This is an automated email from the ASF dual-hosted git repository. dhavalshah9131 pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git
The following commit(s) were added to refs/heads/master by this push: new 5b3d18c4f RANGER-5281 : Disable KMS Module Tests for Analysis (#626) 5b3d18c4f is described below commit 5b3d18c4feb2e002c02ff1a023ba422e586abb65 Author: dhavalshah9131 <dhavalshah9...@gmail.com> AuthorDate: Tue Aug 19 15:04:23 2025 +0530 RANGER-5281 : Disable KMS Module Tests for Analysis (#626) --- .../apache/hadoop/crypto/key/RangerKMSDBTest.java | 2 + .../hadoop/crypto/key/TestDBToKeySecure.java | 2 + .../apache/hadoop/crypto/key/TestHSM2DBMKUtil.java | 2 + .../crypto/key/TestRangerAWSKMSProvider.java | 2 + .../crypto/key/kms/RangerKeyStoreProviderTest.java | 990 --------------------- .../kms/TestAzureKeyVaultClientAuthenticator.java | 2 + .../crypto/key/kms/TestDBToAzureKeyVault.java | 2 + .../hadoop/crypto/key/kms/TestJKS2RangerUtil.java | 2 + .../key/kms/TestKeySecureToRangerDBMKUtil.java | 2 + .../crypto/key/kms/TestMigrateDBMKeyToGCP.java | 2 + .../hadoop/crypto/key/kms/TestRanger2JKSUtil.java | 2 + .../kms/TestRangerAzureKeyVaultKeyGenerator.java | 2 + .../key/kms/TestRangerGoogleCloudHSMProvider.java | 2 + .../hadoop/crypto/key/kms/TestRangerKeyStore.java | 6 + .../crypto/key/kms/TestRangerSafenetKeySecure.java | 2 + .../key/kms/server/RangerKeyStoreProviderTest.java | 33 + .../hadoop/crypto/key/kms/server/TestKMS.java | 2 + .../key/kms/server/TestKMSExceptionsProvider.java | 2 + .../crypto/key/kms/server/TestKMSMDCFilter.java | 2 + .../key/kms/server/TestKMSServerJSONUtils.java | 2 + .../crypto/key/kms/server/TestKMSWebApp.java | 2 + .../key/kms/server/TestRangerJsonProvider.java | 2 + .../org/apache/ranger/entity/TestXXDBBase.java | 2 + .../apache/ranger/entity/TestXXRangerKeyStore.java | 2 + .../ranger/kms/biz/TestRangerKMSStartUp.java | 2 + .../org/apache/ranger/kms/dao/TestBaseDao.java | 2 + .../kms/metrics/source/TestKMSMetricUtil.java | 2 + 27 files changed, 87 insertions(+), 990 deletions(-) diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java b/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java index b4bad9929..351d29cda 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java @@ -20,6 +20,7 @@ import org.apache.hadoop.conf.Configuration; import org.junit.jupiter.api.AfterEach; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.extension.ExtendWith; import org.mockito.junit.jupiter.MockitoExtension; @@ -39,6 +40,7 @@ import static org.junit.jupiter.api.Assertions.assertTrue; @ExtendWith(MockitoExtension.class) +@Disabled public class RangerKMSDBTest { private static final String PROPERTY_PREFIX = "ranger.ks."; private static final String DB_DIALECT = "jpa.jdbc.dialect"; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java b/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java index a2a747c01..a248f30d4 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java @@ -19,6 +19,7 @@ import org.apache.hadoop.conf.Configuration; import org.junit.jupiter.api.AfterAll; import org.junit.jupiter.api.BeforeAll; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -35,6 +36,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestDBToKeySecure { private static SecurityManager originalSecurityManager; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java b/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java index 926e2aad1..55dd7eacc 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java @@ -18,6 +18,7 @@ import org.junit.jupiter.api.AfterEach; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -34,6 +35,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestHSM2DBMKUtil { private final PrintStream originalOut = System.out; private final PrintStream originalErr = System.err; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java b/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java index 3c31e3be4..88bcd22ba 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java @@ -29,6 +29,7 @@ import com.amazonaws.services.kms.model.ListAliasesResult; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.kms.server.KMSConfiguration; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -55,6 +56,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRangerAWSKMSProvider { @Test public void testCreateKMSClient() throws Exception { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/RangerKeyStoreProviderTest.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/RangerKeyStoreProviderTest.java deleted file mode 100644 index e5aefd2de..000000000 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/RangerKeyStoreProviderTest.java +++ /dev/null @@ -1,990 +0,0 @@ -/* - * Licensed to the Apache Software Foundation (ASF) under one or more - * contributor license agreements. See the NOTICE file distributed with - * this work for additional information regarding copyright ownership. - * The ASF licenses this file to You under the Apache License, Version 2.0 - * (the "License"); you may not use this file except in compliance with - * the License. You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -package org.apache.hadoop.crypto.key.kms; - -import org.apache.hadoop.conf.Configuration; -import org.apache.hadoop.crypto.key.KeyProvider; -import org.apache.hadoop.crypto.key.KeyProvider.KeyVersion; -import org.apache.hadoop.crypto.key.KeyProvider.Options; -import org.apache.hadoop.crypto.key.RangerKMSMKI; -import org.apache.hadoop.crypto.key.RangerKeyStore; -import org.apache.hadoop.crypto.key.RangerKeyStoreProvider; -import org.apache.hadoop.crypto.key.kms.server.DerbyTestUtils; -import org.apache.hadoop.crypto.key.kms.server.KMSConfiguration; -import org.junit.jupiter.api.AfterAll; -import org.junit.jupiter.api.Assertions; -import org.junit.jupiter.api.BeforeAll; -import org.junit.jupiter.api.BeforeEach; -import org.junit.jupiter.api.Test; - -import javax.crypto.Cipher; -import javax.crypto.SecretKey; -import javax.crypto.spec.SecretKeySpec; - -import java.io.IOException; -import java.lang.reflect.Field; -import java.lang.reflect.InvocationTargetException; -import java.lang.reflect.Method; -import java.nio.file.Path; -import java.nio.file.Paths; -import java.security.KeyStoreException; -import java.security.NoSuchAlgorithmException; -import java.security.UnrecoverableKeyException; -import java.security.cert.CertificateException; -import java.util.Arrays; -import java.util.HashMap; -import java.util.List; - -import static org.junit.jupiter.api.Assertions.assertArrayEquals; -import static org.junit.jupiter.api.Assertions.assertEquals; -import static org.junit.jupiter.api.Assertions.assertInstanceOf; -import static org.junit.jupiter.api.Assertions.assertNotNull; -import static org.junit.jupiter.api.Assertions.assertThrows; -import static org.junit.jupiter.api.Assertions.assertTrue; -import static org.junit.jupiter.api.Assertions.fail; -import static org.mockito.Mockito.any; -import static org.mockito.Mockito.doNothing; -import static org.mockito.Mockito.doReturn; -import static org.mockito.Mockito.doThrow; -import static org.mockito.Mockito.eq; -import static org.mockito.Mockito.isNull; -import static org.mockito.Mockito.mock; -import static org.mockito.Mockito.spy; -import static org.mockito.Mockito.times; -import static org.mockito.Mockito.verify; -import static org.mockito.Mockito.when; - -/** - * A test for the RangerKeyStoreProvider, which is an implementation of the Hadoop KeyProvider interface, which stores keys in a database. - * Apache Derby is used to create the relevant tables to store the keys in for this test. - */ -public class RangerKeyStoreProviderTest { - private static final boolean UNRESTRICTED_POLICIES_INSTALLED; - - @BeforeAll - public static void startServers() throws Exception { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - DerbyTestUtils.startDerby(); - } - - @AfterAll - public static void stopServers() throws Exception { - if (UNRESTRICTED_POLICIES_INSTALLED) { - DerbyTestUtils.stopDerby(); - } - } - - @BeforeEach - public void cleanUpKeyBeforeEachTest() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - try { - keyProvider.deleteKey("newkey1"); - keyProvider.flush(); - } catch (IOException e) { - // Ignore if the key doesn't exist yet - } - } - - @Test - public void testCreateDeleteKey() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key - Options options = new Options(conf); - options.setBitLength(128); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(128 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - Assertions.assertEquals(1, keyProvider.getKeys().size()); - keyProvider.deleteKey("newkey1"); - - keyProvider.flush(); - Assertions.assertEquals(0, keyProvider.getKeys().size()); - } - - @Test - public void testDeleteKey_EngineDeleteEntryThrowsForBaseKey() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - - // Inject mocked dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Mock Metadata - KeyProvider.Metadata metadata = mock(KeyProvider.Metadata.class); - when(metadata.getAlgorithm()).thenReturn("AES"); - when(metadata.getBitLength()).thenReturn(128); - when(metadata.getDescription()).thenReturn("test description"); - when(metadata.getVersions()).thenReturn(0); // No versions (only base key) - when(metadata.getAttributes()).thenReturn(new HashMap<>()); - - // Return mocked metadata - doReturn(metadata).when(provider).getMetadata("testKey"); - - // Simulate that base key alias exists - doReturn(true).when(dbStore).engineContainsAlias("testKey"); - - // Throw exception when trying to delete base key alias - doThrow(new KeyStoreException("Delete failed")).when(dbStore).engineDeleteEntry("testKey"); - - // Act & Assert - IOException ex = assertThrows(IOException.class, () -> provider.deleteKey("testKey")); - assertTrue(ex.getMessage().contains("Problem removing testKey from")); - } - - @Test - public void testCreateKey() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key - Options options = new Options(conf); - options.setBitLength(256); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(256 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - // Validate the key exists - List<String> keys = keyProvider.getKeys(); - Assertions.assertEquals(1, keys.size()); - Assertions.assertEquals("newkey1", keys.get(0)); - } - - @Test - public void testRolloverKey() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - // Rollover a new key - byte[] oldKey = keyVersion.getMaterial(); - keyVersion = keyProvider.rollNewVersion("newkey1"); - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@1", keyVersion.getVersionName()); - Assertions.assertFalse(Arrays.equals(oldKey, keyVersion.getMaterial())); - - keyProvider.deleteKey("newkey1"); - - keyProvider.flush(); - Assertions.assertEquals(0, keyProvider.getKeys().size()); - try { - keyProvider.deleteKey("newkey1"); - keyProvider.flush(); - } catch (IOException e) { - // Ignore if key doesn't exist - } - } - - @Test - public void testGetKeyVersion() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key version - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - // Validate the key exists - Assertions.assertEquals(1, keyProvider.getKeys().size()); - - // Get key versions - List<KeyVersion> keyVersions = keyProvider.getKeyVersions("newkey1"); - Assertions.assertEquals(1, keyVersions.size()); - - KeyVersion kv = keyVersions.get(0); - Assertions.assertEquals("newkey1", kv.getName()); - Assertions.assertEquals(192 / 8, kv.getMaterial().length); - assertTrue(kv.getVersionName().startsWith("newkey1@")); - - keyProvider.flush(); - Assertions.assertNotEquals(0, keyProvider.getKeys().size()); - - // Try to get key versions of a non-existent key - try { - List<KeyVersion> invalidVersions = keyProvider.getKeyVersions("newkey2"); - if (!invalidVersions.isEmpty()) { - Assertions.fail("Unexpected key version found: " + invalidVersions.get(0).getName()); - } - } catch (IOException ex) { - // expected - } - } - - @Test - public void testGetKeys() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key version - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - List<String> getkeys = keyProvider.getKeys(); - Assertions.assertEquals(1, getkeys.size()); - Assertions.assertEquals("newkey1", getkeys.get(0)); - - keyProvider.flush(); - Assertions.assertNotEquals(0, keyProvider.getKeys().size()); - } - - @Test - public void testGetKeyVersionWithInvalidKey() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Try to get key versions of a non-existent key - try { - List<KeyVersion> invalidVersions = keyProvider.getKeyVersions("nonExistentKey"); - assertTrue(invalidVersions.isEmpty(), "Expected no key versions for non-existent key"); - } catch (IOException ex) { - // expected - } - } - - @Test - public void testGetKeyVersionWithInvalidVersion() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key version - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - // Try to get an invalid version - try { - KeyVersion invalidVersion = keyProvider.getKeyVersion("newkey1@invalid"); - Assertions.assertNull(invalidVersion, "Expected null for invalid version"); - } catch (IOException ex) { - // expected - } - } - - @Test - public void testGetKeyVersions() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key version - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - // Get key versions - List<KeyVersion> keyVersions = keyProvider.getKeyVersions("newkey1"); - Assertions.assertEquals(1, keyVersions.size()); - - KeyVersion kv = keyVersions.get(0); - Assertions.assertEquals("newkey1", kv.getName()); - Assertions.assertEquals(192 / 8, kv.getMaterial().length); - assertTrue(kv.getVersionName().startsWith("newkey1@")); - } - - @Test - public void testGetMetadata() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key version - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - keyProvider.flush(); - - // Get metadata - String metadata = String.valueOf(keyProvider.getMetadata("newkey1")); - assertNotNull(metadata, "Metadata should not be null"); - assertTrue(metadata.contains("192"), "Metadata should contain key bit length"); - assertTrue(metadata.contains("AES"), "Metadata should contain key cipher"); - } - - @Test - public void testGetKeyVersionWithInvalidKeyName() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Try to get key versions of a non-existent key - try { - KeyVersion invalidVersion = keyProvider.getKeyVersion("nonExistentKey@0"); - Assertions.assertNull(invalidVersion, "Expected null for non-existent key version"); - } catch (IOException ex) { - // expected - } - } - - @Test - public void testFlush() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Create a key version - Options options = new Options(conf); - options.setBitLength(192); - options.setCipher("AES"); - KeyVersion keyVersion = keyProvider.createKey("newkey1", options); - - Assertions.assertEquals("newkey1", keyVersion.getName()); - Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length); - Assertions.assertEquals("newkey1@0", keyVersion.getVersionName()); - - // Flush the provider - keyProvider.flush(); - - // Validate that the key is still present after flush - List<KeyVersion> keyVersions = keyProvider.getKeyVersions("newkey1"); - Assertions.assertEquals(1, keyVersions.size()); - } - - @Test - public void testGetConfiguration() { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - String originalConfDir = System.getProperty(KMSConfiguration.KMS_CONFIG_DIR); - - try { - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, "relative/path"); - - Configuration conf = new Configuration(); - - RuntimeException ex = assertThrows(RuntimeException.class, () -> { - new RangerKeyStoreProvider(conf); // Should internally call getConfiguration() - }); - - assertTrue(ex.getMessage().contains("must be an absolute path")); - } finally { - if (originalConfDir != null) { - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, originalConfDir); - } else { - System.clearProperty(KMSConfiguration.KMS_CONFIG_DIR); - } - } - } - - @Test - public void testGetKeyVersionWithInvalidVersionName() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Try to get key version with an invalid version name - try { - KeyVersion invalidVersion = keyProvider.getKeyVersion("newkey1@invalid"); - Assertions.assertNull(invalidVersion, "Expected null for invalid version name"); - } catch (IOException ex) { - // expected - } - } - - @Test - public void testGetDBKSConf() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Get the DB configuration - Configuration dbConf = RangerKeyStoreProvider.getDBKSConf(); - assertNotNull(dbConf, "DB configuration should not be null"); - } - - @Test - public void testRollNewVersion_ThrowsWhenKeyNotFound() throws Throwable { - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = new RangerKeyStoreProvider(conf); - - byte[] dummyMaterial = new byte[16]; // 128-bit material - - IOException exception = assertThrows(IOException.class, () -> - provider.rollNewVersion("nonExistingKey", dummyMaterial)); - - assertTrue(exception.getMessage().contains("Key nonExistingKey not found")); - } - - @Test - public void testRollNewVersion_ThrowsWhenKeyLengthMismatch() throws Throwable { - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = new RangerKeyStoreProvider(conf); - - Options options = new Options(conf); - options.setBitLength(128); - options.setCipher("AES"); - provider.createKey("testKeyMismatch", options); - provider.flush(); - - // Use 192-bit material - byte[] wrongMaterial = new byte[24]; - - IOException exception = assertThrows(IOException.class, () -> - provider.rollNewVersion("testKeyMismatch", wrongMaterial)); - - assertTrue(exception.getMessage().contains("Wrong key length")); - } - - @Test - public void testDeleteKey_MetadataIsNull() throws Throwable { - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider realProvider = new RangerKeyStoreProvider(conf); - - // Spy on the real provider to override getMetadata - RangerKeyStoreProvider provider = spy(realProvider); - - // Simulate missing metadata - doReturn(null).when(provider).getMetadata("testKey"); - - // Act & Assert - IOException ex = assertThrows(IOException.class, () -> provider.deleteKey("testKey")); - - // This now matches the real message thrown by deleteKey() - assertTrue(ex.getMessage().contains("Key testKey does not exist")); - } - - @Test - public void testGetKeyVersion_DecryptKeyThrowsRuntimeException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - // Inject dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Enable keyVault mode - Field keyVaultField = RangerKeyStoreProvider.class.getDeclaredField("keyVaultEnabled"); - keyVaultField.setAccessible(true); - keyVaultField.set(provider, true); - - // Setup mocks: alias exists, but decryption fails - doReturn(true).when(dbStore).engineContainsAlias("testKey"); - doThrow(new RuntimeException("decryption failure")).when(dbStore).engineGetDecryptedZoneKeyByte("testKey"); - - RuntimeException ex = assertThrows(RuntimeException.class, () -> provider.getKeyVersion("testKey")); - assertTrue(ex.getMessage().contains("Error while getting decrypted key.")); - assertTrue(ex.getMessage().contains("decryption failure")); - } - - @Test - public void testGetKeyVersion_NoSuchAlgorithmException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - // Inject dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Setup: alias exists, key fetch throws NoSuchAlgorithmException - doReturn(true).when(dbStore).engineContainsAlias("testKey"); - doThrow(new NoSuchAlgorithmException()).when(dbStore).engineGetKey(eq("testKey"), any()); - - IOException ex = assertThrows(IOException.class, () -> provider.getKeyVersion("testKey")); - - assertTrue(ex.getMessage().contains("Can't get algorithm for key")); - - // Setup: alias exists, key fetch throws UnrecoverableKeyException - doReturn(true).when(dbStore).engineContainsAlias("testKey"); - doThrow(new UnrecoverableKeyException()).when(dbStore).engineGetKey(eq("testKey"), any()); - - IOException ex1 = assertThrows(IOException.class, () -> provider.getKeyVersion("testKey")); - - assertTrue(ex1.getMessage().contains("Can't recover key ")); - } - - @Test - public void testGetMetadata_GenericException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - - // Inject mocked dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Simulate exception during dbStore.engineContainsAlias for RuntimeException - when(dbStore.engineContainsAlias("testKey")).thenThrow(new RuntimeException("DB failure")); - - IOException ex = assertThrows(IOException.class, () -> provider.getMetadata("testKey")); - - assertTrue(ex.getMessage().contains("Please try again")); - assertTrue(ex.getCause().getMessage().contains("DB failure")); - } - - @Test - public void testGetConfiguration1() throws Throwable { - if (!UNRESTRICTED_POLICIES_INSTALLED) { - return; - } - - Path configDir = Paths.get("src/test/resources/kms"); - System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); - - Configuration conf = new Configuration(); - RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf); - - // Get the configuration - Configuration keyProviderConf = keyProvider.getConf(); - assertNotNull(keyProviderConf, "Configuration should not be null"); - } - - @Test - public void testSaveKey_ThrowsIOException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - - // Inject mocked dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Set keyVaultEnabled = false - Field keyVaultField = RangerKeyStoreProvider.class.getDeclaredField("keyVaultEnabled"); - keyVaultField.setAccessible(true); - keyVaultField.set(provider, false); - - // Mock Metadata with required getters - KeyProvider.Metadata metadata = mock(KeyProvider.Metadata.class); - when(metadata.getAlgorithm()).thenReturn("AES"); - when(metadata.getBitLength()).thenReturn(128); - when(metadata.getDescription()).thenReturn("test description"); - when(metadata.getVersions()).thenReturn(1); - when(metadata.getAttributes()).thenReturn(new HashMap<>()); - - // Mock exception on addKeyEntry - doThrow(new RuntimeException("decryption failure")).when(dbStore).addKeyEntry( - eq("testKey"), - any(), - any(), - eq("AES"), - eq(128), - eq("test description"), - eq(1), - any()); - - Method saveKeyMethod = RangerKeyStoreProvider.class.getDeclaredMethod("saveKey", String.class, KeyProvider.Metadata.class); - saveKeyMethod.setAccessible(true); - - try { - saveKeyMethod.invoke(provider, "testKey", metadata); - fail("Expected IOException to be thrown"); - } catch (InvocationTargetException e) { - Throwable cause = e.getCause(); - assertInstanceOf(IOException.class, cause, "Cause should be IOException"); - assertInstanceOf(RuntimeException.class, cause.getCause(), "IOException cause should be RuntimeException"); - assertTrue(cause.getCause().getMessage().contains("decryption failure")); - } - } - - @Test - public void testGetKeyVersion_KeyVaultTrue_SuccessPath() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - - // Inject dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Set keyVaultEnabled = true - Field keyVaultField = RangerKeyStoreProvider.class.getDeclaredField("keyVaultEnabled"); - keyVaultField.setAccessible(true); - keyVaultField.set(provider, true); - - String versionedKey = "testKey@0"; - - // Simulate engineContainsAlias returns false first, then true - when(dbStore.engineContainsAlias(versionedKey)).thenReturn(false).thenReturn(true); - - // Simulate engineLoad - doNothing().when(dbStore).engineLoad(isNull(), any()); - - // Simulate decrypted key return - byte[] decryptedKey = new byte[] {0x01, 0x02, 0x03}; - when(dbStore.engineGetDecryptedZoneKeyByte(versionedKey)).thenReturn(decryptedKey); - - // Act - KeyVersion result = provider.getKeyVersion(versionedKey); - - // Assert - assertNotNull(result); - assertEquals(versionedKey, result.getVersionName()); - assertEquals("testKey", result.getName()); - assertArrayEquals(decryptedKey, result.getMaterial()); - } - - @Test - public void testGenerateAndGetMasterKey_generateMasterKeyThrows() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - RangerKMSMKI masterKeyProvider = mock(RangerKMSMKI.class); - - // simulate generateMasterKey throwing an exception - doThrow(new RuntimeException("Simulated failure in generateMasterKey")).when(masterKeyProvider).generateMasterKey("abc123"); - - Method method = RangerKeyStoreProvider.class.getDeclaredMethod("generateAndGetMasterKey", RangerKMSMKI.class, String.class); - method.setAccessible(true); - - RuntimeException ex = assertThrows(RuntimeException.class, () -> { - try { - method.invoke(provider, masterKeyProvider, "abc123"); - } catch (InvocationTargetException e) { - throw e.getCause(); - } - }); - - assertTrue(ex.getMessage().contains("Error while generating Ranger Master key")); - } - - @Test - void testFlush_EngineStoreThrowsIOException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - doThrow(new IOException("Flush failed")).when(dbStore).engineStore(any(), any()); - - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - // Inject mocks and changed = true - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - Field changedField = RangerKeyStoreProvider.class.getDeclaredField("changed"); - changedField.setAccessible(true); - changedField.set(provider, true); - - IOException ex = assertThrows(IOException.class, provider::flush); - assertTrue(ex.getMessage().contains("Flush failed")); - - verify(dbStore, times(1)).engineStore(any(), any()); - } - - @Test - void testFlush_EngineStoreThrowsNoSuchAlgorithmException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - doThrow(new NoSuchAlgorithmException()).when(dbStore).engineStore(any(), any()); - - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - Field changedField = RangerKeyStoreProvider.class.getDeclaredField("changed"); - changedField.setAccessible(true); - changedField.set(provider, true); - - IOException ex = assertThrows(IOException.class, provider::flush); - assertTrue(ex.getMessage().contains("No such algorithm storing key")); - - verify(dbStore, times(1)).engineStore(any(), any()); - } - - @Test - void testFlush_EngineStoreThrowsCertificateException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - doThrow(new CertificateException()).when(dbStore).engineStore(any(), any()); - - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - Field changedField = RangerKeyStoreProvider.class.getDeclaredField("changed"); - changedField.setAccessible(true); - changedField.set(provider, true); - - IOException ex = assertThrows(IOException.class, provider::flush); - assertTrue(ex.getMessage().contains("Certificate exception storing key")); - - verify(dbStore, times(1)).engineStore(any(), any()); - } - - @Test - void testDeleteKey_ShouldThrowIOException() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - // Inject mocked dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - // Mock Metadata object with versions = 1 - KeyProvider.Metadata metadata = mock(KeyProvider.Metadata.class); - when(metadata.getVersions()).thenReturn(1); - - // Stub getMetadata to return mocked metadata - doReturn(metadata).when(provider).getMetadata("testKey"); - - // Stub dbStore responses for key existence - doReturn(true).when(dbStore).engineContainsAlias("testKey@0"); - doReturn(true).when(dbStore).engineContainsAlias("testKey"); - - // Simulate KeyStoreException on deleting the version key - doThrow(new KeyStoreException("forced exception")).when(dbStore).engineDeleteEntry("testKey@0"); - - // Expect IOException because KeyStoreException is caught and wrapped - IOException ex = assertThrows(IOException.class, () -> provider.deleteKey("testKey")); - assertTrue(ex.getMessage().contains("Problem removing")); - - // Verify interactions with dbStore mocks - verify(dbStore).engineContainsAlias("testKey@0"); - verify(dbStore).engineDeleteEntry("testKey@0"); - } - - @Test - void testCreateKey_ShouldThrowIOException_WhenKeyAlreadyExists() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - // Inject mocked dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - String keyName = "existingKey"; - byte[] material = new byte[16]; // 128 bits - KeyProvider.Options options = new KeyProvider.Options(conf) - .setCipher("AES") - .setBitLength(128); - - // Simulate that key already exists - when(dbStore.engineContainsAlias(keyName)).thenReturn(true); - - IOException ex = assertThrows(IOException.class, () -> provider.createKey(keyName, material, options)); - assertTrue(ex.getMessage().contains("Key " + keyName + " already exists")); - } - - @Test - void testCreateKey_ShouldThrowIOException_WhenKeyLengthIncorrect() throws Throwable { - Configuration conf = new Configuration(); - RangerKeyStore dbStore = mock(RangerKeyStore.class); - RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); - - // Inject mocked dbStore - Field dbStoreField = RangerKeyStoreProvider.class.getDeclaredField("dbStore"); - dbStoreField.setAccessible(true); - dbStoreField.set(provider, dbStore); - - String keyName = "newKey"; - byte[] material = new byte[10]; // 80 bits - KeyProvider.Options options = new KeyProvider.Options(conf) - .setCipher("AES") - .setBitLength(128); // But expects 128 bits - - // Simulate key does not exist - when(dbStore.engineContainsAlias(keyName)).thenReturn(false); - - IOException ex = assertThrows(IOException.class, () -> provider.createKey(keyName, material, options)); - assertTrue(ex.getMessage().contains("Wrong key length. Required 128, but got 80")); - } - - static { - boolean ok = false; - try { - byte[] data = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07}; - - SecretKey key192 = new SecretKeySpec( - new byte[] {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, - 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17}, - "AES"); - Cipher c = Cipher.getInstance("AES"); - c.init(Cipher.ENCRYPT_MODE, key192); - c.doFinal(data); - ok = true; - } catch (Exception e) { - // - } - UNRESTRICTED_POLICIES_INSTALLED = ok; - } -} diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java index 5ddb7e5b2..b5494e2da 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java @@ -18,6 +18,7 @@ import com.microsoft.azure.keyvault.KeyVaultClient; import org.apache.hadoop.crypto.key.AzureKeyVaultClientAuthenticator; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -30,6 +31,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestAzureKeyVaultClientAuthenticator { @Test public void testDoAuthenticate_shouldThrowRuntimeException() { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java index e12238eeb..9663553fe 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java @@ -18,6 +18,7 @@ import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.DBToAzureKeyVault; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -38,6 +39,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestDBToAzureKeyVault { @Test public void testShowUsage() { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java index b941b0511..60006cbb3 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java @@ -19,6 +19,7 @@ import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.JKS2RangerUtil; import org.apache.hadoop.crypto.key.RangerMasterKey; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -40,6 +41,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestJKS2RangerUtil { @Test public void testGetFromJceks() throws Exception { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java index c4a3a40a3..41fec07bb 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java @@ -18,6 +18,7 @@ import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.KeySecureToRangerDBMKUtil; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -38,6 +39,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKeySecureToRangerDBMKUtil { private final ByteArrayOutputStream errContent = new ByteArrayOutputStream(); diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java index d70d133f3..d4a949527 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java @@ -17,6 +17,7 @@ package org.apache.hadoop.crypto.key.kms; import org.apache.hadoop.crypto.key.MigrateDBMKeyToGCP; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -33,6 +34,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestMigrateDBMKeyToGCP { @Test public void testShowUsage() throws InvocationTargetException, IllegalAccessException, NoSuchMethodException { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java index 7792f09cc..acc264d0a 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java @@ -18,6 +18,7 @@ import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.Ranger2JKSUtil; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -30,6 +31,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRanger2JKSUtil { @Test public void testShowUsage() { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java index 4031c0ba2..405ae644b 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java @@ -21,6 +21,7 @@ import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.RangerAzureKeyVaultKeyGenerator; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -43,6 +44,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRangerAzureKeyVaultKeyGenerator { private static final String VALID_VAULT_URL = "https://test-keyvault.vault.azure.net/"; private static final String VALID_MASTER_KEY = "test-master-key"; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java index 988cce338..4801d8c84 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java @@ -20,6 +20,7 @@ import org.apache.hadoop.crypto.key.RangerGoogleCloudHSMProvider; import org.bouncycastle.crypto.RuntimeCryptoException; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -41,6 +42,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRangerGoogleCloudHSMProvider { private static final String VALID_PROJECT_ID = "test-project-id"; private static final String VALID_LOCATION_ID = "us-central1"; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java index 7be4f7fa4..4dee51ac8 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java @@ -28,6 +28,7 @@ import org.junit.jupiter.api.AfterEach; import org.junit.jupiter.api.Assertions; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -259,6 +260,7 @@ public void testEngineStore_ThrowsIllegalArgumentException_WhenPasswordIsNull() } @Test + @Disabled public void testAddKeyEntry_throwsKeyStoreException_whenSealKeyFails() throws Exception { DaoManager daoManager = mock(DaoManager.class); RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager); @@ -279,6 +281,7 @@ public void testAddKeyEntry_throwsKeyStoreException_whenSealKeyFails() throws Ex } @Test + @Disabled public void testDbOperationStore_whenUpdateThrowsException() { DaoManager daoManager = mock(DaoManager.class); RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager); @@ -328,6 +331,7 @@ public void testDbOperationStore_whenKeyStoreExists_shouldCallUpdate() throws Ex } @Test + @Disabled public void testDbOperationDelete() throws Exception { DaoManager daoManager = mock(DaoManager.class); RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager); @@ -348,6 +352,7 @@ public void testDbOperationDelete() throws Exception { } @Test + @Disabled public void testDbOperationLoad() throws Exception { DaoManager daoManager = mock(DaoManager.class); RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager); @@ -472,6 +477,7 @@ void testEngineGetKeyMetadata() throws Exception { } @Test + @Disabled void testAddSecureKeyByteEntry_EncryptFails_ThrowsKeyStoreException() throws Exception { DaoManager daoManager = mock(DaoManager.class); RangerKeyStore rangerKeyStore = spy(new RangerKeyStore(daoManager)); diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java index 98b21e97f..d4c2e3329 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java @@ -18,6 +18,7 @@ import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.crypto.key.RangerSafenetKeySecure; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -39,6 +40,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRangerSafenetKeySecure { @Test public void testGenerateMasterKey_WithNullKeystore_ShouldReturnFalse() throws Exception { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java index 8f68e2498..68fd15f5e 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java @@ -28,6 +28,7 @@ import org.junit.jupiter.api.Assertions; import org.junit.jupiter.api.BeforeAll; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.Test; import javax.crypto.Cipher; @@ -90,6 +91,7 @@ public static void stopServers() throws Exception { } @BeforeEach + @Disabled public void cleanUpKeyBeforeEachTest() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -109,6 +111,7 @@ public void cleanUpKeyBeforeEachTest() throws Throwable { } @Test + @Disabled public void testCreateDeleteKey() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -138,6 +141,7 @@ public void testCreateDeleteKey() throws Throwable { } @Test + @Disabled public void testDeleteKey_EngineDeleteEntryThrowsForBaseKey() throws Throwable { Configuration conf = new Configuration(); RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); @@ -171,6 +175,7 @@ public void testDeleteKey_EngineDeleteEntryThrowsForBaseKey() throws Throwable { } @Test + @Disabled public void testCreateKey() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -200,6 +205,7 @@ public void testCreateKey() throws Throwable { } @Test + @Disabled public void testRolloverKey() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -243,6 +249,7 @@ public void testRolloverKey() throws Throwable { } @Test + @Disabled public void testGetKeyVersion() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -293,6 +300,7 @@ public void testGetKeyVersion() throws Throwable { } @Test + @Disabled public void testGetKeys() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -325,6 +333,7 @@ public void testGetKeys() throws Throwable { } @Test + @Disabled public void testGetKeyVersionWithInvalidKey() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -346,6 +355,7 @@ public void testGetKeyVersionWithInvalidKey() throws Throwable { } @Test + @Disabled public void testGetKeyVersionWithInvalidVersion() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -379,6 +389,7 @@ public void testGetKeyVersionWithInvalidVersion() throws Throwable { } @Test + @Disabled public void testGetKeyVersions() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -413,6 +424,7 @@ public void testGetKeyVersions() throws Throwable { } @Test + @Disabled public void testGetMetadata() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -443,6 +455,7 @@ public void testGetMetadata() throws Throwable { } @Test + @Disabled public void testGetKeyVersionWithInvalidKeyName() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -464,6 +477,7 @@ public void testGetKeyVersionWithInvalidKeyName() throws Throwable { } @Test + @Disabled public void testFlush() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -494,6 +508,7 @@ public void testFlush() throws Throwable { } @Test + @Disabled public void testGetConfiguration() { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -521,6 +536,7 @@ public void testGetConfiguration() { } @Test + @Disabled public void testGetKeyVersionWithInvalidVersionName() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -542,6 +558,7 @@ public void testGetKeyVersionWithInvalidVersionName() throws Throwable { } @Test + @Disabled public void testGetDBKSConf() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -559,6 +576,7 @@ public void testGetDBKSConf() throws Throwable { } @Test + @Disabled public void testRollNewVersion_ThrowsWhenKeyNotFound() throws Throwable { Path configDir = Paths.get("src/test/resources/kms"); System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); @@ -574,6 +592,7 @@ public void testRollNewVersion_ThrowsWhenKeyNotFound() throws Throwable { } @Test + @Disabled public void testRollNewVersion_ThrowsWhenKeyLengthMismatch() throws Throwable { Path configDir = Paths.get("src/test/resources/kms"); System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); @@ -597,6 +616,7 @@ public void testRollNewVersion_ThrowsWhenKeyLengthMismatch() throws Throwable { } @Test + @Disabled public void testDeleteKey_MetadataIsNull() throws Throwable { Path configDir = Paths.get("src/test/resources/kms"); System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, configDir.toFile().getAbsolutePath()); @@ -618,6 +638,7 @@ public void testDeleteKey_MetadataIsNull() throws Throwable { } @Test + @Disabled public void testGetKeyVersion_DecryptKeyThrowsRuntimeException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -643,6 +664,7 @@ public void testGetKeyVersion_DecryptKeyThrowsRuntimeException() throws Throwabl } @Test + @Disabled public void testGetKeyVersion_NoSuchAlgorithmException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -671,6 +693,7 @@ public void testGetKeyVersion_NoSuchAlgorithmException() throws Throwable { } @Test + @Disabled public void testGetMetadata_GenericException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); @@ -691,6 +714,7 @@ public void testGetMetadata_GenericException() throws Throwable { } @Test + @Disabled public void testGetConfiguration1() throws Throwable { if (!UNRESTRICTED_POLICIES_INSTALLED) { return; @@ -708,6 +732,7 @@ public void testGetConfiguration1() throws Throwable { } @Test + @Disabled public void testSaveKey_ThrowsIOException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); @@ -757,6 +782,7 @@ public void testSaveKey_ThrowsIOException() throws Throwable { } @Test + @Disabled public void testGetKeyVersion_KeyVaultTrue_SuccessPath() throws Throwable { Configuration conf = new Configuration(); RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); @@ -795,6 +821,7 @@ public void testGetKeyVersion_KeyVaultTrue_SuccessPath() throws Throwable { } @Test + @Disabled public void testGenerateAndGetMasterKey_generateMasterKeyThrows() throws Throwable { Configuration conf = new Configuration(); RangerKeyStoreProvider provider = spy(new RangerKeyStoreProvider(conf)); @@ -818,6 +845,7 @@ public void testGenerateAndGetMasterKey_generateMasterKeyThrows() throws Throwab } @Test + @Disabled void testFlush_EngineStoreThrowsIOException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -841,6 +869,7 @@ void testFlush_EngineStoreThrowsIOException() throws Throwable { } @Test + @Disabled void testFlush_EngineStoreThrowsNoSuchAlgorithmException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -863,6 +892,7 @@ void testFlush_EngineStoreThrowsNoSuchAlgorithmException() throws Throwable { } @Test + @Disabled void testFlush_EngineStoreThrowsCertificateException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -885,6 +915,7 @@ void testFlush_EngineStoreThrowsCertificateException() throws Throwable { } @Test + @Disabled void testDeleteKey_ShouldThrowIOException() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -919,6 +950,7 @@ void testDeleteKey_ShouldThrowIOException() throws Throwable { } @Test + @Disabled void testCreateKey_ShouldThrowIOException_WhenKeyAlreadyExists() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); @@ -943,6 +975,7 @@ void testCreateKey_ShouldThrowIOException_WhenKeyAlreadyExists() throws Throwabl } @Test + @Disabled void testCreateKey_ShouldThrowIOException_WhenKeyLengthIncorrect() throws Throwable { Configuration conf = new Configuration(); RangerKeyStore dbStore = mock(RangerKeyStore.class); diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java index 931eaa65f..65a01e107 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java @@ -22,6 +22,7 @@ import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension; import org.apache.hadoop.security.UserGroupInformation; import org.apache.hadoop.security.token.delegation.web.HttpUserGroupInformation; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -54,6 +55,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKMS { private static KeyProviderCryptoExtension keyProvider; private static KMSAudit kmsAudit; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java index f5728695e..53595478f 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java @@ -16,6 +16,7 @@ */ package org.apache.hadoop.crypto.key.kms.server; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -32,6 +33,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKMSExceptionsProvider { @Test public void testGetOneLineMessage() throws NoSuchMethodException, InvocationTargetException, IllegalAccessException { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java index 9fa9666e8..c83fbb512 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java @@ -16,6 +16,7 @@ */ package org.apache.hadoop.crypto.key.kms.server; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -34,6 +35,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKMSMDCFilter { @Test public void testInit() throws ServletException { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java index e98b00a45..b427f8682 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java @@ -17,6 +17,7 @@ package org.apache.hadoop.crypto.key.kms.server; import org.apache.hadoop.crypto.key.KeyProvider; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -30,6 +31,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKMSServerJSONUtils { @Test public void testToJSON() { diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java index 726686b7b..142c781e9 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java @@ -25,6 +25,7 @@ import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension; import org.apache.ranger.kms.metrics.collector.KMSMetricsCollector; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -60,6 +61,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKMSWebApp { private Configuration mockConfig; private KeyAuthorizationKeyProvider.KeyACLs mockAcls; diff --git a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java index 92deee574..3652dffac 100644 --- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java +++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java @@ -17,6 +17,7 @@ package org.apache.hadoop.crypto.key.kms.server; import org.apache.ranger.common.RangerJsonProvider; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -27,6 +28,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRangerJsonProvider { @Test public void testRangerJsonProvider() { diff --git a/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java b/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java index a36588e72..84d9c1d6b 100644 --- a/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java +++ b/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java @@ -16,6 +16,7 @@ */ package org.apache.ranger.entity; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -32,6 +33,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestXXDBBase { @Test public void testEquals_sameObject() { diff --git a/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java b/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java index 0c35d0a26..9bb74df0a 100644 --- a/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java +++ b/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java @@ -16,6 +16,7 @@ */ package org.apache.ranger.entity; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -26,6 +27,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestXXRangerKeyStore { @Test public void testGetId() { diff --git a/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java b/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java index 6ce8c7758..11bf99b83 100644 --- a/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java +++ b/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java @@ -16,6 +16,7 @@ */ package org.apache.ranger.kms.biz; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -24,6 +25,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestRangerKMSStartUp { @Test public void testInitRangerMasterKey() throws Throwable { diff --git a/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java b/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java index 093be75e5..2dac31e33 100644 --- a/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java +++ b/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java @@ -17,6 +17,7 @@ package org.apache.ranger.kms.dao; import org.junit.jupiter.api.BeforeEach; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.extension.ExtendWith; import org.mockito.Mock; @@ -33,6 +34,7 @@ import static org.mockito.Mockito.when; @ExtendWith(MockitoExtension.class) +@Disabled public class TestBaseDao { @Mock private DaoManager daoManager; diff --git a/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java b/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java index 2016979ad..72a0df4b7 100644 --- a/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java +++ b/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java @@ -17,6 +17,7 @@ package org.apache.ranger.kms.metrics.source; import org.apache.hadoop.crypto.key.kms.server.KMSMetricUtil; +import org.junit.jupiter.api.Disabled; import org.junit.jupiter.api.MethodOrderer; import org.junit.jupiter.api.Test; import org.junit.jupiter.api.TestMethodOrder; @@ -28,6 +29,7 @@ @ExtendWith(MockitoExtension.class) @TestMethodOrder(MethodOrderer.MethodName.class) +@Disabled public class TestKMSMetricUtil { @Test public void testGetKMSMetricCalculation() throws NoSuchMethodException, InvocationTargetException, IllegalAccessException {