| <!DOCTYPE HTML> |
| <html lang="en"> |
| <head> |
| <!-- Generated by javadoc (17) --> |
| <title>Source code</title> |
| <meta name="viewport" content="width=device-width, initial-scale=1"> |
| <meta name="description" content="source: package: org.apache.hadoop.hbase.http.log, class: TestLogLevel"> |
| <meta name="generator" content="javadoc/SourceToHTMLConverter"> |
| <link rel="stylesheet" type="text/css" href="../../../../../../../stylesheet.css" title="Style"> |
| </head> |
| <body class="source-page"> |
| <main role="main"> |
| <div class="source-container"> |
| <pre><span class="source-line-no">001</span><span id="line-1">/*</span> |
| <span class="source-line-no">002</span><span id="line-2"> * Licensed to the Apache Software Foundation (ASF) under one</span> |
| <span class="source-line-no">003</span><span id="line-3"> * or more contributor license agreements. See the NOTICE file</span> |
| <span class="source-line-no">004</span><span id="line-4"> * distributed with this work for additional information</span> |
| <span class="source-line-no">005</span><span id="line-5"> * regarding copyright ownership. The ASF licenses this file</span> |
| <span class="source-line-no">006</span><span id="line-6"> * to you under the Apache License, Version 2.0 (the</span> |
| <span class="source-line-no">007</span><span id="line-7"> * "License"); you may not use this file except in compliance</span> |
| <span class="source-line-no">008</span><span id="line-8"> * with the License. You may obtain a copy of the License at</span> |
| <span class="source-line-no">009</span><span id="line-9"> *</span> |
| <span class="source-line-no">010</span><span id="line-10"> * http://www.apache.org/licenses/LICENSE-2.0</span> |
| <span class="source-line-no">011</span><span id="line-11"> *</span> |
| <span class="source-line-no">012</span><span id="line-12"> * Unless required by applicable law or agreed to in writing, software</span> |
| <span class="source-line-no">013</span><span id="line-13"> * distributed under the License is distributed on an "AS IS" BASIS,</span> |
| <span class="source-line-no">014</span><span id="line-14"> * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</span> |
| <span class="source-line-no">015</span><span id="line-15"> * See the License for the specific language governing permissions and</span> |
| <span class="source-line-no">016</span><span id="line-16"> * limitations under the License.</span> |
| <span class="source-line-no">017</span><span id="line-17"> */</span> |
| <span class="source-line-no">018</span><span id="line-18">package org.apache.hadoop.hbase.http.log;</span> |
| <span class="source-line-no">019</span><span id="line-19"></span> |
| <span class="source-line-no">020</span><span id="line-20">import static org.junit.Assert.assertEquals;</span> |
| <span class="source-line-no">021</span><span id="line-21">import static org.junit.Assert.assertFalse;</span> |
| <span class="source-line-no">022</span><span id="line-22">import static org.junit.Assert.assertNotEquals;</span> |
| <span class="source-line-no">023</span><span id="line-23">import static org.junit.Assert.assertTrue;</span> |
| <span class="source-line-no">024</span><span id="line-24">import static org.junit.Assert.fail;</span> |
| <span class="source-line-no">025</span><span id="line-25"></span> |
| <span class="source-line-no">026</span><span id="line-26">import java.io.File;</span> |
| <span class="source-line-no">027</span><span id="line-27">import java.io.IOException;</span> |
| <span class="source-line-no">028</span><span id="line-28">import java.net.BindException;</span> |
| <span class="source-line-no">029</span><span id="line-29">import java.net.SocketException;</span> |
| <span class="source-line-no">030</span><span id="line-30">import java.net.URI;</span> |
| <span class="source-line-no">031</span><span id="line-31">import java.security.PrivilegedExceptionAction;</span> |
| <span class="source-line-no">032</span><span id="line-32">import java.util.Properties;</span> |
| <span class="source-line-no">033</span><span id="line-33">import javax.net.ssl.SSLException;</span> |
| <span class="source-line-no">034</span><span id="line-34">import javax.servlet.http.HttpServletResponse;</span> |
| <span class="source-line-no">035</span><span id="line-35">import org.apache.commons.io.FileUtils;</span> |
| <span class="source-line-no">036</span><span id="line-36">import org.apache.hadoop.HadoopIllegalArgumentException;</span> |
| <span class="source-line-no">037</span><span id="line-37">import org.apache.hadoop.conf.Configuration;</span> |
| <span class="source-line-no">038</span><span id="line-38">import org.apache.hadoop.fs.CommonConfigurationKeys;</span> |
| <span class="source-line-no">039</span><span id="line-39">import org.apache.hadoop.fs.CommonConfigurationKeysPublic;</span> |
| <span class="source-line-no">040</span><span id="line-40">import org.apache.hadoop.fs.FileUtil;</span> |
| <span class="source-line-no">041</span><span id="line-41">import org.apache.hadoop.hbase.HBaseClassTestRule;</span> |
| <span class="source-line-no">042</span><span id="line-42">import org.apache.hadoop.hbase.HBaseCommonTestingUtil;</span> |
| <span class="source-line-no">043</span><span id="line-43">import org.apache.hadoop.hbase.http.HttpConfig;</span> |
| <span class="source-line-no">044</span><span id="line-44">import org.apache.hadoop.hbase.http.HttpServer;</span> |
| <span class="source-line-no">045</span><span id="line-45">import org.apache.hadoop.hbase.http.log.LogLevel.CLI;</span> |
| <span class="source-line-no">046</span><span id="line-46">import org.apache.hadoop.hbase.http.ssl.KeyStoreTestUtil;</span> |
| <span class="source-line-no">047</span><span id="line-47">import org.apache.hadoop.hbase.testclassification.MiscTests;</span> |
| <span class="source-line-no">048</span><span id="line-48">import org.apache.hadoop.hbase.testclassification.SmallTests;</span> |
| <span class="source-line-no">049</span><span id="line-49">import org.apache.hadoop.hdfs.DFSConfigKeys;</span> |
| <span class="source-line-no">050</span><span id="line-50">import org.apache.hadoop.minikdc.MiniKdc;</span> |
| <span class="source-line-no">051</span><span id="line-51">import org.apache.hadoop.net.NetUtils;</span> |
| <span class="source-line-no">052</span><span id="line-52">import org.apache.hadoop.security.UserGroupInformation;</span> |
| <span class="source-line-no">053</span><span id="line-53">import org.apache.hadoop.security.authorize.AccessControlList;</span> |
| <span class="source-line-no">054</span><span id="line-54">import org.apache.hadoop.security.ssl.SSLFactory;</span> |
| <span class="source-line-no">055</span><span id="line-55">import org.apache.hadoop.test.GenericTestUtils;</span> |
| <span class="source-line-no">056</span><span id="line-56">import org.apache.hadoop.util.StringUtils;</span> |
| <span class="source-line-no">057</span><span id="line-57">import org.junit.AfterClass;</span> |
| <span class="source-line-no">058</span><span id="line-58">import org.junit.BeforeClass;</span> |
| <span class="source-line-no">059</span><span id="line-59">import org.junit.ClassRule;</span> |
| <span class="source-line-no">060</span><span id="line-60">import org.junit.Test;</span> |
| <span class="source-line-no">061</span><span id="line-61">import org.junit.experimental.categories.Category;</span> |
| <span class="source-line-no">062</span><span id="line-62"></span> |
| <span class="source-line-no">063</span><span id="line-63">/**</span> |
| <span class="source-line-no">064</span><span id="line-64"> * Test LogLevel.</span> |
| <span class="source-line-no">065</span><span id="line-65"> */</span> |
| <span class="source-line-no">066</span><span id="line-66">@Category({ MiscTests.class, SmallTests.class })</span> |
| <span class="source-line-no">067</span><span id="line-67">public class TestLogLevel {</span> |
| <span class="source-line-no">068</span><span id="line-68"> @ClassRule</span> |
| <span class="source-line-no">069</span><span id="line-69"> public static final HBaseClassTestRule CLASS_RULE =</span> |
| <span class="source-line-no">070</span><span id="line-70"> HBaseClassTestRule.forClass(TestLogLevel.class);</span> |
| <span class="source-line-no">071</span><span id="line-71"></span> |
| <span class="source-line-no">072</span><span id="line-72"> private static String keystoresDir;</span> |
| <span class="source-line-no">073</span><span id="line-73"> private static String sslConfDir;</span> |
| <span class="source-line-no">074</span><span id="line-74"> private static Configuration serverConf;</span> |
| <span class="source-line-no">075</span><span id="line-75"> private static Configuration clientConf;</span> |
| <span class="source-line-no">076</span><span id="line-76"> private static Configuration sslConf;</span> |
| <span class="source-line-no">077</span><span id="line-77"> private static final String logName = TestLogLevel.class.getName();</span> |
| <span class="source-line-no">078</span><span id="line-78"> private static final String protectedPrefix = "protected";</span> |
| <span class="source-line-no">079</span><span id="line-79"> private static final String protectedLogName = protectedPrefix + "." + logName;</span> |
| <span class="source-line-no">080</span><span id="line-80"> private static final org.apache.logging.log4j.Logger log =</span> |
| <span class="source-line-no">081</span><span id="line-81"> org.apache.logging.log4j.LogManager.getLogger(logName);</span> |
| <span class="source-line-no">082</span><span id="line-82"> private final static String PRINCIPAL = "loglevel.principal";</span> |
| <span class="source-line-no">083</span><span id="line-83"> private final static String KEYTAB = "loglevel.keytab";</span> |
| <span class="source-line-no">084</span><span id="line-84"></span> |
| <span class="source-line-no">085</span><span id="line-85"> private static MiniKdc kdc;</span> |
| <span class="source-line-no">086</span><span id="line-86"></span> |
| <span class="source-line-no">087</span><span id="line-87"> private static final String LOCALHOST = "localhost";</span> |
| <span class="source-line-no">088</span><span id="line-88"> private static final String clientPrincipal = "client/" + LOCALHOST;</span> |
| <span class="source-line-no">089</span><span id="line-89"> private static String HTTP_PRINCIPAL = "HTTP/" + LOCALHOST;</span> |
| <span class="source-line-no">090</span><span id="line-90"> private static HBaseCommonTestingUtil HTU;</span> |
| <span class="source-line-no">091</span><span id="line-91"> private static File keyTabFile;</span> |
| <span class="source-line-no">092</span><span id="line-92"></span> |
| <span class="source-line-no">093</span><span id="line-93"> @BeforeClass</span> |
| <span class="source-line-no">094</span><span id="line-94"> public static void setUp() throws Exception {</span> |
| <span class="source-line-no">095</span><span id="line-95"> serverConf = new Configuration();</span> |
| <span class="source-line-no">096</span><span id="line-96"> serverConf.setStrings(LogLevel.READONLY_LOGGERS_CONF_KEY, protectedPrefix);</span> |
| <span class="source-line-no">097</span><span id="line-97"> HTU = new HBaseCommonTestingUtil(serverConf);</span> |
| <span class="source-line-no">098</span><span id="line-98"></span> |
| <span class="source-line-no">099</span><span id="line-99"> File keystoreDir = new File(HTU.getDataTestDir("keystore").toString());</span> |
| <span class="source-line-no">100</span><span id="line-100"> keystoreDir.mkdirs();</span> |
| <span class="source-line-no">101</span><span id="line-101"> keyTabFile = new File(HTU.getDataTestDir("keytab").toString(), "keytabfile");</span> |
| <span class="source-line-no">102</span><span id="line-102"> keyTabFile.getParentFile().mkdirs();</span> |
| <span class="source-line-no">103</span><span id="line-103"> clientConf = new Configuration();</span> |
| <span class="source-line-no">104</span><span id="line-104"></span> |
| <span class="source-line-no">105</span><span id="line-105"> setupSSL(keystoreDir);</span> |
| <span class="source-line-no">106</span><span id="line-106"></span> |
| <span class="source-line-no">107</span><span id="line-107"> kdc = setupMiniKdc();</span> |
| <span class="source-line-no">108</span><span id="line-108"> // Create two principles: a client and an HTTP principal</span> |
| <span class="source-line-no">109</span><span id="line-109"> kdc.createPrincipal(keyTabFile, clientPrincipal, HTTP_PRINCIPAL);</span> |
| <span class="source-line-no">110</span><span id="line-110"> }</span> |
| <span class="source-line-no">111</span><span id="line-111"></span> |
| <span class="source-line-no">112</span><span id="line-112"> /**</span> |
| <span class="source-line-no">113</span><span id="line-113"> * Sets up {@link MiniKdc} for testing security. Copied from HBaseTestingUtility#setupMiniKdc().</span> |
| <span class="source-line-no">114</span><span id="line-114"> */</span> |
| <span class="source-line-no">115</span><span id="line-115"> static private MiniKdc setupMiniKdc() throws Exception {</span> |
| <span class="source-line-no">116</span><span id="line-116"> Properties conf = MiniKdc.createConf();</span> |
| <span class="source-line-no">117</span><span id="line-117"> conf.put(MiniKdc.DEBUG, true);</span> |
| <span class="source-line-no">118</span><span id="line-118"> MiniKdc kdc = null;</span> |
| <span class="source-line-no">119</span><span id="line-119"> File dir = null;</span> |
| <span class="source-line-no">120</span><span id="line-120"> // There is time lag between selecting a port and trying to bind with it. It's possible that</span> |
| <span class="source-line-no">121</span><span id="line-121"> // another service captures the port in between which'll result in BindException.</span> |
| <span class="source-line-no">122</span><span id="line-122"> boolean bindException;</span> |
| <span class="source-line-no">123</span><span id="line-123"> int numTries = 0;</span> |
| <span class="source-line-no">124</span><span id="line-124"> do {</span> |
| <span class="source-line-no">125</span><span id="line-125"> try {</span> |
| <span class="source-line-no">126</span><span id="line-126"> bindException = false;</span> |
| <span class="source-line-no">127</span><span id="line-127"> dir = new File(HTU.getDataTestDir("kdc").toUri().getPath());</span> |
| <span class="source-line-no">128</span><span id="line-128"> kdc = new MiniKdc(conf, dir);</span> |
| <span class="source-line-no">129</span><span id="line-129"> kdc.start();</span> |
| <span class="source-line-no">130</span><span id="line-130"> } catch (BindException e) {</span> |
| <span class="source-line-no">131</span><span id="line-131"> FileUtils.deleteDirectory(dir); // clean directory</span> |
| <span class="source-line-no">132</span><span id="line-132"> numTries++;</span> |
| <span class="source-line-no">133</span><span id="line-133"> if (numTries == 3) {</span> |
| <span class="source-line-no">134</span><span id="line-134"> log.error("Failed setting up MiniKDC. Tried " + numTries + " times.");</span> |
| <span class="source-line-no">135</span><span id="line-135"> throw e;</span> |
| <span class="source-line-no">136</span><span id="line-136"> }</span> |
| <span class="source-line-no">137</span><span id="line-137"> log.error("BindException encountered when setting up MiniKdc. Trying again.");</span> |
| <span class="source-line-no">138</span><span id="line-138"> bindException = true;</span> |
| <span class="source-line-no">139</span><span id="line-139"> }</span> |
| <span class="source-line-no">140</span><span id="line-140"> } while (bindException);</span> |
| <span class="source-line-no">141</span><span id="line-141"> return kdc;</span> |
| <span class="source-line-no">142</span><span id="line-142"> }</span> |
| <span class="source-line-no">143</span><span id="line-143"></span> |
| <span class="source-line-no">144</span><span id="line-144"> static private void setupSSL(File base) throws Exception {</span> |
| <span class="source-line-no">145</span><span id="line-145"> clientConf.set(DFSConfigKeys.DFS_HTTP_POLICY_KEY, HttpConfig.Policy.HTTPS_ONLY.name());</span> |
| <span class="source-line-no">146</span><span id="line-146"> clientConf.set(DFSConfigKeys.DFS_NAMENODE_HTTPS_ADDRESS_KEY, "localhost:0");</span> |
| <span class="source-line-no">147</span><span id="line-147"> clientConf.set(DFSConfigKeys.DFS_DATANODE_HTTPS_ADDRESS_KEY, "localhost:0");</span> |
| <span class="source-line-no">148</span><span id="line-148"></span> |
| <span class="source-line-no">149</span><span id="line-149"> keystoresDir = base.getAbsolutePath();</span> |
| <span class="source-line-no">150</span><span id="line-150"> sslConfDir = KeyStoreTestUtil.getClasspathDir(TestLogLevel.class);</span> |
| <span class="source-line-no">151</span><span id="line-151"> KeyStoreTestUtil.setupSSLConfig(keystoresDir, sslConfDir, serverConf, false);</span> |
| <span class="source-line-no">152</span><span id="line-152"></span> |
| <span class="source-line-no">153</span><span id="line-153"> sslConf = getSslConfig(serverConf);</span> |
| <span class="source-line-no">154</span><span id="line-154"> }</span> |
| <span class="source-line-no">155</span><span id="line-155"></span> |
| <span class="source-line-no">156</span><span id="line-156"> /**</span> |
| <span class="source-line-no">157</span><span id="line-157"> * Get the SSL configuration. This method is copied from KeyStoreTestUtil#getSslConfig() in</span> |
| <span class="source-line-no">158</span><span id="line-158"> * Hadoop.</span> |
| <span class="source-line-no">159</span><span id="line-159"> * @return {@link Configuration} instance with ssl configs loaded.</span> |
| <span class="source-line-no">160</span><span id="line-160"> * @param conf to pull client/server SSL settings filename from</span> |
| <span class="source-line-no">161</span><span id="line-161"> */</span> |
| <span class="source-line-no">162</span><span id="line-162"> private static Configuration getSslConfig(Configuration conf) {</span> |
| <span class="source-line-no">163</span><span id="line-163"> Configuration sslConf = new Configuration(false);</span> |
| <span class="source-line-no">164</span><span id="line-164"> String sslServerConfFile = conf.get(SSLFactory.SSL_SERVER_CONF_KEY);</span> |
| <span class="source-line-no">165</span><span id="line-165"> String sslClientConfFile = conf.get(SSLFactory.SSL_CLIENT_CONF_KEY);</span> |
| <span class="source-line-no">166</span><span id="line-166"> sslConf.addResource(sslServerConfFile);</span> |
| <span class="source-line-no">167</span><span id="line-167"> sslConf.addResource(sslClientConfFile);</span> |
| <span class="source-line-no">168</span><span id="line-168"> sslConf.set(SSLFactory.SSL_SERVER_CONF_KEY, sslServerConfFile);</span> |
| <span class="source-line-no">169</span><span id="line-169"> sslConf.set(SSLFactory.SSL_CLIENT_CONF_KEY, sslClientConfFile);</span> |
| <span class="source-line-no">170</span><span id="line-170"> return sslConf;</span> |
| <span class="source-line-no">171</span><span id="line-171"> }</span> |
| <span class="source-line-no">172</span><span id="line-172"></span> |
| <span class="source-line-no">173</span><span id="line-173"> @AfterClass</span> |
| <span class="source-line-no">174</span><span id="line-174"> public static void tearDown() {</span> |
| <span class="source-line-no">175</span><span id="line-175"> if (kdc != null) {</span> |
| <span class="source-line-no">176</span><span id="line-176"> kdc.stop();</span> |
| <span class="source-line-no">177</span><span id="line-177"> }</span> |
| <span class="source-line-no">178</span><span id="line-178"></span> |
| <span class="source-line-no">179</span><span id="line-179"> FileUtil.fullyDelete(new File(HTU.getDataTestDir().toString()));</span> |
| <span class="source-line-no">180</span><span id="line-180"> }</span> |
| <span class="source-line-no">181</span><span id="line-181"></span> |
| <span class="source-line-no">182</span><span id="line-182"> /**</span> |
| <span class="source-line-no">183</span><span id="line-183"> * Test client command line options. Does not validate server behavior.</span> |
| <span class="source-line-no">184</span><span id="line-184"> * @throws Exception if commands return unexpected results.</span> |
| <span class="source-line-no">185</span><span id="line-185"> */</span> |
| <span class="source-line-no">186</span><span id="line-186"> @Test</span> |
| <span class="source-line-no">187</span><span id="line-187"> public void testCommandOptions() throws Exception {</span> |
| <span class="source-line-no">188</span><span id="line-188"> final String className = this.getClass().getName();</span> |
| <span class="source-line-no">189</span><span id="line-189"></span> |
| <span class="source-line-no">190</span><span id="line-190"> assertFalse(validateCommand(new String[] { "-foo" }));</span> |
| <span class="source-line-no">191</span><span id="line-191"> // fail due to insufficient number of arguments</span> |
| <span class="source-line-no">192</span><span id="line-192"> assertFalse(validateCommand(new String[] {}));</span> |
| <span class="source-line-no">193</span><span id="line-193"> assertFalse(validateCommand(new String[] { "-getlevel" }));</span> |
| <span class="source-line-no">194</span><span id="line-194"> assertFalse(validateCommand(new String[] { "-setlevel" }));</span> |
| <span class="source-line-no">195</span><span id="line-195"> assertFalse(validateCommand(new String[] { "-getlevel", "foo.bar:8080" }));</span> |
| <span class="source-line-no">196</span><span id="line-196"></span> |
| <span class="source-line-no">197</span><span id="line-197"> // valid command arguments</span> |
| <span class="source-line-no">198</span><span id="line-198"> assertTrue(validateCommand(new String[] { "-getlevel", "foo.bar:8080", className }));</span> |
| <span class="source-line-no">199</span><span id="line-199"> assertTrue(validateCommand(new String[] { "-setlevel", "foo.bar:8080", className, "DEBUG" }));</span> |
| <span class="source-line-no">200</span><span id="line-200"> assertTrue(validateCommand(new String[] { "-getlevel", "foo.bar:8080", className }));</span> |
| <span class="source-line-no">201</span><span id="line-201"> assertTrue(validateCommand(new String[] { "-setlevel", "foo.bar:8080", className, "DEBUG" }));</span> |
| <span class="source-line-no">202</span><span id="line-202"></span> |
| <span class="source-line-no">203</span><span id="line-203"> // fail due to the extra argument</span> |
| <span class="source-line-no">204</span><span id="line-204"> assertFalse(validateCommand(new String[] { "-getlevel", "foo.bar:8080", className, "blah" }));</span> |
| <span class="source-line-no">205</span><span id="line-205"> assertFalse(</span> |
| <span class="source-line-no">206</span><span id="line-206"> validateCommand(new String[] { "-setlevel", "foo.bar:8080", className, "DEBUG", "blah" }));</span> |
| <span class="source-line-no">207</span><span id="line-207"> assertFalse(validateCommand(new String[] { "-getlevel", "foo.bar:8080", className, "-setlevel",</span> |
| <span class="source-line-no">208</span><span id="line-208"> "foo.bar:8080", className }));</span> |
| <span class="source-line-no">209</span><span id="line-209"> }</span> |
| <span class="source-line-no">210</span><span id="line-210"></span> |
| <span class="source-line-no">211</span><span id="line-211"> /**</span> |
| <span class="source-line-no">212</span><span id="line-212"> * Check to see if a command can be accepted.</span> |
| <span class="source-line-no">213</span><span id="line-213"> * @param args a String array of arguments</span> |
| <span class="source-line-no">214</span><span id="line-214"> * @return true if the command can be accepted, false if not.</span> |
| <span class="source-line-no">215</span><span id="line-215"> */</span> |
| <span class="source-line-no">216</span><span id="line-216"> private boolean validateCommand(String[] args) {</span> |
| <span class="source-line-no">217</span><span id="line-217"> CLI cli = new CLI(clientConf);</span> |
| <span class="source-line-no">218</span><span id="line-218"> try {</span> |
| <span class="source-line-no">219</span><span id="line-219"> cli.parseArguments(args);</span> |
| <span class="source-line-no">220</span><span id="line-220"> } catch (HadoopIllegalArgumentException e) {</span> |
| <span class="source-line-no">221</span><span id="line-221"> return false;</span> |
| <span class="source-line-no">222</span><span id="line-222"> } catch (Exception e) {</span> |
| <span class="source-line-no">223</span><span id="line-223"> // this is used to verify the command arguments only.</span> |
| <span class="source-line-no">224</span><span id="line-224"> // no HadoopIllegalArgumentException = the arguments are good.</span> |
| <span class="source-line-no">225</span><span id="line-225"> return true;</span> |
| <span class="source-line-no">226</span><span id="line-226"> }</span> |
| <span class="source-line-no">227</span><span id="line-227"> return true;</span> |
| <span class="source-line-no">228</span><span id="line-228"> }</span> |
| <span class="source-line-no">229</span><span id="line-229"></span> |
| <span class="source-line-no">230</span><span id="line-230"> /**</span> |
| <span class="source-line-no">231</span><span id="line-231"> * Creates and starts a Jetty server binding at an ephemeral port to run LogLevel servlet.</span> |
| <span class="source-line-no">232</span><span id="line-232"> * @param protocol "http" or "https"</span> |
| <span class="source-line-no">233</span><span id="line-233"> * @param isSpnego true if SPNEGO is enabled</span> |
| <span class="source-line-no">234</span><span id="line-234"> * @return a created HttpServer object</span> |
| <span class="source-line-no">235</span><span id="line-235"> * @throws Exception if unable to create or start a Jetty server</span> |
| <span class="source-line-no">236</span><span id="line-236"> */</span> |
| <span class="source-line-no">237</span><span id="line-237"> private HttpServer createServer(String protocol, boolean isSpnego) throws Exception {</span> |
| <span class="source-line-no">238</span><span id="line-238"> HttpServer.Builder builder = new HttpServer.Builder().setName("..")</span> |
| <span class="source-line-no">239</span><span id="line-239"> .addEndpoint(new URI(protocol + "://localhost:0")).setFindPort(true).setConf(serverConf);</span> |
| <span class="source-line-no">240</span><span id="line-240"> if (isSpnego) {</span> |
| <span class="source-line-no">241</span><span id="line-241"> // Set up server Kerberos credentials.</span> |
| <span class="source-line-no">242</span><span id="line-242"> // Since the server may fall back to simple authentication,</span> |
| <span class="source-line-no">243</span><span id="line-243"> // use ACL to make sure the connection is Kerberos/SPNEGO authenticated.</span> |
| <span class="source-line-no">244</span><span id="line-244"> builder.setSecurityEnabled(true).setUsernameConfKey(PRINCIPAL).setKeytabConfKey(KEYTAB)</span> |
| <span class="source-line-no">245</span><span id="line-245"> .setACL(new AccessControlList("client"));</span> |
| <span class="source-line-no">246</span><span id="line-246"> }</span> |
| <span class="source-line-no">247</span><span id="line-247"></span> |
| <span class="source-line-no">248</span><span id="line-248"> // if using HTTPS, configure keystore/truststore properties.</span> |
| <span class="source-line-no">249</span><span id="line-249"> if (protocol.equals(LogLevel.PROTOCOL_HTTPS)) {</span> |
| <span class="source-line-no">250</span><span id="line-250"> builder = builder.keyPassword(sslConf.get("ssl.server.keystore.keypassword"))</span> |
| <span class="source-line-no">251</span><span id="line-251"> .keyStore(sslConf.get("ssl.server.keystore.location"),</span> |
| <span class="source-line-no">252</span><span id="line-252"> sslConf.get("ssl.server.keystore.password"),</span> |
| <span class="source-line-no">253</span><span id="line-253"> sslConf.get("ssl.server.keystore.type", "jks"))</span> |
| <span class="source-line-no">254</span><span id="line-254"> .trustStore(sslConf.get("ssl.server.truststore.location"),</span> |
| <span class="source-line-no">255</span><span id="line-255"> sslConf.get("ssl.server.truststore.password"),</span> |
| <span class="source-line-no">256</span><span id="line-256"> sslConf.get("ssl.server.truststore.type", "jks"));</span> |
| <span class="source-line-no">257</span><span id="line-257"> }</span> |
| <span class="source-line-no">258</span><span id="line-258"></span> |
| <span class="source-line-no">259</span><span id="line-259"> HttpServer server = builder.build();</span> |
| <span class="source-line-no">260</span><span id="line-260"> server.start();</span> |
| <span class="source-line-no">261</span><span id="line-261"> return server;</span> |
| <span class="source-line-no">262</span><span id="line-262"> }</span> |
| <span class="source-line-no">263</span><span id="line-263"></span> |
| <span class="source-line-no">264</span><span id="line-264"> private void testDynamicLogLevel(final String bindProtocol, final String connectProtocol,</span> |
| <span class="source-line-no">265</span><span id="line-265"> final boolean isSpnego) throws Exception {</span> |
| <span class="source-line-no">266</span><span id="line-266"> testDynamicLogLevel(bindProtocol, connectProtocol, isSpnego, logName,</span> |
| <span class="source-line-no">267</span><span id="line-267"> org.apache.logging.log4j.Level.DEBUG.toString());</span> |
| <span class="source-line-no">268</span><span id="line-268"> }</span> |
| <span class="source-line-no">269</span><span id="line-269"></span> |
| <span class="source-line-no">270</span><span id="line-270"> private void testDynamicLogLevel(final String bindProtocol, final String connectProtocol,</span> |
| <span class="source-line-no">271</span><span id="line-271"> final boolean isSpnego, final String newLevel) throws Exception {</span> |
| <span class="source-line-no">272</span><span id="line-272"> testDynamicLogLevel(bindProtocol, connectProtocol, isSpnego, logName, newLevel);</span> |
| <span class="source-line-no">273</span><span id="line-273"> }</span> |
| <span class="source-line-no">274</span><span id="line-274"></span> |
| <span class="source-line-no">275</span><span id="line-275"> /**</span> |
| <span class="source-line-no">276</span><span id="line-276"> * Run both client and server using the given protocol.</span> |
| <span class="source-line-no">277</span><span id="line-277"> * @param bindProtocol specify either http or https for server</span> |
| <span class="source-line-no">278</span><span id="line-278"> * @param connectProtocol specify either http or https for client</span> |
| <span class="source-line-no">279</span><span id="line-279"> * @param isSpnego true if SPNEGO is enabled</span> |
| <span class="source-line-no">280</span><span id="line-280"> * @throws Exception if client can't accesss server.</span> |
| <span class="source-line-no">281</span><span id="line-281"> */</span> |
| <span class="source-line-no">282</span><span id="line-282"> private void testDynamicLogLevel(final String bindProtocol, final String connectProtocol,</span> |
| <span class="source-line-no">283</span><span id="line-283"> final boolean isSpnego, final String loggerName, final String newLevel) throws Exception {</span> |
| <span class="source-line-no">284</span><span id="line-284"> if (!LogLevel.isValidProtocol(bindProtocol)) {</span> |
| <span class="source-line-no">285</span><span id="line-285"> throw new Exception("Invalid server protocol " + bindProtocol);</span> |
| <span class="source-line-no">286</span><span id="line-286"> }</span> |
| <span class="source-line-no">287</span><span id="line-287"> if (!LogLevel.isValidProtocol(connectProtocol)) {</span> |
| <span class="source-line-no">288</span><span id="line-288"> throw new Exception("Invalid client protocol " + connectProtocol);</span> |
| <span class="source-line-no">289</span><span id="line-289"> }</span> |
| <span class="source-line-no">290</span><span id="line-290"> org.apache.logging.log4j.Logger log = org.apache.logging.log4j.LogManager.getLogger(loggerName);</span> |
| <span class="source-line-no">291</span><span id="line-291"> org.apache.logging.log4j.Level oldLevel = log.getLevel();</span> |
| <span class="source-line-no">292</span><span id="line-292"> assertNotEquals("Get default Log Level which shouldn't be ERROR.",</span> |
| <span class="source-line-no">293</span><span id="line-293"> org.apache.logging.log4j.Level.ERROR, oldLevel);</span> |
| <span class="source-line-no">294</span><span id="line-294"></span> |
| <span class="source-line-no">295</span><span id="line-295"> // configs needed for SPNEGO at server side</span> |
| <span class="source-line-no">296</span><span id="line-296"> if (isSpnego) {</span> |
| <span class="source-line-no">297</span><span id="line-297"> serverConf.set(PRINCIPAL, HTTP_PRINCIPAL);</span> |
| <span class="source-line-no">298</span><span id="line-298"> serverConf.set(KEYTAB, keyTabFile.getAbsolutePath());</span> |
| <span class="source-line-no">299</span><span id="line-299"> serverConf.set(CommonConfigurationKeysPublic.HADOOP_SECURITY_AUTHENTICATION, "kerberos");</span> |
| <span class="source-line-no">300</span><span id="line-300"> serverConf.setBoolean(CommonConfigurationKeys.HADOOP_SECURITY_AUTHORIZATION, true);</span> |
| <span class="source-line-no">301</span><span id="line-301"> UserGroupInformation.setConfiguration(serverConf);</span> |
| <span class="source-line-no">302</span><span id="line-302"> } else {</span> |
| <span class="source-line-no">303</span><span id="line-303"> serverConf.set(CommonConfigurationKeysPublic.HADOOP_SECURITY_AUTHENTICATION, "simple");</span> |
| <span class="source-line-no">304</span><span id="line-304"> serverConf.setBoolean(CommonConfigurationKeys.HADOOP_SECURITY_AUTHORIZATION, false);</span> |
| <span class="source-line-no">305</span><span id="line-305"> UserGroupInformation.setConfiguration(serverConf);</span> |
| <span class="source-line-no">306</span><span id="line-306"> }</span> |
| <span class="source-line-no">307</span><span id="line-307"></span> |
| <span class="source-line-no">308</span><span id="line-308"> final HttpServer server = createServer(bindProtocol, isSpnego);</span> |
| <span class="source-line-no">309</span><span id="line-309"> // get server port</span> |
| <span class="source-line-no">310</span><span id="line-310"> final String authority = NetUtils.getHostPortString(server.getConnectorAddress(0));</span> |
| <span class="source-line-no">311</span><span id="line-311"></span> |
| <span class="source-line-no">312</span><span id="line-312"> String keytabFilePath = keyTabFile.getAbsolutePath();</span> |
| <span class="source-line-no">313</span><span id="line-313"></span> |
| <span class="source-line-no">314</span><span id="line-314"> UserGroupInformation clientUGI =</span> |
| <span class="source-line-no">315</span><span id="line-315"> UserGroupInformation.loginUserFromKeytabAndReturnUGI(clientPrincipal, keytabFilePath);</span> |
| <span class="source-line-no">316</span><span id="line-316"> try {</span> |
| <span class="source-line-no">317</span><span id="line-317"> clientUGI.doAs((PrivilegedExceptionAction<Void>) () -> {</span> |
| <span class="source-line-no">318</span><span id="line-318"> // client command line</span> |
| <span class="source-line-no">319</span><span id="line-319"> getLevel(connectProtocol, authority, loggerName);</span> |
| <span class="source-line-no">320</span><span id="line-320"> setLevel(connectProtocol, authority, loggerName, newLevel);</span> |
| <span class="source-line-no">321</span><span id="line-321"> return null;</span> |
| <span class="source-line-no">322</span><span id="line-322"> });</span> |
| <span class="source-line-no">323</span><span id="line-323"> } finally {</span> |
| <span class="source-line-no">324</span><span id="line-324"> clientUGI.logoutUserFromKeytab();</span> |
| <span class="source-line-no">325</span><span id="line-325"> server.stop();</span> |
| <span class="source-line-no">326</span><span id="line-326"> }</span> |
| <span class="source-line-no">327</span><span id="line-327"></span> |
| <span class="source-line-no">328</span><span id="line-328"> // restore log level</span> |
| <span class="source-line-no">329</span><span id="line-329"> org.apache.logging.log4j.core.config.Configurator.setLevel(log.getName(), oldLevel);</span> |
| <span class="source-line-no">330</span><span id="line-330"> }</span> |
| <span class="source-line-no">331</span><span id="line-331"></span> |
| <span class="source-line-no">332</span><span id="line-332"> /**</span> |
| <span class="source-line-no">333</span><span id="line-333"> * Run LogLevel command line to start a client to get log level of this test class.</span> |
| <span class="source-line-no">334</span><span id="line-334"> * @param protocol specify either http or https</span> |
| <span class="source-line-no">335</span><span id="line-335"> * @param authority daemon's web UI address</span> |
| <span class="source-line-no">336</span><span id="line-336"> * @throws Exception if unable to connect</span> |
| <span class="source-line-no">337</span><span id="line-337"> */</span> |
| <span class="source-line-no">338</span><span id="line-338"> private void getLevel(String protocol, String authority, String logName) throws Exception {</span> |
| <span class="source-line-no">339</span><span id="line-339"> String[] getLevelArgs = { "-getlevel", authority, logName, "-protocol", protocol };</span> |
| <span class="source-line-no">340</span><span id="line-340"> CLI cli = new CLI(protocol.equalsIgnoreCase("https") ? sslConf : clientConf);</span> |
| <span class="source-line-no">341</span><span id="line-341"> cli.run(getLevelArgs);</span> |
| <span class="source-line-no">342</span><span id="line-342"> }</span> |
| <span class="source-line-no">343</span><span id="line-343"></span> |
| <span class="source-line-no">344</span><span id="line-344"> /**</span> |
| <span class="source-line-no">345</span><span id="line-345"> * Run LogLevel command line to start a client to set log level of this test class to debug.</span> |
| <span class="source-line-no">346</span><span id="line-346"> * @param protocol specify either http or https</span> |
| <span class="source-line-no">347</span><span id="line-347"> * @param authority daemon's web UI address</span> |
| <span class="source-line-no">348</span><span id="line-348"> * @throws Exception if unable to run or log level does not change as expected</span> |
| <span class="source-line-no">349</span><span id="line-349"> */</span> |
| <span class="source-line-no">350</span><span id="line-350"> private void setLevel(String protocol, String authority, String logName, String newLevel)</span> |
| <span class="source-line-no">351</span><span id="line-351"> throws Exception {</span> |
| <span class="source-line-no">352</span><span id="line-352"> String[] setLevelArgs = { "-setlevel", authority, logName, newLevel, "-protocol", protocol };</span> |
| <span class="source-line-no">353</span><span id="line-353"> CLI cli = new CLI(protocol.equalsIgnoreCase("https") ? sslConf : clientConf);</span> |
| <span class="source-line-no">354</span><span id="line-354"> cli.run(setLevelArgs);</span> |
| <span class="source-line-no">355</span><span id="line-355"></span> |
| <span class="source-line-no">356</span><span id="line-356"> org.apache.logging.log4j.Logger logger = org.apache.logging.log4j.LogManager.getLogger(logName);</span> |
| <span class="source-line-no">357</span><span id="line-357"></span> |
| <span class="source-line-no">358</span><span id="line-358"> assertEquals("new level not equal to expected: ", newLevel.toUpperCase(),</span> |
| <span class="source-line-no">359</span><span id="line-359"> logger.getLevel().toString());</span> |
| <span class="source-line-no">360</span><span id="line-360"> }</span> |
| <span class="source-line-no">361</span><span id="line-361"></span> |
| <span class="source-line-no">362</span><span id="line-362"> @Test</span> |
| <span class="source-line-no">363</span><span id="line-363"> public void testSettingProtectedLogLevel() throws Exception {</span> |
| <span class="source-line-no">364</span><span id="line-364"> try {</span> |
| <span class="source-line-no">365</span><span id="line-365"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTP, true, protectedLogName,</span> |
| <span class="source-line-no">366</span><span id="line-366"> "DEBUG");</span> |
| <span class="source-line-no">367</span><span id="line-367"> fail("Expected IO exception due to protected logger");</span> |
| <span class="source-line-no">368</span><span id="line-368"> } catch (IOException e) {</span> |
| <span class="source-line-no">369</span><span id="line-369"> assertTrue(e.getMessage().contains("" + HttpServletResponse.SC_PRECONDITION_FAILED));</span> |
| <span class="source-line-no">370</span><span id="line-370"> assertTrue(e.getMessage().contains(</span> |
| <span class="source-line-no">371</span><span id="line-371"> "Modification of logger " + protectedLogName + " is disallowed in configuration."));</span> |
| <span class="source-line-no">372</span><span id="line-372"> }</span> |
| <span class="source-line-no">373</span><span id="line-373"> }</span> |
| <span class="source-line-no">374</span><span id="line-374"></span> |
| <span class="source-line-no">375</span><span id="line-375"> /**</span> |
| <span class="source-line-no">376</span><span id="line-376"> * Test setting log level to "Info".</span> |
| <span class="source-line-no">377</span><span id="line-377"> * @throws Exception if client can't set log level to INFO.</span> |
| <span class="source-line-no">378</span><span id="line-378"> */</span> |
| <span class="source-line-no">379</span><span id="line-379"> @Test</span> |
| <span class="source-line-no">380</span><span id="line-380"> public void testInfoLogLevel() throws Exception {</span> |
| <span class="source-line-no">381</span><span id="line-381"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTP, true, "INFO");</span> |
| <span class="source-line-no">382</span><span id="line-382"> }</span> |
| <span class="source-line-no">383</span><span id="line-383"></span> |
| <span class="source-line-no">384</span><span id="line-384"> /**</span> |
| <span class="source-line-no">385</span><span id="line-385"> * Test setting log level to "Error".</span> |
| <span class="source-line-no">386</span><span id="line-386"> * @throws Exception if client can't set log level to ERROR.</span> |
| <span class="source-line-no">387</span><span id="line-387"> */</span> |
| <span class="source-line-no">388</span><span id="line-388"> @Test</span> |
| <span class="source-line-no">389</span><span id="line-389"> public void testErrorLogLevel() throws Exception {</span> |
| <span class="source-line-no">390</span><span id="line-390"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTP, true, "ERROR");</span> |
| <span class="source-line-no">391</span><span id="line-391"> }</span> |
| <span class="source-line-no">392</span><span id="line-392"></span> |
| <span class="source-line-no">393</span><span id="line-393"> /**</span> |
| <span class="source-line-no">394</span><span id="line-394"> * Server runs HTTP, no SPNEGO.</span> |
| <span class="source-line-no">395</span><span id="line-395"> * @throws Exception if http client can't access http server, or http client can access https</span> |
| <span class="source-line-no">396</span><span id="line-396"> * server.</span> |
| <span class="source-line-no">397</span><span id="line-397"> */</span> |
| <span class="source-line-no">398</span><span id="line-398"> @Test</span> |
| <span class="source-line-no">399</span><span id="line-399"> public void testLogLevelByHttp() throws Exception {</span> |
| <span class="source-line-no">400</span><span id="line-400"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTP, false);</span> |
| <span class="source-line-no">401</span><span id="line-401"> try {</span> |
| <span class="source-line-no">402</span><span id="line-402"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTPS, false);</span> |
| <span class="source-line-no">403</span><span id="line-403"> fail("An HTTPS Client should not have succeeded in connecting to a " + "HTTP server");</span> |
| <span class="source-line-no">404</span><span id="line-404"> } catch (SSLException e) {</span> |
| <span class="source-line-no">405</span><span id="line-405"> exceptionShouldContains("Unrecognized SSL message", e);</span> |
| <span class="source-line-no">406</span><span id="line-406"> }</span> |
| <span class="source-line-no">407</span><span id="line-407"> }</span> |
| <span class="source-line-no">408</span><span id="line-408"></span> |
| <span class="source-line-no">409</span><span id="line-409"> /**</span> |
| <span class="source-line-no">410</span><span id="line-410"> * Server runs HTTP + SPNEGO.</span> |
| <span class="source-line-no">411</span><span id="line-411"> * @throws Exception if http client can't access http server, or http client can access https</span> |
| <span class="source-line-no">412</span><span id="line-412"> * server.</span> |
| <span class="source-line-no">413</span><span id="line-413"> */</span> |
| <span class="source-line-no">414</span><span id="line-414"> @Test</span> |
| <span class="source-line-no">415</span><span id="line-415"> public void testLogLevelByHttpWithSpnego() throws Exception {</span> |
| <span class="source-line-no">416</span><span id="line-416"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTP, true);</span> |
| <span class="source-line-no">417</span><span id="line-417"> try {</span> |
| <span class="source-line-no">418</span><span id="line-418"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTP, LogLevel.PROTOCOL_HTTPS, true);</span> |
| <span class="source-line-no">419</span><span id="line-419"> fail("An HTTPS Client should not have succeeded in connecting to a " + "HTTP server");</span> |
| <span class="source-line-no">420</span><span id="line-420"> } catch (SSLException e) {</span> |
| <span class="source-line-no">421</span><span id="line-421"> exceptionShouldContains("Unrecognized SSL message", e);</span> |
| <span class="source-line-no">422</span><span id="line-422"> }</span> |
| <span class="source-line-no">423</span><span id="line-423"> }</span> |
| <span class="source-line-no">424</span><span id="line-424"></span> |
| <span class="source-line-no">425</span><span id="line-425"> /**</span> |
| <span class="source-line-no">426</span><span id="line-426"> * Server runs HTTPS, no SPNEGO.</span> |
| <span class="source-line-no">427</span><span id="line-427"> * @throws Exception if https client can't access https server, or https client can access http</span> |
| <span class="source-line-no">428</span><span id="line-428"> * server.</span> |
| <span class="source-line-no">429</span><span id="line-429"> */</span> |
| <span class="source-line-no">430</span><span id="line-430"> @Test</span> |
| <span class="source-line-no">431</span><span id="line-431"> public void testLogLevelByHttps() throws Exception {</span> |
| <span class="source-line-no">432</span><span id="line-432"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTPS, LogLevel.PROTOCOL_HTTPS, false);</span> |
| <span class="source-line-no">433</span><span id="line-433"> try {</span> |
| <span class="source-line-no">434</span><span id="line-434"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTPS, LogLevel.PROTOCOL_HTTP, false);</span> |
| <span class="source-line-no">435</span><span id="line-435"> fail("An HTTP Client should not have succeeded in connecting to a " + "HTTPS server");</span> |
| <span class="source-line-no">436</span><span id="line-436"> } catch (SocketException e) {</span> |
| <span class="source-line-no">437</span><span id="line-437"> exceptionShouldContains("Unexpected end of file from server", e);</span> |
| <span class="source-line-no">438</span><span id="line-438"> }</span> |
| <span class="source-line-no">439</span><span id="line-439"> }</span> |
| <span class="source-line-no">440</span><span id="line-440"></span> |
| <span class="source-line-no">441</span><span id="line-441"> /**</span> |
| <span class="source-line-no">442</span><span id="line-442"> * Server runs HTTPS + SPNEGO.</span> |
| <span class="source-line-no">443</span><span id="line-443"> * @throws Exception if https client can't access https server, or https client can access http</span> |
| <span class="source-line-no">444</span><span id="line-444"> * server.</span> |
| <span class="source-line-no">445</span><span id="line-445"> */</span> |
| <span class="source-line-no">446</span><span id="line-446"> @Test</span> |
| <span class="source-line-no">447</span><span id="line-447"> public void testLogLevelByHttpsWithSpnego() throws Exception {</span> |
| <span class="source-line-no">448</span><span id="line-448"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTPS, LogLevel.PROTOCOL_HTTPS, true);</span> |
| <span class="source-line-no">449</span><span id="line-449"> try {</span> |
| <span class="source-line-no">450</span><span id="line-450"> testDynamicLogLevel(LogLevel.PROTOCOL_HTTPS, LogLevel.PROTOCOL_HTTP, true);</span> |
| <span class="source-line-no">451</span><span id="line-451"> fail("An HTTP Client should not have succeeded in connecting to a " + "HTTPS server");</span> |
| <span class="source-line-no">452</span><span id="line-452"> } catch (SocketException e) {</span> |
| <span class="source-line-no">453</span><span id="line-453"> exceptionShouldContains("Unexpected end of file from server", e);</span> |
| <span class="source-line-no">454</span><span id="line-454"> }</span> |
| <span class="source-line-no">455</span><span id="line-455"> }</span> |
| <span class="source-line-no">456</span><span id="line-456"></span> |
| <span class="source-line-no">457</span><span id="line-457"> /**</span> |
| <span class="source-line-no">458</span><span id="line-458"> * Assert that a throwable or one of its causes should contain the substr in its message. Ideally</span> |
| <span class="source-line-no">459</span><span id="line-459"> * we should use {@link GenericTestUtils#assertExceptionContains(String, Throwable)} util method</span> |
| <span class="source-line-no">460</span><span id="line-460"> * which asserts t.toString() contains the substr. As the original throwable may have been wrapped</span> |
| <span class="source-line-no">461</span><span id="line-461"> * in Hadoop3 because of HADOOP-12897, it's required to check all the wrapped causes. After stop</span> |
| <span class="source-line-no">462</span><span id="line-462"> * supporting Hadoop2, this method can be removed and assertion in tests can use t.getCause()</span> |
| <span class="source-line-no">463</span><span id="line-463"> * directly, similar to HADOOP-15280.</span> |
| <span class="source-line-no">464</span><span id="line-464"> */</span> |
| <span class="source-line-no">465</span><span id="line-465"> private static void exceptionShouldContains(String substr, Throwable throwable) {</span> |
| <span class="source-line-no">466</span><span id="line-466"> Throwable t = throwable;</span> |
| <span class="source-line-no">467</span><span id="line-467"> while (t != null) {</span> |
| <span class="source-line-no">468</span><span id="line-468"> String msg = t.toString();</span> |
| <span class="source-line-no">469</span><span id="line-469"> if (msg != null && msg.toLowerCase().contains(substr.toLowerCase())) {</span> |
| <span class="source-line-no">470</span><span id="line-470"> return;</span> |
| <span class="source-line-no">471</span><span id="line-471"> }</span> |
| <span class="source-line-no">472</span><span id="line-472"> t = t.getCause();</span> |
| <span class="source-line-no">473</span><span id="line-473"> }</span> |
| <span class="source-line-no">474</span><span id="line-474"> throw new AssertionError("Expected to find '" + substr + "' but got unexpected exception:"</span> |
| <span class="source-line-no">475</span><span id="line-475"> + StringUtils.stringifyException(throwable), throwable);</span> |
| <span class="source-line-no">476</span><span id="line-476"> }</span> |
| <span class="source-line-no">477</span><span id="line-477">}</span> |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| </pre> |
| </div> |
| </main> |
| </body> |
| </html> |