|
35 | 35 | import java.util.Collection;
|
36 | 36 | import java.util.EnumSet;
|
37 | 37 | import java.util.List;
|
38 |
| -import java.util.Map; |
39 | 38 | import java.util.concurrent.Callable;
|
40 | 39 | import java.util.concurrent.CountDownLatch;
|
41 | 40 | import java.util.concurrent.ExecutionException;
|
|
61 | 60 | import org.apache.hadoop.fs.FileSystem;
|
62 | 61 | import org.apache.hadoop.fs.FileSystemTestHelper;
|
63 | 62 | import org.apache.hadoop.fs.FileSystemTestWrapper;
|
64 |
| -import org.apache.hadoop.fs.FileUtil; |
65 | 63 | import org.apache.hadoop.fs.FsServerDefaults;
|
66 | 64 | import org.apache.hadoop.fs.FsShell;
|
67 | 65 | import org.apache.hadoop.fs.Path;
|
@@ -326,72 +324,6 @@ public Object run() throws Exception {
|
326 | 324 | });
|
327 | 325 | }
|
328 | 326 |
|
329 |
| - /** |
330 |
| - * Tests encrypted files with same original content placed in two different |
331 |
| - * EZ are not same in encrypted form. |
332 |
| - */ |
333 |
| - @Test |
334 |
| - public void testEncryptionZonesDictCp() throws Exception { |
335 |
| - final String testkey1 = "testkey1"; |
336 |
| - final String testkey2 = "testkey2"; |
337 |
| - DFSTestUtil.createKey(testkey1, cluster, conf); |
338 |
| - DFSTestUtil.createKey(testkey2, cluster, conf); |
339 |
| - |
340 |
| - final int len = 8196; |
341 |
| - final Path zone1 = new Path("/zone1"); |
342 |
| - final Path zone1File = new Path(zone1, "file"); |
343 |
| - final Path raw1File = new Path("/.reserved/raw/zone1/file"); |
344 |
| - |
345 |
| - final Path zone2 = new Path("/zone2"); |
346 |
| - final Path zone2File = new Path(zone2, "file"); |
347 |
| - final Path raw2File = new Path(zone2, "/.reserved/raw/zone2/file"); |
348 |
| - |
349 |
| - // 1. Create two encrypted zones |
350 |
| - fs.mkdirs(zone1, new FsPermission(700)); |
351 |
| - dfsAdmin.createEncryptionZone(zone1, testkey1, NO_TRASH); |
352 |
| - |
353 |
| - fs.mkdirs(zone2, new FsPermission(700)); |
354 |
| - dfsAdmin.createEncryptionZone(zone2, testkey2, NO_TRASH); |
355 |
| - |
356 |
| - // 2. Create a file in one of the zones |
357 |
| - DFSTestUtil.createFile(fs, zone1File, len, (short) 1, 0xFEED); |
358 |
| - // 3. Copy it to the other zone through /.raw/reserved |
359 |
| - FileUtil.copy(fs, raw1File, fs, raw2File, false, conf); |
360 |
| - Map<String, byte[]> attrs = fs.getXAttrs(raw1File); |
361 |
| - if (attrs != null) { |
362 |
| - for (Map.Entry<String, byte[]> entry : attrs.entrySet()) { |
363 |
| - String xattrName = entry.getKey(); |
364 |
| - |
365 |
| - try { |
366 |
| - fs.setXAttr(raw2File, xattrName, entry.getValue()); |
367 |
| - fail("Exception should be thrown while setting: " + |
368 |
| - xattrName + " on file:" + raw2File); |
369 |
| - } catch (RemoteException e) { |
370 |
| - Assert.assertEquals(e.getClassName(), |
371 |
| - IllegalArgumentException.class.getCanonicalName()); |
372 |
| - Assert.assertTrue(e.getMessage(). |
373 |
| - contains("does not belong to the key")); |
374 |
| - } |
375 |
| - } |
376 |
| - } |
377 |
| - |
378 |
| - assertEquals("File can be created on the root encryption zone " + |
379 |
| - "with correct length", len, fs.getFileStatus(zone1File).getLen()); |
380 |
| - assertTrue("/zone1 dir is encrypted", |
381 |
| - fs.getFileStatus(zone1).isEncrypted()); |
382 |
| - assertTrue("File is encrypted", fs.getFileStatus(zone1File).isEncrypted()); |
383 |
| - |
384 |
| - assertTrue("/zone2 dir is encrypted", |
385 |
| - fs.getFileStatus(zone2).isEncrypted()); |
386 |
| - assertTrue("File is encrypted", fs.getFileStatus(zone2File).isEncrypted()); |
387 |
| - |
388 |
| - // 4. Now the decrypted contents of the files should be different. |
389 |
| - DFSTestUtil.verifyFilesNotEqual(fs, zone1File, zone2File, len); |
390 |
| - |
391 |
| - // 5. Encrypted contents of the files should be same. |
392 |
| - DFSTestUtil.verifyFilesEqual(fs, raw1File, raw2File, len); |
393 |
| - } |
394 |
| - |
395 | 327 | /**
|
396 | 328 | * Make sure hdfs crypto -provisionTrash command creates a trash directory
|
397 | 329 | * with sticky bits.
|
|
0 commit comments