YARN-10901. Permission checking error on an existing directory in LogAggregationFileController#verifyAndCreateRemoteLogDir (#3410)
Co-authored-by: Tamas Domok <tdomok@cloudera.com>
This commit is contained in:
parent
4eeb4d32e5
commit
478d2f2897
|
@ -19,6 +19,7 @@
|
||||||
package org.apache.hadoop.yarn.logaggregation.filecontroller;
|
package org.apache.hadoop.yarn.logaggregation.filecontroller;
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
|
import org.apache.commons.lang3.RandomStringUtils;
|
||||||
|
|
||||||
import java.io.FileNotFoundException;
|
import java.io.FileNotFoundException;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
@ -368,10 +369,13 @@ public abstract class LogAggregationFileController {
|
||||||
throw new YarnRuntimeException("Failed to create remoteLogDir ["
|
throw new YarnRuntimeException("Failed to create remoteLogDir ["
|
||||||
+ remoteRootLogDir + "]", e);
|
+ remoteRootLogDir + "]", e);
|
||||||
}
|
}
|
||||||
} else{
|
} else {
|
||||||
//Check if FS has capability to set/modify permissions
|
//Check if FS has capability to set/modify permissions
|
||||||
|
Path permissionCheckFile = new Path(qualified, String.format("%s.permission_check",
|
||||||
|
RandomStringUtils.randomAlphanumeric(8)));
|
||||||
try {
|
try {
|
||||||
remoteFS.setPermission(qualified, new FsPermission(TLDIR_PERMISSIONS));
|
remoteFS.createNewFile(permissionCheckFile);
|
||||||
|
remoteFS.setPermission(permissionCheckFile, new FsPermission(TLDIR_PERMISSIONS));
|
||||||
} catch (UnsupportedOperationException use) {
|
} catch (UnsupportedOperationException use) {
|
||||||
LOG.info("Unable to set permissions for configured filesystem since"
|
LOG.info("Unable to set permissions for configured filesystem since"
|
||||||
+ " it does not support this", remoteFS.getScheme());
|
+ " it does not support this", remoteFS.getScheme());
|
||||||
|
@ -379,6 +383,11 @@ public abstract class LogAggregationFileController {
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
LOG.warn("Failed to check if FileSystem suppports permissions on "
|
LOG.warn("Failed to check if FileSystem suppports permissions on "
|
||||||
+ "remoteLogDir [" + remoteRootLogDir + "]", e);
|
+ "remoteLogDir [" + remoteRootLogDir + "]", e);
|
||||||
|
} finally {
|
||||||
|
try {
|
||||||
|
remoteFS.delete(permissionCheckFile, false);
|
||||||
|
} catch (IOException ignored) {
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,75 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.hadoop.yarn.logaggregation.filecontroller;
|
||||||
|
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.fs.FileStatus;
|
||||||
|
import org.apache.hadoop.fs.FileSystem;
|
||||||
|
import org.apache.hadoop.fs.Path;
|
||||||
|
import org.apache.hadoop.fs.permission.FsPermission;
|
||||||
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.mockito.Mockito;
|
||||||
|
|
||||||
|
import java.net.URI;
|
||||||
|
|
||||||
|
import static org.apache.hadoop.yarn.logaggregation.filecontroller.LogAggregationFileController.TLDIR_PERMISSIONS;
|
||||||
|
import static org.mockito.Mockito.doNothing;
|
||||||
|
import static org.mockito.Mockito.doReturn;
|
||||||
|
import static org.mockito.Mockito.mock;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
import static org.mockito.Mockito.any;
|
||||||
|
import static org.mockito.Mockito.eq;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test for the abstract {@link LogAggregationFileController} class,
|
||||||
|
* checking its core functionality.
|
||||||
|
*/
|
||||||
|
public class TestLogAggregationFileController {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testRemoteDirCreationWithCustomUser() throws Exception {
|
||||||
|
FileSystem fs = mock(FileSystem.class);
|
||||||
|
doReturn(new URI("")).when(fs).getUri();
|
||||||
|
doReturn(new FileStatus(128, false, 0, 64, System.currentTimeMillis(),
|
||||||
|
System.currentTimeMillis(), new FsPermission(TLDIR_PERMISSIONS),
|
||||||
|
"not_yarn_user", "yarn_group", new Path("/tmp/logs"))).when(fs)
|
||||||
|
.getFileStatus(any(Path.class));
|
||||||
|
|
||||||
|
Configuration conf = new Configuration();
|
||||||
|
LogAggregationFileController controller = mock(
|
||||||
|
LogAggregationFileController.class, Mockito.CALLS_REAL_METHODS);
|
||||||
|
controller.fsSupportsChmod = true;
|
||||||
|
doReturn(fs).when(controller).getFileSystem(any(Configuration.class));
|
||||||
|
|
||||||
|
UserGroupInformation ugi = UserGroupInformation.createUserForTesting(
|
||||||
|
"yarn_user", new String[]{"yarn_group", "other_group"});
|
||||||
|
UserGroupInformation.setLoginUser(ugi);
|
||||||
|
|
||||||
|
doNothing().when(controller).initInternal(any(Configuration.class));
|
||||||
|
controller.initialize(conf, "TFile");
|
||||||
|
controller.verifyAndCreateRemoteLogDir();
|
||||||
|
|
||||||
|
verify(fs).createNewFile(any());
|
||||||
|
verify(fs).setPermission(any(), eq(new FsPermission(TLDIR_PERMISSIONS)));
|
||||||
|
verify(fs).delete(any(), eq(false));
|
||||||
|
Assert.assertTrue(controller.fsSupportsChmod);
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue