This is an automated email from the ASF dual-hosted git repository.

dhavalshah9131 pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ranger.git


The following commit(s) were added to refs/heads/master by this push:
     new 5b3d18c4f RANGER-5281 : Disable KMS Module Tests for Analysis (#626)
5b3d18c4f is described below

commit 5b3d18c4feb2e002c02ff1a023ba422e586abb65
Author: dhavalshah9131 <dhavalshah9...@gmail.com>
AuthorDate: Tue Aug 19 15:04:23 2025 +0530

    RANGER-5281 : Disable KMS Module Tests for Analysis (#626)
---
 .../apache/hadoop/crypto/key/RangerKMSDBTest.java  |   2 +
 .../hadoop/crypto/key/TestDBToKeySecure.java       |   2 +
 .../apache/hadoop/crypto/key/TestHSM2DBMKUtil.java |   2 +
 .../crypto/key/TestRangerAWSKMSProvider.java       |   2 +
 .../crypto/key/kms/RangerKeyStoreProviderTest.java | 990 ---------------------
 .../kms/TestAzureKeyVaultClientAuthenticator.java  |   2 +
 .../crypto/key/kms/TestDBToAzureKeyVault.java      |   2 +
 .../hadoop/crypto/key/kms/TestJKS2RangerUtil.java  |   2 +
 .../key/kms/TestKeySecureToRangerDBMKUtil.java     |   2 +
 .../crypto/key/kms/TestMigrateDBMKeyToGCP.java     |   2 +
 .../hadoop/crypto/key/kms/TestRanger2JKSUtil.java  |   2 +
 .../kms/TestRangerAzureKeyVaultKeyGenerator.java   |   2 +
 .../key/kms/TestRangerGoogleCloudHSMProvider.java  |   2 +
 .../hadoop/crypto/key/kms/TestRangerKeyStore.java  |   6 +
 .../crypto/key/kms/TestRangerSafenetKeySecure.java |   2 +
 .../key/kms/server/RangerKeyStoreProviderTest.java |  33 +
 .../hadoop/crypto/key/kms/server/TestKMS.java      |   2 +
 .../key/kms/server/TestKMSExceptionsProvider.java  |   2 +
 .../crypto/key/kms/server/TestKMSMDCFilter.java    |   2 +
 .../key/kms/server/TestKMSServerJSONUtils.java     |   2 +
 .../crypto/key/kms/server/TestKMSWebApp.java       |   2 +
 .../key/kms/server/TestRangerJsonProvider.java     |   2 +
 .../org/apache/ranger/entity/TestXXDBBase.java     |   2 +
 .../apache/ranger/entity/TestXXRangerKeyStore.java |   2 +
 .../ranger/kms/biz/TestRangerKMSStartUp.java       |   2 +
 .../org/apache/ranger/kms/dao/TestBaseDao.java     |   2 +
 .../kms/metrics/source/TestKMSMetricUtil.java      |   2 +
 27 files changed, 87 insertions(+), 990 deletions(-)

diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java
index b4bad9929..351d29cda 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/RangerKMSDBTest.java
@@ -20,6 +20,7 @@
 import org.apache.hadoop.conf.Configuration;
 import org.junit.jupiter.api.AfterEach;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.extension.ExtendWith;
 import org.mockito.junit.jupiter.MockitoExtension;
@@ -39,6 +40,7 @@
 import static org.junit.jupiter.api.Assertions.assertTrue;
 
 @ExtendWith(MockitoExtension.class)
+@Disabled
 public class RangerKMSDBTest {
     private static final String PROPERTY_PREFIX                = "ranger.ks.";
     private static final String DB_DIALECT                     = 
"jpa.jdbc.dialect";
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java
index a2a747c01..a248f30d4 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/TestDBToKeySecure.java
@@ -19,6 +19,7 @@
 import org.apache.hadoop.conf.Configuration;
 import org.junit.jupiter.api.AfterAll;
 import org.junit.jupiter.api.BeforeAll;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -35,6 +36,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestDBToKeySecure {
     private static SecurityManager originalSecurityManager;
 
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java
index 926e2aad1..55dd7eacc 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/TestHSM2DBMKUtil.java
@@ -18,6 +18,7 @@
 
 import org.junit.jupiter.api.AfterEach;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -34,6 +35,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestHSM2DBMKUtil {
     private final PrintStream     originalOut             = System.out;
     private final PrintStream     originalErr             = System.err;
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java
index 3c31e3be4..88bcd22ba 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/TestRangerAWSKMSProvider.java
@@ -29,6 +29,7 @@
 import com.amazonaws.services.kms.model.ListAliasesResult;
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.kms.server.KMSConfiguration;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -55,6 +56,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRangerAWSKMSProvider {
     @Test
     public void testCreateKMSClient() throws Exception {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/RangerKeyStoreProviderTest.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/RangerKeyStoreProviderTest.java
deleted file mode 100644
index e5aefd2de..000000000
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/RangerKeyStoreProviderTest.java
+++ /dev/null
@@ -1,990 +0,0 @@
-/*
- * Licensed to the Apache Software Foundation (ASF) under one or more
- * contributor license agreements.  See the NOTICE file distributed with
- * this work for additional information regarding copyright ownership.
- * The ASF licenses this file to You under the Apache License, Version 2.0
- * (the "License"); you may not use this file except in compliance with
- * the License.  You may obtain a copy of the License at
- *
- *      http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-
-package org.apache.hadoop.crypto.key.kms;
-
-import org.apache.hadoop.conf.Configuration;
-import org.apache.hadoop.crypto.key.KeyProvider;
-import org.apache.hadoop.crypto.key.KeyProvider.KeyVersion;
-import org.apache.hadoop.crypto.key.KeyProvider.Options;
-import org.apache.hadoop.crypto.key.RangerKMSMKI;
-import org.apache.hadoop.crypto.key.RangerKeyStore;
-import org.apache.hadoop.crypto.key.RangerKeyStoreProvider;
-import org.apache.hadoop.crypto.key.kms.server.DerbyTestUtils;
-import org.apache.hadoop.crypto.key.kms.server.KMSConfiguration;
-import org.junit.jupiter.api.AfterAll;
-import org.junit.jupiter.api.Assertions;
-import org.junit.jupiter.api.BeforeAll;
-import org.junit.jupiter.api.BeforeEach;
-import org.junit.jupiter.api.Test;
-
-import javax.crypto.Cipher;
-import javax.crypto.SecretKey;
-import javax.crypto.spec.SecretKeySpec;
-
-import java.io.IOException;
-import java.lang.reflect.Field;
-import java.lang.reflect.InvocationTargetException;
-import java.lang.reflect.Method;
-import java.nio.file.Path;
-import java.nio.file.Paths;
-import java.security.KeyStoreException;
-import java.security.NoSuchAlgorithmException;
-import java.security.UnrecoverableKeyException;
-import java.security.cert.CertificateException;
-import java.util.Arrays;
-import java.util.HashMap;
-import java.util.List;
-
-import static org.junit.jupiter.api.Assertions.assertArrayEquals;
-import static org.junit.jupiter.api.Assertions.assertEquals;
-import static org.junit.jupiter.api.Assertions.assertInstanceOf;
-import static org.junit.jupiter.api.Assertions.assertNotNull;
-import static org.junit.jupiter.api.Assertions.assertThrows;
-import static org.junit.jupiter.api.Assertions.assertTrue;
-import static org.junit.jupiter.api.Assertions.fail;
-import static org.mockito.Mockito.any;
-import static org.mockito.Mockito.doNothing;
-import static org.mockito.Mockito.doReturn;
-import static org.mockito.Mockito.doThrow;
-import static org.mockito.Mockito.eq;
-import static org.mockito.Mockito.isNull;
-import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.spy;
-import static org.mockito.Mockito.times;
-import static org.mockito.Mockito.verify;
-import static org.mockito.Mockito.when;
-
-/**
- * A test for the RangerKeyStoreProvider, which is an implementation of the 
Hadoop KeyProvider interface, which stores keys in a database.
- * Apache Derby is used to create the relevant tables to store the keys in for 
this test.
- */
-public class RangerKeyStoreProviderTest {
-    private static final boolean UNRESTRICTED_POLICIES_INSTALLED;
-
-    @BeforeAll
-    public static void startServers() throws Exception {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-        DerbyTestUtils.startDerby();
-    }
-
-    @AfterAll
-    public static void stopServers() throws Exception {
-        if (UNRESTRICTED_POLICIES_INSTALLED) {
-            DerbyTestUtils.stopDerby();
-        }
-    }
-
-    @BeforeEach
-    public void cleanUpKeyBeforeEachTest() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        try {
-            keyProvider.deleteKey("newkey1");
-            keyProvider.flush();
-        } catch (IOException e) {
-            // Ignore if the key doesn't exist yet
-        }
-    }
-
-    @Test
-    public void testCreateDeleteKey() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key
-        Options options = new Options(conf);
-        options.setBitLength(128);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(128 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-        Assertions.assertEquals(1, keyProvider.getKeys().size());
-        keyProvider.deleteKey("newkey1");
-
-        keyProvider.flush();
-        Assertions.assertEquals(0, keyProvider.getKeys().size());
-    }
-
-    @Test
-    public void testDeleteKey_EngineDeleteEntryThrowsForBaseKey() throws 
Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-
-        // Inject mocked dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Mock Metadata
-        KeyProvider.Metadata metadata = mock(KeyProvider.Metadata.class);
-        when(metadata.getAlgorithm()).thenReturn("AES");
-        when(metadata.getBitLength()).thenReturn(128);
-        when(metadata.getDescription()).thenReturn("test description");
-        when(metadata.getVersions()).thenReturn(0); // No versions (only base 
key)
-        when(metadata.getAttributes()).thenReturn(new HashMap<>());
-
-        // Return mocked metadata
-        doReturn(metadata).when(provider).getMetadata("testKey");
-
-        // Simulate that base key alias exists
-        doReturn(true).when(dbStore).engineContainsAlias("testKey");
-
-        // Throw exception when trying to delete base key alias
-        doThrow(new KeyStoreException("Delete 
failed")).when(dbStore).engineDeleteEntry("testKey");
-
-        // Act & Assert
-        IOException ex = assertThrows(IOException.class, () -> 
provider.deleteKey("testKey"));
-        assertTrue(ex.getMessage().contains("Problem removing testKey from"));
-    }
-
-    @Test
-    public void testCreateKey() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key
-        Options options = new Options(conf);
-        options.setBitLength(256);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(256 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        // Validate the key exists
-        List<String> keys = keyProvider.getKeys();
-        Assertions.assertEquals(1, keys.size());
-        Assertions.assertEquals("newkey1", keys.get(0));
-    }
-
-    @Test
-    public void testRolloverKey() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        // Rollover a new key
-        byte[] oldKey = keyVersion.getMaterial();
-        keyVersion = keyProvider.rollNewVersion("newkey1");
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@1", keyVersion.getVersionName());
-        Assertions.assertFalse(Arrays.equals(oldKey, 
keyVersion.getMaterial()));
-
-        keyProvider.deleteKey("newkey1");
-
-        keyProvider.flush();
-        Assertions.assertEquals(0, keyProvider.getKeys().size());
-        try {
-            keyProvider.deleteKey("newkey1");
-            keyProvider.flush();
-        } catch (IOException e) {
-            // Ignore if key doesn't exist
-        }
-    }
-
-    @Test
-    public void testGetKeyVersion() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key version
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        // Validate the key exists
-        Assertions.assertEquals(1, keyProvider.getKeys().size());
-
-        // Get key versions
-        List<KeyVersion> keyVersions = keyProvider.getKeyVersions("newkey1");
-        Assertions.assertEquals(1, keyVersions.size());
-
-        KeyVersion kv = keyVersions.get(0);
-        Assertions.assertEquals("newkey1", kv.getName());
-        Assertions.assertEquals(192 / 8, kv.getMaterial().length);
-        assertTrue(kv.getVersionName().startsWith("newkey1@"));
-
-        keyProvider.flush();
-        Assertions.assertNotEquals(0, keyProvider.getKeys().size());
-
-        // Try to get key versions of a non-existent key
-        try {
-            List<KeyVersion> invalidVersions = 
keyProvider.getKeyVersions("newkey2");
-            if (!invalidVersions.isEmpty()) {
-                Assertions.fail("Unexpected key version found: " + 
invalidVersions.get(0).getName());
-            }
-        } catch (IOException ex) {
-            // expected
-        }
-    }
-
-    @Test
-    public void testGetKeys() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key version
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        List<String> getkeys = keyProvider.getKeys();
-        Assertions.assertEquals(1, getkeys.size());
-        Assertions.assertEquals("newkey1", getkeys.get(0));
-
-        keyProvider.flush();
-        Assertions.assertNotEquals(0, keyProvider.getKeys().size());
-    }
-
-    @Test
-    public void testGetKeyVersionWithInvalidKey() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Try to get key versions of a non-existent key
-        try {
-            List<KeyVersion> invalidVersions = 
keyProvider.getKeyVersions("nonExistentKey");
-            assertTrue(invalidVersions.isEmpty(), "Expected no key versions 
for non-existent key");
-        } catch (IOException ex) {
-            // expected
-        }
-    }
-
-    @Test
-    public void testGetKeyVersionWithInvalidVersion() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key version
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        // Try to get an invalid version
-        try {
-            KeyVersion invalidVersion = 
keyProvider.getKeyVersion("newkey1@invalid");
-            Assertions.assertNull(invalidVersion, "Expected null for invalid 
version");
-        } catch (IOException ex) {
-            // expected
-        }
-    }
-
-    @Test
-    public void testGetKeyVersions() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key version
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        // Get key versions
-        List<KeyVersion> keyVersions = keyProvider.getKeyVersions("newkey1");
-        Assertions.assertEquals(1, keyVersions.size());
-
-        KeyVersion kv = keyVersions.get(0);
-        Assertions.assertEquals("newkey1", kv.getName());
-        Assertions.assertEquals(192 / 8, kv.getMaterial().length);
-        assertTrue(kv.getVersionName().startsWith("newkey1@"));
-    }
-
-    @Test
-    public void testGetMetadata() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key version
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        keyProvider.flush();
-
-        // Get metadata
-        String metadata = String.valueOf(keyProvider.getMetadata("newkey1"));
-        assertNotNull(metadata, "Metadata should not be null");
-        assertTrue(metadata.contains("192"), "Metadata should contain key bit 
length");
-        assertTrue(metadata.contains("AES"), "Metadata should contain key 
cipher");
-    }
-
-    @Test
-    public void testGetKeyVersionWithInvalidKeyName() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Try to get key versions of a non-existent key
-        try {
-            KeyVersion invalidVersion = 
keyProvider.getKeyVersion("nonExistentKey@0");
-            Assertions.assertNull(invalidVersion, "Expected null for 
non-existent key version");
-        } catch (IOException ex) {
-            // expected
-        }
-    }
-
-    @Test
-    public void testFlush() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Create a key version
-        Options options = new Options(conf);
-        options.setBitLength(192);
-        options.setCipher("AES");
-        KeyVersion keyVersion = keyProvider.createKey("newkey1", options);
-
-        Assertions.assertEquals("newkey1", keyVersion.getName());
-        Assertions.assertEquals(192 / 8, keyVersion.getMaterial().length);
-        Assertions.assertEquals("newkey1@0", keyVersion.getVersionName());
-
-        // Flush the provider
-        keyProvider.flush();
-
-        // Validate that the key is still present after flush
-        List<KeyVersion> keyVersions = keyProvider.getKeyVersions("newkey1");
-        Assertions.assertEquals(1, keyVersions.size());
-    }
-
-    @Test
-    public void testGetConfiguration() {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        String originalConfDir = 
System.getProperty(KMSConfiguration.KMS_CONFIG_DIR);
-
-        try {
-            System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
"relative/path");
-
-            Configuration conf = new Configuration();
-
-            RuntimeException ex = assertThrows(RuntimeException.class, () -> {
-                new RangerKeyStoreProvider(conf); // Should internally call 
getConfiguration()
-            });
-
-            assertTrue(ex.getMessage().contains("must be an absolute path"));
-        } finally {
-            if (originalConfDir != null) {
-                System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
originalConfDir);
-            } else {
-                System.clearProperty(KMSConfiguration.KMS_CONFIG_DIR);
-            }
-        }
-    }
-
-    @Test
-    public void testGetKeyVersionWithInvalidVersionName() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Try to get key version with an invalid version name
-        try {
-            KeyVersion invalidVersion = 
keyProvider.getKeyVersion("newkey1@invalid");
-            Assertions.assertNull(invalidVersion, "Expected null for invalid 
version name");
-        } catch (IOException ex) {
-            // expected
-        }
-    }
-
-    @Test
-    public void testGetDBKSConf() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Get the DB configuration
-        Configuration dbConf = RangerKeyStoreProvider.getDBKSConf();
-        assertNotNull(dbConf, "DB configuration should not be null");
-    }
-
-    @Test
-    public void testRollNewVersion_ThrowsWhenKeyNotFound() throws Throwable {
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-        Configuration          conf     = new Configuration();
-        RangerKeyStoreProvider provider = new RangerKeyStoreProvider(conf);
-
-        byte[] dummyMaterial = new byte[16]; // 128-bit material
-
-        IOException exception = assertThrows(IOException.class, () ->
-                provider.rollNewVersion("nonExistingKey", dummyMaterial));
-
-        assertTrue(exception.getMessage().contains("Key nonExistingKey not 
found"));
-    }
-
-    @Test
-    public void testRollNewVersion_ThrowsWhenKeyLengthMismatch() throws 
Throwable {
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf     = new Configuration();
-        RangerKeyStoreProvider provider = new RangerKeyStoreProvider(conf);
-
-        Options options = new Options(conf);
-        options.setBitLength(128);
-        options.setCipher("AES");
-        provider.createKey("testKeyMismatch", options);
-        provider.flush();
-
-        // Use 192-bit material
-        byte[] wrongMaterial = new byte[24];
-
-        IOException exception = assertThrows(IOException.class, () ->
-                provider.rollNewVersion("testKeyMismatch", wrongMaterial));
-
-        assertTrue(exception.getMessage().contains("Wrong key length"));
-    }
-
-    @Test
-    public void testDeleteKey_MetadataIsNull() throws Throwable {
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf         = new Configuration();
-        RangerKeyStoreProvider realProvider = new RangerKeyStoreProvider(conf);
-
-        // Spy on the real provider to override getMetadata
-        RangerKeyStoreProvider provider = spy(realProvider);
-
-        // Simulate missing metadata
-        doReturn(null).when(provider).getMetadata("testKey");
-
-        // Act & Assert
-        IOException ex = assertThrows(IOException.class, () -> 
provider.deleteKey("testKey"));
-
-        // This now matches the real message thrown by deleteKey()
-        assertTrue(ex.getMessage().contains("Key testKey does not exist"));
-    }
-
-    @Test
-    public void testGetKeyVersion_DecryptKeyThrowsRuntimeException() throws 
Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        // Inject dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Enable keyVault mode
-        Field keyVaultField = 
RangerKeyStoreProvider.class.getDeclaredField("keyVaultEnabled");
-        keyVaultField.setAccessible(true);
-        keyVaultField.set(provider, true);
-
-        // Setup mocks: alias exists, but decryption fails
-        doReturn(true).when(dbStore).engineContainsAlias("testKey");
-        doThrow(new RuntimeException("decryption 
failure")).when(dbStore).engineGetDecryptedZoneKeyByte("testKey");
-
-        RuntimeException ex = assertThrows(RuntimeException.class, () -> 
provider.getKeyVersion("testKey"));
-        assertTrue(ex.getMessage().contains("Error while getting decrypted 
key."));
-        assertTrue(ex.getMessage().contains("decryption failure"));
-    }
-
-    @Test
-    public void testGetKeyVersion_NoSuchAlgorithmException() throws Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        // Inject dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Setup: alias exists, key fetch throws NoSuchAlgorithmException
-        doReturn(true).when(dbStore).engineContainsAlias("testKey");
-        doThrow(new 
NoSuchAlgorithmException()).when(dbStore).engineGetKey(eq("testKey"), any());
-
-        IOException ex = assertThrows(IOException.class, () -> 
provider.getKeyVersion("testKey"));
-
-        assertTrue(ex.getMessage().contains("Can't get algorithm for key"));
-
-        // Setup: alias exists, key fetch throws UnrecoverableKeyException
-        doReturn(true).when(dbStore).engineContainsAlias("testKey");
-        doThrow(new 
UnrecoverableKeyException()).when(dbStore).engineGetKey(eq("testKey"), any());
-
-        IOException ex1 = assertThrows(IOException.class, () -> 
provider.getKeyVersion("testKey"));
-
-        assertTrue(ex1.getMessage().contains("Can't recover key "));
-    }
-
-    @Test
-    public void testGetMetadata_GenericException() throws Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-
-        // Inject mocked dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Simulate exception during dbStore.engineContainsAlias for 
RuntimeException
-        when(dbStore.engineContainsAlias("testKey")).thenThrow(new 
RuntimeException("DB failure"));
-
-        IOException ex = assertThrows(IOException.class, () -> 
provider.getMetadata("testKey"));
-
-        assertTrue(ex.getMessage().contains("Please try again"));
-        assertTrue(ex.getCause().getMessage().contains("DB failure"));
-    }
-
-    @Test
-    public void testGetConfiguration1() throws Throwable {
-        if (!UNRESTRICTED_POLICIES_INSTALLED) {
-            return;
-        }
-
-        Path configDir = Paths.get("src/test/resources/kms");
-        System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
-
-        Configuration          conf        = new Configuration();
-        RangerKeyStoreProvider keyProvider = new RangerKeyStoreProvider(conf);
-
-        // Get the configuration
-        Configuration keyProviderConf = keyProvider.getConf();
-        assertNotNull(keyProviderConf, "Configuration should not be null");
-    }
-
-    @Test
-    public void testSaveKey_ThrowsIOException() throws Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-
-        // Inject mocked dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Set keyVaultEnabled = false
-        Field keyVaultField = 
RangerKeyStoreProvider.class.getDeclaredField("keyVaultEnabled");
-        keyVaultField.setAccessible(true);
-        keyVaultField.set(provider, false);
-
-        // Mock Metadata with required getters
-        KeyProvider.Metadata metadata = mock(KeyProvider.Metadata.class);
-        when(metadata.getAlgorithm()).thenReturn("AES");
-        when(metadata.getBitLength()).thenReturn(128);
-        when(metadata.getDescription()).thenReturn("test description");
-        when(metadata.getVersions()).thenReturn(1);
-        when(metadata.getAttributes()).thenReturn(new HashMap<>());
-
-        // Mock exception on addKeyEntry
-        doThrow(new RuntimeException("decryption 
failure")).when(dbStore).addKeyEntry(
-                eq("testKey"),
-                any(),
-                any(),
-                eq("AES"),
-                eq(128),
-                eq("test description"),
-                eq(1),
-                any());
-
-        Method saveKeyMethod = 
RangerKeyStoreProvider.class.getDeclaredMethod("saveKey", String.class, 
KeyProvider.Metadata.class);
-        saveKeyMethod.setAccessible(true);
-
-        try {
-            saveKeyMethod.invoke(provider, "testKey", metadata);
-            fail("Expected IOException to be thrown");
-        } catch (InvocationTargetException e) {
-            Throwable cause = e.getCause();
-            assertInstanceOf(IOException.class, cause, "Cause should be 
IOException");
-            assertInstanceOf(RuntimeException.class, cause.getCause(), 
"IOException cause should be RuntimeException");
-            assertTrue(cause.getCause().getMessage().contains("decryption 
failure"));
-        }
-    }
-
-    @Test
-    public void testGetKeyVersion_KeyVaultTrue_SuccessPath() throws Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-
-        // Inject dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Set keyVaultEnabled = true
-        Field keyVaultField = 
RangerKeyStoreProvider.class.getDeclaredField("keyVaultEnabled");
-        keyVaultField.setAccessible(true);
-        keyVaultField.set(provider, true);
-
-        String versionedKey = "testKey@0";
-
-        // Simulate engineContainsAlias returns false first, then true
-        
when(dbStore.engineContainsAlias(versionedKey)).thenReturn(false).thenReturn(true);
-
-        // Simulate engineLoad
-        doNothing().when(dbStore).engineLoad(isNull(), any());
-
-        // Simulate decrypted key return
-        byte[] decryptedKey = new byte[] {0x01, 0x02, 0x03};
-        
when(dbStore.engineGetDecryptedZoneKeyByte(versionedKey)).thenReturn(decryptedKey);
-
-        // Act
-        KeyVersion result = provider.getKeyVersion(versionedKey);
-
-        // Assert
-        assertNotNull(result);
-        assertEquals(versionedKey, result.getVersionName());
-        assertEquals("testKey", result.getName());
-        assertArrayEquals(decryptedKey, result.getMaterial());
-    }
-
-    @Test
-    public void testGenerateAndGetMasterKey_generateMasterKeyThrows() throws 
Throwable {
-        Configuration          conf              = new Configuration();
-        RangerKeyStoreProvider provider          = spy(new 
RangerKeyStoreProvider(conf));
-        RangerKMSMKI           masterKeyProvider = mock(RangerKMSMKI.class);
-
-        // simulate generateMasterKey throwing an exception
-        doThrow(new RuntimeException("Simulated failure in 
generateMasterKey")).when(masterKeyProvider).generateMasterKey("abc123");
-
-        Method method = 
RangerKeyStoreProvider.class.getDeclaredMethod("generateAndGetMasterKey", 
RangerKMSMKI.class, String.class);
-        method.setAccessible(true);
-
-        RuntimeException ex = assertThrows(RuntimeException.class, () -> {
-            try {
-                method.invoke(provider, masterKeyProvider, "abc123");
-            } catch (InvocationTargetException e) {
-                throw e.getCause();
-            }
-        });
-
-        assertTrue(ex.getMessage().contains("Error while generating Ranger 
Master key"));
-    }
-
-    @Test
-    void testFlush_EngineStoreThrowsIOException() throws Throwable {
-        Configuration  conf    = new Configuration();
-        RangerKeyStore dbStore = mock(RangerKeyStore.class);
-        doThrow(new IOException("Flush 
failed")).when(dbStore).engineStore(any(), any());
-
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        // Inject mocks and changed = true
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        Field changedField = 
RangerKeyStoreProvider.class.getDeclaredField("changed");
-        changedField.setAccessible(true);
-        changedField.set(provider, true);
-
-        IOException ex = assertThrows(IOException.class, provider::flush);
-        assertTrue(ex.getMessage().contains("Flush failed"));
-
-        verify(dbStore, times(1)).engineStore(any(), any());
-    }
-
-    @Test
-    void testFlush_EngineStoreThrowsNoSuchAlgorithmException() throws 
Throwable {
-        Configuration  conf    = new Configuration();
-        RangerKeyStore dbStore = mock(RangerKeyStore.class);
-        doThrow(new 
NoSuchAlgorithmException()).when(dbStore).engineStore(any(), any());
-
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        Field changedField = 
RangerKeyStoreProvider.class.getDeclaredField("changed");
-        changedField.setAccessible(true);
-        changedField.set(provider, true);
-
-        IOException ex = assertThrows(IOException.class, provider::flush);
-        assertTrue(ex.getMessage().contains("No such algorithm storing key"));
-
-        verify(dbStore, times(1)).engineStore(any(), any());
-    }
-
-    @Test
-    void testFlush_EngineStoreThrowsCertificateException() throws Throwable {
-        Configuration  conf    = new Configuration();
-        RangerKeyStore dbStore = mock(RangerKeyStore.class);
-        doThrow(new CertificateException()).when(dbStore).engineStore(any(), 
any());
-
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        Field changedField = 
RangerKeyStoreProvider.class.getDeclaredField("changed");
-        changedField.setAccessible(true);
-        changedField.set(provider, true);
-
-        IOException ex = assertThrows(IOException.class, provider::flush);
-        assertTrue(ex.getMessage().contains("Certificate exception storing 
key"));
-
-        verify(dbStore, times(1)).engineStore(any(), any());
-    }
-
-    @Test
-    void testDeleteKey_ShouldThrowIOException() throws Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        // Inject mocked dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        // Mock Metadata object with versions = 1
-        KeyProvider.Metadata metadata = mock(KeyProvider.Metadata.class);
-        when(metadata.getVersions()).thenReturn(1);
-
-        // Stub getMetadata to return mocked metadata
-        doReturn(metadata).when(provider).getMetadata("testKey");
-
-        // Stub dbStore responses for key existence
-        doReturn(true).when(dbStore).engineContainsAlias("testKey@0");
-        doReturn(true).when(dbStore).engineContainsAlias("testKey");
-
-        // Simulate KeyStoreException on deleting the version key
-        doThrow(new KeyStoreException("forced 
exception")).when(dbStore).engineDeleteEntry("testKey@0");
-
-        // Expect IOException because KeyStoreException is caught and wrapped
-        IOException ex = assertThrows(IOException.class, () -> 
provider.deleteKey("testKey"));
-        assertTrue(ex.getMessage().contains("Problem removing"));
-
-        // Verify interactions with dbStore mocks
-        verify(dbStore).engineContainsAlias("testKey@0");
-        verify(dbStore).engineDeleteEntry("testKey@0");
-    }
-
-    @Test
-    void testCreateKey_ShouldThrowIOException_WhenKeyAlreadyExists() throws 
Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        // Inject mocked dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        String keyName  = "existingKey";
-        byte[] material = new byte[16]; // 128 bits
-        KeyProvider.Options options = new KeyProvider.Options(conf)
-                .setCipher("AES")
-                .setBitLength(128);
-
-        // Simulate that key already exists
-        when(dbStore.engineContainsAlias(keyName)).thenReturn(true);
-
-        IOException ex = assertThrows(IOException.class, () -> 
provider.createKey(keyName, material, options));
-        assertTrue(ex.getMessage().contains("Key " + keyName + " already 
exists"));
-    }
-
-    @Test
-    void testCreateKey_ShouldThrowIOException_WhenKeyLengthIncorrect() throws 
Throwable {
-        Configuration          conf     = new Configuration();
-        RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
-        RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
-
-        // Inject mocked dbStore
-        Field dbStoreField = 
RangerKeyStoreProvider.class.getDeclaredField("dbStore");
-        dbStoreField.setAccessible(true);
-        dbStoreField.set(provider, dbStore);
-
-        String keyName  = "newKey";
-        byte[] material = new byte[10]; // 80 bits
-        KeyProvider.Options options = new KeyProvider.Options(conf)
-                .setCipher("AES")
-                .setBitLength(128); // But expects 128 bits
-
-        // Simulate key does not exist
-        when(dbStore.engineContainsAlias(keyName)).thenReturn(false);
-
-        IOException ex = assertThrows(IOException.class, () -> 
provider.createKey(keyName, material, options));
-        assertTrue(ex.getMessage().contains("Wrong key length. Required 128, 
but got 80"));
-    }
-
-    static {
-        boolean ok = false;
-        try {
-            byte[] data = {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07};
-
-            SecretKey key192 = new SecretKeySpec(
-                    new byte[] {0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
-                            0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
-                            0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17},
-                    "AES");
-            Cipher c = Cipher.getInstance("AES");
-            c.init(Cipher.ENCRYPT_MODE, key192);
-            c.doFinal(data);
-            ok = true;
-        } catch (Exception e) {
-            //
-        }
-        UNRESTRICTED_POLICIES_INSTALLED = ok;
-    }
-}
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java
index 5ddb7e5b2..b5494e2da 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestAzureKeyVaultClientAuthenticator.java
@@ -18,6 +18,7 @@
 
 import com.microsoft.azure.keyvault.KeyVaultClient;
 import org.apache.hadoop.crypto.key.AzureKeyVaultClientAuthenticator;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -30,6 +31,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestAzureKeyVaultClientAuthenticator {
     @Test
     public void testDoAuthenticate_shouldThrowRuntimeException() {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java
index e12238eeb..9663553fe 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestDBToAzureKeyVault.java
@@ -18,6 +18,7 @@
 
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.DBToAzureKeyVault;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -38,6 +39,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestDBToAzureKeyVault {
     @Test
     public void testShowUsage() {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java
index b941b0511..60006cbb3 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestJKS2RangerUtil.java
@@ -19,6 +19,7 @@
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.JKS2RangerUtil;
 import org.apache.hadoop.crypto.key.RangerMasterKey;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -40,6 +41,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestJKS2RangerUtil {
     @Test
     public void testGetFromJceks() throws Exception {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java
index c4a3a40a3..41fec07bb 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestKeySecureToRangerDBMKUtil.java
@@ -18,6 +18,7 @@
 
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.KeySecureToRangerDBMKUtil;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -38,6 +39,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKeySecureToRangerDBMKUtil {
     private final ByteArrayOutputStream errContent = new 
ByteArrayOutputStream();
 
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java
index d70d133f3..d4a949527 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestMigrateDBMKeyToGCP.java
@@ -17,6 +17,7 @@
 package org.apache.hadoop.crypto.key.kms;
 
 import org.apache.hadoop.crypto.key.MigrateDBMKeyToGCP;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -33,6 +34,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestMigrateDBMKeyToGCP {
     @Test
     public void testShowUsage() throws InvocationTargetException, 
IllegalAccessException, NoSuchMethodException {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java
index 7792f09cc..acc264d0a 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRanger2JKSUtil.java
@@ -18,6 +18,7 @@
 
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.Ranger2JKSUtil;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -30,6 +31,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRanger2JKSUtil {
     @Test
     public void testShowUsage() {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java
index 4031c0ba2..405ae644b 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerAzureKeyVaultKeyGenerator.java
@@ -21,6 +21,7 @@
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.RangerAzureKeyVaultKeyGenerator;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -43,6 +44,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRangerAzureKeyVaultKeyGenerator {
     private static final String        VALID_VAULT_URL     = 
"https://test-keyvault.vault.azure.net/";;
     private static final String        VALID_MASTER_KEY    = "test-master-key";
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java
index 988cce338..4801d8c84 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerGoogleCloudHSMProvider.java
@@ -20,6 +20,7 @@
 import org.apache.hadoop.crypto.key.RangerGoogleCloudHSMProvider;
 import org.bouncycastle.crypto.RuntimeCryptoException;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -41,6 +42,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRangerGoogleCloudHSMProvider {
     private static final String        VALID_PROJECT_ID      = 
"test-project-id";
     private static final String        VALID_LOCATION_ID     = "us-central1";
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java
index 7be4f7fa4..4dee51ac8 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerKeyStore.java
@@ -28,6 +28,7 @@
 import org.junit.jupiter.api.AfterEach;
 import org.junit.jupiter.api.Assertions;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -259,6 +260,7 @@ public void 
testEngineStore_ThrowsIllegalArgumentException_WhenPasswordIsNull()
     }
 
     @Test
+    @Disabled
     public void testAddKeyEntry_throwsKeyStoreException_whenSealKeyFails() 
throws Exception {
         DaoManager     daoManager     = mock(DaoManager.class);
         RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager);
@@ -279,6 +281,7 @@ public void 
testAddKeyEntry_throwsKeyStoreException_whenSealKeyFails() throws Ex
     }
 
     @Test
+    @Disabled
     public void testDbOperationStore_whenUpdateThrowsException() {
         DaoManager     daoManager     = mock(DaoManager.class);
         RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager);
@@ -328,6 +331,7 @@ public void 
testDbOperationStore_whenKeyStoreExists_shouldCallUpdate() throws Ex
     }
 
     @Test
+    @Disabled
     public void testDbOperationDelete() throws Exception {
         DaoManager     daoManager     = mock(DaoManager.class);
         RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager);
@@ -348,6 +352,7 @@ public void testDbOperationDelete() throws Exception {
     }
 
     @Test
+    @Disabled
     public void testDbOperationLoad() throws Exception {
         DaoManager     daoManager     = mock(DaoManager.class);
         RangerKeyStore rangerKeyStore = new RangerKeyStore(daoManager);
@@ -472,6 +477,7 @@ void testEngineGetKeyMetadata() throws Exception {
     }
 
     @Test
+    @Disabled
     void testAddSecureKeyByteEntry_EncryptFails_ThrowsKeyStoreException() 
throws Exception {
         DaoManager     daoManager     = mock(DaoManager.class);
         RangerKeyStore rangerKeyStore = spy(new RangerKeyStore(daoManager));
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java
index 98b21e97f..d4c2e3329 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/TestRangerSafenetKeySecure.java
@@ -18,6 +18,7 @@
 
 import org.apache.hadoop.conf.Configuration;
 import org.apache.hadoop.crypto.key.RangerSafenetKeySecure;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -39,6 +40,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRangerSafenetKeySecure {
     @Test
     public void testGenerateMasterKey_WithNullKeystore_ShouldReturnFalse() 
throws Exception {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java
index 8f68e2498..68fd15f5e 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/RangerKeyStoreProviderTest.java
@@ -28,6 +28,7 @@
 import org.junit.jupiter.api.Assertions;
 import org.junit.jupiter.api.BeforeAll;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.Test;
 
 import javax.crypto.Cipher;
@@ -90,6 +91,7 @@ public static void stopServers() throws Exception {
     }
 
     @BeforeEach
+    @Disabled
     public void cleanUpKeyBeforeEachTest() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -109,6 +111,7 @@ public void cleanUpKeyBeforeEachTest() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testCreateDeleteKey() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -138,6 +141,7 @@ public void testCreateDeleteKey() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testDeleteKey_EngineDeleteEntryThrowsForBaseKey() throws 
Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
@@ -171,6 +175,7 @@ public void 
testDeleteKey_EngineDeleteEntryThrowsForBaseKey() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testCreateKey() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -200,6 +205,7 @@ public void testCreateKey() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testRolloverKey() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -243,6 +249,7 @@ public void testRolloverKey() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersion() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -293,6 +300,7 @@ public void testGetKeyVersion() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeys() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -325,6 +333,7 @@ public void testGetKeys() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersionWithInvalidKey() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -346,6 +355,7 @@ public void testGetKeyVersionWithInvalidKey() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersionWithInvalidVersion() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -379,6 +389,7 @@ public void testGetKeyVersionWithInvalidVersion() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersions() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -413,6 +424,7 @@ public void testGetKeyVersions() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetMetadata() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -443,6 +455,7 @@ public void testGetMetadata() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersionWithInvalidKeyName() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -464,6 +477,7 @@ public void testGetKeyVersionWithInvalidKeyName() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     public void testFlush() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -494,6 +508,7 @@ public void testFlush() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetConfiguration() {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -521,6 +536,7 @@ public void testGetConfiguration() {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersionWithInvalidVersionName() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -542,6 +558,7 @@ public void testGetKeyVersionWithInvalidVersionName() 
throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetDBKSConf() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -559,6 +576,7 @@ public void testGetDBKSConf() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testRollNewVersion_ThrowsWhenKeyNotFound() throws Throwable {
         Path configDir = Paths.get("src/test/resources/kms");
         System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
@@ -574,6 +592,7 @@ public void testRollNewVersion_ThrowsWhenKeyNotFound() 
throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testRollNewVersion_ThrowsWhenKeyLengthMismatch() throws 
Throwable {
         Path configDir = Paths.get("src/test/resources/kms");
         System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
@@ -597,6 +616,7 @@ public void 
testRollNewVersion_ThrowsWhenKeyLengthMismatch() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testDeleteKey_MetadataIsNull() throws Throwable {
         Path configDir = Paths.get("src/test/resources/kms");
         System.setProperty(KMSConfiguration.KMS_CONFIG_DIR, 
configDir.toFile().getAbsolutePath());
@@ -618,6 +638,7 @@ public void testDeleteKey_MetadataIsNull() throws Throwable 
{
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersion_DecryptKeyThrowsRuntimeException() throws 
Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
@@ -643,6 +664,7 @@ public void 
testGetKeyVersion_DecryptKeyThrowsRuntimeException() throws Throwabl
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersion_NoSuchAlgorithmException() throws Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
@@ -671,6 +693,7 @@ public void testGetKeyVersion_NoSuchAlgorithmException() 
throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetMetadata_GenericException() throws Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
@@ -691,6 +714,7 @@ public void testGetMetadata_GenericException() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetConfiguration1() throws Throwable {
         if (!UNRESTRICTED_POLICIES_INSTALLED) {
             return;
@@ -708,6 +732,7 @@ public void testGetConfiguration1() throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testSaveKey_ThrowsIOException() throws Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
@@ -757,6 +782,7 @@ public void testSaveKey_ThrowsIOException() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     public void testGetKeyVersion_KeyVaultTrue_SuccessPath() throws Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStoreProvider provider = spy(new 
RangerKeyStoreProvider(conf));
@@ -795,6 +821,7 @@ public void testGetKeyVersion_KeyVaultTrue_SuccessPath() 
throws Throwable {
     }
 
     @Test
+    @Disabled
     public void testGenerateAndGetMasterKey_generateMasterKeyThrows() throws 
Throwable {
         Configuration          conf              = new Configuration();
         RangerKeyStoreProvider provider          = spy(new 
RangerKeyStoreProvider(conf));
@@ -818,6 +845,7 @@ public void 
testGenerateAndGetMasterKey_generateMasterKeyThrows() throws Throwab
     }
 
     @Test
+    @Disabled
     void testFlush_EngineStoreThrowsIOException() throws Throwable {
         Configuration  conf    = new Configuration();
         RangerKeyStore dbStore = mock(RangerKeyStore.class);
@@ -841,6 +869,7 @@ void testFlush_EngineStoreThrowsIOException() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     void testFlush_EngineStoreThrowsNoSuchAlgorithmException() throws 
Throwable {
         Configuration  conf    = new Configuration();
         RangerKeyStore dbStore = mock(RangerKeyStore.class);
@@ -863,6 +892,7 @@ void testFlush_EngineStoreThrowsNoSuchAlgorithmException() 
throws Throwable {
     }
 
     @Test
+    @Disabled
     void testFlush_EngineStoreThrowsCertificateException() throws Throwable {
         Configuration  conf    = new Configuration();
         RangerKeyStore dbStore = mock(RangerKeyStore.class);
@@ -885,6 +915,7 @@ void testFlush_EngineStoreThrowsCertificateException() 
throws Throwable {
     }
 
     @Test
+    @Disabled
     void testDeleteKey_ShouldThrowIOException() throws Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
@@ -919,6 +950,7 @@ void testDeleteKey_ShouldThrowIOException() throws 
Throwable {
     }
 
     @Test
+    @Disabled
     void testCreateKey_ShouldThrowIOException_WhenKeyAlreadyExists() throws 
Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
@@ -943,6 +975,7 @@ void 
testCreateKey_ShouldThrowIOException_WhenKeyAlreadyExists() throws Throwabl
     }
 
     @Test
+    @Disabled
     void testCreateKey_ShouldThrowIOException_WhenKeyLengthIncorrect() throws 
Throwable {
         Configuration          conf     = new Configuration();
         RangerKeyStore         dbStore  = mock(RangerKeyStore.class);
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
index 931eaa65f..65a01e107 100644
--- a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
+++ b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
@@ -22,6 +22,7 @@
 import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension;
 import org.apache.hadoop.security.UserGroupInformation;
 import 
org.apache.hadoop.security.token.delegation.web.HttpUserGroupInformation;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -54,6 +55,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKMS {
     private static KeyProviderCryptoExtension keyProvider;
     private static KMSAudit                   kmsAudit;
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java
index f5728695e..53595478f 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSExceptionsProvider.java
@@ -16,6 +16,7 @@
  */
 package org.apache.hadoop.crypto.key.kms.server;
 
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -32,6 +33,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKMSExceptionsProvider {
     @Test
     public void testGetOneLineMessage() throws NoSuchMethodException, 
InvocationTargetException, IllegalAccessException {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java
index 9fa9666e8..c83fbb512 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSMDCFilter.java
@@ -16,6 +16,7 @@
  */
 package org.apache.hadoop.crypto.key.kms.server;
 
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -34,6 +35,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKMSMDCFilter {
     @Test
     public void testInit() throws ServletException {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java
index e98b00a45..b427f8682 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSServerJSONUtils.java
@@ -17,6 +17,7 @@
 package org.apache.hadoop.crypto.key.kms.server;
 
 import org.apache.hadoop.crypto.key.KeyProvider;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -30,6 +31,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKMSServerJSONUtils {
     @Test
     public void testToJSON() {
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java
index 726686b7b..142c781e9 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMSWebApp.java
@@ -25,6 +25,7 @@
 import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension;
 import org.apache.ranger.kms.metrics.collector.KMSMetricsCollector;
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -60,6 +61,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKMSWebApp {
     private Configuration                       mockConfig;
     private KeyAuthorizationKeyProvider.KeyACLs mockAcls;
diff --git 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java
 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java
index 92deee574..3652dffac 100644
--- 
a/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java
+++ 
b/kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestRangerJsonProvider.java
@@ -17,6 +17,7 @@
 package org.apache.hadoop.crypto.key.kms.server;
 
 import org.apache.ranger.common.RangerJsonProvider;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -27,6 +28,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRangerJsonProvider {
     @Test
     public void testRangerJsonProvider() {
diff --git a/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java 
b/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java
index a36588e72..84d9c1d6b 100644
--- a/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java
+++ b/kms/src/test/java/org/apache/ranger/entity/TestXXDBBase.java
@@ -16,6 +16,7 @@
  */
 package org.apache.ranger.entity;
 
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -32,6 +33,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestXXDBBase {
     @Test
     public void testEquals_sameObject() {
diff --git 
a/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java 
b/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java
index 0c35d0a26..9bb74df0a 100644
--- a/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java
+++ b/kms/src/test/java/org/apache/ranger/entity/TestXXRangerKeyStore.java
@@ -16,6 +16,7 @@
  */
 package org.apache.ranger.entity;
 
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -26,6 +27,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestXXRangerKeyStore {
     @Test
     public void testGetId() {
diff --git 
a/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java 
b/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java
index 6ce8c7758..11bf99b83 100644
--- a/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java
+++ b/kms/src/test/java/org/apache/ranger/kms/biz/TestRangerKMSStartUp.java
@@ -16,6 +16,7 @@
  */
 package org.apache.ranger.kms.biz;
 
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -24,6 +25,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestRangerKMSStartUp {
     @Test
     public void testInitRangerMasterKey() throws Throwable {
diff --git a/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java 
b/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java
index 093be75e5..2dac31e33 100644
--- a/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java
+++ b/kms/src/test/java/org/apache/ranger/kms/dao/TestBaseDao.java
@@ -17,6 +17,7 @@
 package org.apache.ranger.kms.dao;
 
 import org.junit.jupiter.api.BeforeEach;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.extension.ExtendWith;
 import org.mockito.Mock;
@@ -33,6 +34,7 @@
 import static org.mockito.Mockito.when;
 
 @ExtendWith(MockitoExtension.class)
+@Disabled
 public class TestBaseDao {
     @Mock
     private DaoManager daoManager;
diff --git 
a/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java 
b/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java
index 2016979ad..72a0df4b7 100644
--- 
a/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java
+++ 
b/kms/src/test/java/org/apache/ranger/kms/metrics/source/TestKMSMetricUtil.java
@@ -17,6 +17,7 @@
 package org.apache.ranger.kms.metrics.source;
 
 import org.apache.hadoop.crypto.key.kms.server.KMSMetricUtil;
+import org.junit.jupiter.api.Disabled;
 import org.junit.jupiter.api.MethodOrderer;
 import org.junit.jupiter.api.Test;
 import org.junit.jupiter.api.TestMethodOrder;
@@ -28,6 +29,7 @@
 
 @ExtendWith(MockitoExtension.class)
 @TestMethodOrder(MethodOrderer.MethodName.class)
+@Disabled
 public class TestKMSMetricUtil {
     @Test
     public void testGetKMSMetricCalculation() throws NoSuchMethodException, 
InvocationTargetException, IllegalAccessException {

Reply via email to