Merging r1539245 through r1539736 from trunk to branch HDFS-2832
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/branches/HDFS-2832@1539737 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
commit
2af29af098
|
@ -431,6 +431,9 @@ Release 2.2.1 - UNRELEASED
|
||||||
HADOOP-10079. log a warning message if group resolution takes too long.
|
HADOOP-10079. log a warning message if group resolution takes too long.
|
||||||
(cmccabe)
|
(cmccabe)
|
||||||
|
|
||||||
|
HADOOP-9623 Update jets3t dependency to 0.9.0. (Amandeep Khurana via Colin
|
||||||
|
Patrick McCabe)
|
||||||
|
|
||||||
OPTIMIZATIONS
|
OPTIMIZATIONS
|
||||||
|
|
||||||
BUG FIXES
|
BUG FIXES
|
||||||
|
@ -460,6 +463,10 @@ Release 2.2.1 - UNRELEASED
|
||||||
HADOOP-9478. Fix race conditions during the initialization of Configuration
|
HADOOP-9478. Fix race conditions during the initialization of Configuration
|
||||||
related to deprecatedKeyMap (cmccabe)
|
related to deprecatedKeyMap (cmccabe)
|
||||||
|
|
||||||
|
HADOOP-9660. [WINDOWS] Powershell / cmd parses -Dkey=value from command line
|
||||||
|
as [-Dkey, value] which breaks GenericsOptionParser.
|
||||||
|
(Enis Soztutar via cnauroth)
|
||||||
|
|
||||||
Release 2.2.0 - 2013-10-13
|
Release 2.2.0 - 2013-10-13
|
||||||
|
|
||||||
INCOMPATIBLE CHANGES
|
INCOMPATIBLE CHANGES
|
||||||
|
|
|
@ -42,6 +42,7 @@ import org.apache.hadoop.fs.Path;
|
||||||
import org.apache.hadoop.fs.s3.INode.FileType;
|
import org.apache.hadoop.fs.s3.INode.FileType;
|
||||||
import org.jets3t.service.S3Service;
|
import org.jets3t.service.S3Service;
|
||||||
import org.jets3t.service.S3ServiceException;
|
import org.jets3t.service.S3ServiceException;
|
||||||
|
import org.jets3t.service.ServiceException;
|
||||||
import org.jets3t.service.impl.rest.httpclient.RestS3Service;
|
import org.jets3t.service.impl.rest.httpclient.RestS3Service;
|
||||||
import org.jets3t.service.model.S3Bucket;
|
import org.jets3t.service.model.S3Bucket;
|
||||||
import org.jets3t.service.model.S3Object;
|
import org.jets3t.service.model.S3Object;
|
||||||
|
@ -60,8 +61,8 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
private static final String FILE_SYSTEM_VERSION_NAME = "fs-version";
|
private static final String FILE_SYSTEM_VERSION_NAME = "fs-version";
|
||||||
private static final String FILE_SYSTEM_VERSION_VALUE = "1";
|
private static final String FILE_SYSTEM_VERSION_VALUE = "1";
|
||||||
|
|
||||||
private static final Map<String, String> METADATA =
|
private static final Map<String, Object> METADATA =
|
||||||
new HashMap<String, String>();
|
new HashMap<String, Object>();
|
||||||
|
|
||||||
static {
|
static {
|
||||||
METADATA.put(FILE_SYSTEM_NAME, FILE_SYSTEM_VALUE);
|
METADATA.put(FILE_SYSTEM_NAME, FILE_SYSTEM_VALUE);
|
||||||
|
@ -165,7 +166,7 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
throws IOException {
|
throws IOException {
|
||||||
|
|
||||||
try {
|
try {
|
||||||
S3Object object = s3Service.getObject(bucket, key);
|
S3Object object = s3Service.getObject(bucket.getName(), key);
|
||||||
if (checkMetadata) {
|
if (checkMetadata) {
|
||||||
checkMetadata(object);
|
checkMetadata(object);
|
||||||
}
|
}
|
||||||
|
@ -178,6 +179,9 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
throw (IOException) e.getCause();
|
throw (IOException) e.getCause();
|
||||||
}
|
}
|
||||||
throw new S3Exception(e);
|
throw new S3Exception(e);
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
handleServiceException(e);
|
||||||
|
return null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -194,6 +198,9 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
throw (IOException) e.getCause();
|
throw (IOException) e.getCause();
|
||||||
}
|
}
|
||||||
throw new S3Exception(e);
|
throw new S3Exception(e);
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
handleServiceException(e);
|
||||||
|
return null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -276,7 +283,7 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
if (!prefix.endsWith(PATH_DELIMITER)) {
|
if (!prefix.endsWith(PATH_DELIMITER)) {
|
||||||
prefix += PATH_DELIMITER;
|
prefix += PATH_DELIMITER;
|
||||||
}
|
}
|
||||||
S3Object[] objects = s3Service.listObjects(bucket, prefix, PATH_DELIMITER);
|
S3Object[] objects = s3Service.listObjects(bucket.getName(), prefix, PATH_DELIMITER);
|
||||||
Set<Path> prefixes = new TreeSet<Path>();
|
Set<Path> prefixes = new TreeSet<Path>();
|
||||||
for (int i = 0; i < objects.length; i++) {
|
for (int i = 0; i < objects.length; i++) {
|
||||||
prefixes.add(keyToPath(objects[i].getKey()));
|
prefixes.add(keyToPath(objects[i].getKey()));
|
||||||
|
@ -298,7 +305,7 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
if (!prefix.endsWith(PATH_DELIMITER)) {
|
if (!prefix.endsWith(PATH_DELIMITER)) {
|
||||||
prefix += PATH_DELIMITER;
|
prefix += PATH_DELIMITER;
|
||||||
}
|
}
|
||||||
S3Object[] objects = s3Service.listObjects(bucket, prefix, null);
|
S3Object[] objects = s3Service.listObjects(bucket.getName(), prefix, null);
|
||||||
Set<Path> prefixes = new TreeSet<Path>();
|
Set<Path> prefixes = new TreeSet<Path>();
|
||||||
for (int i = 0; i < objects.length; i++) {
|
for (int i = 0; i < objects.length; i++) {
|
||||||
prefixes.add(keyToPath(objects[i].getKey()));
|
prefixes.add(keyToPath(objects[i].getKey()));
|
||||||
|
@ -385,7 +392,7 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
@Override
|
@Override
|
||||||
public void purge() throws IOException {
|
public void purge() throws IOException {
|
||||||
try {
|
try {
|
||||||
S3Object[] objects = s3Service.listObjects(bucket);
|
S3Object[] objects = s3Service.listObjects(bucket.getName());
|
||||||
for (int i = 0; i < objects.length; i++) {
|
for (int i = 0; i < objects.length; i++) {
|
||||||
s3Service.deleteObject(bucket, objects[i].getKey());
|
s3Service.deleteObject(bucket, objects[i].getKey());
|
||||||
}
|
}
|
||||||
|
@ -402,7 +409,7 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
StringBuilder sb = new StringBuilder("S3 Filesystem, ");
|
StringBuilder sb = new StringBuilder("S3 Filesystem, ");
|
||||||
sb.append(bucket.getName()).append("\n");
|
sb.append(bucket.getName()).append("\n");
|
||||||
try {
|
try {
|
||||||
S3Object[] objects = s3Service.listObjects(bucket, PATH_DELIMITER, null);
|
S3Object[] objects = s3Service.listObjects(bucket.getName(), PATH_DELIMITER, null);
|
||||||
for (int i = 0; i < objects.length; i++) {
|
for (int i = 0; i < objects.length; i++) {
|
||||||
Path path = keyToPath(objects[i].getKey());
|
Path path = keyToPath(objects[i].getKey());
|
||||||
sb.append(path).append("\n");
|
sb.append(path).append("\n");
|
||||||
|
@ -424,4 +431,15 @@ class Jets3tFileSystemStore implements FileSystemStore {
|
||||||
System.out.println(sb);
|
System.out.println(sb);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void handleServiceException(ServiceException e) throws IOException {
|
||||||
|
if (e.getCause() instanceof IOException) {
|
||||||
|
throw (IOException) e.getCause();
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Got ServiceException with Error code: " + e.getErrorCode() + ";and Error message: " + e.getErrorMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -34,6 +34,7 @@ import org.apache.hadoop.util.Tool;
|
||||||
import org.apache.hadoop.util.ToolRunner;
|
import org.apache.hadoop.util.ToolRunner;
|
||||||
import org.jets3t.service.S3Service;
|
import org.jets3t.service.S3Service;
|
||||||
import org.jets3t.service.S3ServiceException;
|
import org.jets3t.service.S3ServiceException;
|
||||||
|
import org.jets3t.service.ServiceException;
|
||||||
import org.jets3t.service.impl.rest.httpclient.RestS3Service;
|
import org.jets3t.service.impl.rest.httpclient.RestS3Service;
|
||||||
import org.jets3t.service.model.S3Bucket;
|
import org.jets3t.service.model.S3Bucket;
|
||||||
import org.jets3t.service.model.S3Object;
|
import org.jets3t.service.model.S3Object;
|
||||||
|
@ -177,7 +178,7 @@ public class MigrationTool extends Configured implements Tool {
|
||||||
|
|
||||||
private S3Object get(String key) {
|
private S3Object get(String key) {
|
||||||
try {
|
try {
|
||||||
return s3Service.getObject(bucket, key);
|
return s3Service.getObject(bucket.getName(), key);
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
if ("NoSuchKey".equals(e.getS3ErrorCode())) {
|
if ("NoSuchKey".equals(e.getS3ErrorCode())) {
|
||||||
return null;
|
return null;
|
||||||
|
@ -200,7 +201,7 @@ public class MigrationTool extends Configured implements Tool {
|
||||||
public Set<Path> listAllPaths() throws IOException {
|
public Set<Path> listAllPaths() throws IOException {
|
||||||
try {
|
try {
|
||||||
String prefix = urlEncode(Path.SEPARATOR);
|
String prefix = urlEncode(Path.SEPARATOR);
|
||||||
S3Object[] objects = s3Service.listObjects(bucket, prefix, null);
|
S3Object[] objects = s3Service.listObjects(bucket.getName(), prefix, null);
|
||||||
Set<Path> prefixes = new TreeSet<Path>();
|
Set<Path> prefixes = new TreeSet<Path>();
|
||||||
for (int i = 0; i < objects.length; i++) {
|
for (int i = 0; i < objects.length; i++) {
|
||||||
prefixes.add(keyToPath(objects[i].getKey()));
|
prefixes.add(keyToPath(objects[i].getKey()));
|
||||||
|
@ -237,7 +238,7 @@ public class MigrationTool extends Configured implements Tool {
|
||||||
|
|
||||||
private InputStream get(String key) throws IOException {
|
private InputStream get(String key) throws IOException {
|
||||||
try {
|
try {
|
||||||
S3Object object = s3Service.getObject(bucket, key);
|
S3Object object = s3Service.getObject(bucket.getName(), key);
|
||||||
return object.getDataInputStream();
|
return object.getDataInputStream();
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
if ("NoSuchKey".equals(e.getS3ErrorCode())) {
|
if ("NoSuchKey".equals(e.getS3ErrorCode())) {
|
||||||
|
@ -247,6 +248,8 @@ public class MigrationTool extends Configured implements Tool {
|
||||||
throw (IOException) e.getCause();
|
throw (IOException) e.getCause();
|
||||||
}
|
}
|
||||||
throw new S3Exception(e);
|
throw new S3Exception(e);
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
return null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -29,17 +29,21 @@ import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.classification.InterfaceStability;
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.fs.s3.S3Credentials;
|
import org.apache.hadoop.fs.s3.S3Credentials;
|
||||||
import org.apache.hadoop.fs.s3.S3Exception;
|
import org.apache.hadoop.fs.s3.S3Exception;
|
||||||
import org.jets3t.service.S3ObjectsChunk;
|
|
||||||
import org.jets3t.service.S3Service;
|
import org.jets3t.service.S3Service;
|
||||||
import org.jets3t.service.S3ServiceException;
|
import org.jets3t.service.S3ServiceException;
|
||||||
|
import org.jets3t.service.ServiceException;
|
||||||
|
import org.jets3t.service.StorageObjectsChunk;
|
||||||
import org.jets3t.service.impl.rest.httpclient.RestS3Service;
|
import org.jets3t.service.impl.rest.httpclient.RestS3Service;
|
||||||
import org.jets3t.service.model.S3Bucket;
|
import org.jets3t.service.model.S3Bucket;
|
||||||
import org.jets3t.service.model.S3Object;
|
import org.jets3t.service.model.S3Object;
|
||||||
|
import org.jets3t.service.model.StorageObject;
|
||||||
import org.jets3t.service.security.AWSCredentials;
|
import org.jets3t.service.security.AWSCredentials;
|
||||||
|
|
||||||
@InterfaceAudience.Private
|
@InterfaceAudience.Private
|
||||||
|
@ -48,7 +52,9 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
|
|
||||||
private S3Service s3Service;
|
private S3Service s3Service;
|
||||||
private S3Bucket bucket;
|
private S3Bucket bucket;
|
||||||
|
public static final Log LOG =
|
||||||
|
LogFactory.getLog(Jets3tNativeFileSystemStore.class);
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void initialize(URI uri, Configuration conf) throws IOException {
|
public void initialize(URI uri, Configuration conf) throws IOException {
|
||||||
S3Credentials s3Credentials = new S3Credentials();
|
S3Credentials s3Credentials = new S3Credentials();
|
||||||
|
@ -59,7 +65,7 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
s3Credentials.getSecretAccessKey());
|
s3Credentials.getSecretAccessKey());
|
||||||
this.s3Service = new RestS3Service(awsCredentials);
|
this.s3Service = new RestS3Service(awsCredentials);
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
}
|
}
|
||||||
bucket = new S3Bucket(uri.getHost());
|
bucket = new S3Bucket(uri.getHost());
|
||||||
}
|
}
|
||||||
|
@ -80,7 +86,7 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
}
|
}
|
||||||
s3Service.putObject(bucket, object);
|
s3Service.putObject(bucket, object);
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
} finally {
|
} finally {
|
||||||
if (in != null) {
|
if (in != null) {
|
||||||
try {
|
try {
|
||||||
|
@ -101,53 +107,85 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
object.setContentLength(0);
|
object.setContentLength(0);
|
||||||
s3Service.putObject(bucket, object);
|
s3Service.putObject(bucket, object);
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public FileMetadata retrieveMetadata(String key) throws IOException {
|
public FileMetadata retrieveMetadata(String key) throws IOException {
|
||||||
try {
|
try {
|
||||||
S3Object object = s3Service.getObjectDetails(bucket, key);
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Getting metadata for key: " + key + " from bucket:" + bucket.getName());
|
||||||
|
}
|
||||||
|
S3Object object = s3Service.getObject(bucket.getName(), key);
|
||||||
return new FileMetadata(key, object.getContentLength(),
|
return new FileMetadata(key, object.getContentLength(),
|
||||||
object.getLastModifiedDate().getTime());
|
object.getLastModifiedDate().getTime());
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
// Following is brittle. Is there a better way?
|
// Following is brittle. Is there a better way?
|
||||||
if (e.getMessage().contains("ResponseCode=404")) {
|
if (e.getS3ErrorCode().matches("NoSuchKey")) {
|
||||||
return null;
|
return null; //return null if key not found
|
||||||
}
|
}
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
return null; //never returned - keep compiler happy
|
return null; //never returned - keep compiler happy
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param key
|
||||||
|
* The key is the object name that is being retrieved from the S3 bucket
|
||||||
|
* @return
|
||||||
|
* This method returns null if the key is not found
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public InputStream retrieve(String key) throws IOException {
|
public InputStream retrieve(String key) throws IOException {
|
||||||
try {
|
try {
|
||||||
S3Object object = s3Service.getObject(bucket, key);
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Getting key: " + key + " from bucket:" + bucket.getName());
|
||||||
|
}
|
||||||
|
S3Object object = s3Service.getObject(bucket.getName(), key);
|
||||||
return object.getDataInputStream();
|
return object.getDataInputStream();
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(key, e);
|
handleS3ServiceException(key, e);
|
||||||
return null; //never returned - keep compiler happy
|
return null; //never returned - keep compiler happy
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
handleServiceException(e);
|
||||||
|
return null; //return null if key not found
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @param key
|
||||||
|
* The key is the object name that is being retrieved from the S3 bucket
|
||||||
|
* @return
|
||||||
|
* This method returns null if the key is not found
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public InputStream retrieve(String key, long byteRangeStart)
|
public InputStream retrieve(String key, long byteRangeStart)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
try {
|
try {
|
||||||
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Getting key: " + key + " from bucket:" + bucket.getName() + " with byteRangeStart: " + byteRangeStart);
|
||||||
|
}
|
||||||
S3Object object = s3Service.getObject(bucket, key, null, null, null,
|
S3Object object = s3Service.getObject(bucket, key, null, null, null,
|
||||||
null, byteRangeStart, null);
|
null, byteRangeStart, null);
|
||||||
return object.getDataInputStream();
|
return object.getDataInputStream();
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(key, e);
|
handleS3ServiceException(key, e);
|
||||||
return null; //never returned - keep compiler happy
|
return null; //never returned - keep compiler happy
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
handleServiceException(e);
|
||||||
|
return null; //return null if key not found
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PartialListing list(String prefix, int maxListingLength)
|
public PartialListing list(String prefix, int maxListingLength)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
return list(prefix, maxListingLength, null, false);
|
return list(prefix, maxListingLength, null, false);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -158,6 +196,13 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
return list(prefix, recurse ? null : PATH_DELIMITER, maxListingLength, priorLastKey);
|
return list(prefix, recurse ? null : PATH_DELIMITER, maxListingLength, priorLastKey);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* This method returns null if the list could not be populated
|
||||||
|
* due to S3 giving ServiceException
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
|
||||||
private PartialListing list(String prefix, String delimiter,
|
private PartialListing list(String prefix, String delimiter,
|
||||||
int maxListingLength, String priorLastKey) throws IOException {
|
int maxListingLength, String priorLastKey) throws IOException {
|
||||||
|
@ -165,52 +210,63 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
if (prefix.length() > 0 && !prefix.endsWith(PATH_DELIMITER)) {
|
if (prefix.length() > 0 && !prefix.endsWith(PATH_DELIMITER)) {
|
||||||
prefix += PATH_DELIMITER;
|
prefix += PATH_DELIMITER;
|
||||||
}
|
}
|
||||||
S3ObjectsChunk chunk = s3Service.listObjectsChunked(bucket.getName(),
|
StorageObjectsChunk chunk = s3Service.listObjectsChunked(bucket.getName(),
|
||||||
prefix, delimiter, maxListingLength, priorLastKey);
|
prefix, delimiter, maxListingLength, priorLastKey);
|
||||||
|
|
||||||
FileMetadata[] fileMetadata =
|
FileMetadata[] fileMetadata =
|
||||||
new FileMetadata[chunk.getObjects().length];
|
new FileMetadata[chunk.getObjects().length];
|
||||||
for (int i = 0; i < fileMetadata.length; i++) {
|
for (int i = 0; i < fileMetadata.length; i++) {
|
||||||
S3Object object = chunk.getObjects()[i];
|
StorageObject object = chunk.getObjects()[i];
|
||||||
fileMetadata[i] = new FileMetadata(object.getKey(),
|
fileMetadata[i] = new FileMetadata(object.getKey(),
|
||||||
object.getContentLength(), object.getLastModifiedDate().getTime());
|
object.getContentLength(), object.getLastModifiedDate().getTime());
|
||||||
}
|
}
|
||||||
return new PartialListing(chunk.getPriorLastKey(), fileMetadata,
|
return new PartialListing(chunk.getPriorLastKey(), fileMetadata,
|
||||||
chunk.getCommonPrefixes());
|
chunk.getCommonPrefixes());
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
return null; //never returned - keep compiler happy
|
return null; //never returned - keep compiler happy
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
handleServiceException(e);
|
||||||
|
return null; //return null if list could not be populated
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void delete(String key) throws IOException {
|
public void delete(String key) throws IOException {
|
||||||
try {
|
try {
|
||||||
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Deleting key:" + key + "from bucket" + bucket.getName());
|
||||||
|
}
|
||||||
s3Service.deleteObject(bucket, key);
|
s3Service.deleteObject(bucket, key);
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(key, e);
|
handleS3ServiceException(key, e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void copy(String srcKey, String dstKey) throws IOException {
|
public void copy(String srcKey, String dstKey) throws IOException {
|
||||||
try {
|
try {
|
||||||
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Copying srcKey: " + srcKey + "to dstKey: " + dstKey + "in bucket: " + bucket.getName());
|
||||||
|
}
|
||||||
s3Service.copyObject(bucket.getName(), srcKey, bucket.getName(),
|
s3Service.copyObject(bucket.getName(), srcKey, bucket.getName(),
|
||||||
new S3Object(dstKey), false);
|
new S3Object(dstKey), false);
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(srcKey, e);
|
handleS3ServiceException(srcKey, e);
|
||||||
|
} catch (ServiceException e) {
|
||||||
|
handleServiceException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void purge(String prefix) throws IOException {
|
public void purge(String prefix) throws IOException {
|
||||||
try {
|
try {
|
||||||
S3Object[] objects = s3Service.listObjects(bucket, prefix, null);
|
S3Object[] objects = s3Service.listObjects(bucket.getName(), prefix, null);
|
||||||
for (S3Object object : objects) {
|
for (S3Object object : objects) {
|
||||||
s3Service.deleteObject(bucket, object.getKey());
|
s3Service.deleteObject(bucket, object.getKey());
|
||||||
}
|
}
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -219,30 +275,44 @@ class Jets3tNativeFileSystemStore implements NativeFileSystemStore {
|
||||||
StringBuilder sb = new StringBuilder("S3 Native Filesystem, ");
|
StringBuilder sb = new StringBuilder("S3 Native Filesystem, ");
|
||||||
sb.append(bucket.getName()).append("\n");
|
sb.append(bucket.getName()).append("\n");
|
||||||
try {
|
try {
|
||||||
S3Object[] objects = s3Service.listObjects(bucket);
|
S3Object[] objects = s3Service.listObjects(bucket.getName());
|
||||||
for (S3Object object : objects) {
|
for (S3Object object : objects) {
|
||||||
sb.append(object.getKey()).append("\n");
|
sb.append(object.getKey()).append("\n");
|
||||||
}
|
}
|
||||||
} catch (S3ServiceException e) {
|
} catch (S3ServiceException e) {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
}
|
}
|
||||||
System.out.println(sb);
|
System.out.println(sb);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void handleServiceException(String key, S3ServiceException e) throws IOException {
|
private void handleS3ServiceException(String key, S3ServiceException e) throws IOException {
|
||||||
if ("NoSuchKey".equals(e.getS3ErrorCode())) {
|
if ("NoSuchKey".equals(e.getS3ErrorCode())) {
|
||||||
throw new FileNotFoundException("Key '" + key + "' does not exist in S3");
|
throw new FileNotFoundException("Key '" + key + "' does not exist in S3");
|
||||||
} else {
|
} else {
|
||||||
handleServiceException(e);
|
handleS3ServiceException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void handleServiceException(S3ServiceException e) throws IOException {
|
private void handleS3ServiceException(S3ServiceException e) throws IOException {
|
||||||
if (e.getCause() instanceof IOException) {
|
if (e.getCause() instanceof IOException) {
|
||||||
throw (IOException) e.getCause();
|
throw (IOException) e.getCause();
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("S3 Error code: " + e.getS3ErrorCode() + "; S3 Error message: " + e.getS3ErrorMessage());
|
||||||
|
}
|
||||||
throw new S3Exception(e);
|
throw new S3Exception(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void handleServiceException(ServiceException e) throws IOException {
|
||||||
|
if (e.getCause() instanceof IOException) {
|
||||||
|
throw (IOException) e.getCause();
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
if(LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("Got ServiceException with Error code: " + e.getErrorCode() + ";and Error message: " + e.getErrorMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -273,7 +273,7 @@ public class NativeS3FileSystem extends FileSystem {
|
||||||
setConf(conf);
|
setConf(conf);
|
||||||
this.uri = URI.create(uri.getScheme() + "://" + uri.getAuthority());
|
this.uri = URI.create(uri.getScheme() + "://" + uri.getAuthority());
|
||||||
this.workingDir =
|
this.workingDir =
|
||||||
new Path("/user", System.getProperty("user.name")).makeQualified(this);
|
new Path("/user", System.getProperty("user.name")).makeQualified(this.uri, this.getWorkingDirectory());
|
||||||
}
|
}
|
||||||
|
|
||||||
private static NativeFileSystemStore createDefaultStore(Configuration conf) {
|
private static NativeFileSystemStore createDefaultStore(Configuration conf) {
|
||||||
|
@ -511,11 +511,11 @@ public class NativeS3FileSystem extends FileSystem {
|
||||||
|
|
||||||
private FileStatus newFile(FileMetadata meta, Path path) {
|
private FileStatus newFile(FileMetadata meta, Path path) {
|
||||||
return new FileStatus(meta.getLength(), false, 1, getDefaultBlockSize(),
|
return new FileStatus(meta.getLength(), false, 1, getDefaultBlockSize(),
|
||||||
meta.getLastModified(), path.makeQualified(this));
|
meta.getLastModified(), path.makeQualified(this.getUri(), this.getWorkingDirectory()));
|
||||||
}
|
}
|
||||||
|
|
||||||
private FileStatus newDirectory(Path path) {
|
private FileStatus newDirectory(Path path) {
|
||||||
return new FileStatus(0, true, 1, 0, 0, path.makeQualified(this));
|
return new FileStatus(0, true, 1, 0, 0, path.makeQualified(this.getUri(), this.getWorkingDirectory()));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -243,6 +243,9 @@ Release 2.2.1 - UNRELEASED
|
||||||
MAPREDUCE-5604. TestMRAMWithNonNormalizedCapabilities fails on Windows due to
|
MAPREDUCE-5604. TestMRAMWithNonNormalizedCapabilities fails on Windows due to
|
||||||
exceeding max path length. (cnauroth)
|
exceeding max path length. (cnauroth)
|
||||||
|
|
||||||
|
MAPREDUCE-5451. MR uses LD_LIBRARY_PATH which doesn't mean anything in
|
||||||
|
Windows. (Yingda Chen via cnauroth)
|
||||||
|
|
||||||
Release 2.2.0 - 2013-10-13
|
Release 2.2.0 - 2013-10-13
|
||||||
|
|
||||||
INCOMPATIBLE CHANGES
|
INCOMPATIBLE CHANGES
|
||||||
|
|
|
@ -575,8 +575,10 @@ public interface MRJobConfig {
|
||||||
public static final String MAPRED_ADMIN_USER_ENV =
|
public static final String MAPRED_ADMIN_USER_ENV =
|
||||||
"mapreduce.admin.user.env";
|
"mapreduce.admin.user.env";
|
||||||
|
|
||||||
public static final String DEFAULT_MAPRED_ADMIN_USER_ENV =
|
public final String DEFAULT_MAPRED_ADMIN_USER_ENV =
|
||||||
"LD_LIBRARY_PATH=$HADOOP_COMMON_HOME/lib/native";
|
Shell.WINDOWS ?
|
||||||
|
"PATH=%PATH%;%HADOOP_COMMON_HOME%\\bin":
|
||||||
|
"LD_LIBRARY_PATH=$HADOOP_COMMON_HOME/lib/native";
|
||||||
|
|
||||||
public static final String WORKDIR = "work";
|
public static final String WORKDIR = "work";
|
||||||
|
|
||||||
|
|
|
@ -183,11 +183,16 @@
|
||||||
|
|
||||||
<property>
|
<property>
|
||||||
<name>mapreduce.admin.user.env</name>
|
<name>mapreduce.admin.user.env</name>
|
||||||
<value>LD_LIBRARY_PATH=$HADOOP_COMMON_HOME/lib/native</value>
|
<value></value>
|
||||||
<description>Expert: Additional execution environment entries for
|
<description>
|
||||||
|
Expert: Additional execution environment entries for
|
||||||
map and reduce task processes. This is not an additive property.
|
map and reduce task processes. This is not an additive property.
|
||||||
You must preserve the original value if you want your map and
|
You must preserve the original value if you want your map and
|
||||||
reduce tasks to have access to native libraries (compression, etc).
|
reduce tasks to have access to native libraries (compression, etc).
|
||||||
|
When this value is empty, the command to set execution
|
||||||
|
envrionment will be OS dependent:
|
||||||
|
For linux, use LD_LIBRARY_PATH=$HADOOP_COMMON_HOME/lib/native.
|
||||||
|
For windows, use PATH = %PATH%;%HADOOP_COMMON_HOME%\\bin.
|
||||||
</description>
|
</description>
|
||||||
</property>
|
</property>
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,9 @@ import static org.junit.Assert.assertTrue;
|
||||||
import static org.junit.Assert.fail;
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
import java.io.*;
|
import java.io.*;
|
||||||
|
import java.util.HashMap;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
import org.junit.AfterClass;
|
import org.junit.AfterClass;
|
||||||
import org.junit.BeforeClass;
|
import org.junit.BeforeClass;
|
||||||
|
@ -46,6 +48,7 @@ import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hdfs.MiniDFSCluster;
|
import org.apache.hadoop.hdfs.MiniDFSCluster;
|
||||||
import org.apache.hadoop.mapreduce.v2.MiniMRYarnCluster;
|
import org.apache.hadoop.mapreduce.v2.MiniMRYarnCluster;
|
||||||
import org.apache.hadoop.util.Shell;
|
import org.apache.hadoop.util.Shell;
|
||||||
|
import org.apache.hadoop.yarn.util.Apps;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Class to test mapred task's
|
* Class to test mapred task's
|
||||||
|
@ -107,6 +110,29 @@ public class TestMiniMRChildTask {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Map class which checks if hadoop lib location
|
||||||
|
* is in the execution path
|
||||||
|
*/
|
||||||
|
public static class ExecutionEnvCheckMapClass extends MapReduceBase
|
||||||
|
implements Mapper<LongWritable, Text, Text, IntWritable> {
|
||||||
|
public void map (LongWritable key, Text value,
|
||||||
|
OutputCollector<Text, IntWritable> output,
|
||||||
|
Reporter reporter) throws IOException {
|
||||||
|
}
|
||||||
|
public void configure(JobConf job) {
|
||||||
|
String executionEnvPathVariable = System.getenv(Shell.WINDOWS ? "PATH"
|
||||||
|
: "LD_LIBRARY_PATH");
|
||||||
|
String hadoopHome = System.getenv("HADOOP_COMMON_HOME");
|
||||||
|
if (hadoopHome == null) {
|
||||||
|
hadoopHome = "";
|
||||||
|
}
|
||||||
|
String hadoopLibLocation = hadoopHome
|
||||||
|
+ (Shell.WINDOWS ? "\\bin" : "/lib/native");
|
||||||
|
assertTrue(executionEnvPathVariable.contains(hadoopLibLocation));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// configure a job
|
// configure a job
|
||||||
private void configure(JobConf conf, Path inDir, Path outDir, String input,
|
private void configure(JobConf conf, Path inDir, Path outDir, String input,
|
||||||
|
@ -153,8 +179,6 @@ public class TestMiniMRChildTask {
|
||||||
Path outDir,
|
Path outDir,
|
||||||
String input)
|
String input)
|
||||||
throws IOException, InterruptedException, ClassNotFoundException {
|
throws IOException, InterruptedException, ClassNotFoundException {
|
||||||
configure(conf, inDir, outDir, input,
|
|
||||||
MapClass.class, IdentityReducer.class);
|
|
||||||
|
|
||||||
FileSystem outFs = outDir.getFileSystem(conf);
|
FileSystem outFs = outDir.getFileSystem(conf);
|
||||||
|
|
||||||
|
@ -359,7 +383,8 @@ public class TestMiniMRChildTask {
|
||||||
Path inDir = new Path("testing/wc/input");
|
Path inDir = new Path("testing/wc/input");
|
||||||
Path outDir = new Path("testing/wc/output");
|
Path outDir = new Path("testing/wc/output");
|
||||||
String input = "The input";
|
String input = "The input";
|
||||||
|
configure(conf, inDir, outDir, input,
|
||||||
|
MapClass.class, IdentityReducer.class);
|
||||||
launchTest(conf, inDir, outDir, input);
|
launchTest(conf, inDir, outDir, input);
|
||||||
|
|
||||||
} catch(Exception e) {
|
} catch(Exception e) {
|
||||||
|
@ -369,6 +394,66 @@ public class TestMiniMRChildTask {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* To test OS dependent setting of default execution path for a MapRed task.
|
||||||
|
* Mainly that we can use MRJobConfig.DEFAULT_MAPRED_ADMIN_USER_ENV to set -
|
||||||
|
* for WINDOWS: %HADOOP_COMMON_HOME%\bin is expected to be included in PATH - for
|
||||||
|
* Linux: $HADOOP_COMMON_HOME/lib/native is expected to be included in
|
||||||
|
* LD_LIBRARY_PATH
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void testMapRedExecutionEnv() {
|
||||||
|
// test if the env variable can be set
|
||||||
|
try {
|
||||||
|
// Application environment
|
||||||
|
Map<String, String> environment = new HashMap<String, String>();
|
||||||
|
String setupHadoopHomeCommand = Shell.WINDOWS ?
|
||||||
|
"HADOOP_COMMON_HOME=C:\\fake\\PATH\\to\\hadoop\\common\\home" :
|
||||||
|
"HADOOP_COMMON_HOME=/fake/path/to/hadoop/common/home";
|
||||||
|
Apps.setEnvFromInputString(environment, setupHadoopHomeCommand);
|
||||||
|
|
||||||
|
// Add the env variables passed by the admin
|
||||||
|
Apps.setEnvFromInputString(environment, conf.get(
|
||||||
|
MRJobConfig.MAPRED_ADMIN_USER_ENV,
|
||||||
|
MRJobConfig.DEFAULT_MAPRED_ADMIN_USER_ENV));
|
||||||
|
|
||||||
|
String executionPaths = environment.get(
|
||||||
|
Shell.WINDOWS ? "PATH" : "LD_LIBRARY_PATH");
|
||||||
|
String toFind = Shell.WINDOWS ?
|
||||||
|
"C:\\fake\\PATH\\to\\hadoop\\common\\home\\bin" :
|
||||||
|
"/fake/path/to/hadoop/common/home/lib/native";
|
||||||
|
|
||||||
|
// Ensure execution PATH/LD_LIBRARY_PATH set up pointing to hadoop lib
|
||||||
|
assertTrue("execution path does not include the hadoop lib location "
|
||||||
|
+ toFind, executionPaths.contains(toFind));
|
||||||
|
} catch (Exception e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
fail("Exception in testing execution environment for MapReduce task");
|
||||||
|
tearDown();
|
||||||
|
}
|
||||||
|
|
||||||
|
// now launch a mapreduce job to ensure that the child
|
||||||
|
// also gets the configured setting for hadoop lib
|
||||||
|
try {
|
||||||
|
|
||||||
|
JobConf conf = new JobConf(mr.getConfig());
|
||||||
|
// initialize input, output directories
|
||||||
|
Path inDir = new Path("input");
|
||||||
|
Path outDir = new Path("output");
|
||||||
|
String input = "The input";
|
||||||
|
|
||||||
|
// set config to use the ExecutionEnvCheckMapClass map class
|
||||||
|
configure(conf, inDir, outDir, input,
|
||||||
|
ExecutionEnvCheckMapClass.class, IdentityReducer.class);
|
||||||
|
launchTest(conf, inDir, outDir, input);
|
||||||
|
|
||||||
|
} catch(Exception e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
fail("Exception in testing propagation of env setting to child task");
|
||||||
|
tearDown();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Test to test if the user set env variables reflect in the child
|
* Test to test if the user set env variables reflect in the child
|
||||||
* processes. Mainly
|
* processes. Mainly
|
||||||
|
|
|
@ -347,6 +347,11 @@
|
||||||
<artifactId>httpclient</artifactId>
|
<artifactId>httpclient</artifactId>
|
||||||
<version>4.2.5</version>
|
<version>4.2.5</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
|
<dependency>
|
||||||
|
<groupId>org.apache.httpcomponents</groupId>
|
||||||
|
<artifactId>httpcore</artifactId>
|
||||||
|
<version>4.2.5</version>
|
||||||
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>commons-codec</groupId>
|
<groupId>commons-codec</groupId>
|
||||||
<artifactId>commons-codec</artifactId>
|
<artifactId>commons-codec</artifactId>
|
||||||
|
@ -554,7 +559,7 @@
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>net.java.dev.jets3t</groupId>
|
<groupId>net.java.dev.jets3t</groupId>
|
||||||
<artifactId>jets3t</artifactId>
|
<artifactId>jets3t</artifactId>
|
||||||
<version>0.6.1</version>
|
<version>0.9.0</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<dependency>
|
<dependency>
|
||||||
<groupId>org.apache.mina</groupId>
|
<groupId>org.apache.mina</groupId>
|
||||||
|
|
Loading…
Reference in New Issue