@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = String.valueOf(Integer.parseInt(zkTimeout) * 15); assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); SecurityProtocol securityProtocol = config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT; for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = String.valueOf(Integer.parseInt(zkTimeout) * 15); assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); SecurityProtocol securityProtocol = config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT; for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = String.valueOf(Integer.parseInt(zkTimeout) * 15); assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); SecurityProtocol securityProtocol = config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT; for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = zkTimeout * 15; assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); ListenerName listenerName = ListenerName.forSecurityProtocol(config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT); for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = zkTimeout * 15; assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); ListenerName listenerName = ListenerName.forSecurityProtocol(config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT); for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = zkTimeout * 15; assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); ListenerName listenerName = ListenerName.forSecurityProtocol(config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT); for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = zkTimeout * 15; assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); ListenerName listenerName = ListenerName.forSecurityProtocol(config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT); for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = zkTimeout * 15; assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); ListenerName listenerName = ListenerName.forSecurityProtocol(config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT); for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
if (config.getKafkaServerProperties() != null) { kafkaProperties.putAll(config.getKafkaServerProperties()); kafkaProperties.put("port", Integer.toString(kafkaPort)); if (config.isHideKafkaBehindProxy()) { NetworkFailuresProxy proxy = createProxy(KAFKA_HOST, kafkaPort); kafkaProperties.put("advertised.port", proxy.getLocalPort()); if (config.isSecureMode()) { LOG.info("Adding Kafka secure configurations"); kafkaProperties.put("listeners", "SASL_PLAINTEXT://" + KAFKA_HOST + ":" + kafkaPort);
@Override public void prepare(Config config) { if (config.isSecureMode()) { config.setKafkaServersNumber(1); zkTimeout = zkTimeout * 15; assertTrue("cannot create kafka temp dir", tmpKafkaParent.mkdirs()); tmpKafkaDirs = new ArrayList<>(config.getKafkaServersNumber()); for (int i = 0; i < config.getKafkaServersNumber(); i++) { File tmpDir = new File(tmpKafkaParent, "server-" + i); assertTrue("cannot create kafka temp dir", tmpDir.mkdir()); brokers = new ArrayList<>(config.getKafkaServersNumber()); ListenerName listenerName = ListenerName.forSecurityProtocol(config.isSecureMode() ? SecurityProtocol.SASL_PLAINTEXT : SecurityProtocol.PLAINTEXT); for (int i = 0; i < config.getKafkaServersNumber(); i++) { KafkaServer kafkaServer = getKafkaServer(i, tmpKafkaDirs.get(i)); brokers.add(kafkaServer);
@Override public Properties getSecureProperties() { Properties prop = new Properties(); if (config.isSecureMode()) { prop.put("security.inter.broker.protocol", "SASL_PLAINTEXT"); prop.put("security.protocol", "SASL_PLAINTEXT"); prop.put("sasl.kerberos.service.name", "kafka"); //add special timeout for Travis prop.setProperty("zookeeper.session.timeout.ms", String.valueOf(zkTimeout)); prop.setProperty("zookeeper.connection.timeout.ms", String.valueOf(zkTimeout)); prop.setProperty("metadata.fetch.timeout.ms", "120000"); } return prop; }
@Override public Properties getSecureProperties() { Properties prop = new Properties(); if (config.isSecureMode()) { prop.put("security.inter.broker.protocol", "SASL_PLAINTEXT"); prop.put("security.protocol", "SASL_PLAINTEXT"); prop.put("sasl.kerberos.service.name", "kafka"); //add special timeout for Travis prop.setProperty("zookeeper.session.timeout.ms", String.valueOf(zkTimeout)); prop.setProperty("zookeeper.connection.timeout.ms", String.valueOf(zkTimeout)); prop.setProperty("metadata.fetch.timeout.ms", "120000"); } return prop; }