ClickHouse/tests/integration/helpers/hdfs_api.py

176 lines
7.8 KiB
Python
Raw Normal View History

# -*- coding: utf-8 -*-
2020-10-02 16:54:07 +00:00
import io
import gzip
import subprocess
2020-09-10 10:02:46 +00:00
import time
from tempfile import NamedTemporaryFile
import requests
2020-09-10 10:02:46 +00:00
import requests_kerberos as reqkerb
import socket
import tempfile
import logging
import os
class mk_krb_conf(object):
def __init__(self, krb_conf, kdc_ip):
self.krb_conf = krb_conf
self.kdc_ip = kdc_ip
self.amended_krb_conf = None
def __enter__(self):
with open(self.krb_conf) as f:
content = f.read()
amended_content = content.replace('hdfskerberos', self.kdc_ip)
self.amended_krb_conf = tempfile.NamedTemporaryFile(delete=False, mode="w+")
2020-09-10 10:02:46 +00:00
self.amended_krb_conf.write(amended_content)
self.amended_krb_conf.close()
return self.amended_krb_conf.name
def __exit__(self, type, value, traceback):
if self.amended_krb_conf is not None:
self.amended_krb_conf.close()
class HDFSApi(object):
2020-09-10 10:02:46 +00:00
def __init__(self, user, timeout=100, kerberized=False, principal=None,
keytab=None, krb_conf=None,
host = "localhost", protocol = "http",
proxy_port = 50070, data_port = 50075, hdfs_ip = None, kdc_ip = None):
2020-09-10 10:02:46 +00:00
self.host = host
self.protocol = protocol
self.proxy_port = proxy_port
self.data_port = data_port
self.user = user
2020-09-10 10:02:46 +00:00
self.kerberized = kerberized
self.principal = principal
self.keytab = keytab
self.timeout = timeout
self.hdfs_ip = hdfs_ip
self.kdc_ip = kdc_ip
self.krb_conf = krb_conf
# logging.basicConfig(level=logging.DEBUG)
# logging.getLogger().setLevel(logging.DEBUG)
2021-02-19 12:58:11 +00:00
requests_log = logging.getLogger("requests.packages.urllib3")
requests_log.setLevel(logging.DEBUG)
requests_log.propagate = True
2021-02-19 14:42:43 +00:00
kerb_log = logging.getLogger("requests_kerberos")
kerb_log.setLevel(logging.DEBUG)
kerb_log.propagate = True
2020-09-10 10:02:46 +00:00
if kerberized:
self._run_kinit()
2021-02-19 15:39:27 +00:00
self.kerberos_auth = reqkerb.HTTPKerberosAuth(mutual_authentication=reqkerb.DISABLED, hostname_override="kerberizedhdfs1", principal=self.principal)
#principal=self.principal,
2020-09-10 10:02:46 +00:00
#hostname_override=self.host, principal=self.principal)
# , mutual_authentication=reqkerb.REQUIRED, force_preemptive=True)
else:
self.kerberos_auth = None
def _run_kinit(self):
if self.principal is None or self.keytab is None:
raise Exception("kerberos principal and keytab are required")
with mk_krb_conf(self.krb_conf, self.kdc_ip) as instantiated_krb_conf:
2021-02-19 14:42:43 +00:00
logging.debug("instantiated_krb_conf {}".format(instantiated_krb_conf))
2020-09-10 10:02:46 +00:00
os.environ["KRB5_CONFIG"] = instantiated_krb_conf
cmd = "(kinit -R -t {keytab} -k {principal} || (sleep 5 && kinit -R -t {keytab} -k {principal})) ; klist".format(instantiated_krb_conf=instantiated_krb_conf, keytab=self.keytab, principal=self.principal)
2020-09-10 10:02:46 +00:00
start = time.time()
while time.time() - start < self.timeout:
try:
2021-02-19 14:42:43 +00:00
res = subprocess.run(cmd, shell=True)
if res.returncode != 0:
# check_call(...) from subprocess does not print stderr, so we do it manually
logging.debug('Stderr:\n{}\n'.format(res.stderr.decode('utf-8')))
logging.debug('Stdout:\n{}\n'.format(res.stdout.decode('utf-8')))
logging.debug('Env:\n{}\n'.format(env))
raise Exception('Command {} return non-zero code {}: {}'.format(args, res.returncode, res.stderr.decode('utf-8')))
logging.debug("KDC started, kinit successfully run")
2020-09-10 10:02:46 +00:00
return
except Exception as ex:
2021-02-19 14:42:43 +00:00
logging.debug("Can't run kinit ... waiting {}".format(str(ex)))
2020-09-10 10:02:46 +00:00
time.sleep(1)
raise Exception("Kinit running failure")
2020-10-02 16:54:07 +00:00
def read_data(self, path, universal_newlines=True):
2021-02-19 12:58:11 +00:00
logging.debug("read_data protocol:{} host:{} port:{} path: {}".format(self.protocol, self.host, self.proxy_port, path))
response = requests.get("{protocol}://{host}:{port}/webhdfs/v1{path}?op=OPEN".format(protocol=self.protocol, host=self.host, port=self.proxy_port, path=path), headers={'host': 'localhost'}, allow_redirects=False, verify=False, auth=self.kerberos_auth)
if response.status_code != 307:
response.raise_for_status()
# additional_params = '&'.join(response.headers['Location'].split('&')[1:2])
2021-02-19 14:42:43 +00:00
location = None
if self.kerberized:
location = response.headers['Location'].replace("kerberizedhdfs1:1006", "{}:{}".format(self.host, self.data_port))
else:
location = response.headers['Location'].replace("hdfs1:50075", "{}:{}".format(self.host, self.data_port))
logging.debug("redirected to {}".format(location))
2021-02-19 15:39:27 +00:00
2021-02-19 14:42:43 +00:00
response_data = requests.get(location, headers={'host': 'localhost'},
2021-02-19 12:58:11 +00:00
verify=False, auth=self.kerberos_auth)
if response_data.status_code != 200:
response_data.raise_for_status()
2020-10-02 16:54:07 +00:00
if universal_newlines:
return response_data.text
else:
return response_data.content
def write_data(self, path, content):
2021-02-19 15:08:38 +00:00
logging.debug("write_data protocol:{} host:{} port:{} path: {} user:{}, principal:{}".format(
self.protocol, self.host, self.proxy_port, path, self.user, self.principal))
2020-10-02 16:54:07 +00:00
named_file = NamedTemporaryFile(mode='wb+')
fpath = named_file.name
2020-10-02 16:54:07 +00:00
if isinstance(content, str):
content = content.encode()
named_file.write(content)
named_file.flush()
2021-02-19 12:58:11 +00:00
response = requests.put(
"{protocol}://{host}:{port}/webhdfs/v1{path}?op=CREATE".format(protocol=self.protocol, host='localhost',
port=self.proxy_port,
path=path, user=self.user),
allow_redirects=False,
headers={'host': 'localhost'},
params={'overwrite' : 'true'},
verify=False, auth=self.kerberos_auth
)
logging.debug("HDFS api response:{}".format(response.headers))
if response.status_code != 307:
response.raise_for_status()
2021-02-19 12:58:11 +00:00
# additional_params = '&'.join(
# response.headers['Location'].split('&')[1:2] + ["user.name={}".format(self.user), "overwrite=true"])
2021-02-19 14:42:43 +00:00
if self.kerberized:
location = response.headers['Location'].replace("kerberizedhdfs1:1006", "{}:{}".format(self.host, self.data_port))
else:
location = response.headers['Location'].replace("hdfs1:50075", "{}:{}".format(self.host, self.data_port))
2021-02-19 12:58:11 +00:00
with open(fpath, mode="rb") as fh:
file_data = fh.read()
protocol = "http" # self.protocol
response = requests.put(
2021-02-19 12:58:11 +00:00
"{location}".format(location=location),
data=file_data,
headers={'content-type':'text/plain', 'host': 'localhost'},
params={'file': path, 'user.name' : self.user},
allow_redirects=False, verify=False, auth=self.kerberos_auth
)
2021-02-19 12:58:11 +00:00
logging.debug(response)
if response.status_code != 201:
response.raise_for_status()
2020-09-10 10:02:46 +00:00
def write_gzip_data(self, path, content):
2020-10-02 16:54:07 +00:00
if isinstance(content, str):
content = content.encode()
out = io.BytesIO()
with gzip.GzipFile(fileobj=out, mode="wb") as f:
f.write(content)
self.write_data(path, out.getvalue())
def read_gzip_data(self, path):
2020-10-02 16:54:07 +00:00
return gzip.GzipFile(fileobj=io.BytesIO(self.read_data(path, universal_newlines=False))).read().decode()