@@ -32,6 +32,7 @@ def setup_module(module):
32
32
utils .require_hdfs ()
33
33
utils .require_spark ()
34
34
utils .upload_file (os .environ ["SCALA_TEST_JAR_PATH" ])
35
+ shakedown .run_dcos_command ('package install --cli dcos-enterprise-cli --yes' )
35
36
36
37
37
38
def teardown_module (module ):
@@ -299,11 +300,12 @@ def test_marathon_group():
299
300
300
301
301
302
@pytest .mark .sanity
303
+ @pytest .mark .secrets
302
304
def test_secrets ():
303
305
properties_file_path = os .path .join (THIS_DIR , "resources" , "secrets-opts.txt" )
304
- secrets_handler = utils . SecretHandler ( SECRET_NAME , SECRET_CONTENTS )
305
- r = secrets_handler . create_secret ( )
306
- assert r . ok , "Error creating secret, {}" . format ( r . content )
306
+ # Create secret
307
+ shakedown . run_dcos_command ( 'security secrets create /{} --value {}' . format ( SECRET_NAME , SECRET_CONTENTS ) )
308
+
307
309
secret_file_name = "secret_file"
308
310
output = "Contents of file {}: {}" .format (secret_file_name , SECRET_CONTENTS )
309
311
args = ["--properties-file" , properties_file_path ,
@@ -313,9 +315,9 @@ def test_secrets():
313
315
expected_output = output ,
314
316
app_name = "/spark" ,
315
317
args = args )
316
- r = secrets_handler . delete_secret ()
317
- if not r . ok :
318
- LOGGER . warn ( "Error when deleting secret, {}" .format (r . content ))
318
+
319
+ # Delete secret
320
+ shakedown . run_dcos_command ( 'security secrets delete /{}' .format (SECRET_NAME ))
319
321
320
322
321
323
# Skip DC/OS < 1.10, because it doesn't have support for file-based secrets.
@@ -328,7 +330,6 @@ def test_driver_executor_tls():
328
330
Put keystore and truststore as secrets in DC/OS secret store.
329
331
Run SparkPi job with TLS enabled, referencing those secrets.
330
332
'''
331
- shakedown .run_dcos_command ('package install --cli dcos-enterprise-cli --yes' )
332
333
resources_folder = os .path .join (
333
334
os .path .dirname (os .path .realpath (__file__ )), 'resources'
334
335
)
@@ -363,6 +364,8 @@ def test_driver_executor_tls():
363
364
"--conf" , "spark.mesos.executor.secret.filenames={},{}" .format (keystore_file , truststore_file ),
364
365
"--conf" , "spark.mesos.task.labels=DCOS_SPACE:/spark"
365
366
])
367
+ shakedown .run_dcos_command ('security secrets delete /{}' .format (keystore_secret ))
368
+ shakedown .run_dcos_command ('security secrets delete /{}' .format (truststore_secret ))
366
369
367
370
368
371
def _run_janitor (service_name ):
0 commit comments