HDFS-7115. TestEncryptionZones assumes Unix path separator for KMS key store path. Contributed by Xiaoyu Yao.
(cherry picked from commit 26cba7f35f
)
This commit is contained in:
parent
f4534746fb
commit
39bcc57c3e
|
@ -575,6 +575,9 @@ Release 2.6.0 - UNRELEASED
|
||||||
HDFS-7110. Skip tests related to short-circuit read on platforms that do not
|
HDFS-7110. Skip tests related to short-circuit read on platforms that do not
|
||||||
currently implement short-circuit read. (cnauroth)
|
currently implement short-circuit read. (cnauroth)
|
||||||
|
|
||||||
|
HDFS-7115. TestEncryptionZones assumes Unix path separator for KMS key store
|
||||||
|
path. (Xiaoyu Yao via cnauroth)
|
||||||
|
|
||||||
Release 2.5.1 - 2014-09-05
|
Release 2.5.1 - 2014-09-05
|
||||||
|
|
||||||
INCOMPATIBLE CHANGES
|
INCOMPATIBLE CHANGES
|
||||||
|
|
|
@ -116,8 +116,8 @@ public class TestEncryptionZones {
|
||||||
protected FileContextTestWrapper fcWrapper;
|
protected FileContextTestWrapper fcWrapper;
|
||||||
|
|
||||||
protected String getKeyProviderURI() {
|
protected String getKeyProviderURI() {
|
||||||
return JavaKeyStoreProvider.SCHEME_NAME + "://file" + testRootDir +
|
return JavaKeyStoreProvider.SCHEME_NAME + "://file" +
|
||||||
"/test.jks";
|
new Path(testRootDir.toString(), "test.jks").toUri();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
|
@ -1043,7 +1043,7 @@ public class TestEncryptionZones {
|
||||||
dfsAdmin.createEncryptionZone(zone, TEST_KEY);
|
dfsAdmin.createEncryptionZone(zone, TEST_KEY);
|
||||||
DFSTestUtil.createFile(fs, zoneFile, len, (short) 1, 0xFEED);
|
DFSTestUtil.createFile(fs, zoneFile, len, (short) 1, 0xFEED);
|
||||||
String contents = DFSTestUtil.readFile(fs, zoneFile);
|
String contents = DFSTestUtil.readFile(fs, zoneFile);
|
||||||
final Path snap1 = fs.createSnapshot(zoneParent);
|
final Path snap1 = fs.createSnapshot(zoneParent, "snap1");
|
||||||
final Path snap1Zone = new Path(snap1, zone.getName());
|
final Path snap1Zone = new Path(snap1, zone.getName());
|
||||||
assertEquals("Got unexpected ez path", zone.toString(),
|
assertEquals("Got unexpected ez path", zone.toString(),
|
||||||
dfsAdmin.getEncryptionZoneForPath(snap1Zone).getPath().toString());
|
dfsAdmin.getEncryptionZoneForPath(snap1Zone).getPath().toString());
|
||||||
|
@ -1052,14 +1052,14 @@ public class TestEncryptionZones {
|
||||||
// snapshot
|
// snapshot
|
||||||
fsWrapper.delete(zone, true);
|
fsWrapper.delete(zone, true);
|
||||||
fsWrapper.mkdir(zone, FsPermission.getDirDefault(), true);
|
fsWrapper.mkdir(zone, FsPermission.getDirDefault(), true);
|
||||||
final Path snap2 = fs.createSnapshot(zoneParent);
|
final Path snap2 = fs.createSnapshot(zoneParent, "snap2");
|
||||||
final Path snap2Zone = new Path(snap2, zone.getName());
|
final Path snap2Zone = new Path(snap2, zone.getName());
|
||||||
assertNull("Expected null ez path",
|
assertNull("Expected null ez path",
|
||||||
dfsAdmin.getEncryptionZoneForPath(snap2Zone));
|
dfsAdmin.getEncryptionZoneForPath(snap2Zone));
|
||||||
|
|
||||||
// Create the encryption zone again
|
// Create the encryption zone again
|
||||||
dfsAdmin.createEncryptionZone(zone, TEST_KEY2);
|
dfsAdmin.createEncryptionZone(zone, TEST_KEY2);
|
||||||
final Path snap3 = fs.createSnapshot(zoneParent);
|
final Path snap3 = fs.createSnapshot(zoneParent, "snap3");
|
||||||
final Path snap3Zone = new Path(snap3, zone.getName());
|
final Path snap3Zone = new Path(snap3, zone.getName());
|
||||||
// Check that snap3's EZ has the correct settings
|
// Check that snap3's EZ has the correct settings
|
||||||
EncryptionZone ezSnap3 = dfsAdmin.getEncryptionZoneForPath(snap3Zone);
|
EncryptionZone ezSnap3 = dfsAdmin.getEncryptionZoneForPath(snap3Zone);
|
||||||
|
|
Loading…
Reference in New Issue