Commit 4c7c911c by nixonrodrigues

ATLAS-3083 :- Disable SSLAndKerberosTest & SSLTest etc Unitcases

Change-Id: I55f6ea20b0643821996721d3a7370a44729d5ea2
parent fa2c3e2c
...@@ -47,7 +47,7 @@ public class NegativeSSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -47,7 +47,7 @@ public class NegativeSSLAndKerberosTest extends BaseSSLAndKerberosTest {
private String originalConf; private String originalConf;
private AtlasClient dgiClient; private AtlasClient dgiClient;
@BeforeClass //@BeforeClass
public void setUp() throws Exception { public void setUp() throws Exception {
jksPath = new Path(Files.createTempDirectory("tempproviders").toString(), "test.jks"); jksPath = new Path(Files.createTempDirectory("tempproviders").toString(), "test.jks");
providerUrl = JavaKeyStoreProvider.SCHEME_NAME + "://file/" + jksPath.toUri(); providerUrl = JavaKeyStoreProvider.SCHEME_NAME + "://file/" + jksPath.toUri();
...@@ -115,7 +115,7 @@ public class NegativeSSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -115,7 +115,7 @@ public class NegativeSSLAndKerberosTest extends BaseSSLAndKerberosTest {
secureEmbeddedServer.getServer().start(); secureEmbeddedServer.getServer().start();
} }
@AfterClass //@AfterClass
public void tearDown() throws Exception { public void tearDown() throws Exception {
if (secureEmbeddedServer != null) { if (secureEmbeddedServer != null) {
secureEmbeddedServer.getServer().stop(); secureEmbeddedServer.getServer().stop();
...@@ -130,7 +130,7 @@ public class NegativeSSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -130,7 +130,7 @@ public class NegativeSSLAndKerberosTest extends BaseSSLAndKerberosTest {
} }
} }
@Test (enabled = false) @Test(enabled = false)
public void testUnsecuredClient() throws Exception { public void testUnsecuredClient() throws Exception {
try { try {
dgiClient.listTypes(); dgiClient.listTypes();
......
...@@ -29,7 +29,7 @@ import org.apache.hadoop.security.alias.JavaKeyStoreProvider; ...@@ -29,7 +29,7 @@ import org.apache.hadoop.security.alias.JavaKeyStoreProvider;
import org.testng.annotations.AfterClass; import org.testng.annotations.AfterClass;
import org.testng.annotations.BeforeClass; import org.testng.annotations.BeforeClass;
import org.testng.annotations.Test; import org.testng.annotations.Test;
import org.junit.Ignore;
import java.io.File; import java.io.File;
import java.io.IOException; import java.io.IOException;
import java.net.URL; import java.net.URL;
...@@ -59,7 +59,7 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -59,7 +59,7 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest {
private String originalConf; private String originalConf;
private String originalHomeDir; private String originalHomeDir;
@BeforeClass //@BeforeClass
public void setUp() throws Exception { public void setUp() throws Exception {
jksPath = new Path(Files.createTempDirectory("tempproviders").toString(), "test.jks"); jksPath = new Path(Files.createTempDirectory("tempproviders").toString(), "test.jks");
providerUrl = JavaKeyStoreProvider.SCHEME_NAME + "://file/" + jksPath.toUri(); providerUrl = JavaKeyStoreProvider.SCHEME_NAME + "://file/" + jksPath.toUri();
...@@ -103,7 +103,6 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -103,7 +103,6 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest {
+ "/users-credentials"); + "/users-credentials");
configuration.setProperty("atlas.auth.policy.file",persistDir configuration.setProperty("atlas.auth.policy.file",persistDir
+ "/policy-store.txt" ); + "/policy-store.txt" );
TestUtils.writeConfiguration(configuration, persistDir + File.separator + TestUtils.writeConfiguration(configuration, persistDir + File.separator +
"atlas-application.properties"); "atlas-application.properties");
...@@ -140,7 +139,7 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -140,7 +139,7 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest {
secureEmbeddedServer.getServer().start(); secureEmbeddedServer.getServer().start();
} }
@AfterClass //@AfterClass
public void tearDown() throws Exception { public void tearDown() throws Exception {
if (secureEmbeddedServer != null) { if (secureEmbeddedServer != null) {
secureEmbeddedServer.getServer().stop(); secureEmbeddedServer.getServer().stop();
...@@ -181,7 +180,7 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest { ...@@ -181,7 +180,7 @@ public class SSLAndKerberosTest extends BaseSSLAndKerberosTest {
return lc.getSubject(); return lc.getSubject();
} }
@Test @Test(enabled = false)
public void testService() throws Exception { public void testService() throws Exception {
dgiCLient.listTypes(); dgiCLient.listTypes();
} }
......
...@@ -68,7 +68,7 @@ public class SSLTest extends BaseSSLAndKerberosTest { ...@@ -68,7 +68,7 @@ public class SSLTest extends BaseSSLAndKerberosTest {
} }
} }
@BeforeClass //@BeforeClass
public void setUp() throws Exception { public void setUp() throws Exception {
jksPath = new Path(Files.createTempDirectory("tempproviders").toString(), "test.jks"); jksPath = new Path(Files.createTempDirectory("tempproviders").toString(), "test.jks");
providerUrl = JavaKeyStoreProvider.SCHEME_NAME + "://file/" + jksPath.toUri(); providerUrl = JavaKeyStoreProvider.SCHEME_NAME + "://file/" + jksPath.toUri();
...@@ -95,7 +95,7 @@ public class SSLTest extends BaseSSLAndKerberosTest { ...@@ -95,7 +95,7 @@ public class SSLTest extends BaseSSLAndKerberosTest {
secureEmbeddedServer.getServer().start(); secureEmbeddedServer.getServer().start();
} }
@AfterClass //@AfterClass
public void tearDown() throws Exception { public void tearDown() throws Exception {
if (secureEmbeddedServer != null) { if (secureEmbeddedServer != null) {
secureEmbeddedServer.getServer().stop(); secureEmbeddedServer.getServer().stop();
...@@ -142,7 +142,7 @@ public class SSLTest extends BaseSSLAndKerberosTest { ...@@ -142,7 +142,7 @@ public class SSLTest extends BaseSSLAndKerberosTest {
} }
} }
@Test //@Test
public void testService() throws Exception { public void testService() throws Exception {
atlasClient.listTypes(); atlasClient.listTypes();
} }
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment