From 47bb93cfd79d0dda5305f1560b9c72ec7e505a90 Mon Sep 17 00:00:00 2001 From: Aneesh Garg <105221361+AnGg98@users.noreply.github.com> Date: Fri, 3 Jun 2022 21:20:49 +0530 Subject: [PATCH] MINOR: Replace ACL_AUTHORIZER attribute with ZK_ACL_AUTHORIZER (#12247) Replace ACL_AUTHORIZER attribute with ZK_ACL_AUTHORIZER in system tests. Required after the changes merged with https://github.com/apache/kafka/pull/12190. Reviewers: David Jacot --- tests/kafkatest/tests/core/security_rolling_upgrade_test.py | 2 +- tests/kafkatest/tests/core/zookeeper_security_upgrade_test.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/tests/kafkatest/tests/core/security_rolling_upgrade_test.py b/tests/kafkatest/tests/core/security_rolling_upgrade_test.py index aa60878dac2..571f8241a89 100644 --- a/tests/kafkatest/tests/core/security_rolling_upgrade_test.py +++ b/tests/kafkatest/tests/core/security_rolling_upgrade_test.py @@ -71,7 +71,7 @@ class TestSecurityRollingUpgrade(ProduceConsumeValidateTest): self.set_authorizer_and_bounce(client_protocol, broker_protocol) def set_authorizer_and_bounce(self, client_protocol, broker_protocol): - self.kafka.authorizer_class_name = KafkaService.ACL_AUTHORIZER + self.kafka.authorizer_class_name = KafkaService.ZK_ACL_AUTHORIZER # Force use of direct ZooKeeper access due to SecurityDisabledException: No Authorizer is configured on the broker. self.acls.set_acls(client_protocol, self.kafka, self.topic, self.group, force_use_zk_connection=True) self.acls.set_acls(broker_protocol, self.kafka, self.topic, self.group, force_use_zk_connection=True) diff --git a/tests/kafkatest/tests/core/zookeeper_security_upgrade_test.py b/tests/kafkatest/tests/core/zookeeper_security_upgrade_test.py index 241c3819b79..ea1b61bd57f 100644 --- a/tests/kafkatest/tests/core/zookeeper_security_upgrade_test.py +++ b/tests/kafkatest/tests/core/zookeeper_security_upgrade_test.py @@ -95,7 +95,7 @@ class ZooKeeperSecurityUpgradeTest(ProduceConsumeValidateTest): # set acls if self.is_secure: - self.kafka.authorizer_class_name = KafkaService.ACL_AUTHORIZER + self.kafka.authorizer_class_name = KafkaService.ZK_ACL_AUTHORIZER # Force use of direct ZooKeeper access because Kafka is not yet started self.acls.set_acls(security_protocol, self.kafka, self.topic, self.group, force_use_zk_connection=True, additional_cluster_operations_to_grant=['Create'])