diff options
author | Bjørn Christian Seime <bjorncs@verizonmedia.com> | 2021-03-18 14:53:14 +0100 |
---|---|---|
committer | Bjørn Christian Seime <bjorncs@verizonmedia.com> | 2021-03-18 14:53:14 +0100 |
commit | a66ebb8e7ade065d2fe78169301f1989da2001b4 (patch) | |
tree | 60a78e17893ff65cd19703823d03e97aca825bc3 /zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo | |
parent | 85ad07ca7b5a1625048155ee3d55dffcd4da38c5 (diff) |
Another attempt at configuring secure only client port on ZK server
ZK dynamic reconfiguration logic assumes that insecure client port exists.
This commit introduces a new connection factory that overrides 'secure'
flag from configure() and makes the insecure client port become secure.
Diffstat (limited to 'zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo')
-rw-r--r-- | zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo/vespa/zookeeper/ConfiguratorTest.java | 30 |
1 files changed, 10 insertions, 20 deletions
diff --git a/zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo/vespa/zookeeper/ConfiguratorTest.java b/zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo/vespa/zookeeper/ConfiguratorTest.java index f0d3df43c4e..47fed6fceac 100644 --- a/zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo/vespa/zookeeper/ConfiguratorTest.java +++ b/zookeeper-server/zookeeper-server-common/src/test/java/com/yahoo/vespa/zookeeper/ConfiguratorTest.java @@ -171,7 +171,7 @@ public class ConfiguratorTest { "autopurge.snapRetainCount=15\n" + "4lw.commands.whitelist=conf,cons,crst,dirs,dump,envi,mntr,ruok,srst,srvr,stat,wchs\n" + "admin.enableServer=false\n" + - "serverCnxnFactory=org.apache.zookeeper.server.NettyServerCnxnFactory\n" + + "serverCnxnFactory=org.apache.zookeeper.server.VespaNettyServerCnxnFactory\n" + "quorumListenOnAllIPs=true\n" + "standaloneEnabled=false\n" + "reconfigEnabled=true\n" + @@ -181,12 +181,10 @@ public class ConfiguratorTest { private void validateConfigFileSingleHost(File cfgFile) { String expected = commonConfig() + - "server.0=foo:321:123\n" + + "server.0=foo:321:123;2181\n" + "sslQuorum=false\n" + "portUnification=false\n" + - "client.portUnification=false\n" + - "clientPort=2181\n" + - "secureClientPort=0\n"; + "client.portUnification=false\n"; validateConfigFile(cfgFile, expected); } @@ -209,27 +207,23 @@ public class ConfiguratorTest { private void validateConfigFileMultipleHosts(File cfgFile) { String expected = commonConfig() + - "server.0=foo:321:123\n" + - "server.1=bar:432:234\n" + - "server.2=baz:543:345:observer\n" + + "server.0=foo:321:123;2181\n" + + "server.1=bar:432:234;2181\n" + + "server.2=baz:543:345:observer;2181\n" + "sslQuorum=false\n" + "portUnification=false\n" + - "client.portUnification=false\n" + - "clientPort=2181\n" + - "secureClientPort=0\n"; + "client.portUnification=false\n"; validateConfigFile(cfgFile, expected); } private void validateConfigFilePortUnification(File cfgFile) { String expected = commonConfig() + - "server.0=foo:321:123\n" + + "server.0=foo:321:123;2181\n" + "sslQuorum=false\n" + "portUnification=true\n" + tlsQuorumConfig() + "client.portUnification=true\n" + - "clientPort=2181\n" + - "secureClientPort=0\n" + tlsClientServerConfig(); validateConfigFile(cfgFile, expected); } @@ -237,13 +231,11 @@ public class ConfiguratorTest { private void validateConfigFileTlsWithPortUnification(File cfgFile) { String expected = commonConfig() + - "server.0=foo:321:123\n" + + "server.0=foo:321:123;2181\n" + "sslQuorum=true\n" + "portUnification=true\n" + tlsQuorumConfig() + "client.portUnification=true\n" + - "clientPort=2181\n" + - "secureClientPort=0\n" + tlsClientServerConfig(); validateConfigFile(cfgFile, expected); } @@ -251,13 +243,11 @@ public class ConfiguratorTest { private void validateConfigFileTlsOnly(File cfgFile) { String expected = commonConfig() + - "server.0=foo:321:123\n" + + "server.0=foo:321:123;2181\n" + "sslQuorum=true\n" + "portUnification=false\n" + tlsQuorumConfig() + "client.portUnification=false\n" + - "clientPort=0\n" + - "secureClientPort=2181\n" + tlsClientServerConfig(); validateConfigFile(cfgFile, expected); } |