Revert HADOOP-8193 from r1304968. Patch introduced some NPEs in a test case.
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/branches/branch-0.23@1305151 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
00796d4cf4
commit
81878db486
|
@ -109,9 +109,6 @@ Release 0.23.3 - UNRELEASED
|
||||||
HADOOP-8163. Improve ActiveStandbyElector to provide hooks for
|
HADOOP-8163. Improve ActiveStandbyElector to provide hooks for
|
||||||
fencing old active. (todd)
|
fencing old active. (todd)
|
||||||
|
|
||||||
HADOOP-8193. Refactor FailoverController/HAAdmin code to add an abstract
|
|
||||||
class for "target" services. (todd)
|
|
||||||
|
|
||||||
OPTIMIZATIONS
|
OPTIMIZATIONS
|
||||||
|
|
||||||
BUG FIXES
|
BUG FIXES
|
||||||
|
|
|
@ -19,16 +19,11 @@ package org.apache.hadoop.ha;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.classification.InterfaceStability;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Indicates that the operator has specified an invalid configuration
|
* Indicates that the operator has specified an invalid configuration
|
||||||
* for fencing methods.
|
* for fencing methods.
|
||||||
*/
|
*/
|
||||||
@InterfaceAudience.Public
|
class BadFencingConfigurationException extends IOException {
|
||||||
@InterfaceStability.Evolving
|
|
||||||
public class BadFencingConfigurationException extends IOException {
|
|
||||||
private static final long serialVersionUID = 1L;
|
private static final long serialVersionUID = 1L;
|
||||||
|
|
||||||
public BadFencingConfigurationException(String msg) {
|
public BadFencingConfigurationException(String msg) {
|
||||||
|
|
|
@ -18,6 +18,7 @@
|
||||||
package org.apache.hadoop.ha;
|
package org.apache.hadoop.ha;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
import java.net.InetSocketAddress;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
@ -50,21 +51,21 @@ public class FailoverController {
|
||||||
* allow it to become active, eg because it triggers a log roll
|
* allow it to become active, eg because it triggers a log roll
|
||||||
* so the standby can learn about new blocks and leave safemode.
|
* so the standby can learn about new blocks and leave safemode.
|
||||||
*
|
*
|
||||||
* @param target service to make active
|
* @param toSvc service to make active
|
||||||
|
* @param toSvcName name of service to make active
|
||||||
* @param forceActive ignore toSvc if it reports that it is not ready
|
* @param forceActive ignore toSvc if it reports that it is not ready
|
||||||
* @throws FailoverFailedException if we should avoid failover
|
* @throws FailoverFailedException if we should avoid failover
|
||||||
*/
|
*/
|
||||||
private static void preFailoverChecks(HAServiceTarget target,
|
private static void preFailoverChecks(HAServiceProtocol toSvc,
|
||||||
|
InetSocketAddress toSvcAddr,
|
||||||
boolean forceActive)
|
boolean forceActive)
|
||||||
throws FailoverFailedException {
|
throws FailoverFailedException {
|
||||||
HAServiceStatus toSvcStatus;
|
HAServiceStatus toSvcStatus;
|
||||||
HAServiceProtocol toSvc;
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
toSvc = target.getProxy();
|
|
||||||
toSvcStatus = toSvc.getServiceStatus();
|
toSvcStatus = toSvc.getServiceStatus();
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
String msg = "Unable to get service state for " + target;
|
String msg = "Unable to get service state for " + toSvcAddr;
|
||||||
LOG.error(msg, e);
|
LOG.error(msg, e);
|
||||||
throw new FailoverFailedException(msg, e);
|
throw new FailoverFailedException(msg, e);
|
||||||
}
|
}
|
||||||
|
@ -78,7 +79,7 @@ public class FailoverController {
|
||||||
String notReadyReason = toSvcStatus.getNotReadyReason();
|
String notReadyReason = toSvcStatus.getNotReadyReason();
|
||||||
if (!forceActive) {
|
if (!forceActive) {
|
||||||
throw new FailoverFailedException(
|
throw new FailoverFailedException(
|
||||||
target + " is not ready to become active: " +
|
toSvcAddr + " is not ready to become active: " +
|
||||||
notReadyReason);
|
notReadyReason);
|
||||||
} else {
|
} else {
|
||||||
LOG.warn("Service is not ready to become active, but forcing: " +
|
LOG.warn("Service is not ready to become active, but forcing: " +
|
||||||
|
@ -102,39 +103,44 @@ public class FailoverController {
|
||||||
* then try to failback.
|
* then try to failback.
|
||||||
*
|
*
|
||||||
* @param fromSvc currently active service
|
* @param fromSvc currently active service
|
||||||
|
* @param fromSvcAddr addr of the currently active service
|
||||||
* @param toSvc service to make active
|
* @param toSvc service to make active
|
||||||
|
* @param toSvcAddr addr of the service to make active
|
||||||
|
* @param fencer for fencing fromSvc
|
||||||
* @param forceFence to fence fromSvc even if not strictly necessary
|
* @param forceFence to fence fromSvc even if not strictly necessary
|
||||||
* @param forceActive try to make toSvc active even if it is not ready
|
* @param forceActive try to make toSvc active even if it is not ready
|
||||||
* @throws FailoverFailedException if the failover fails
|
* @throws FailoverFailedException if the failover fails
|
||||||
*/
|
*/
|
||||||
public static void failover(HAServiceTarget fromSvc,
|
public static void failover(HAServiceProtocol fromSvc,
|
||||||
HAServiceTarget toSvc,
|
InetSocketAddress fromSvcAddr,
|
||||||
|
HAServiceProtocol toSvc,
|
||||||
|
InetSocketAddress toSvcAddr,
|
||||||
|
NodeFencer fencer,
|
||||||
boolean forceFence,
|
boolean forceFence,
|
||||||
boolean forceActive)
|
boolean forceActive)
|
||||||
throws FailoverFailedException {
|
throws FailoverFailedException {
|
||||||
Preconditions.checkArgument(fromSvc.getFencer() != null,
|
Preconditions.checkArgument(fencer != null, "failover requires a fencer");
|
||||||
"failover requires a fencer");
|
preFailoverChecks(toSvc, toSvcAddr, forceActive);
|
||||||
preFailoverChecks(toSvc, forceActive);
|
|
||||||
|
|
||||||
// Try to make fromSvc standby
|
// Try to make fromSvc standby
|
||||||
boolean tryFence = true;
|
boolean tryFence = true;
|
||||||
try {
|
try {
|
||||||
HAServiceProtocolHelper.transitionToStandby(fromSvc.getProxy());
|
HAServiceProtocolHelper.transitionToStandby(fromSvc);
|
||||||
// We should try to fence if we failed or it was forced
|
// We should try to fence if we failed or it was forced
|
||||||
tryFence = forceFence ? true : false;
|
tryFence = forceFence ? true : false;
|
||||||
} catch (ServiceFailedException sfe) {
|
} catch (ServiceFailedException sfe) {
|
||||||
LOG.warn("Unable to make " + fromSvc + " standby (" +
|
LOG.warn("Unable to make " + fromSvcAddr + " standby (" +
|
||||||
sfe.getMessage() + ")");
|
sfe.getMessage() + ")");
|
||||||
} catch (IOException ioe) {
|
} catch (IOException ioe) {
|
||||||
LOG.warn("Unable to make " + fromSvc +
|
LOG.warn("Unable to make " + fromSvcAddr +
|
||||||
" standby (unable to connect)", ioe);
|
" standby (unable to connect)", ioe);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Fence fromSvc if it's required or forced by the user
|
// Fence fromSvc if it's required or forced by the user
|
||||||
if (tryFence) {
|
if (tryFence) {
|
||||||
if (!fromSvc.getFencer().fence(fromSvc)) {
|
if (!fencer.fence(fromSvcAddr)) {
|
||||||
throw new FailoverFailedException("Unable to fence " +
|
throw new FailoverFailedException("Unable to fence " +
|
||||||
fromSvc + ". Fencing failed.");
|
fromSvcAddr + ". Fencing failed.");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -142,14 +148,14 @@ public class FailoverController {
|
||||||
boolean failed = false;
|
boolean failed = false;
|
||||||
Throwable cause = null;
|
Throwable cause = null;
|
||||||
try {
|
try {
|
||||||
HAServiceProtocolHelper.transitionToActive(toSvc.getProxy());
|
HAServiceProtocolHelper.transitionToActive(toSvc);
|
||||||
} catch (ServiceFailedException sfe) {
|
} catch (ServiceFailedException sfe) {
|
||||||
LOG.error("Unable to make " + toSvc + " active (" +
|
LOG.error("Unable to make " + toSvcAddr + " active (" +
|
||||||
sfe.getMessage() + "). Failing back.");
|
sfe.getMessage() + "). Failing back.");
|
||||||
failed = true;
|
failed = true;
|
||||||
cause = sfe;
|
cause = sfe;
|
||||||
} catch (IOException ioe) {
|
} catch (IOException ioe) {
|
||||||
LOG.error("Unable to make " + toSvc +
|
LOG.error("Unable to make " + toSvcAddr +
|
||||||
" active (unable to connect). Failing back.", ioe);
|
" active (unable to connect). Failing back.", ioe);
|
||||||
failed = true;
|
failed = true;
|
||||||
cause = ioe;
|
cause = ioe;
|
||||||
|
@ -157,7 +163,7 @@ public class FailoverController {
|
||||||
|
|
||||||
// We failed to make toSvc active
|
// We failed to make toSvc active
|
||||||
if (failed) {
|
if (failed) {
|
||||||
String msg = "Unable to failover to " + toSvc;
|
String msg = "Unable to failover to " + toSvcAddr;
|
||||||
// Only try to failback if we didn't fence fromSvc
|
// Only try to failback if we didn't fence fromSvc
|
||||||
if (!tryFence) {
|
if (!tryFence) {
|
||||||
try {
|
try {
|
||||||
|
@ -165,9 +171,9 @@ public class FailoverController {
|
||||||
// become active, eg we timed out waiting for its response.
|
// become active, eg we timed out waiting for its response.
|
||||||
// Unconditionally force fromSvc to become active since it
|
// Unconditionally force fromSvc to become active since it
|
||||||
// was previously active when we initiated failover.
|
// was previously active when we initiated failover.
|
||||||
failover(toSvc, fromSvc, true, true);
|
failover(toSvc, toSvcAddr, fromSvc, fromSvcAddr, fencer, true, true);
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
msg += ". Failback to " + fromSvc +
|
msg += ". Failback to " + fromSvcAddr +
|
||||||
" failed (" + ffe.getMessage() + ")";
|
" failed (" + ffe.getMessage() + ")";
|
||||||
LOG.fatal(msg);
|
LOG.fatal(msg);
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,6 +17,8 @@
|
||||||
*/
|
*/
|
||||||
package org.apache.hadoop.ha;
|
package org.apache.hadoop.ha;
|
||||||
|
|
||||||
|
import java.net.InetSocketAddress;
|
||||||
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.classification.InterfaceStability;
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
import org.apache.hadoop.conf.Configurable;
|
import org.apache.hadoop.conf.Configurable;
|
||||||
|
@ -60,6 +62,6 @@ public interface FenceMethod {
|
||||||
* @throws BadFencingConfigurationException if the configuration was
|
* @throws BadFencingConfigurationException if the configuration was
|
||||||
* determined to be invalid only at runtime
|
* determined to be invalid only at runtime
|
||||||
*/
|
*/
|
||||||
public boolean tryFence(HAServiceTarget target, String args)
|
public boolean tryFence(InetSocketAddress serviceAddr, String args)
|
||||||
throws BadFencingConfigurationException;
|
throws BadFencingConfigurationException;
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,6 +19,7 @@ package org.apache.hadoop.ha;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.PrintStream;
|
import java.io.PrintStream;
|
||||||
|
import java.net.InetSocketAddress;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
import org.apache.commons.cli.Options;
|
import org.apache.commons.cli.Options;
|
||||||
|
@ -27,8 +28,11 @@ import org.apache.commons.cli.CommandLineParser;
|
||||||
import org.apache.commons.cli.GnuParser;
|
import org.apache.commons.cli.GnuParser;
|
||||||
import org.apache.commons.cli.ParseException;
|
import org.apache.commons.cli.ParseException;
|
||||||
|
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.conf.Configured;
|
import org.apache.hadoop.conf.Configured;
|
||||||
|
import org.apache.hadoop.ha.protocolPB.HAServiceProtocolClientSideTranslatorPB;
|
||||||
|
import org.apache.hadoop.net.NetUtils;
|
||||||
import org.apache.hadoop.util.Tool;
|
import org.apache.hadoop.util.Tool;
|
||||||
import org.apache.hadoop.util.ToolRunner;
|
import org.apache.hadoop.util.ToolRunner;
|
||||||
|
|
||||||
|
@ -73,8 +77,6 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
protected PrintStream errOut = System.err;
|
protected PrintStream errOut = System.err;
|
||||||
PrintStream out = System.out;
|
PrintStream out = System.out;
|
||||||
|
|
||||||
protected abstract HAServiceTarget resolveTarget(String string);
|
|
||||||
|
|
||||||
protected String getUsageString() {
|
protected String getUsageString() {
|
||||||
return "Usage: HAAdmin";
|
return "Usage: HAAdmin";
|
||||||
}
|
}
|
||||||
|
@ -107,7 +109,7 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
HAServiceProtocol proto = resolveTarget(argv[1]).getProxy();
|
HAServiceProtocol proto = getProtocol(argv[1]);
|
||||||
HAServiceProtocolHelper.transitionToActive(proto);
|
HAServiceProtocolHelper.transitionToActive(proto);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@ -120,13 +122,14 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
HAServiceProtocol proto = resolveTarget(argv[1]).getProxy();
|
HAServiceProtocol proto = getProtocol(argv[1]);
|
||||||
HAServiceProtocolHelper.transitionToStandby(proto);
|
HAServiceProtocolHelper.transitionToStandby(proto);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
private int failover(final String[] argv)
|
private int failover(final String[] argv)
|
||||||
throws IOException, ServiceFailedException {
|
throws IOException, ServiceFailedException {
|
||||||
|
Configuration conf = getConf();
|
||||||
boolean forceFence = false;
|
boolean forceFence = false;
|
||||||
boolean forceActive = false;
|
boolean forceActive = false;
|
||||||
|
|
||||||
|
@ -159,12 +162,29 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
HAServiceTarget fromNode = resolveTarget(args[0]);
|
NodeFencer fencer;
|
||||||
HAServiceTarget toNode = resolveTarget(args[1]);
|
try {
|
||||||
|
fencer = NodeFencer.create(conf);
|
||||||
|
} catch (BadFencingConfigurationException bfce) {
|
||||||
|
errOut.println("failover: incorrect fencing configuration: " +
|
||||||
|
bfce.getLocalizedMessage());
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
if (fencer == null) {
|
||||||
|
errOut.println("failover: no fencer configured");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
InetSocketAddress addr1 =
|
||||||
|
NetUtils.createSocketAddr(getServiceAddr(args[0]));
|
||||||
|
InetSocketAddress addr2 =
|
||||||
|
NetUtils.createSocketAddr(getServiceAddr(args[1]));
|
||||||
|
HAServiceProtocol proto1 = getProtocol(args[0]);
|
||||||
|
HAServiceProtocol proto2 = getProtocol(args[1]);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(fromNode, toNode,
|
FailoverController.failover(proto1, addr1, proto2, addr2,
|
||||||
forceFence, forceActive);
|
fencer, forceFence, forceActive);
|
||||||
out.println("Failover from "+args[0]+" to "+args[1]+" successful");
|
out.println("Failover from "+args[0]+" to "+args[1]+" successful");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
errOut.println("Failover failed: " + ffe.getLocalizedMessage());
|
errOut.println("Failover failed: " + ffe.getLocalizedMessage());
|
||||||
|
@ -181,7 +201,7 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
HAServiceProtocol proto = resolveTarget(argv[1]).getProxy();
|
HAServiceProtocol proto = getProtocol(argv[1]);
|
||||||
try {
|
try {
|
||||||
HAServiceProtocolHelper.monitorHealth(proto);
|
HAServiceProtocolHelper.monitorHealth(proto);
|
||||||
} catch (HealthCheckFailedException e) {
|
} catch (HealthCheckFailedException e) {
|
||||||
|
@ -199,7 +219,7 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
HAServiceProtocol proto = resolveTarget(argv[1]).getProxy();
|
HAServiceProtocol proto = getProtocol(argv[1]);
|
||||||
out.println(proto.getServiceStatus().getState());
|
out.println(proto.getServiceStatus().getState());
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@ -212,6 +232,16 @@ public abstract class HAAdmin extends Configured implements Tool {
|
||||||
return serviceId;
|
return serviceId;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Return a proxy to the specified target service.
|
||||||
|
*/
|
||||||
|
protected HAServiceProtocol getProtocol(String serviceId)
|
||||||
|
throws IOException {
|
||||||
|
String serviceAddr = getServiceAddr(serviceId);
|
||||||
|
InetSocketAddress addr = NetUtils.createSocketAddr(serviceAddr);
|
||||||
|
return new HAServiceProtocolClientSideTranslatorPB(addr, getConf());
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public int run(String[] argv) throws Exception {
|
public int run(String[] argv) throws Exception {
|
||||||
try {
|
try {
|
||||||
|
|
|
@ -1,74 +0,0 @@
|
||||||
/**
|
|
||||||
* Licensed to the Apache Software Foundation (ASF) under one
|
|
||||||
* or more contributor license agreements. See the NOTICE file
|
|
||||||
* distributed with this work for additional information
|
|
||||||
* regarding copyright ownership. The ASF licenses this file
|
|
||||||
* to you under the Apache License, Version 2.0 (the
|
|
||||||
* "License"); you may not use this file except in compliance
|
|
||||||
* with the License. You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package org.apache.hadoop.ha;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.net.InetSocketAddress;
|
|
||||||
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.classification.InterfaceStability;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
|
||||||
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
|
||||||
import org.apache.hadoop.ha.protocolPB.HAServiceProtocolClientSideTranslatorPB;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Represents a target of the client side HA administration commands.
|
|
||||||
*/
|
|
||||||
@InterfaceAudience.Public
|
|
||||||
@InterfaceStability.Evolving
|
|
||||||
public abstract class HAServiceTarget {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the IPC address of the target node.
|
|
||||||
*/
|
|
||||||
public abstract InetSocketAddress getAddress();
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return a Fencer implementation configured for this target node
|
|
||||||
*/
|
|
||||||
public abstract NodeFencer getFencer();
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @throws BadFencingConfigurationException if the fencing configuration
|
|
||||||
* appears to be invalid. This is divorced from the above
|
|
||||||
* {@link #getFencer()} method so that the configuration can be checked
|
|
||||||
* during the pre-flight phase of failover.
|
|
||||||
*/
|
|
||||||
public abstract void checkFencingConfigured()
|
|
||||||
throws BadFencingConfigurationException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return a proxy to connect to the target HA Service.
|
|
||||||
*/
|
|
||||||
public HAServiceProtocol getProxy(Configuration conf, int timeoutMs)
|
|
||||||
throws IOException {
|
|
||||||
Configuration confCopy = new Configuration(conf);
|
|
||||||
// Lower the timeout so we quickly fail to connect
|
|
||||||
confCopy.setInt(CommonConfigurationKeysPublic.IPC_CLIENT_CONNECT_MAX_RETRIES_KEY, 1);
|
|
||||||
return new HAServiceProtocolClientSideTranslatorPB(
|
|
||||||
getAddress(),
|
|
||||||
confCopy, null, timeoutMs);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return a proxy to connect to the target HA Service.
|
|
||||||
*/
|
|
||||||
public final HAServiceProtocol getProxy() throws IOException {
|
|
||||||
return getProxy(new Configuration(), 0); // default conf, timeout
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -17,6 +17,7 @@
|
||||||
*/
|
*/
|
||||||
package org.apache.hadoop.ha;
|
package org.apache.hadoop.ha;
|
||||||
|
|
||||||
|
import java.net.InetSocketAddress;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.regex.Matcher;
|
import java.util.regex.Matcher;
|
||||||
|
@ -90,14 +91,14 @@ public class NodeFencer {
|
||||||
return new NodeFencer(conf);
|
return new NodeFencer(conf);
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean fence(HAServiceTarget fromSvc) {
|
public boolean fence(InetSocketAddress serviceAddr) {
|
||||||
LOG.info("====== Beginning Service Fencing Process... ======");
|
LOG.info("====== Beginning Service Fencing Process... ======");
|
||||||
int i = 0;
|
int i = 0;
|
||||||
for (FenceMethodWithArg method : methods) {
|
for (FenceMethodWithArg method : methods) {
|
||||||
LOG.info("Trying method " + (++i) + "/" + methods.size() +": " + method);
|
LOG.info("Trying method " + (++i) + "/" + methods.size() +": " + method);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
if (method.method.tryFence(fromSvc, method.arg)) {
|
if (method.method.tryFence(serviceAddr, method.arg)) {
|
||||||
LOG.info("====== Fencing successful by method " + method + " ======");
|
LOG.info("====== Fencing successful by method " + method + " ======");
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
|
@ -75,8 +75,7 @@ public class ShellCommandFencer
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean tryFence(HAServiceTarget target, String cmd) {
|
public boolean tryFence(InetSocketAddress serviceAddr, String cmd) {
|
||||||
InetSocketAddress serviceAddr = target.getAddress();
|
|
||||||
List<String> cmdList = Arrays.asList(cmd.split("\\s+"));
|
List<String> cmdList = Arrays.asList(cmd.split("\\s+"));
|
||||||
|
|
||||||
// Create arg list with service as the first argument
|
// Create arg list with service as the first argument
|
||||||
|
|
|
@ -79,11 +79,10 @@ public class SshFenceByTcpPort extends Configured
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean tryFence(HAServiceTarget target, String argsStr)
|
public boolean tryFence(InetSocketAddress serviceAddr, String argsStr)
|
||||||
throws BadFencingConfigurationException {
|
throws BadFencingConfigurationException {
|
||||||
|
|
||||||
Args args = new Args(argsStr);
|
Args args = new Args(argsStr);
|
||||||
InetSocketAddress serviceAddr = target.getAddress();
|
|
||||||
String host = serviceAddr.getHostName();
|
String host = serviceAddr.getHostName();
|
||||||
|
|
||||||
Session session;
|
Session session;
|
||||||
|
|
|
@ -1,94 +0,0 @@
|
||||||
/**
|
|
||||||
* Licensed to the Apache Software Foundation (ASF) under one
|
|
||||||
* or more contributor license agreements. See the NOTICE file
|
|
||||||
* distributed with this work for additional information
|
|
||||||
* regarding copyright ownership. The ASF licenses this file
|
|
||||||
* to you under the Apache License, Version 2.0 (the
|
|
||||||
* "License"); you may not use this file except in compliance
|
|
||||||
* with the License. You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package org.apache.hadoop.ha;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.net.InetSocketAddress;
|
|
||||||
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
|
||||||
import org.apache.hadoop.security.AccessControlException;
|
|
||||||
import org.mockito.Mockito;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test-only implementation of {@link HAServiceTarget}, which returns
|
|
||||||
* a mock implementation.
|
|
||||||
*/
|
|
||||||
class DummyHAService extends HAServiceTarget {
|
|
||||||
HAServiceState state;
|
|
||||||
HAServiceProtocol proxy;
|
|
||||||
NodeFencer fencer;
|
|
||||||
InetSocketAddress address;
|
|
||||||
|
|
||||||
DummyHAService(HAServiceState state, InetSocketAddress address) {
|
|
||||||
this.state = state;
|
|
||||||
this.proxy = makeMock();
|
|
||||||
this.fencer = Mockito.mock(NodeFencer.class);
|
|
||||||
this.address = address;
|
|
||||||
}
|
|
||||||
|
|
||||||
private HAServiceProtocol makeMock() {
|
|
||||||
return Mockito.spy(new HAServiceProtocol() {
|
|
||||||
@Override
|
|
||||||
public void monitorHealth() throws HealthCheckFailedException,
|
|
||||||
AccessControlException, IOException {
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void transitionToActive() throws ServiceFailedException,
|
|
||||||
AccessControlException, IOException {
|
|
||||||
state = HAServiceState.ACTIVE;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void transitionToStandby() throws ServiceFailedException,
|
|
||||||
AccessControlException, IOException {
|
|
||||||
state = HAServiceState.STANDBY;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public HAServiceStatus getServiceStatus() throws IOException {
|
|
||||||
HAServiceStatus ret = new HAServiceStatus(state);
|
|
||||||
if (state == HAServiceState.STANDBY) {
|
|
||||||
ret.setReadyToBecomeActive();
|
|
||||||
}
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public InetSocketAddress getAddress() {
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public HAServiceProtocol getProxy(Configuration conf, int timeout)
|
|
||||||
throws IOException {
|
|
||||||
return proxy;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public NodeFencer getFencer() {
|
|
||||||
return fencer;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void checkFencingConfigured() throws BadFencingConfigurationException {
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -24,85 +24,124 @@ import static org.mockito.Mockito.spy;
|
||||||
import static org.mockito.Mockito.verify;
|
import static org.mockito.Mockito.verify;
|
||||||
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
||||||
|
import org.apache.hadoop.ha.protocolPB.HAServiceProtocolClientSideTranslatorPB;
|
||||||
import org.apache.hadoop.ha.TestNodeFencer.AlwaysSucceedFencer;
|
import org.apache.hadoop.ha.TestNodeFencer.AlwaysSucceedFencer;
|
||||||
import org.apache.hadoop.ha.TestNodeFencer.AlwaysFailFencer;
|
import org.apache.hadoop.ha.TestNodeFencer.AlwaysFailFencer;
|
||||||
import static org.apache.hadoop.ha.TestNodeFencer.setupFencer;
|
import static org.apache.hadoop.ha.TestNodeFencer.setupFencer;
|
||||||
|
import org.apache.hadoop.net.NetUtils;
|
||||||
import org.apache.hadoop.security.AccessControlException;
|
import org.apache.hadoop.security.AccessControlException;
|
||||||
|
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.mockito.Mockito;
|
|
||||||
import org.mockito.internal.stubbing.answers.ThrowsException;
|
|
||||||
import org.mockito.stubbing.Answer;
|
|
||||||
|
|
||||||
import static org.junit.Assert.*;
|
import static org.junit.Assert.*;
|
||||||
|
|
||||||
public class TestFailoverController {
|
public class TestFailoverController {
|
||||||
|
|
||||||
private InetSocketAddress svc1Addr = new InetSocketAddress("svc1", 1234);
|
private InetSocketAddress svc1Addr = new InetSocketAddress("svc1", 1234);
|
||||||
private InetSocketAddress svc2Addr = new InetSocketAddress("svc2", 5678);
|
private InetSocketAddress svc2Addr = new InetSocketAddress("svc2", 5678);
|
||||||
|
|
||||||
HAServiceStatus STATE_NOT_READY = new HAServiceStatus(HAServiceState.STANDBY)
|
private class DummyService implements HAServiceProtocol {
|
||||||
.setNotReadyToBecomeActive("injected not ready");
|
HAServiceState state;
|
||||||
|
|
||||||
|
DummyService(HAServiceState state) {
|
||||||
|
this.state = state;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void monitorHealth() throws HealthCheckFailedException, IOException {
|
||||||
|
// Do nothing
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void transitionToActive() throws ServiceFailedException, IOException {
|
||||||
|
state = HAServiceState.ACTIVE;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void transitionToStandby() throws ServiceFailedException, IOException {
|
||||||
|
state = HAServiceState.STANDBY;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public HAServiceStatus getServiceStatus() throws IOException {
|
||||||
|
HAServiceStatus ret = new HAServiceStatus(state);
|
||||||
|
if (state == HAServiceState.STANDBY) {
|
||||||
|
ret.setReadyToBecomeActive();
|
||||||
|
}
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
private HAServiceState getServiceState() {
|
||||||
|
return state;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverAndFailback() throws Exception {
|
public void testFailoverAndFailback() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY);
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
AlwaysSucceedFencer.fenceCalled = 0;
|
AlwaysSucceedFencer.fenceCalled = 0;
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
assertEquals(0, TestNodeFencer.AlwaysSucceedFencer.fenceCalled);
|
assertEquals(0, TestNodeFencer.AlwaysSucceedFencer.fenceCalled);
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.ACTIVE, svc2.state);
|
assertEquals(HAServiceState.ACTIVE, svc2.getServiceState());
|
||||||
|
|
||||||
AlwaysSucceedFencer.fenceCalled = 0;
|
AlwaysSucceedFencer.fenceCalled = 0;
|
||||||
FailoverController.failover(svc2, svc1, false, false);
|
FailoverController.failover(svc2, svc2Addr, svc1, svc1Addr, fencer, false, false);
|
||||||
assertEquals(0, TestNodeFencer.AlwaysSucceedFencer.fenceCalled);
|
assertEquals(0, TestNodeFencer.AlwaysSucceedFencer.fenceCalled);
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverFromStandbyToStandby() throws Exception {
|
public void testFailoverFromStandbyToStandby() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.STANDBY, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.STANDBY);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY);
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.ACTIVE, svc2.state);
|
assertEquals(HAServiceState.ACTIVE, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverFromActiveToActive() throws Exception {
|
public void testFailoverFromActiveToActive() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.ACTIVE, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.ACTIVE);
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Can't failover to an already active service");
|
fail("Can't failover to an already active service");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
}
|
}
|
||||||
|
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.ACTIVE, svc2.state);
|
assertEquals(HAServiceState.ACTIVE, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverWithoutPermission() throws Exception {
|
public void testFailoverWithoutPermission() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE) {
|
||||||
Mockito.doThrow(new AccessControlException("Access denied"))
|
@Override
|
||||||
.when(svc1.proxy).getServiceStatus();
|
public HAServiceStatus getServiceStatus() throws IOException {
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
throw new AccessControlException("Access denied");
|
||||||
Mockito.doThrow(new AccessControlException("Access denied"))
|
}
|
||||||
.when(svc2.proxy).getServiceStatus();
|
};
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
|
@Override
|
||||||
|
public HAServiceStatus getServiceStatus() throws IOException {
|
||||||
|
throw new AccessControlException("Access denied");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Can't failover when access is denied");
|
fail("Can't failover when access is denied");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
assertTrue(ffe.getCause().getMessage().contains("Access denied"));
|
assertTrue(ffe.getCause().getMessage().contains("Access denied"));
|
||||||
|
@ -112,13 +151,19 @@ public class TestFailoverController {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverToUnreadyService() throws Exception {
|
public void testFailoverToUnreadyService() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
Mockito.doReturn(STATE_NOT_READY).when(svc2.proxy).getServiceStatus();
|
@Override
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
public HAServiceStatus getServiceStatus() throws IOException {
|
||||||
|
HAServiceStatus ret = new HAServiceStatus(HAServiceState.STANDBY);
|
||||||
|
ret.setNotReadyToBecomeActive("injected not ready");
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Can't failover to a service that's not ready");
|
fail("Can't failover to a service that's not ready");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
|
@ -127,88 +172,95 @@ public class TestFailoverController {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
|
|
||||||
// Forcing it means we ignore readyToBecomeActive
|
// Forcing it means we ignore readyToBecomeActive
|
||||||
FailoverController.failover(svc1, svc2, false, true);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, true);
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.ACTIVE, svc2.state);
|
assertEquals(HAServiceState.ACTIVE, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverToUnhealthyServiceFailsAndFailsback() throws Exception {
|
public void testFailoverToUnhealthyServiceFailsAndFailsback() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
Mockito.doThrow(new HealthCheckFailedException("Failed!"))
|
@Override
|
||||||
.when(svc2.proxy).monitorHealth();
|
public void monitorHealth() throws HealthCheckFailedException {
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
throw new HealthCheckFailedException("Failed!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failover to unhealthy service");
|
fail("Failover to unhealthy service");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
}
|
}
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverFromFaultyServiceSucceeds() throws Exception {
|
public void testFailoverFromFaultyServiceSucceeds() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE) {
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
@Override
|
||||||
.when(svc1.proxy).transitionToStandby();
|
public void transitionToStandby() throws ServiceFailedException {
|
||||||
|
throw new ServiceFailedException("Failed!");
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
}
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
};
|
||||||
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY);
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
AlwaysSucceedFencer.fenceCalled = 0;
|
AlwaysSucceedFencer.fenceCalled = 0;
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
fail("Faulty active prevented failover");
|
fail("Faulty active prevented failover");
|
||||||
}
|
}
|
||||||
|
|
||||||
// svc1 still thinks it's active, that's OK, it was fenced
|
// svc1 still thinks it's active, that's OK, it was fenced
|
||||||
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
||||||
assertSame(svc1, AlwaysSucceedFencer.fencedSvc);
|
assertEquals("svc1:1234", AlwaysSucceedFencer.fencedSvc);
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.ACTIVE, svc2.state);
|
assertEquals(HAServiceState.ACTIVE, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverFromFaultyServiceFencingFailure() throws Exception {
|
public void testFailoverFromFaultyServiceFencingFailure() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE) {
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
@Override
|
||||||
.when(svc1.proxy).transitionToStandby();
|
public void transitionToStandby() throws ServiceFailedException {
|
||||||
|
throw new ServiceFailedException("Failed!");
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
}
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysFailFencer.class.getName());
|
};
|
||||||
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY);
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysFailFencer.class.getName());
|
||||||
|
|
||||||
AlwaysFailFencer.fenceCalled = 0;
|
AlwaysFailFencer.fenceCalled = 0;
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failed over even though fencing failed");
|
fail("Failed over even though fencing failed");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
}
|
}
|
||||||
|
|
||||||
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
||||||
assertSame(svc1, AlwaysFailFencer.fencedSvc);
|
assertEquals("svc1:1234", AlwaysFailFencer.fencedSvc);
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFencingFailureDuringFailover() throws Exception {
|
public void testFencingFailureDuringFailover() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY);
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysFailFencer.class.getName());
|
NodeFencer fencer = setupFencer(AlwaysFailFencer.class.getName());
|
||||||
|
|
||||||
AlwaysFailFencer.fenceCalled = 0;
|
AlwaysFailFencer.fenceCalled = 0;
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, true, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, true, false);
|
||||||
fail("Failed over even though fencing requested and failed");
|
fail("Failed over even though fencing requested and failed");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
|
@ -217,83 +269,90 @@ public class TestFailoverController {
|
||||||
// If fencing was requested and it failed we don't try to make
|
// If fencing was requested and it failed we don't try to make
|
||||||
// svc2 active anyway, and we don't failback to svc1.
|
// svc2 active anyway, and we don't failback to svc1.
|
||||||
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
||||||
assertSame(svc1, AlwaysFailFencer.fencedSvc);
|
assertEquals("svc1:1234", AlwaysFailFencer.fencedSvc);
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
|
}
|
||||||
|
|
||||||
|
private HAServiceProtocol getProtocol(String target)
|
||||||
|
throws IOException {
|
||||||
|
InetSocketAddress addr = NetUtils.createSocketAddr(target);
|
||||||
|
Configuration conf = new Configuration();
|
||||||
|
// Lower the timeout so we quickly fail to connect
|
||||||
|
conf.setInt(CommonConfigurationKeysPublic.IPC_CLIENT_CONNECT_MAX_RETRIES_KEY, 1);
|
||||||
|
return new HAServiceProtocolClientSideTranslatorPB(addr, conf);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverFromNonExistantServiceWithFencer() throws Exception {
|
public void testFailoverFromNonExistantServiceWithFencer() throws Exception {
|
||||||
DummyHAService svc1 = spy(new DummyHAService(null, svc1Addr));
|
HAServiceProtocol svc1 = getProtocol("localhost:1234");
|
||||||
// Getting a proxy to a dead server will throw IOException on call,
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY);
|
||||||
// not on creation of the proxy.
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
HAServiceProtocol errorThrowingProxy = Mockito.mock(HAServiceProtocol.class,
|
|
||||||
new ThrowsException(new IOException("Could not connect to host")));
|
|
||||||
Mockito.doReturn(errorThrowingProxy).when(svc1).getProxy();
|
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
fail("Non-existant active prevented failover");
|
fail("Non-existant active prevented failover");
|
||||||
}
|
}
|
||||||
|
|
||||||
// Don't check svc1 because we can't reach it, but that's OK, it's been fenced.
|
// Don't check svc1 because we can't reach it, but that's OK, it's been fenced.
|
||||||
assertEquals(HAServiceState.ACTIVE, svc2.state);
|
assertEquals(HAServiceState.ACTIVE, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverToNonExistantServiceFails() throws Exception {
|
public void testFailoverToNonExistantServiceFails() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = spy(new DummyHAService(null, svc2Addr));
|
HAServiceProtocol svc2 = getProtocol("localhost:1234");
|
||||||
Mockito.doThrow(new IOException("Failed to connect"))
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
.when(svc2).getProxy(Mockito.<Configuration>any(),
|
|
||||||
Mockito.anyInt());
|
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failed over to a non-existant standby");
|
fail("Failed over to a non-existant standby");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
}
|
}
|
||||||
|
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailoverToFaultyServiceFailsbackOK() throws Exception {
|
public void testFailoverToFaultyServiceFailsbackOK() throws Exception {
|
||||||
DummyHAService svc1 = spy(new DummyHAService(HAServiceState.ACTIVE, svc1Addr));
|
DummyService svc1 = spy(new DummyService(HAServiceState.ACTIVE));
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
@Override
|
||||||
.when(svc2.proxy).transitionToActive();
|
public void transitionToActive() throws ServiceFailedException {
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
throw new ServiceFailedException("Failed!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failover to already active service");
|
fail("Failover to already active service");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
}
|
}
|
||||||
|
|
||||||
// svc1 went standby then back to active
|
// svc1 went standby then back to active
|
||||||
verify(svc1.proxy).transitionToStandby();
|
verify(svc1).transitionToStandby();
|
||||||
verify(svc1.proxy).transitionToActive();
|
verify(svc1).transitionToActive();
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testWeDontFailbackIfActiveWasFenced() throws Exception {
|
public void testWeDontFailbackIfActiveWasFenced() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
@Override
|
||||||
.when(svc2.proxy).transitionToActive();
|
public void transitionToActive() throws ServiceFailedException {
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
throw new ServiceFailedException("Failed!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, true, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, true, false);
|
||||||
fail("Failed over to service that won't transition to active");
|
fail("Failed over to service that won't transition to active");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
|
@ -301,21 +360,24 @@ public class TestFailoverController {
|
||||||
|
|
||||||
// We failed to failover and did not failback because we fenced
|
// We failed to failover and did not failback because we fenced
|
||||||
// svc1 (we forced it), therefore svc1 and svc2 should be standby.
|
// svc1 (we forced it), therefore svc1 and svc2 should be standby.
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testWeFenceOnFailbackIfTransitionToActiveFails() throws Exception {
|
public void testWeFenceOnFailbackIfTransitionToActiveFails() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
@Override
|
||||||
.when(svc2.proxy).transitionToActive();
|
public void transitionToActive() throws ServiceFailedException, IOException {
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
throw new IOException("Failed!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
AlwaysSucceedFencer.fenceCalled = 0;
|
AlwaysSucceedFencer.fenceCalled = 0;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failed over to service that won't transition to active");
|
fail("Failed over to service that won't transition to active");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
|
@ -324,22 +386,25 @@ public class TestFailoverController {
|
||||||
// We failed to failover. We did not fence svc1 because it cooperated
|
// We failed to failover. We did not fence svc1 because it cooperated
|
||||||
// and we didn't force it, so we failed back to svc1 and fenced svc2.
|
// and we didn't force it, so we failed back to svc1 and fenced svc2.
|
||||||
// Note svc2 still thinks it's active, that's OK, we fenced it.
|
// Note svc2 still thinks it's active, that's OK, we fenced it.
|
||||||
assertEquals(HAServiceState.ACTIVE, svc1.state);
|
assertEquals(HAServiceState.ACTIVE, svc1.getServiceState());
|
||||||
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
||||||
assertSame(svc2, AlwaysSucceedFencer.fencedSvc);
|
assertEquals("svc2:5678", AlwaysSucceedFencer.fencedSvc);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailureToFenceOnFailbackFailsTheFailback() throws Exception {
|
public void testFailureToFenceOnFailbackFailsTheFailback() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE);
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
Mockito.doThrow(new IOException("Failed!"))
|
@Override
|
||||||
.when(svc2.proxy).transitionToActive();
|
public void transitionToActive() throws ServiceFailedException, IOException {
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysFailFencer.class.getName());
|
throw new IOException("Failed!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysFailFencer.class.getName());
|
||||||
AlwaysFailFencer.fenceCalled = 0;
|
AlwaysFailFencer.fenceCalled = 0;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failed over to service that won't transition to active");
|
fail("Failed over to service that won't transition to active");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
|
@ -348,30 +413,35 @@ public class TestFailoverController {
|
||||||
// We did not fence svc1 because it cooperated and we didn't force it,
|
// We did not fence svc1 because it cooperated and we didn't force it,
|
||||||
// we failed to failover so we fenced svc2, we failed to fence svc2
|
// we failed to failover so we fenced svc2, we failed to fence svc2
|
||||||
// so we did not failback to svc1, ie it's still standby.
|
// so we did not failback to svc1, ie it's still standby.
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
||||||
assertSame(svc2, AlwaysFailFencer.fencedSvc);
|
assertEquals("svc2:5678", AlwaysFailFencer.fencedSvc);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFailbackToFaultyServiceFails() throws Exception {
|
public void testFailbackToFaultyServiceFails() throws Exception {
|
||||||
DummyHAService svc1 = new DummyHAService(HAServiceState.ACTIVE, svc1Addr);
|
DummyService svc1 = new DummyService(HAServiceState.ACTIVE) {
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
@Override
|
||||||
.when(svc1.proxy).transitionToActive();
|
public void transitionToActive() throws ServiceFailedException {
|
||||||
DummyHAService svc2 = new DummyHAService(HAServiceState.STANDBY, svc2Addr);
|
throw new ServiceFailedException("Failed!");
|
||||||
Mockito.doThrow(new ServiceFailedException("Failed!"))
|
}
|
||||||
.when(svc2.proxy).transitionToActive();
|
};
|
||||||
|
DummyService svc2 = new DummyService(HAServiceState.STANDBY) {
|
||||||
svc1.fencer = svc2.fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
@Override
|
||||||
|
public void transitionToActive() throws ServiceFailedException {
|
||||||
|
throw new ServiceFailedException("Failed!");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
NodeFencer fencer = setupFencer(AlwaysSucceedFencer.class.getName());
|
||||||
|
|
||||||
try {
|
try {
|
||||||
FailoverController.failover(svc1, svc2, false, false);
|
FailoverController.failover(svc1, svc1Addr, svc2, svc2Addr, fencer, false, false);
|
||||||
fail("Failover to already active service");
|
fail("Failover to already active service");
|
||||||
} catch (FailoverFailedException ffe) {
|
} catch (FailoverFailedException ffe) {
|
||||||
// Expected
|
// Expected
|
||||||
}
|
}
|
||||||
|
|
||||||
assertEquals(HAServiceState.STANDBY, svc1.state);
|
assertEquals(HAServiceState.STANDBY, svc1.getServiceState());
|
||||||
assertEquals(HAServiceState.STANDBY, svc2.state);
|
assertEquals(HAServiceState.STANDBY, svc2.getServiceState());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,15 +22,14 @@ import static org.junit.Assert.*;
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.PrintStream;
|
import java.io.PrintStream;
|
||||||
import java.net.InetSocketAddress;
|
|
||||||
|
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
|
||||||
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
import org.mockito.Mockito;
|
||||||
|
|
||||||
import com.google.common.base.Charsets;
|
import com.google.common.base.Charsets;
|
||||||
import com.google.common.base.Joiner;
|
import com.google.common.base.Joiner;
|
||||||
|
@ -41,14 +40,15 @@ public class TestHAAdmin {
|
||||||
private HAAdmin tool;
|
private HAAdmin tool;
|
||||||
private ByteArrayOutputStream errOutBytes = new ByteArrayOutputStream();
|
private ByteArrayOutputStream errOutBytes = new ByteArrayOutputStream();
|
||||||
private String errOutput;
|
private String errOutput;
|
||||||
|
private HAServiceProtocol mockProtocol;
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
public void setup() throws IOException {
|
public void setup() throws IOException {
|
||||||
|
mockProtocol = Mockito.mock(HAServiceProtocol.class);
|
||||||
tool = new HAAdmin() {
|
tool = new HAAdmin() {
|
||||||
@Override
|
@Override
|
||||||
protected HAServiceTarget resolveTarget(String target) {
|
protected HAServiceProtocol getProtocol(String target) throws IOException {
|
||||||
return new DummyHAService(HAServiceState.STANDBY,
|
return mockProtocol;
|
||||||
new InetSocketAddress("dummy", 12345));
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
tool.setConf(new Configuration());
|
tool.setConf(new Configuration());
|
||||||
|
|
|
@ -26,35 +26,26 @@ import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.conf.Configured;
|
import org.apache.hadoop.conf.Configured;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.mockito.Mockito;
|
|
||||||
|
|
||||||
import com.google.common.collect.Lists;
|
import com.google.common.collect.Lists;
|
||||||
|
|
||||||
public class TestNodeFencer {
|
public class TestNodeFencer {
|
||||||
|
|
||||||
private HAServiceTarget MOCK_TARGET;
|
|
||||||
|
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
public void clearMockState() {
|
public void clearMockState() {
|
||||||
AlwaysSucceedFencer.fenceCalled = 0;
|
AlwaysSucceedFencer.fenceCalled = 0;
|
||||||
AlwaysSucceedFencer.callArgs.clear();
|
AlwaysSucceedFencer.callArgs.clear();
|
||||||
AlwaysFailFencer.fenceCalled = 0;
|
AlwaysFailFencer.fenceCalled = 0;
|
||||||
AlwaysFailFencer.callArgs.clear();
|
AlwaysFailFencer.callArgs.clear();
|
||||||
|
|
||||||
MOCK_TARGET = Mockito.mock(HAServiceTarget.class);
|
|
||||||
Mockito.doReturn("my mock").when(MOCK_TARGET).toString();
|
|
||||||
Mockito.doReturn(new InetSocketAddress("host", 1234))
|
|
||||||
.when(MOCK_TARGET).getAddress();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testSingleFencer() throws BadFencingConfigurationException {
|
public void testSingleFencer() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer(
|
NodeFencer fencer = setupFencer(
|
||||||
AlwaysSucceedFencer.class.getName() + "(foo)");
|
AlwaysSucceedFencer.class.getName() + "(foo)");
|
||||||
assertTrue(fencer.fence(MOCK_TARGET));
|
assertTrue(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
||||||
assertSame(MOCK_TARGET, AlwaysSucceedFencer.fencedSvc);
|
assertEquals("host:1234", AlwaysSucceedFencer.fencedSvc);
|
||||||
assertEquals("foo", AlwaysSucceedFencer.callArgs.get(0));
|
assertEquals("foo", AlwaysSucceedFencer.callArgs.get(0));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -63,7 +54,7 @@ public class TestNodeFencer {
|
||||||
NodeFencer fencer = setupFencer(
|
NodeFencer fencer = setupFencer(
|
||||||
AlwaysSucceedFencer.class.getName() + "(foo)\n" +
|
AlwaysSucceedFencer.class.getName() + "(foo)\n" +
|
||||||
AlwaysSucceedFencer.class.getName() + "(bar)\n");
|
AlwaysSucceedFencer.class.getName() + "(bar)\n");
|
||||||
assertTrue(fencer.fence(MOCK_TARGET));
|
assertTrue(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
// Only one call, since the first fencer succeeds
|
// Only one call, since the first fencer succeeds
|
||||||
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
||||||
assertEquals("foo", AlwaysSucceedFencer.callArgs.get(0));
|
assertEquals("foo", AlwaysSucceedFencer.callArgs.get(0));
|
||||||
|
@ -77,12 +68,12 @@ public class TestNodeFencer {
|
||||||
" # the next one will always fail\n" +
|
" # the next one will always fail\n" +
|
||||||
" " + AlwaysFailFencer.class.getName() + "(foo) # <- fails\n" +
|
" " + AlwaysFailFencer.class.getName() + "(foo) # <- fails\n" +
|
||||||
AlwaysSucceedFencer.class.getName() + "(bar) \n");
|
AlwaysSucceedFencer.class.getName() + "(bar) \n");
|
||||||
assertTrue(fencer.fence(MOCK_TARGET));
|
assertTrue(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
// One call to each, since top fencer fails
|
// One call to each, since top fencer fails
|
||||||
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
assertEquals(1, AlwaysFailFencer.fenceCalled);
|
||||||
assertSame(MOCK_TARGET, AlwaysFailFencer.fencedSvc);
|
assertEquals("host:1234", AlwaysFailFencer.fencedSvc);
|
||||||
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
||||||
assertSame(MOCK_TARGET, AlwaysSucceedFencer.fencedSvc);
|
assertEquals("host:1234", AlwaysSucceedFencer.fencedSvc);
|
||||||
assertEquals("foo", AlwaysFailFencer.callArgs.get(0));
|
assertEquals("foo", AlwaysFailFencer.callArgs.get(0));
|
||||||
assertEquals("bar", AlwaysSucceedFencer.callArgs.get(0));
|
assertEquals("bar", AlwaysSucceedFencer.callArgs.get(0));
|
||||||
}
|
}
|
||||||
|
@ -91,41 +82,41 @@ public class TestNodeFencer {
|
||||||
public void testArglessFencer() throws BadFencingConfigurationException {
|
public void testArglessFencer() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer(
|
NodeFencer fencer = setupFencer(
|
||||||
AlwaysSucceedFencer.class.getName());
|
AlwaysSucceedFencer.class.getName());
|
||||||
assertTrue(fencer.fence(MOCK_TARGET));
|
assertTrue(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
// One call to each, since top fencer fails
|
// One call to each, since top fencer fails
|
||||||
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
assertEquals(1, AlwaysSucceedFencer.fenceCalled);
|
||||||
assertSame(MOCK_TARGET, AlwaysSucceedFencer.fencedSvc);
|
assertEquals("host:1234", AlwaysSucceedFencer.fencedSvc);
|
||||||
assertEquals(null, AlwaysSucceedFencer.callArgs.get(0));
|
assertEquals(null, AlwaysSucceedFencer.callArgs.get(0));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testShortNameShell() throws BadFencingConfigurationException {
|
public void testShortNameShell() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer("shell(true)");
|
NodeFencer fencer = setupFencer("shell(true)");
|
||||||
assertTrue(fencer.fence(MOCK_TARGET));
|
assertTrue(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testShortNameSsh() throws BadFencingConfigurationException {
|
public void testShortNameSsh() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer("sshfence");
|
NodeFencer fencer = setupFencer("sshfence");
|
||||||
assertFalse(fencer.fence(MOCK_TARGET));
|
assertFalse(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testShortNameSshWithUser() throws BadFencingConfigurationException {
|
public void testShortNameSshWithUser() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer("sshfence(user)");
|
NodeFencer fencer = setupFencer("sshfence(user)");
|
||||||
assertFalse(fencer.fence(MOCK_TARGET));
|
assertFalse(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testShortNameSshWithPort() throws BadFencingConfigurationException {
|
public void testShortNameSshWithPort() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer("sshfence(:123)");
|
NodeFencer fencer = setupFencer("sshfence(:123)");
|
||||||
assertFalse(fencer.fence(MOCK_TARGET));
|
assertFalse(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testShortNameSshWithUserPort() throws BadFencingConfigurationException {
|
public void testShortNameSshWithUserPort() throws BadFencingConfigurationException {
|
||||||
NodeFencer fencer = setupFencer("sshfence(user:123)");
|
NodeFencer fencer = setupFencer("sshfence(user:123)");
|
||||||
assertFalse(fencer.fence(MOCK_TARGET));
|
assertFalse(fencer.fence(new InetSocketAddress("host", 1234)));
|
||||||
}
|
}
|
||||||
|
|
||||||
public static NodeFencer setupFencer(String confStr)
|
public static NodeFencer setupFencer(String confStr)
|
||||||
|
@ -142,12 +133,12 @@ public class TestNodeFencer {
|
||||||
public static class AlwaysSucceedFencer extends Configured
|
public static class AlwaysSucceedFencer extends Configured
|
||||||
implements FenceMethod {
|
implements FenceMethod {
|
||||||
static int fenceCalled = 0;
|
static int fenceCalled = 0;
|
||||||
static HAServiceTarget fencedSvc;
|
static String fencedSvc;
|
||||||
static List<String> callArgs = Lists.newArrayList();
|
static List<String> callArgs = Lists.newArrayList();
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean tryFence(HAServiceTarget target, String args) {
|
public boolean tryFence(InetSocketAddress serviceAddr, String args) {
|
||||||
fencedSvc = target;
|
fencedSvc = serviceAddr.getHostName() + ":" + serviceAddr.getPort();
|
||||||
callArgs.add(args);
|
callArgs.add(args);
|
||||||
fenceCalled++;
|
fenceCalled++;
|
||||||
return true;
|
return true;
|
||||||
|
@ -164,12 +155,12 @@ public class TestNodeFencer {
|
||||||
public static class AlwaysFailFencer extends Configured
|
public static class AlwaysFailFencer extends Configured
|
||||||
implements FenceMethod {
|
implements FenceMethod {
|
||||||
static int fenceCalled = 0;
|
static int fenceCalled = 0;
|
||||||
static HAServiceTarget fencedSvc;
|
static String fencedSvc;
|
||||||
static List<String> callArgs = Lists.newArrayList();
|
static List<String> callArgs = Lists.newArrayList();
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean tryFence(HAServiceTarget target, String args) {
|
public boolean tryFence(InetSocketAddress serviceAddr, String args) {
|
||||||
fencedSvc = target;
|
fencedSvc = serviceAddr.getHostName() + ":" + serviceAddr.getPort();
|
||||||
callArgs.add(args);
|
callArgs.add(args);
|
||||||
fenceCalled++;
|
fenceCalled++;
|
||||||
return false;
|
return false;
|
||||||
|
|
|
@ -22,7 +22,6 @@ import static org.junit.Assert.*;
|
||||||
import java.net.InetSocketAddress;
|
import java.net.InetSocketAddress;
|
||||||
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.BeforeClass;
|
import org.junit.BeforeClass;
|
||||||
|
@ -33,9 +32,6 @@ import static org.mockito.Mockito.spy;
|
||||||
|
|
||||||
public class TestShellCommandFencer {
|
public class TestShellCommandFencer {
|
||||||
private ShellCommandFencer fencer = createFencer();
|
private ShellCommandFencer fencer = createFencer();
|
||||||
private static final HAServiceTarget TEST_TARGET =
|
|
||||||
new DummyHAService(HAServiceState.ACTIVE,
|
|
||||||
new InetSocketAddress("host", 1234));
|
|
||||||
|
|
||||||
@BeforeClass
|
@BeforeClass
|
||||||
public static void setupLogSpy() {
|
public static void setupLogSpy() {
|
||||||
|
@ -61,10 +57,11 @@ public class TestShellCommandFencer {
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testBasicSuccessFailure() {
|
public void testBasicSuccessFailure() {
|
||||||
assertTrue(fencer.tryFence(TEST_TARGET, "echo"));
|
InetSocketAddress addr = new InetSocketAddress("host", 1234);
|
||||||
assertFalse(fencer.tryFence(TEST_TARGET, "exit 1"));
|
assertTrue(fencer.tryFence(addr, "echo"));
|
||||||
|
assertFalse(fencer.tryFence(addr, "exit 1"));
|
||||||
// bad path should also fail
|
// bad path should also fail
|
||||||
assertFalse(fencer.tryFence(TEST_TARGET, "xxxxxxxxxxxx"));
|
assertFalse(fencer.tryFence(addr, "xxxxxxxxxxxx"));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -101,7 +98,8 @@ public class TestShellCommandFencer {
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testStdoutLogging() {
|
public void testStdoutLogging() {
|
||||||
assertTrue(fencer.tryFence(TEST_TARGET, "echo hello"));
|
InetSocketAddress addr = new InetSocketAddress("host", 1234);
|
||||||
|
assertTrue(fencer.tryFence(addr, "echo hello"));
|
||||||
Mockito.verify(ShellCommandFencer.LOG).info(
|
Mockito.verify(ShellCommandFencer.LOG).info(
|
||||||
Mockito.endsWith("echo hello: host:1234 hello"));
|
Mockito.endsWith("echo hello: host:1234 hello"));
|
||||||
}
|
}
|
||||||
|
@ -112,7 +110,8 @@ public class TestShellCommandFencer {
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testStderrLogging() {
|
public void testStderrLogging() {
|
||||||
assertTrue(fencer.tryFence(TEST_TARGET, "echo hello >&2"));
|
InetSocketAddress addr = new InetSocketAddress("host", 1234);
|
||||||
|
assertTrue(fencer.tryFence(addr, "echo hello >&2"));
|
||||||
Mockito.verify(ShellCommandFencer.LOG).warn(
|
Mockito.verify(ShellCommandFencer.LOG).warn(
|
||||||
Mockito.endsWith("echo hello >&2: host:1234 hello"));
|
Mockito.endsWith("echo hello >&2: host:1234 hello"));
|
||||||
}
|
}
|
||||||
|
@ -123,7 +122,8 @@ public class TestShellCommandFencer {
|
||||||
*/
|
*/
|
||||||
@Test
|
@Test
|
||||||
public void testConfAsEnvironment() {
|
public void testConfAsEnvironment() {
|
||||||
fencer.tryFence(TEST_TARGET, "echo $in_fencing_tests");
|
InetSocketAddress addr = new InetSocketAddress("host", 1234);
|
||||||
|
fencer.tryFence(addr, "echo $in_fencing_tests");
|
||||||
Mockito.verify(ShellCommandFencer.LOG).info(
|
Mockito.verify(ShellCommandFencer.LOG).info(
|
||||||
Mockito.endsWith("echo $in...ing_tests: host:1234 yessir"));
|
Mockito.endsWith("echo $in...ing_tests: host:1234 yessir"));
|
||||||
}
|
}
|
||||||
|
@ -136,7 +136,8 @@ public class TestShellCommandFencer {
|
||||||
*/
|
*/
|
||||||
@Test(timeout=10000)
|
@Test(timeout=10000)
|
||||||
public void testSubprocessInputIsClosed() {
|
public void testSubprocessInputIsClosed() {
|
||||||
assertFalse(fencer.tryFence(TEST_TARGET, "read"));
|
InetSocketAddress addr = new InetSocketAddress("host", 1234);
|
||||||
|
assertFalse(fencer.tryFence(addr, "read"));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -23,7 +23,6 @@ import java.net.InetSocketAddress;
|
||||||
|
|
||||||
import org.apache.commons.logging.impl.Log4JLogger;
|
import org.apache.commons.logging.impl.Log4JLogger;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
|
||||||
import org.apache.hadoop.ha.SshFenceByTcpPort.Args;
|
import org.apache.hadoop.ha.SshFenceByTcpPort.Args;
|
||||||
import org.apache.log4j.Level;
|
import org.apache.log4j.Level;
|
||||||
import org.junit.Assume;
|
import org.junit.Assume;
|
||||||
|
@ -35,26 +34,13 @@ public class TestSshFenceByTcpPort {
|
||||||
((Log4JLogger)SshFenceByTcpPort.LOG).getLogger().setLevel(Level.ALL);
|
((Log4JLogger)SshFenceByTcpPort.LOG).getLogger().setLevel(Level.ALL);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static String TEST_FENCING_HOST = System.getProperty(
|
private String TEST_FENCING_HOST = System.getProperty(
|
||||||
"test.TestSshFenceByTcpPort.host", "localhost");
|
"test.TestSshFenceByTcpPort.host", "localhost");
|
||||||
private static final String TEST_FENCING_PORT = System.getProperty(
|
private String TEST_FENCING_PORT = System.getProperty(
|
||||||
"test.TestSshFenceByTcpPort.port", "8020");
|
"test.TestSshFenceByTcpPort.port", "8020");
|
||||||
private static final String TEST_KEYFILE = System.getProperty(
|
private final String TEST_KEYFILE = System.getProperty(
|
||||||
"test.TestSshFenceByTcpPort.key");
|
"test.TestSshFenceByTcpPort.key");
|
||||||
|
|
||||||
private static final InetSocketAddress TEST_ADDR =
|
|
||||||
new InetSocketAddress(TEST_FENCING_HOST,
|
|
||||||
Integer.valueOf(TEST_FENCING_PORT));
|
|
||||||
private static final HAServiceTarget TEST_TARGET =
|
|
||||||
new DummyHAService(HAServiceState.ACTIVE, TEST_ADDR);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Connect to Google's DNS server - not running ssh!
|
|
||||||
*/
|
|
||||||
private static final HAServiceTarget UNFENCEABLE_TARGET =
|
|
||||||
new DummyHAService(HAServiceState.ACTIVE,
|
|
||||||
new InetSocketAddress("8.8.8.8", 1234));
|
|
||||||
|
|
||||||
@Test(timeout=20000)
|
@Test(timeout=20000)
|
||||||
public void testFence() throws BadFencingConfigurationException {
|
public void testFence() throws BadFencingConfigurationException {
|
||||||
Assume.assumeTrue(isConfigured());
|
Assume.assumeTrue(isConfigured());
|
||||||
|
@ -63,7 +49,8 @@ public class TestSshFenceByTcpPort {
|
||||||
SshFenceByTcpPort fence = new SshFenceByTcpPort();
|
SshFenceByTcpPort fence = new SshFenceByTcpPort();
|
||||||
fence.setConf(conf);
|
fence.setConf(conf);
|
||||||
assertTrue(fence.tryFence(
|
assertTrue(fence.tryFence(
|
||||||
TEST_TARGET,
|
new InetSocketAddress(TEST_FENCING_HOST,
|
||||||
|
Integer.valueOf(TEST_FENCING_PORT)),
|
||||||
null));
|
null));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -78,7 +65,8 @@ public class TestSshFenceByTcpPort {
|
||||||
conf.setInt(SshFenceByTcpPort.CONF_CONNECT_TIMEOUT_KEY, 3000);
|
conf.setInt(SshFenceByTcpPort.CONF_CONNECT_TIMEOUT_KEY, 3000);
|
||||||
SshFenceByTcpPort fence = new SshFenceByTcpPort();
|
SshFenceByTcpPort fence = new SshFenceByTcpPort();
|
||||||
fence.setConf(conf);
|
fence.setConf(conf);
|
||||||
assertFalse(fence.tryFence(UNFENCEABLE_TARGET, ""));
|
// Connect to Google's DNS server - not running ssh!
|
||||||
|
assertFalse(fence.tryFence(new InetSocketAddress("8.8.8.8", 1234), ""));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -25,8 +25,8 @@ import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.fs.CommonConfigurationKeys;
|
import org.apache.hadoop.fs.CommonConfigurationKeys;
|
||||||
import org.apache.hadoop.ha.HAAdmin;
|
import org.apache.hadoop.ha.HAAdmin;
|
||||||
import org.apache.hadoop.ha.HAServiceTarget;
|
|
||||||
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
||||||
|
import org.apache.hadoop.hdfs.DFSUtil;
|
||||||
import org.apache.hadoop.hdfs.HdfsConfiguration;
|
import org.apache.hadoop.hdfs.HdfsConfiguration;
|
||||||
import org.apache.hadoop.util.ToolRunner;
|
import org.apache.hadoop.util.ToolRunner;
|
||||||
|
|
||||||
|
@ -65,9 +65,15 @@ public class DFSHAAdmin extends HAAdmin {
|
||||||
* Try to map the given namenode ID to its service address.
|
* Try to map the given namenode ID to its service address.
|
||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
protected HAServiceTarget resolveTarget(String nnId) {
|
protected String getServiceAddr(String nnId) {
|
||||||
HdfsConfiguration conf = (HdfsConfiguration)getConf();
|
HdfsConfiguration conf = (HdfsConfiguration)getConf();
|
||||||
return new NNHAServiceTarget(conf, nameserviceId, nnId);
|
String serviceAddr =
|
||||||
|
DFSUtil.getNamenodeServiceAddr(conf, nameserviceId, nnId);
|
||||||
|
if (serviceAddr == null) {
|
||||||
|
throw new IllegalArgumentException(
|
||||||
|
"Unable to determine service address for namenode '" + nnId + "'");
|
||||||
|
}
|
||||||
|
return serviceAddr;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -1,84 +0,0 @@
|
||||||
/**
|
|
||||||
* Licensed to the Apache Software Foundation (ASF) under one
|
|
||||||
* or more contributor license agreements. See the NOTICE file
|
|
||||||
* distributed with this work for additional information
|
|
||||||
* regarding copyright ownership. The ASF licenses this file
|
|
||||||
* to you under the Apache License, Version 2.0 (the
|
|
||||||
* "License"); you may not use this file except in compliance
|
|
||||||
* with the License. You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package org.apache.hadoop.hdfs.tools;
|
|
||||||
|
|
||||||
import java.net.InetSocketAddress;
|
|
||||||
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.ha.BadFencingConfigurationException;
|
|
||||||
import org.apache.hadoop.ha.HAServiceTarget;
|
|
||||||
import org.apache.hadoop.ha.NodeFencer;
|
|
||||||
import org.apache.hadoop.hdfs.DFSUtil;
|
|
||||||
import org.apache.hadoop.hdfs.HdfsConfiguration;
|
|
||||||
import org.apache.hadoop.hdfs.server.namenode.NameNode;
|
|
||||||
import org.apache.hadoop.net.NetUtils;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* One of the NN NameNodes acting as the target of an administrative command
|
|
||||||
* (e.g. failover).
|
|
||||||
*/
|
|
||||||
@InterfaceAudience.Private
|
|
||||||
public class NNHAServiceTarget extends HAServiceTarget {
|
|
||||||
|
|
||||||
private final InetSocketAddress addr;
|
|
||||||
private NodeFencer fencer;
|
|
||||||
private BadFencingConfigurationException fenceConfigError;
|
|
||||||
|
|
||||||
public NNHAServiceTarget(HdfsConfiguration conf,
|
|
||||||
String nsId, String nnId) {
|
|
||||||
String serviceAddr =
|
|
||||||
DFSUtil.getNamenodeServiceAddr(conf, nsId, nnId);
|
|
||||||
if (serviceAddr == null) {
|
|
||||||
throw new IllegalArgumentException(
|
|
||||||
"Unable to determine service address for namenode '" + nnId + "'");
|
|
||||||
}
|
|
||||||
this.addr = NetUtils.createSocketAddr(serviceAddr,
|
|
||||||
NameNode.DEFAULT_PORT);
|
|
||||||
try {
|
|
||||||
this.fencer = NodeFencer.create(conf);
|
|
||||||
} catch (BadFencingConfigurationException e) {
|
|
||||||
this.fenceConfigError = e;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @return the NN's IPC address.
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public InetSocketAddress getAddress() {
|
|
||||||
return addr;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void checkFencingConfigured() throws BadFencingConfigurationException {
|
|
||||||
if (fenceConfigError != null) {
|
|
||||||
throw fenceConfigError;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public NodeFencer getFencer() {
|
|
||||||
return fencer;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String toString() {
|
|
||||||
return "NameNode at " + addr;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
|
@ -32,7 +32,6 @@ import org.apache.hadoop.hdfs.HdfsConfiguration;
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol;
|
import org.apache.hadoop.ha.HAServiceProtocol;
|
||||||
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
|
||||||
import org.apache.hadoop.ha.HAServiceStatus;
|
import org.apache.hadoop.ha.HAServiceStatus;
|
||||||
import org.apache.hadoop.ha.HAServiceTarget;
|
|
||||||
import org.apache.hadoop.ha.HealthCheckFailedException;
|
import org.apache.hadoop.ha.HealthCheckFailedException;
|
||||||
import org.apache.hadoop.ha.NodeFencer;
|
import org.apache.hadoop.ha.NodeFencer;
|
||||||
|
|
||||||
|
@ -80,18 +79,10 @@ public class TestDFSHAAdmin {
|
||||||
public void setup() throws IOException {
|
public void setup() throws IOException {
|
||||||
mockProtocol = Mockito.mock(HAServiceProtocol.class);
|
mockProtocol = Mockito.mock(HAServiceProtocol.class);
|
||||||
tool = new DFSHAAdmin() {
|
tool = new DFSHAAdmin() {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected HAServiceTarget resolveTarget(String nnId) {
|
protected HAServiceProtocol getProtocol(String serviceId) throws IOException {
|
||||||
HAServiceTarget target = super.resolveTarget(nnId);
|
getServiceAddr(serviceId);
|
||||||
HAServiceTarget spy = Mockito.spy(target);
|
return mockProtocol;
|
||||||
// OVerride the target to return our mock protocol
|
|
||||||
try {
|
|
||||||
Mockito.doReturn(mockProtocol).when(spy).getProxy();
|
|
||||||
} catch (IOException e) {
|
|
||||||
throw new AssertionError(e); // mock setup doesn't really throw
|
|
||||||
}
|
|
||||||
return spy;
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
tool.setConf(getHAConf());
|
tool.setConf(getHAConf());
|
||||||
|
|
Loading…
Reference in New Issue