From 0499907466e78a5b674ac72a5503af892adc348f Mon Sep 17 00:00:00 2001 From: Zhe Zhang Date: Mon, 6 Jun 2016 15:52:39 -0700 Subject: [PATCH] HDFS-10458. getFileEncryptionInfo should return quickly for non-encrypted cluster. (cherry picked from commit 6de9213df111a9a4ed875db995d67af72d08a798) (cherry picked from commit 06e38c835d0ad9619d4bea662f2dd7d0f62007a9) --- .../namenode/EncryptionZoneManager.java | 36 ++++++++++++++++--- .../namenode/FSDirEncryptionZoneOp.java | 2 +- 2 files changed, 32 insertions(+), 6 deletions(-) diff --git a/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/EncryptionZoneManager.java b/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/EncryptionZoneManager.java index 8454c0411c6..e29d4206c50 100644 --- a/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/EncryptionZoneManager.java +++ b/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/EncryptionZoneManager.java @@ -95,7 +95,7 @@ public class EncryptionZoneManager { } } - private final TreeMap encryptionZones; + private TreeMap encryptionZones = null; private final FSDirectory dir; private final int maxListEncryptionZonesResponses; @@ -106,7 +106,6 @@ public class EncryptionZoneManager { */ public EncryptionZoneManager(FSDirectory dir, Configuration conf) { this.dir = dir; - encryptionZones = new TreeMap(); maxListEncryptionZonesResponses = conf.getInt( DFSConfigKeys.DFS_NAMENODE_LIST_ENCRYPTION_ZONES_NUM_RESPONSES, DFSConfigKeys.DFS_NAMENODE_LIST_ENCRYPTION_ZONES_NUM_RESPONSES_DEFAULT @@ -143,6 +142,9 @@ public class EncryptionZoneManager { CipherSuite suite, CryptoProtocolVersion version, String keyName) { final EncryptionZoneInt ez = new EncryptionZoneInt( inodeId, suite, version, keyName); + if (encryptionZones == null) { + encryptionZones = new TreeMap<>(); + } encryptionZones.put(inodeId, ez); } @@ -153,7 +155,9 @@ public class EncryptionZoneManager { */ void removeEncryptionZone(Long inodeId) { assert dir.hasWriteLock(); - encryptionZones.remove(inodeId); + if (hasCreatedEncryptionZone()) { + encryptionZones.remove(inodeId); + } } /** @@ -201,6 +205,9 @@ public class EncryptionZoneManager { private EncryptionZoneInt getEncryptionZoneForPath(INodesInPath iip) { assert dir.hasReadLock(); Preconditions.checkNotNull(iip); + if (!hasCreatedEncryptionZone()) { + return null; + } List inodes = iip.getReadOnlyINodes(); for (int i = inodes.size() - 1; i >= 0; i--) { final INode inode = inodes.get(i); @@ -313,7 +320,8 @@ public class EncryptionZoneManager { throw new IOException("Attempt to create an encryption zone for a file."); } - if (encryptionZones.get(srcINode.getId()) != null) { + if (hasCreatedEncryptionZone() && encryptionZones. + get(srcINode.getId()) != null) { throw new IOException("Directory " + src + " is already an encryption " + "zone."); } @@ -340,6 +348,10 @@ public class EncryptionZoneManager { BatchedListEntries listEncryptionZones(long prevId) throws IOException { assert dir.hasReadLock(); + if (!hasCreatedEncryptionZone()) { + final List emptyZones = Lists.newArrayList(); + return new BatchedListEntries(emptyZones, false); + } NavigableMap tailMap = encryptionZones.tailMap (prevId, false); final int numResponses = Math.min(maxListEncryptionZonesResponses, @@ -379,7 +391,18 @@ public class EncryptionZoneManager { * @return number of encryption zones. */ public int getNumEncryptionZones() { - return encryptionZones.size(); + return hasCreatedEncryptionZone() ? + encryptionZones.size() : 0; + } + + /** + * @return Whether there has been any attempt to create an encryption zone in + * the cluster at all. If not, it is safe to quickly return null when + * checking the encryption information of any file or directory in the + * cluster. + */ + public boolean hasCreatedEncryptionZone() { + return encryptionZones != null; } /** @@ -387,6 +410,9 @@ public class EncryptionZoneManager { */ String[] getKeyNames() { assert dir.hasReadLock(); + if (!hasCreatedEncryptionZone()) { + return new String[0]; + } String[] ret = new String[encryptionZones.size()]; int index = 0; for (Map.Entry entry : encryptionZones diff --git a/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirEncryptionZoneOp.java b/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirEncryptionZoneOp.java index bd254190ebf..2997179e810 100644 --- a/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirEncryptionZoneOp.java +++ b/hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirEncryptionZoneOp.java @@ -254,7 +254,7 @@ final class FSDirEncryptionZoneOp { static FileEncryptionInfo getFileEncryptionInfo(final FSDirectory fsd, final INode inode, final int snapshotId, final INodesInPath iip) throws IOException { - if (!inode.isFile()) { + if (!inode.isFile() || !fsd.ezManager.hasCreatedEncryptionZone()) { return null; } fsd.readLock();