def setUp(self): self.rpc_addresses = '' if sentry_site.get_sentry_server_rpc_addresses() is not None: self.rpc_addresses = ','.join(sentry_site.get_sentry_server_rpc_addresses()) self.rpc_port = sentry_site.get_sentry_server_rpc_port() or '8038' self.tmpdir = tempfile.mkdtemp() self.resets = [ SENTRY_CONF_DIR.set_for_testing(self.tmpdir), ] clear_api_cache() clear_api2_cache()
def setUp(self): self.rpc_addresses = '' if sentry_site.get_sentry_server_rpc_addresses() is not None: self.rpc_addresses = ','.join( sentry_site.get_sentry_server_rpc_addresses()) self.tmpdir = tempfile.mkdtemp() self.resets = [ SENTRY_CONF_DIR.set_for_testing(self.tmpdir), ] if API_CACHE is not None: self.resets.append(API_CACHE.set_for_testing(None)) if API2_CACHE is not None: self.resets.append(API2_CACHE.set_for_testing(None))
def test_security_kerberos(): tmpdir = tempfile.mkdtemp() finish = SENTRY_CONF_DIR.set_for_testing(tmpdir) try: xml = sentry_site_xml(provider='default', authentication='kerberos') file(os.path.join(tmpdir, 'sentry-site.xml'), 'w').write(xml) sentry_site.reset() security = SentryClient('test.com', 11111, 'test')._get_security() assert_equal(True, security['use_sasl']) assert_equal('GSSAPI', security['mechanism']) finally: sentry_site.reset() finish() shutil.rmtree(tmpdir)
def test_security_plain(): tmpdir = tempfile.mkdtemp() finish = SENTRY_CONF_DIR.set_for_testing(tmpdir) try: xml = sentry_site_xml(provider='default') file(os.path.join(tmpdir, 'sentry-site.xml'), 'w').write(xml) sentry_site.reset() assert_equal('test/[email protected]', get_sentry_server_principal()) assert_equal(['hive', 'impala', 'hue'], get_sentry_server_admin_groups()) security = SentryClient('test.com', 11111, 'test')._get_security() assert_equal('test', security['kerberos_principal_short_name']) assert_equal(False, security['use_sasl']) assert_equal('NOSASL', security['mechanism']) finally: sentry_site.reset() finish() shutil.rmtree(tmpdir)