
  417. owner = 'hbase',
  418. group = 'hadoop',
  419. recursive = True)
  420. self.assertResourceCalled('Directory', '/hadoop/hbase',
  421. owner = 'hbase',
  422. mode = 0775,
  423. recursive = True,
  424. cd_access='a')
  425. self.assertResourceCalled('Directory', '/hadoop/hbase/local',
  426. owner = 'hbase',
  427. group = 'hadoop',
  428. mode=0775,
  429. recursive = True)
  430. self.assertResourceCalled('Directory', '/hadoop/hbase/local/jars',
  431. owner = 'hbase',
  432. group = 'hadoop',
  433. mode=0775,
  434. recursive = True)
  435. self.assertResourceCalled('XmlConfig', 'hbase-site.xml',
  436. owner = 'hbase',
  437. group = 'hadoop',
  438. conf_dir = '/etc/hbase/conf',
  439. configurations = self.getConfig()['configurations']['hbase-site'],
  440. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-site'])
  441. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  442. owner = 'hbase',
  443. group = 'hadoop',
  444. conf_dir = '/etc/hbase/conf',
  445. configurations = self.getConfig()['configurations']['core-site'],
  446. configuration_attributes = self.getConfig()['configuration_attributes']['core-site'])
  447. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  448. owner = 'hbase',
  449. group = 'hadoop',
  450. conf_dir = '/etc/hbase/conf',
  451. configurations = self.getConfig()['configurations']['hdfs-site'],
  452. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site'])
  453. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  454. owner = 'hdfs',
  455. group = 'hadoop',
  456. conf_dir = '/etc/hadoop/conf',
  457. configurations = self.getConfig()['configurations']['hdfs-site'],
  458. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site'])
  459. self.assertResourceCalled('XmlConfig', 'hbase-policy.xml',
  460. owner = 'hbase',
  461. group = 'hadoop',
  462. conf_dir = '/etc/hbase/conf',
  463. configurations = self.getConfig()['configurations']['hbase-policy'],
  464. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-policy'])
  465. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-env.sh',
  466. owner = 'hbase',
  467. content = InlineTemplate(self.getConfig()['configurations']['hbase-env']['content']))
  468. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hadoop-metrics2-hbase.properties',
  469. owner = 'hbase',
  470. template_tag = 'GANGLIA-MASTER')
  471. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/regionservers',
  472. owner = 'hbase',
  473. template_tag = None)
  474. self.assertResourceCalled('Directory', '/var/run/hbase',
  475. owner = 'hbase',
  476. recursive = True)
  477. self.assertResourceCalled('Directory', '/var/log/hbase',
  478. owner = 'hbase',
  479. recursive = True)
  480. self.assertResourceCalled('File',
  481. '/etc/hbase/conf/log4j.properties',
  482. mode=0644,
  483. group='hadoop',
  484. owner='hbase',
  485. content='log4jproperties\nline2')
  486. self.assertResourceCalled('HdfsDirectory', 'hdfs://nn1/apps/hbase/data',
  487. security_enabled = False,
  488. keytab = UnknownConfigurationMock(),
  489. conf_dir = '/etc/hadoop/conf',
  490. hdfs_user = 'hdfs',
  491. kinit_path_local = "/usr/bin/kinit",
  492. owner = 'hbase',
  493. bin_dir = '/usr/hdp/current/hadoop-client/bin',
  494. action = ['create_delayed'])
  495. self.assertResourceCalled('HdfsDirectory', '/apps/hbase/staging',
  496. security_enabled = False,
  497. keytab = UnknownConfigurationMock(),
  498. conf_dir = '/etc/hadoop/conf',
  499. hdfs_user = 'hdfs',
  500. kinit_path_local = "/usr/bin/kinit",
  501. mode = 0711,
  502. owner = 'hbase',
  503. bin_dir = '/usr/hdp/current/hadoop-client/bin',
  504. action = ['create_delayed'])
  505. self.assertResourceCalled('HdfsDirectory', None,
  506. security_enabled = False,
  507. keytab = UnknownConfigurationMock(),
  508. conf_dir = '/etc/hadoop/conf',
  509. hdfs_user = 'hdfs',
  510. kinit_path_local = "/usr/bin/kinit",
  511. bin_dir = '/usr/hdp/current/hadoop-client/bin',
  512. action = ['create'])
  513. self.assertResourceCalled('Execute', '/usr/hdp/current/hbase-master/bin/hbase-daemon.sh --config /etc/hbase/conf start master',
  514. not_if = 'ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1',
  515. user = 'hbase')
  516. self.assertNoMoreResources()
  517. @patch("resource_management.libraries.functions.security_commons.build_expectations")
  518. @patch("resource_management.libraries.functions.security_commons.get_params_from_filesystem")
  519. @patch("resource_management.libraries.functions.security_commons.validate_security_config_properties")
  520. @patch("resource_management.libraries.functions.security_commons.cached_kinit_executor")
  521. @patch("resource_management.libraries.script.Script.put_structured_out")
  522. def test_security_status(self, put_structured_out_mock, cached_kinit_executor_mock, validate_security_config_mock, get_params_mock, build_exp_mock):
  523. # Test that function works when is called with correct parameters
  524. security_params = {
  525. 'hbase-site': {
  526. 'hbase.master.kerberos.principal': '/path/to/hbase_keytab',
  527. 'hbase.master.keytab.file': 'hbase_principal'
  528. }
  529. }
  530. result_issues = []
  531. props_value_check = {"hbase.security.authentication": "kerberos",
  532. "hbase.security.authorization": "true"}
  533. props_empty_check = ["hbase.master.keytab.file",
  534. "hbase.master.kerberos.principal"]
  535. props_read_check = ["hbase.master.keytab.file"]
  536. get_params_mock.return_value = security_params
  537. validate_security_config_mock.return_value = result_issues
  538. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  539. classname = "HbaseMaster",
  540. command = "security_status",
  541. config_file="secured.json",
  542. hdp_stack_version = self.STACK_VERSION,
  543. target = RMFTestCase.TARGET_COMMON_SERVICES
  544. )
  545. build_exp_mock.assert_called_with('hbase-site', props_value_check, props_empty_check, props_read_check)
  546. put_structured_out_mock.assert_called_with({"securityState": "SECURED_KERBEROS"})
  547. cached_kinit_executor_mock.called_with('/usr/bin/kinit',
  548. self.config_dict['configurations']['hbase-env']['hbase_user'],
  549. security_params['hbase-site']['hbase.master.keytab.file'],
  550. security_params['hbase-site']['hbase.master.kerberos.principal'],
  551. self.config_dict['hostname'],
  552. '/tmp')
  553. # Testing that the exception throw by cached_executor is caught
  554. cached_kinit_executor_mock.reset_mock()
  555. cached_kinit_executor_mock.side_effect = Exception("Invalid command")
  556. try:
  557. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  558. classname = "HbaseMaster",
  559. command = "security_status",
  560. config_file="secured.json",
  561. hdp_stack_version = self.STACK_VERSION,
  562. target = RMFTestCase.TARGET_COMMON_SERVICES
  563. )
  564. except:
  565. self.assertTrue(True)
  566. # Testing with a security_params which doesn't contains hbase-site
  567. empty_security_params = {}
  568. cached_kinit_executor_mock.reset_mock()
  569. get_params_mock.reset_mock()
  570. put_structured_out_mock.reset_mock()
  571. get_params_mock.return_value = empty_security_params
  572. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  573. classname = "HbaseMaster",
  574. command = "security_status",
  575. config_file="secured.json",
  576. hdp_stack_version = self.STACK_VERSION,
  577. target = RMFTestCase.TARGET_COMMON_SERVICES
  578. )
  579. put_structured_out_mock.assert_called_with({"securityIssuesFound": "Keytab file or principal are not set property."})
  580. # Testing with not empty result_issues
  581. result_issues_with_params = {}
  582. result_issues_with_params['hbase-site']="Something bad happened"
  583. validate_security_config_mock.reset_mock()
  584. get_params_mock.reset_mock()
  585. validate_security_config_mock.return_value = result_issues_with_params
  586. get_params_mock.return_value = security_params
  587. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  588. classname = "HbaseMaster",
  589. command = "security_status",
  590. config_file="default.json",
  591. hdp_stack_version = self.STACK_VERSION,
  592. target = RMFTestCase.TARGET_COMMON_SERVICES
  593. )
  594. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  595. # Testing with security_enable = false
  596. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  597. classname = "HbaseMaster",
  598. command = "security_status",
  599. config_file="secured.json",
  600. hdp_stack_version = self.STACK_VERSION,
  601. target = RMFTestCase.TARGET_COMMON_SERVICES
  602. )
  603. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  604. def test_upgrade_backup(self):
  605. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_upgrade.py",
  606. classname = "HbaseMasterUpgrade",
  607. command = "snapshot",
  608. config_file="hbase-preupgrade.json",
  609. hdp_stack_version = self.STACK_VERSION,
  610. target = RMFTestCase.TARGET_COMMON_SERVICES)
  611. self.assertResourceCalled('Execute', " echo 'snapshot_all' | /usr/hdp/current/hbase-client/bin/hbase shell",
  612. user = 'hbase')
  613. self.assertNoMoreResources()