test_hbase_master.py 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734
  1. #!/usr/bin/env python
  2. '''
  3. Licensed to the Apache Software Foundation (ASF) under one
  4. or more contributor license agreements. See the NOTICE file
  5. distributed with this work for additional information
  6. regarding copyright ownership. The ASF licenses this file
  7. to you under the Apache License, Version 2.0 (the
  8. "License"); you may not use this file except in compliance
  9. with the License. You may obtain a copy of the License at
  10. http://www.apache.org/licenses/LICENSE-2.0
  11. Unless required by applicable law or agreed to in writing, software
  12. distributed under the License is distributed on an "AS IS" BASIS,
  13. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. See the License for the specific language governing permissions and
  15. limitations under the License.
  16. '''
  17. import json
  18. from mock.mock import MagicMock, patch
  19. from stacks.utils.RMFTestCase import *
  20. @patch("platform.linux_distribution", new = MagicMock(return_value="Linux"))
  21. @patch("os.path.exists", new = MagicMock(return_value=True))
  22. class TestHBaseMaster(RMFTestCase):
  23. COMMON_SERVICES_PACKAGE_DIR = "HBASE/0.96.0.2.0/package"
  24. STACK_VERSION = "2.0.6"
  25. def test_configure_default(self):
  26. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  27. classname = "HbaseMaster",
  28. command = "configure",
  29. config_file="default.json",
  30. hdp_stack_version = self.STACK_VERSION,
  31. target = RMFTestCase.TARGET_COMMON_SERVICES
  32. )
  33. self.assert_configure_default()
  34. self.assertNoMoreResources()
  35. def test_start_default(self):
  36. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  37. classname = "HbaseMaster",
  38. command = "start",
  39. config_file="default.json",
  40. hdp_stack_version = self.STACK_VERSION,
  41. target = RMFTestCase.TARGET_COMMON_SERVICES
  42. )
  43. self.assert_configure_default()
  44. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf start master',
  45. not_if = 'ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1',
  46. user = 'hbase'
  47. )
  48. self.assertNoMoreResources()
  49. def test_stop_default(self):
  50. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  51. classname = "HbaseMaster",
  52. command = "stop",
  53. config_file="default.json",
  54. hdp_stack_version = self.STACK_VERSION,
  55. target = RMFTestCase.TARGET_COMMON_SERVICES
  56. )
  57. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf stop master',
  58. on_timeout = '! ( ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1 ) || ambari-sudo.sh -H -E kill -9 `cat /var/run/hbase/hbase-hbase-master.pid`',
  59. timeout = 30,
  60. user = 'hbase',
  61. )
  62. self.assertResourceCalled('Execute', 'rm -f /var/run/hbase/hbase-hbase-master.pid',
  63. )
  64. self.assertNoMoreResources()
  65. def test_decom_default(self):
  66. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  67. classname = "HbaseMaster",
  68. command = "decommission",
  69. config_file="default.json",
  70. hdp_stack_version = self.STACK_VERSION,
  71. target = RMFTestCase.TARGET_COMMON_SERVICES
  72. )
  73. self.assertResourceCalled('File', '/usr/lib/hbase/bin/draining_servers.rb',
  74. content = StaticFile('draining_servers.rb'),
  75. mode = 0755,
  76. )
  77. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb add host1',
  78. logoutput = True,
  79. user = 'hbase',
  80. )
  81. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/region_mover.rb unload host1',
  82. logoutput = True,
  83. user = 'hbase',
  84. )
  85. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb add host2',
  86. logoutput = True,
  87. user = 'hbase',
  88. )
  89. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/region_mover.rb unload host2',
  90. logoutput = True,
  91. user = 'hbase',
  92. )
  93. self.assertNoMoreResources()
  94. def test_decom_default_draining_only(self):
  95. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  96. classname = "HbaseMaster",
  97. command = "decommission",
  98. config_file="default.hbasedecom.json",
  99. hdp_stack_version = self.STACK_VERSION,
  100. target = RMFTestCase.TARGET_COMMON_SERVICES
  101. )
  102. self.assertResourceCalled('File', '/usr/lib/hbase/bin/draining_servers.rb',
  103. content = StaticFile('draining_servers.rb'),
  104. mode = 0755,
  105. )
  106. self.assertResourceCalled('Execute', ' /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb remove host1',
  107. logoutput = True,
  108. user = 'hbase',
  109. )
  110. self.assertNoMoreResources()
  111. def test_configure_secured(self):
  112. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  113. classname = "HbaseMaster",
  114. command = "configure",
  115. config_file="secured.json",
  116. hdp_stack_version = self.STACK_VERSION,
  117. target = RMFTestCase.TARGET_COMMON_SERVICES
  118. )
  119. self.assert_configure_secured()
  120. self.assertNoMoreResources()
  121. def test_start_secured(self):
  122. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  123. classname = "HbaseMaster",
  124. command = "start",
  125. config_file="secured.json",
  126. hdp_stack_version = self.STACK_VERSION,
  127. target = RMFTestCase.TARGET_COMMON_SERVICES
  128. )
  129. self.assert_configure_secured()
  130. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf start master',
  131. not_if = 'ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1',
  132. user = 'hbase',
  133. )
  134. self.assertNoMoreResources()
  135. def test_stop_secured(self):
  136. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  137. classname = "HbaseMaster",
  138. command = "stop",
  139. config_file="secured.json",
  140. hdp_stack_version = self.STACK_VERSION,
  141. target = RMFTestCase.TARGET_COMMON_SERVICES
  142. )
  143. self.assertResourceCalled('Execute', '/usr/lib/hbase/bin/hbase-daemon.sh --config /etc/hbase/conf stop master',
  144. on_timeout = '! ( ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1 ) || ambari-sudo.sh -H -E kill -9 `cat /var/run/hbase/hbase-hbase-master.pid`',
  145. timeout = 30,
  146. user = 'hbase',
  147. )
  148. self.assertResourceCalled('Execute', 'rm -f /var/run/hbase/hbase-hbase-master.pid',
  149. )
  150. self.assertNoMoreResources()
  151. def test_decom_secure(self):
  152. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  153. classname = "HbaseMaster",
  154. command = "decommission",
  155. config_file="secured.json",
  156. hdp_stack_version = self.STACK_VERSION,
  157. target = RMFTestCase.TARGET_COMMON_SERVICES
  158. )
  159. self.assertResourceCalled('File', '/usr/lib/hbase/bin/draining_servers.rb',
  160. content = StaticFile('draining_servers.rb'),
  161. mode = 0755,
  162. )
  163. self.assertResourceCalled('Execute', '/usr/bin/kinit -kt /etc/security/keytabs/hbase.headless.keytab hbase; /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/draining_servers.rb add host1',
  164. logoutput = True,
  165. user = 'hbase',
  166. )
  167. self.assertResourceCalled('Execute', '/usr/bin/kinit -kt /etc/security/keytabs/hbase.headless.keytab hbase; /usr/lib/hbase/bin/hbase --config /etc/hbase/conf org.jruby.Main /usr/lib/hbase/bin/region_mover.rb unload host1',
  168. logoutput = True,
  169. user = 'hbase',
  170. )
  171. self.assertNoMoreResources()
  172. def assert_configure_default(self):
  173. self.assertResourceCalled('Directory', '/etc/hbase',
  174. mode = 0755
  175. )
  176. self.assertResourceCalled('Directory', '/etc/hbase/conf',
  177. owner = 'hbase',
  178. group = 'hadoop',
  179. recursive = True,
  180. )
  181. self.assertResourceCalled('Directory', '/hadoop/hbase',
  182. owner = 'hbase',
  183. mode = 0775,
  184. recursive = True,
  185. cd_access='a'
  186. )
  187. self.assertResourceCalled('Directory', '/hadoop/hbase/local',
  188. owner = 'hbase',
  189. group = 'hadoop',
  190. mode=0775,
  191. recursive = True,
  192. )
  193. self.assertResourceCalled('Directory', '/hadoop/hbase/local/jars',
  194. owner = 'hbase',
  195. group = 'hadoop',
  196. mode=0775,
  197. recursive = True,
  198. )
  199. self.assertResourceCalled('XmlConfig', 'hbase-site.xml',
  200. owner = 'hbase',
  201. group = 'hadoop',
  202. conf_dir = '/etc/hbase/conf',
  203. configurations = self.getConfig()['configurations']['hbase-site'],
  204. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-site']
  205. )
  206. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  207. owner = 'hbase',
  208. group = 'hadoop',
  209. conf_dir = '/etc/hbase/conf',
  210. configurations = self.getConfig()['configurations']['core-site'],
  211. configuration_attributes = self.getConfig()['configuration_attributes']['core-site']
  212. )
  213. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  214. owner = 'hbase',
  215. group = 'hadoop',
  216. conf_dir = '/etc/hbase/conf',
  217. configurations = self.getConfig()['configurations']['hdfs-site'],
  218. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  219. )
  220. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  221. owner = 'hdfs',
  222. group = 'hadoop',
  223. conf_dir = '/etc/hadoop/conf',
  224. configurations = self.getConfig()['configurations']['hdfs-site'],
  225. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  226. )
  227. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-policy.xml',
  228. owner = 'hbase',
  229. group = 'hadoop'
  230. )
  231. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-env.sh',
  232. owner = 'hbase',
  233. content = InlineTemplate(self.getConfig()['configurations']['hbase-env']['content']),
  234. )
  235. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hadoop-metrics2-hbase.properties',
  236. owner = 'hbase',
  237. template_tag = 'GANGLIA-MASTER',
  238. )
  239. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/regionservers',
  240. owner = 'hbase',
  241. template_tag = None,
  242. )
  243. self.assertResourceCalled('Directory', '/var/run/hbase',
  244. owner = 'hbase',
  245. recursive = True,
  246. )
  247. self.assertResourceCalled('Directory', '/var/log/hbase',
  248. owner = 'hbase',
  249. recursive = True,
  250. )
  251. self.assertResourceCalled('File',
  252. '/etc/hbase/conf/log4j.properties',
  253. mode=0644,
  254. group='hadoop',
  255. owner='hbase',
  256. content='log4jproperties\nline2'
  257. )
  258. self.assertResourceCalled('HdfsDirectory', 'hdfs://c6401.ambari.apache.org:8020/apps/hbase/data',
  259. security_enabled = False,
  260. keytab = UnknownConfigurationMock(),
  261. conf_dir = '/etc/hadoop/conf',
  262. hdfs_user = 'hdfs',
  263. kinit_path_local = "/usr/bin/kinit",
  264. owner = 'hbase',
  265. bin_dir = '/usr/bin',
  266. action = ['create_delayed'],
  267. )
  268. self.assertResourceCalled('HdfsDirectory', '/apps/hbase/staging',
  269. security_enabled = False,
  270. keytab = UnknownConfigurationMock(),
  271. conf_dir = '/etc/hadoop/conf',
  272. hdfs_user = 'hdfs',
  273. kinit_path_local = "/usr/bin/kinit",
  274. mode = 0711,
  275. owner = 'hbase',
  276. bin_dir = '/usr/bin',
  277. action = ['create_delayed'],
  278. )
  279. self.assertResourceCalled('HdfsDirectory', None,
  280. security_enabled = False,
  281. keytab = UnknownConfigurationMock(),
  282. conf_dir = '/etc/hadoop/conf',
  283. hdfs_user = 'hdfs',
  284. kinit_path_local = "/usr/bin/kinit",
  285. bin_dir = '/usr/bin',
  286. action = ['create'],
  287. )
  288. def assert_configure_secured(self):
  289. self.assertResourceCalled('Directory', '/etc/hbase',
  290. mode = 0755
  291. )
  292. self.assertResourceCalled('Directory', '/etc/hbase/conf',
  293. owner = 'hbase',
  294. group = 'hadoop',
  295. recursive = True,
  296. )
  297. self.assertResourceCalled('Directory', '/hadoop/hbase',
  298. owner = 'hbase',
  299. mode = 0775,
  300. recursive = True,
  301. cd_access='a'
  302. )
  303. self.assertResourceCalled('Directory', '/hadoop/hbase/local',
  304. owner = 'hbase',
  305. group = 'hadoop',
  306. mode=0775,
  307. recursive = True
  308. )
  309. self.assertResourceCalled('Directory', '/hadoop/hbase/local/jars',
  310. owner = 'hbase',
  311. group = 'hadoop',
  312. mode=0775,
  313. recursive = True,
  314. )
  315. self.assertResourceCalled('XmlConfig', 'hbase-site.xml',
  316. owner = 'hbase',
  317. group = 'hadoop',
  318. conf_dir = '/etc/hbase/conf',
  319. configurations = self.getConfig()['configurations']['hbase-site'],
  320. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-site']
  321. )
  322. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  323. owner = 'hbase',
  324. group = 'hadoop',
  325. conf_dir = '/etc/hbase/conf',
  326. configurations = self.getConfig()['configurations']['core-site'],
  327. configuration_attributes = self.getConfig()['configuration_attributes']['core-site']
  328. )
  329. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  330. owner = 'hbase',
  331. group = 'hadoop',
  332. conf_dir = '/etc/hbase/conf',
  333. configurations = self.getConfig()['configurations']['hdfs-site'],
  334. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  335. )
  336. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  337. owner = 'hdfs',
  338. group = 'hadoop',
  339. conf_dir = '/etc/hadoop/conf',
  340. configurations = self.getConfig()['configurations']['hdfs-site'],
  341. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site']
  342. )
  343. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-policy.xml',
  344. owner = 'hbase',
  345. group = 'hadoop',
  346. )
  347. self.assertResourceCalled('File', '/etc/hbase/conf/hbase-env.sh',
  348. owner = 'hbase',
  349. content = InlineTemplate(self.getConfig()['configurations']['hbase-env']['content']),
  350. )
  351. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hadoop-metrics2-hbase.properties',
  352. owner = 'hbase',
  353. template_tag = 'GANGLIA-MASTER',
  354. )
  355. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/regionservers',
  356. owner = 'hbase',
  357. template_tag = None,
  358. )
  359. self.assertResourceCalled('TemplateConfig', '/etc/hbase/conf/hbase_master_jaas.conf',
  360. owner = 'hbase',
  361. template_tag = None,
  362. )
  363. self.assertResourceCalled('Directory', '/var/run/hbase',
  364. owner = 'hbase',
  365. recursive = True,
  366. )
  367. self.assertResourceCalled('Directory', '/var/log/hbase',
  368. owner = 'hbase',
  369. recursive = True,
  370. )
  371. self.assertResourceCalled('File',
  372. '/etc/hbase/conf/log4j.properties',
  373. mode=0644,
  374. group='hadoop',
  375. owner='hbase',
  376. content='log4jproperties\nline2'
  377. )
  378. self.assertResourceCalled('HdfsDirectory', 'hdfs://c6401.ambari.apache.org:8020/apps/hbase/data',
  379. security_enabled = True,
  380. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  381. conf_dir = '/etc/hadoop/conf',
  382. hdfs_user = 'hdfs',
  383. kinit_path_local = '/usr/bin/kinit',
  384. owner = 'hbase',
  385. bin_dir = '/usr/bin',
  386. action = ['create_delayed'],
  387. )
  388. self.assertResourceCalled('HdfsDirectory', '/apps/hbase/staging',
  389. security_enabled = True,
  390. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  391. conf_dir = '/etc/hadoop/conf',
  392. hdfs_user = 'hdfs',
  393. kinit_path_local = '/usr/bin/kinit',
  394. mode = 0711,
  395. owner = 'hbase',
  396. bin_dir = '/usr/bin',
  397. action = ['create_delayed'],
  398. )
  399. self.assertResourceCalled('HdfsDirectory', None,
  400. security_enabled = True,
  401. keytab = '/etc/security/keytabs/hdfs.headless.keytab',
  402. conf_dir = '/etc/hadoop/conf',
  403. hdfs_user = 'hdfs',
  404. kinit_path_local = '/usr/bin/kinit',
  405. bin_dir = '/usr/bin',
  406. action = ['create'],
  407. )
  408. def test_start_default_22(self):
  409. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  410. classname = "HbaseMaster",
  411. command = "start",
  412. config_file="hbase-2.2.json",
  413. hdp_stack_version = self.STACK_VERSION,
  414. target = RMFTestCase.TARGET_COMMON_SERVICES)
  415. self.assertResourceCalled('Directory', '/etc/hbase',
  416. mode = 0755)
  417. self.assertResourceCalled('Directory', '/usr/hdp/current/hbase-master/conf',
  418. owner = 'hbase',
  419. group = 'hadoop',
  420. recursive = True)
  421. self.assertResourceCalled('Directory', '/hadoop/hbase',
  422. owner = 'hbase',
  423. mode = 0775,
  424. recursive = True,
  425. cd_access='a')
  426. self.assertResourceCalled('Directory', '/hadoop/hbase/local',
  427. owner = 'hbase',
  428. group = 'hadoop',
  429. mode=0775,
  430. recursive = True)
  431. self.assertResourceCalled('Directory', '/hadoop/hbase/local/jars',
  432. owner = 'hbase',
  433. group = 'hadoop',
  434. mode=0775,
  435. recursive = True)
  436. self.assertResourceCalled('XmlConfig', 'hbase-site.xml',
  437. owner = 'hbase',
  438. group = 'hadoop',
  439. conf_dir = '/usr/hdp/current/hbase-master/conf',
  440. configurations = self.getConfig()['configurations']['hbase-site'],
  441. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-site'])
  442. self.assertResourceCalled('XmlConfig', 'core-site.xml',
  443. owner = 'hbase',
  444. group = 'hadoop',
  445. conf_dir = '/usr/hdp/current/hbase-master/conf',
  446. configurations = self.getConfig()['configurations']['core-site'],
  447. configuration_attributes = self.getConfig()['configuration_attributes']['core-site'])
  448. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  449. owner = 'hbase',
  450. group = 'hadoop',
  451. conf_dir = '/usr/hdp/current/hbase-master/conf',
  452. configurations = self.getConfig()['configurations']['hdfs-site'],
  453. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site'])
  454. self.assertResourceCalled('XmlConfig', 'hdfs-site.xml',
  455. owner = 'hdfs',
  456. group = 'hadoop',
  457. conf_dir = '/usr/hdp/current/hadoop-client/conf',
  458. configurations = self.getConfig()['configurations']['hdfs-site'],
  459. configuration_attributes = self.getConfig()['configuration_attributes']['hdfs-site'])
  460. self.assertResourceCalled('XmlConfig', 'hbase-policy.xml',
  461. owner = 'hbase',
  462. group = 'hadoop',
  463. conf_dir = '/usr/hdp/current/hbase-master/conf',
  464. configurations = self.getConfig()['configurations']['hbase-policy'],
  465. configuration_attributes = self.getConfig()['configuration_attributes']['hbase-policy'])
  466. self.assertResourceCalled('File', '/usr/hdp/current/hbase-master/conf/hbase-env.sh',
  467. owner = 'hbase',
  468. content = InlineTemplate(self.getConfig()['configurations']['hbase-env']['content']))
  469. self.assertResourceCalled('TemplateConfig', '/usr/hdp/current/hbase-master/conf/hadoop-metrics2-hbase.properties',
  470. owner = 'hbase',
  471. template_tag = 'GANGLIA-MASTER')
  472. self.assertResourceCalled('TemplateConfig', '/usr/hdp/current/hbase-master/conf/regionservers',
  473. owner = 'hbase',
  474. template_tag = None)
  475. self.assertResourceCalled('Directory', '/var/run/hbase',
  476. owner = 'hbase',
  477. recursive = True)
  478. self.assertResourceCalled('Directory', '/var/log/hbase',
  479. owner = 'hbase',
  480. recursive = True)
  481. self.assertResourceCalled('File',
  482. '/usr/hdp/current/hbase-master/conf/log4j.properties',
  483. mode=0644,
  484. group='hadoop',
  485. owner='hbase',
  486. content='log4jproperties\nline2')
  487. self.assertResourceCalled('HdfsDirectory', 'hdfs://nn1/apps/hbase/data',
  488. security_enabled = False,
  489. keytab = UnknownConfigurationMock(),
  490. conf_dir = '/usr/hdp/current/hadoop-client/conf',
  491. hdfs_user = 'hdfs',
  492. kinit_path_local = "/usr/bin/kinit",
  493. owner = 'hbase',
  494. bin_dir = '/usr/hdp/current/hadoop-client/bin',
  495. action = ['create_delayed'])
  496. self.assertResourceCalled('HdfsDirectory', '/apps/hbase/staging',
  497. security_enabled = False,
  498. keytab = UnknownConfigurationMock(),
  499. conf_dir = '/usr/hdp/current/hadoop-client/conf',
  500. hdfs_user = 'hdfs',
  501. kinit_path_local = "/usr/bin/kinit",
  502. mode = 0711,
  503. owner = 'hbase',
  504. bin_dir = '/usr/hdp/current/hadoop-client/bin',
  505. action = ['create_delayed'])
  506. self.assertResourceCalled('HdfsDirectory', None,
  507. security_enabled = False,
  508. keytab = UnknownConfigurationMock(),
  509. conf_dir = '/usr/hdp/current/hadoop-client/conf',
  510. hdfs_user = 'hdfs',
  511. kinit_path_local = "/usr/bin/kinit",
  512. bin_dir = '/usr/hdp/current/hadoop-client/bin',
  513. action = ['create'])
  514. self.assertResourceCalled('Execute', '/usr/hdp/current/hbase-master/bin/hbase-daemon.sh --config /usr/hdp/current/hbase-master/conf start master',
  515. not_if = 'ls /var/run/hbase/hbase-hbase-master.pid >/dev/null 2>&1 && ps -p `cat /var/run/hbase/hbase-hbase-master.pid` >/dev/null 2>&1',
  516. user = 'hbase')
  517. self.assertNoMoreResources()
  518. @patch("resource_management.libraries.functions.security_commons.build_expectations")
  519. @patch("resource_management.libraries.functions.security_commons.get_params_from_filesystem")
  520. @patch("resource_management.libraries.functions.security_commons.validate_security_config_properties")
  521. @patch("resource_management.libraries.functions.security_commons.cached_kinit_executor")
  522. @patch("resource_management.libraries.script.Script.put_structured_out")
  523. def test_security_status(self, put_structured_out_mock, cached_kinit_executor_mock, validate_security_config_mock, get_params_mock, build_exp_mock):
  524. # Test that function works when is called with correct parameters
  525. security_params = {
  526. 'hbase-site': {
  527. 'hbase.master.kerberos.principal': '/path/to/hbase_keytab',
  528. 'hbase.master.keytab.file': 'hbase_principal'
  529. }
  530. }
  531. result_issues = []
  532. props_value_check = {"hbase.security.authentication": "kerberos",
  533. "hbase.security.authorization": "true"}
  534. props_empty_check = ["hbase.master.keytab.file",
  535. "hbase.master.kerberos.principal"]
  536. props_read_check = ["hbase.master.keytab.file"]
  537. get_params_mock.return_value = security_params
  538. validate_security_config_mock.return_value = result_issues
  539. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  540. classname = "HbaseMaster",
  541. command = "security_status",
  542. config_file="secured.json",
  543. hdp_stack_version = self.STACK_VERSION,
  544. target = RMFTestCase.TARGET_COMMON_SERVICES
  545. )
  546. build_exp_mock.assert_called_with('hbase-site', props_value_check, props_empty_check, props_read_check)
  547. put_structured_out_mock.assert_called_with({"securityState": "SECURED_KERBEROS"})
  548. cached_kinit_executor_mock.called_with('/usr/bin/kinit',
  549. self.config_dict['configurations']['hbase-env']['hbase_user'],
  550. security_params['hbase-site']['hbase.master.keytab.file'],
  551. security_params['hbase-site']['hbase.master.kerberos.principal'],
  552. self.config_dict['hostname'],
  553. '/tmp')
  554. # Testing that the exception throw by cached_executor is caught
  555. cached_kinit_executor_mock.reset_mock()
  556. cached_kinit_executor_mock.side_effect = Exception("Invalid command")
  557. try:
  558. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  559. classname = "HbaseMaster",
  560. command = "security_status",
  561. config_file="secured.json",
  562. hdp_stack_version = self.STACK_VERSION,
  563. target = RMFTestCase.TARGET_COMMON_SERVICES
  564. )
  565. except:
  566. self.assertTrue(True)
  567. # Testing with a security_params which doesn't contains hbase-site
  568. empty_security_params = {}
  569. cached_kinit_executor_mock.reset_mock()
  570. get_params_mock.reset_mock()
  571. put_structured_out_mock.reset_mock()
  572. get_params_mock.return_value = empty_security_params
  573. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  574. classname = "HbaseMaster",
  575. command = "security_status",
  576. config_file="secured.json",
  577. hdp_stack_version = self.STACK_VERSION,
  578. target = RMFTestCase.TARGET_COMMON_SERVICES
  579. )
  580. put_structured_out_mock.assert_called_with({"securityIssuesFound": "Keytab file or principal are not set property."})
  581. # Testing with not empty result_issues
  582. result_issues_with_params = {}
  583. result_issues_with_params['hbase-site']="Something bad happened"
  584. validate_security_config_mock.reset_mock()
  585. get_params_mock.reset_mock()
  586. validate_security_config_mock.return_value = result_issues_with_params
  587. get_params_mock.return_value = security_params
  588. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  589. classname = "HbaseMaster",
  590. command = "security_status",
  591. config_file="default.json",
  592. hdp_stack_version = self.STACK_VERSION,
  593. target = RMFTestCase.TARGET_COMMON_SERVICES
  594. )
  595. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  596. # Testing with security_enable = false
  597. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  598. classname = "HbaseMaster",
  599. command = "security_status",
  600. config_file="secured.json",
  601. hdp_stack_version = self.STACK_VERSION,
  602. target = RMFTestCase.TARGET_COMMON_SERVICES
  603. )
  604. put_structured_out_mock.assert_called_with({"securityState": "UNSECURED"})
  605. def test_upgrade_backup(self):
  606. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_upgrade.py",
  607. classname = "HbaseMasterUpgrade",
  608. command = "snapshot",
  609. config_file="hbase-preupgrade.json",
  610. hdp_stack_version = self.STACK_VERSION,
  611. target = RMFTestCase.TARGET_COMMON_SERVICES)
  612. self.assertResourceCalled('Execute', " echo 'snapshot_all' | /usr/hdp/current/hbase-client/bin/hbase shell",
  613. user = 'hbase')
  614. self.assertNoMoreResources()
  615. @patch("resource_management.core.shell.call")
  616. def test_pre_rolling_restart(self, call_mock):
  617. call_mock.side_effects = [(0, None), (0, None)]
  618. config_file = self.get_src_folder()+"/test/python/stacks/2.0.6/configs/default.json"
  619. with open(config_file, "r") as f:
  620. json_content = json.load(f)
  621. version = '2.2.1.0-3242'
  622. json_content['commandParams']['version'] = version
  623. mocks_dict = {}
  624. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  625. classname = "HbaseMaster",
  626. command = "pre_rolling_restart",
  627. config_dict = json_content,
  628. hdp_stack_version = self.STACK_VERSION,
  629. target = RMFTestCase.TARGET_COMMON_SERVICES,
  630. mocks_dict = mocks_dict)
  631. self.assertResourceCalled('Execute',
  632. 'hdp-select set hbase-master %s' % version,)
  633. self.assertFalse(call_mock.called)
  634. self.assertNoMoreResources()
  635. @patch("resource_management.core.shell.call")
  636. def test_upgrade_23(self, call_mock):
  637. call_mock.side_effects = [(0, None), (0, None)]
  638. config_file = self.get_src_folder()+"/test/python/stacks/2.0.6/configs/default.json"
  639. with open(config_file, "r") as f:
  640. json_content = json.load(f)
  641. version = '2.3.0.0-1234'
  642. json_content['commandParams']['version'] = version
  643. mocks_dict = {}
  644. self.executeScript(self.COMMON_SERVICES_PACKAGE_DIR + "/scripts/hbase_master.py",
  645. classname = "HbaseMaster",
  646. command = "pre_rolling_restart",
  647. config_dict = json_content,
  648. hdp_stack_version = self.STACK_VERSION,
  649. target = RMFTestCase.TARGET_COMMON_SERVICES,
  650. call_mocks = [(0, None), (0, None), (0, None), (0, None)],
  651. mocks_dict = mocks_dict)
  652. self.assertResourceCalled('Execute', 'hdp-select set hbase-master %s' % version)
  653. self.assertEquals(2, mocks_dict['call'].call_count)
  654. self.assertEquals(
  655. "conf-select create-conf-dir --package hbase --stack-version 2.3.0.0-1234 --conf-version 0",
  656. mocks_dict['call'].call_args_list[0][0][0])
  657. self.assertEquals(
  658. "conf-select set-conf-dir --package hbase --stack-version 2.3.0.0-1234 --conf-version 0",
  659. mocks_dict['call'].call_args_list[1][0][0])