HDDS-2266. Avoid evaluation of LOG.trace and LOG.debug statement in the read/write path. (#1633)
This commit is contained in:
parent
eeb58a07e2
commit
a031388a2e
|
@ -41,8 +41,7 @@ import java.util.stream.Collectors;
|
||||||
*/
|
*/
|
||||||
public final class Pipeline {
|
public final class Pipeline {
|
||||||
|
|
||||||
private static final Logger LOG = LoggerFactory
|
private static final Logger LOG = LoggerFactory.getLogger(Pipeline.class);
|
||||||
.getLogger(Pipeline.class);
|
|
||||||
private final PipelineID id;
|
private final PipelineID id;
|
||||||
private final ReplicationType type;
|
private final ReplicationType type;
|
||||||
private final ReplicationFactor factor;
|
private final ReplicationFactor factor;
|
||||||
|
|
|
@ -193,11 +193,13 @@ public class BlockOutputStreamEntryPool {
|
||||||
.setPipeline(streamEntry.getPipeline()).build();
|
.setPipeline(streamEntry.getPipeline()).build();
|
||||||
locationInfoList.add(info);
|
locationInfoList.add(info);
|
||||||
}
|
}
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug(
|
LOG.debug(
|
||||||
"block written " + streamEntry.getBlockID() + ", length " + length
|
"block written " + streamEntry.getBlockID() + ", length " + length
|
||||||
+ " bcsID " + streamEntry.getBlockID()
|
+ " bcsID " + streamEntry.getBlockID()
|
||||||
.getBlockCommitSequenceId());
|
.getBlockCommitSequenceId());
|
||||||
}
|
}
|
||||||
|
}
|
||||||
return locationInfoList;
|
return locationInfoList;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -97,8 +97,10 @@ public class KeyInputStream extends InputStream implements Seekable {
|
||||||
long keyLength = 0;
|
long keyLength = 0;
|
||||||
for (int i = 0; i < blockInfos.size(); i++) {
|
for (int i = 0; i < blockInfos.size(); i++) {
|
||||||
OmKeyLocationInfo omKeyLocationInfo = blockInfos.get(i);
|
OmKeyLocationInfo omKeyLocationInfo = blockInfos.get(i);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Adding stream for accessing {}. The stream will be " +
|
LOG.debug("Adding stream for accessing {}. The stream will be " +
|
||||||
"initialized later.", omKeyLocationInfo);
|
"initialized later.", omKeyLocationInfo);
|
||||||
|
}
|
||||||
|
|
||||||
addStream(omKeyLocationInfo, xceiverClientManager,
|
addStream(omKeyLocationInfo, xceiverClientManager,
|
||||||
verifyChecksum);
|
verifyChecksum);
|
||||||
|
|
|
@ -439,10 +439,14 @@ public class RpcClient implements ClientProtocol {
|
||||||
ozoneManagerClient.getDelegationToken(renewer);
|
ozoneManagerClient.getDelegationToken(renewer);
|
||||||
if (token != null) {
|
if (token != null) {
|
||||||
token.setService(dtService);
|
token.setService(dtService);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Created token {} for dtService {}", token, dtService);
|
LOG.debug("Created token {} for dtService {}", token, dtService);
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
LOG.debug("Cannot get ozone delegation token for renewer {} to access " +
|
if (LOG.isDebugEnabled()) {
|
||||||
"service {}", renewer, dtService);
|
LOG.debug("Cannot get ozone delegation token for renewer {} to " +
|
||||||
|
"access service {}", renewer, dtService);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return token;
|
return token;
|
||||||
}
|
}
|
||||||
|
|
|
@ -75,7 +75,9 @@ public class S3SecretManagerImpl implements S3SecretManager {
|
||||||
} finally {
|
} finally {
|
||||||
omMetadataManager.getLock().releaseLock(S3_SECRET_LOCK, kerberosID);
|
omMetadataManager.getLock().releaseLock(S3_SECRET_LOCK, kerberosID);
|
||||||
}
|
}
|
||||||
|
if (LOG.isTraceEnabled()) {
|
||||||
LOG.trace("Secret for accessKey:{}, proto:{}", kerberosID, result);
|
LOG.trace("Secret for accessKey:{}, proto:{}", kerberosID, result);
|
||||||
|
}
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -214,9 +214,11 @@ public class OMFailoverProxyProvider implements
|
||||||
@Override
|
@Override
|
||||||
public void performFailover(OzoneManagerProtocolPB currentProxy) {
|
public void performFailover(OzoneManagerProtocolPB currentProxy) {
|
||||||
int newProxyIndex = incrementProxyIndex();
|
int newProxyIndex = incrementProxyIndex();
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Failing over OM proxy to index: {}, nodeId: {}",
|
LOG.debug("Failing over OM proxy to index: {}, nodeId: {}",
|
||||||
newProxyIndex, omNodeIDList.get(newProxyIndex));
|
newProxyIndex, omNodeIDList.get(newProxyIndex));
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Update the proxy index to the next proxy in the list.
|
* Update the proxy index to the next proxy in the list.
|
||||||
|
|
|
@ -61,7 +61,9 @@ public final class OMRatisHelper {
|
||||||
*/
|
*/
|
||||||
public static RaftClient newRaftClient(RpcType rpcType, String omId, RaftGroup
|
public static RaftClient newRaftClient(RpcType rpcType, String omId, RaftGroup
|
||||||
group, RetryPolicy retryPolicy, Configuration conf) {
|
group, RetryPolicy retryPolicy, Configuration conf) {
|
||||||
|
if (LOG.isTraceEnabled()) {
|
||||||
LOG.trace("newRaftClient: {}, leader={}, group={}", rpcType, omId, group);
|
LOG.trace("newRaftClient: {}, leader={}, group={}", rpcType, omId, group);
|
||||||
|
}
|
||||||
final RaftProperties properties = new RaftProperties();
|
final RaftProperties properties = new RaftProperties();
|
||||||
RaftConfigKeys.Rpc.setType(properties, rpcType);
|
RaftConfigKeys.Rpc.setType(properties, rpcType);
|
||||||
|
|
||||||
|
|
|
@ -168,8 +168,10 @@ public class OzoneManagerLock {
|
||||||
throw new RuntimeException(errorMessage);
|
throw new RuntimeException(errorMessage);
|
||||||
} else {
|
} else {
|
||||||
lockFn.accept(resourceName);
|
lockFn.accept(resourceName);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Acquired {} {} lock on resource {}", lockType, resource.name,
|
LOG.debug("Acquired {} {} lock on resource {}", lockType, resource.name,
|
||||||
resourceName);
|
resourceName);
|
||||||
|
}
|
||||||
lockSet.set(resource.setLock(lockSet.get()));
|
lockSet.set(resource.setLock(lockSet.get()));
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
@ -264,8 +266,10 @@ public class OzoneManagerLock {
|
||||||
throw ex;
|
throw ex;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Acquired Write {} lock on resource {} and {}", resource.name,
|
LOG.debug("Acquired Write {} lock on resource {} and {}", resource.name,
|
||||||
firstUser, secondUser);
|
firstUser, secondUser);
|
||||||
|
}
|
||||||
lockSet.set(resource.setLock(lockSet.get()));
|
lockSet.set(resource.setLock(lockSet.get()));
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
@ -300,8 +304,10 @@ public class OzoneManagerLock {
|
||||||
manager.writeUnlock(firstUser);
|
manager.writeUnlock(firstUser);
|
||||||
manager.writeUnlock(secondUser);
|
manager.writeUnlock(secondUser);
|
||||||
}
|
}
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Release Write {} lock on resource {} and {}", resource.name,
|
LOG.debug("Release Write {} lock on resource {} and {}", resource.name,
|
||||||
firstUser, secondUser);
|
firstUser, secondUser);
|
||||||
|
}
|
||||||
lockSet.set(resource.clearLock(lockSet.get()));
|
lockSet.set(resource.clearLock(lockSet.get()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -352,8 +358,10 @@ public class OzoneManagerLock {
|
||||||
// locks, as some locks support acquiring lock again.
|
// locks, as some locks support acquiring lock again.
|
||||||
lockFn.accept(resourceName);
|
lockFn.accept(resourceName);
|
||||||
// clear lock
|
// clear lock
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Release {} {}, lock on resource {}", lockType, resource.name,
|
LOG.debug("Release {} {}, lock on resource {}", lockType, resource.name,
|
||||||
resourceName);
|
resourceName);
|
||||||
|
}
|
||||||
lockSet.set(resource.clearLock(lockSet.get()));
|
lockSet.set(resource.clearLock(lockSet.get()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -89,7 +89,7 @@ public class OzoneBlockTokenSecretManager extends
|
||||||
if (LOG.isTraceEnabled()) {
|
if (LOG.isTraceEnabled()) {
|
||||||
long expiryTime = tokenIdentifier.getExpiryDate();
|
long expiryTime = tokenIdentifier.getExpiryDate();
|
||||||
String tokenId = tokenIdentifier.toString();
|
String tokenId = tokenIdentifier.toString();
|
||||||
LOG.trace("Issued delegation token -> expiryTime:{},tokenId:{}",
|
LOG.trace("Issued delegation token -> expiryTime:{}, tokenId:{}",
|
||||||
expiryTime, tokenId);
|
expiryTime, tokenId);
|
||||||
}
|
}
|
||||||
// Pass blockId as service.
|
// Pass blockId as service.
|
||||||
|
|
|
@ -289,8 +289,10 @@ public class OzoneDelegationTokenSecretManager
|
||||||
String canceller) throws IOException {
|
String canceller) throws IOException {
|
||||||
OzoneTokenIdentifier id = OzoneTokenIdentifier.readProtoBuf(
|
OzoneTokenIdentifier id = OzoneTokenIdentifier.readProtoBuf(
|
||||||
token.getIdentifier());
|
token.getIdentifier());
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Token cancellation requested for identifier: {}",
|
LOG.debug("Token cancellation requested for identifier: {}",
|
||||||
formatTokenId(id));
|
formatTokenId(id));
|
||||||
|
}
|
||||||
|
|
||||||
if (id.getUser() == null) {
|
if (id.getUser() == null) {
|
||||||
throw new InvalidToken("Token with no owner " + formatTokenId(id));
|
throw new InvalidToken("Token with no owner " + formatTokenId(id));
|
||||||
|
|
|
@ -43,9 +43,13 @@ public class OzoneDelegationTokenSelector
|
||||||
@Override
|
@Override
|
||||||
public Token<OzoneTokenIdentifier> selectToken(Text service,
|
public Token<OzoneTokenIdentifier> selectToken(Text service,
|
||||||
Collection<Token<? extends TokenIdentifier>> tokens) {
|
Collection<Token<? extends TokenIdentifier>> tokens) {
|
||||||
|
if (LOG.isTraceEnabled()) {
|
||||||
LOG.trace("Getting token for service {}", service);
|
LOG.trace("Getting token for service {}", service);
|
||||||
|
}
|
||||||
Token token = getSelectedTokens(service, tokens);
|
Token token = getSelectedTokens(service, tokens);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Got tokens: {} for service {}", token, service);
|
LOG.debug("Got tokens: {} for service {}", token, service);
|
||||||
|
}
|
||||||
return token;
|
return token;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -110,8 +110,10 @@ public abstract class OzoneSecretManager<T extends TokenIdentifier>
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public byte[] createPassword(T identifier) {
|
public byte[] createPassword(T identifier) {
|
||||||
|
if (logger.isDebugEnabled()) {
|
||||||
logger.debug("Creating password for identifier: {}, currentKey: {}",
|
logger.debug("Creating password for identifier: {}, currentKey: {}",
|
||||||
formatTokenId(identifier), currentKey.getKeyId());
|
formatTokenId(identifier), currentKey.getKeyId());
|
||||||
|
}
|
||||||
byte[] password = null;
|
byte[] password = null;
|
||||||
try {
|
try {
|
||||||
password = createPassword(identifier.getBytes(),
|
password = createPassword(identifier.getBytes(),
|
||||||
|
|
|
@ -570,8 +570,10 @@ public class BucketManagerImpl implements BucketManager {
|
||||||
}
|
}
|
||||||
boolean hasAccess = OzoneAclUtil.checkAclRights(bucketInfo.getAcls(),
|
boolean hasAccess = OzoneAclUtil.checkAclRights(bucketInfo.getAcls(),
|
||||||
context);
|
context);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("user:{} has access rights for bucket:{} :{} ",
|
LOG.debug("user:{} has access rights for bucket:{} :{} ",
|
||||||
context.getClientUgi(), ozObject.getBucketName(), hasAccess);
|
context.getClientUgi(), ozObject.getBucketName(), hasAccess);
|
||||||
|
}
|
||||||
return hasAccess;
|
return hasAccess;
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
if(ex instanceof OMException) {
|
if(ex instanceof OMException) {
|
||||||
|
|
|
@ -1661,8 +1661,10 @@ public class KeyManagerImpl implements KeyManager {
|
||||||
if (keyInfo == null) {
|
if (keyInfo == null) {
|
||||||
// the key does not exist, but it is a parent "dir" of some key
|
// the key does not exist, but it is a parent "dir" of some key
|
||||||
// let access be determined based on volume/bucket/prefix ACL
|
// let access be determined based on volume/bucket/prefix ACL
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("key:{} is non-existent parent, permit access to user:{}",
|
LOG.debug("key:{} is non-existent parent, permit access to user:{}",
|
||||||
keyName, context.getClientUgi());
|
keyName, context.getClientUgi());
|
||||||
|
}
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
} catch (OMException e) {
|
} catch (OMException e) {
|
||||||
|
@ -1678,8 +1680,10 @@ public class KeyManagerImpl implements KeyManager {
|
||||||
|
|
||||||
boolean hasAccess = OzoneAclUtil.checkAclRight(
|
boolean hasAccess = OzoneAclUtil.checkAclRight(
|
||||||
keyInfo.getAcls(), context);
|
keyInfo.getAcls(), context);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("user:{} has access rights for key:{} :{} ",
|
LOG.debug("user:{} has access rights for key:{} :{} ",
|
||||||
context.getClientUgi(), ozObject.getKeyName(), hasAccess);
|
context.getClientUgi(), ozObject.getKeyName(), hasAccess);
|
||||||
|
}
|
||||||
return hasAccess;
|
return hasAccess;
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
if(ex instanceof OMException) {
|
if(ex instanceof OMException) {
|
||||||
|
@ -1766,10 +1770,11 @@ public class KeyManagerImpl implements KeyManager {
|
||||||
if (keys.iterator().hasNext()) {
|
if (keys.iterator().hasNext()) {
|
||||||
return new OzoneFileStatus(keyName);
|
return new OzoneFileStatus(keyName);
|
||||||
}
|
}
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Unable to get file status for the key: volume:" + volumeName +
|
LOG.debug("Unable to get file status for the key: volume: {}, bucket:" +
|
||||||
" bucket:" + bucketName + " key:" + keyName + " with error no " +
|
" {}, key: {}, with error: No such file exists.", volumeName,
|
||||||
"such file exists:");
|
bucketName, keyName);
|
||||||
|
}
|
||||||
throw new OMException("Unable to get file status: volume: " +
|
throw new OMException("Unable to get file status: volume: " +
|
||||||
volumeName + " bucket: " + bucketName + " key: " + keyName,
|
volumeName + " bucket: " + bucketName + " key: " + keyName,
|
||||||
FILE_NOT_FOUND);
|
FILE_NOT_FOUND);
|
||||||
|
@ -2132,8 +2137,10 @@ public class KeyManagerImpl implements KeyManager {
|
||||||
List<DatanodeDetails> sortedNodes = scmClient.getBlockClient()
|
List<DatanodeDetails> sortedNodes = scmClient.getBlockClient()
|
||||||
.sortDatanodes(nodeList, clientMachine);
|
.sortDatanodes(nodeList, clientMachine);
|
||||||
k.getPipeline().setNodesInOrder(sortedNodes);
|
k.getPipeline().setNodesInOrder(sortedNodes);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Sort datanodes {} for client {}, return {}", nodes,
|
LOG.debug("Sort datanodes {} for client {}, return {}", nodes,
|
||||||
clientMachine, sortedNodes);
|
clientMachine, sortedNodes);
|
||||||
|
}
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
LOG.warn("Unable to sort datanodes based on distance to " +
|
LOG.warn("Unable to sort datanodes based on distance to " +
|
||||||
"client, volume=" + keyInfo.getVolumeName() +
|
"client, volume=" + keyInfo.getVolumeName() +
|
||||||
|
|
|
@ -88,7 +88,9 @@ public class OpenKeyCleanupService extends BackgroundService {
|
||||||
if (result.isSuccess()) {
|
if (result.isSuccess()) {
|
||||||
try {
|
try {
|
||||||
keyManager.deleteExpiredOpenKey(result.getObjectKey());
|
keyManager.deleteExpiredOpenKey(result.getObjectKey());
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Key {} deleted from OM DB", result.getObjectKey());
|
LOG.debug("Key {} deleted from OM DB", result.getObjectKey());
|
||||||
|
}
|
||||||
deletedSize += 1;
|
deletedSize += 1;
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
LOG.warn("Failed to delete hanging-open key {}",
|
LOG.warn("Failed to delete hanging-open key {}",
|
||||||
|
|
|
@ -734,10 +734,12 @@ public final class OzoneManager extends ServiceRuntimeInfoImpl
|
||||||
|
|
||||||
if (SecurityUtil.getAuthenticationMethod(conf).equals(
|
if (SecurityUtil.getAuthenticationMethod(conf).equals(
|
||||||
AuthenticationMethod.KERBEROS)) {
|
AuthenticationMethod.KERBEROS)) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Ozone security is enabled. Attempting login for OM user. "
|
LOG.debug("Ozone security is enabled. Attempting login for OM user. "
|
||||||
+ "Principal: {},keytab: {}", conf.get(
|
+ "Principal: {}, keytab: {}", conf.get(
|
||||||
OZONE_OM_KERBEROS_PRINCIPAL_KEY),
|
OZONE_OM_KERBEROS_PRINCIPAL_KEY),
|
||||||
conf.get(OZONE_OM_KERBEROS_KEYTAB_FILE_KEY));
|
conf.get(OZONE_OM_KERBEROS_KEYTAB_FILE_KEY));
|
||||||
|
}
|
||||||
|
|
||||||
UserGroupInformation.setConfiguration(conf);
|
UserGroupInformation.setConfiguration(conf);
|
||||||
|
|
||||||
|
|
|
@ -139,7 +139,10 @@ public class PrefixManagerImpl implements PrefixManager {
|
||||||
OMPrefixAclOpResult omPrefixAclOpResult = removeAcl(obj, acl, prefixInfo);
|
OMPrefixAclOpResult omPrefixAclOpResult = removeAcl(obj, acl, prefixInfo);
|
||||||
|
|
||||||
if (!omPrefixAclOpResult.isOperationsResult()) {
|
if (!omPrefixAclOpResult.isOperationsResult()) {
|
||||||
LOG.debug("acl {} does not exist for prefix path {} ", acl, prefixPath);
|
if (LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("acl {} does not exist for prefix path {} ",
|
||||||
|
acl, prefixPath);
|
||||||
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -236,8 +239,10 @@ public class PrefixManagerImpl implements PrefixManager {
|
||||||
if (lastNode != null && lastNode.getValue() != null) {
|
if (lastNode != null && lastNode.getValue() != null) {
|
||||||
boolean hasAccess = OzoneAclUtil.checkAclRights(lastNode.getValue().
|
boolean hasAccess = OzoneAclUtil.checkAclRights(lastNode.getValue().
|
||||||
getAcls(), context);
|
getAcls(), context);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("user:{} has access rights for ozObj:{} ::{} ",
|
LOG.debug("user:{} has access rights for ozObj:{} ::{} ",
|
||||||
context.getClientUgi(), ozObject, hasAccess);
|
context.getClientUgi(), ozObject, hasAccess);
|
||||||
|
}
|
||||||
return hasAccess;
|
return hasAccess;
|
||||||
} else {
|
} else {
|
||||||
return true;
|
return true;
|
||||||
|
|
|
@ -108,7 +108,7 @@ public class VolumeManagerImpl implements VolumeManager {
|
||||||
if (volumeList != null) {
|
if (volumeList != null) {
|
||||||
prevVolList.addAll(volumeList.getVolumeNamesList());
|
prevVolList.addAll(volumeList.getVolumeNamesList());
|
||||||
} else {
|
} else {
|
||||||
LOG.debug("volume:{} not found for user:{}");
|
LOG.debug("volume:{} not found for user:{}", volume, owner);
|
||||||
throw new OMException(ResultCodes.USER_NOT_FOUND);
|
throw new OMException(ResultCodes.USER_NOT_FOUND);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -503,7 +503,9 @@ public class VolumeManagerImpl implements VolumeManager {
|
||||||
try {
|
try {
|
||||||
volumeArgs.addAcl(acl);
|
volumeArgs.addAcl(acl);
|
||||||
} catch (OMException ex) {
|
} catch (OMException ex) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Add acl failed.", ex);
|
LOG.debug("Add acl failed.", ex);
|
||||||
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
metadataManager.getVolumeTable().put(dbVolumeKey, volumeArgs);
|
metadataManager.getVolumeTable().put(dbVolumeKey, volumeArgs);
|
||||||
|
@ -553,7 +555,9 @@ public class VolumeManagerImpl implements VolumeManager {
|
||||||
try {
|
try {
|
||||||
volumeArgs.removeAcl(acl);
|
volumeArgs.removeAcl(acl);
|
||||||
} catch (OMException ex) {
|
} catch (OMException ex) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Remove acl failed.", ex);
|
LOG.debug("Remove acl failed.", ex);
|
||||||
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
metadataManager.getVolumeTable().put(dbVolumeKey, volumeArgs);
|
metadataManager.getVolumeTable().put(dbVolumeKey, volumeArgs);
|
||||||
|
@ -685,8 +689,10 @@ public class VolumeManagerImpl implements VolumeManager {
|
||||||
Preconditions.checkState(volume.equals(volumeArgs.getVolume()));
|
Preconditions.checkState(volume.equals(volumeArgs.getVolume()));
|
||||||
boolean hasAccess = volumeArgs.getAclMap().hasAccess(
|
boolean hasAccess = volumeArgs.getAclMap().hasAccess(
|
||||||
context.getAclRights(), context.getClientUgi());
|
context.getAclRights(), context.getClientUgi());
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("user:{} has access rights for volume:{} :{} ",
|
LOG.debug("user:{} has access rights for volume:{} :{} ",
|
||||||
context.getClientUgi(), ozObject.getVolumeName(), hasAccess);
|
context.getClientUgi(), ozObject.getVolumeName(), hasAccess);
|
||||||
|
}
|
||||||
return hasAccess;
|
return hasAccess;
|
||||||
} catch (IOException ex) {
|
} catch (IOException ex) {
|
||||||
LOG.error("Check access operation failed for volume:{}", volume, ex);
|
LOG.error("Check access operation failed for volume:{}", volume, ex);
|
||||||
|
|
|
@ -148,9 +148,11 @@ public class OzoneManagerDoubleBuffer {
|
||||||
flushedTransactionCount.addAndGet(flushedTransactionsSize);
|
flushedTransactionCount.addAndGet(flushedTransactionsSize);
|
||||||
flushIterations.incrementAndGet();
|
flushIterations.incrementAndGet();
|
||||||
|
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Sync Iteration {} flushed transactions in this " +
|
LOG.debug("Sync Iteration {} flushed transactions in this " +
|
||||||
"iteration{}", flushIterations.get(),
|
"iteration{}", flushIterations.get(),
|
||||||
flushedTransactionsSize);
|
flushedTransactionsSize);
|
||||||
|
}
|
||||||
|
|
||||||
long lastRatisTransactionIndex =
|
long lastRatisTransactionIndex =
|
||||||
readyBuffer.stream().map(DoubleBufferEntry::getTrxLogIndex)
|
readyBuffer.stream().map(DoubleBufferEntry::getTrxLogIndex)
|
||||||
|
|
|
@ -99,8 +99,10 @@ public final class OzoneManagerRatisClient implements Closeable {
|
||||||
}
|
}
|
||||||
|
|
||||||
public void connect() {
|
public void connect() {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Connecting to OM Ratis Server GroupId:{} OM:{}",
|
LOG.debug("Connecting to OM Ratis Server GroupId:{} OM:{}",
|
||||||
raftGroup.getGroupId().getUuid().toString(), omNodeID);
|
raftGroup.getGroupId().getUuid().toString(), omNodeID);
|
||||||
|
}
|
||||||
|
|
||||||
// TODO : XceiverClient ratis should pass the config value of
|
// TODO : XceiverClient ratis should pass the config value of
|
||||||
// maxOutstandingRequests so as to set the upper bound on max no of async
|
// maxOutstandingRequests so as to set the upper bound on max no of async
|
||||||
|
@ -147,8 +149,7 @@ public final class OzoneManagerRatisClient implements Closeable {
|
||||||
if (message.contains(STATUS_CODE)) {
|
if (message.contains(STATUS_CODE)) {
|
||||||
String errorCode = message.substring(message.indexOf(STATUS_CODE) +
|
String errorCode = message.substring(message.indexOf(STATUS_CODE) +
|
||||||
STATUS_CODE.length());
|
STATUS_CODE.length());
|
||||||
LOG.debug("Parsing error message for error code " +
|
LOG.debug("Parsing error message for error code {}", errorCode);
|
||||||
errorCode);
|
|
||||||
return OzoneManagerProtocolProtos.Status.valueOf(errorCode.trim());
|
return OzoneManagerProtocolProtos.Status.valueOf(errorCode.trim());
|
||||||
} else {
|
} else {
|
||||||
return OzoneManagerProtocolProtos.Status.INTERNAL_ERROR;
|
return OzoneManagerProtocolProtos.Status.INTERNAL_ERROR;
|
||||||
|
@ -166,11 +167,13 @@ public final class OzoneManagerRatisClient implements Closeable {
|
||||||
CompletableFuture<RaftClientReply> raftClientReply =
|
CompletableFuture<RaftClientReply> raftClientReply =
|
||||||
sendRequestAsync(request);
|
sendRequestAsync(request);
|
||||||
|
|
||||||
return raftClientReply.whenComplete((reply, e) -> LOG.debug(
|
return raftClientReply.whenComplete((reply, e) -> {
|
||||||
"received reply {} for request: cmdType={} traceID={} " +
|
if (LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("received reply {} for request: cmdType={} traceID={} " +
|
||||||
"exception: {}", reply, request.getCmdType(),
|
"exception: {}", reply, request.getCmdType(),
|
||||||
request.getTraceID(), e))
|
request.getTraceID(), e);
|
||||||
.thenApply(reply -> {
|
}
|
||||||
|
}).thenApply(reply -> {
|
||||||
try {
|
try {
|
||||||
Preconditions.checkNotNull(reply);
|
Preconditions.checkNotNull(reply);
|
||||||
if (!reply.isSuccess()) {
|
if (!reply.isSuccess()) {
|
||||||
|
@ -198,7 +201,9 @@ public final class OzoneManagerRatisClient implements Closeable {
|
||||||
OMRequest request) {
|
OMRequest request) {
|
||||||
boolean isReadOnlyRequest = OmUtils.isReadOnly(request);
|
boolean isReadOnlyRequest = OmUtils.isReadOnly(request);
|
||||||
ByteString byteString = OMRatisHelper.convertRequestToByteString(request);
|
ByteString byteString = OMRatisHelper.convertRequestToByteString(request);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("sendOMRequestAsync {} {}", isReadOnlyRequest, request);
|
LOG.debug("sendOMRequestAsync {} {}", isReadOnlyRequest, request);
|
||||||
|
}
|
||||||
return isReadOnlyRequest ? raftClient.sendReadOnlyAsync(() -> byteString) :
|
return isReadOnlyRequest ? raftClient.sendReadOnlyAsync(() -> byteString) :
|
||||||
raftClient.sendAsync(() -> byteString);
|
raftClient.sendAsync(() -> byteString);
|
||||||
}
|
}
|
||||||
|
|
|
@ -169,8 +169,10 @@ public final class OzoneManagerRatisServer {
|
||||||
omResponse.setMessage(stateMachineException.getCause().getMessage());
|
omResponse.setMessage(stateMachineException.getCause().getMessage());
|
||||||
omResponse.setStatus(parseErrorStatus(
|
omResponse.setStatus(parseErrorStatus(
|
||||||
stateMachineException.getCause().getMessage()));
|
stateMachineException.getCause().getMessage()));
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Error while executing ratis request. " +
|
LOG.debug("Error while executing ratis request. " +
|
||||||
"stateMachineException: ", stateMachineException);
|
"stateMachineException: ", stateMachineException);
|
||||||
|
}
|
||||||
return omResponse.build();
|
return omResponse.build();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -103,7 +103,9 @@ public class OMBucketSetAclRequest extends OMBucketAclRequest {
|
||||||
void onComplete(boolean operationResult, IOException exception,
|
void onComplete(boolean operationResult, IOException exception,
|
||||||
OMMetrics omMetrics) {
|
OMMetrics omMetrics) {
|
||||||
if (operationResult) {
|
if (operationResult) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Set acl: {} for path: {} success!", getAcls(), getPath());
|
LOG.debug("Set acl: {} for path: {} success!", getAcls(), getPath());
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
omMetrics.incNumBucketUpdateFails();
|
omMetrics.incNumBucketUpdateFails();
|
||||||
if (exception == null) {
|
if (exception == null) {
|
||||||
|
|
|
@ -96,8 +96,10 @@ public class OMVolumeSetAclRequest extends OMVolumeAclRequest {
|
||||||
@Override
|
@Override
|
||||||
void onComplete(IOException ex) {
|
void onComplete(IOException ex) {
|
||||||
if (ex == null) {
|
if (ex == null) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Set acls: {} to volume: {} success!",
|
LOG.debug("Set acls: {} to volume: {} success!",
|
||||||
getAcls(), getVolumeName());
|
getAcls(), getVolumeName());
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
LOG.error("Set acls {} to volume {} failed!",
|
LOG.error("Set acls {} to volume {} failed!",
|
||||||
getAcls(), getVolumeName(), ex);
|
getAcls(), getVolumeName(), ex);
|
||||||
|
|
|
@ -48,7 +48,9 @@ public class OzoneManagerHARequestHandlerImpl
|
||||||
@Override
|
@Override
|
||||||
public OMResponse handleApplyTransaction(OMRequest omRequest,
|
public OMResponse handleApplyTransaction(OMRequest omRequest,
|
||||||
long transactionLogIndex) {
|
long transactionLogIndex) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Received OMRequest: {}, ", omRequest);
|
LOG.debug("Received OMRequest: {}, ", omRequest);
|
||||||
|
}
|
||||||
Type cmdType = omRequest.getCmdType();
|
Type cmdType = omRequest.getCmdType();
|
||||||
switch (cmdType) {
|
switch (cmdType) {
|
||||||
case CreateVolume:
|
case CreateVolume:
|
||||||
|
|
|
@ -225,7 +225,9 @@ public class OzoneManagerProtocolServerSideTranslatorPB implements
|
||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
omClientResponse.getFlushFuture().get();
|
omClientResponse.getFlushFuture().get();
|
||||||
|
if (LOG.isTraceEnabled()) {
|
||||||
LOG.trace("Future for {} is completed", request);
|
LOG.trace("Future for {} is completed", request);
|
||||||
|
}
|
||||||
} catch (ExecutionException | InterruptedException ex) {
|
} catch (ExecutionException | InterruptedException ex) {
|
||||||
// terminate OM. As if we are in this stage means, while getting
|
// terminate OM. As if we are in this stage means, while getting
|
||||||
// response from flush future, we got an exception.
|
// response from flush future, we got an exception.
|
||||||
|
|
|
@ -149,7 +149,9 @@ public class OzoneManagerRequestHandler implements RequestHandler {
|
||||||
@SuppressWarnings("methodlength")
|
@SuppressWarnings("methodlength")
|
||||||
@Override
|
@Override
|
||||||
public OMResponse handle(OMRequest request) {
|
public OMResponse handle(OMRequest request) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Received OMRequest: {}, ", request);
|
LOG.debug("Received OMRequest: {}, ", request);
|
||||||
|
}
|
||||||
Type cmdType = request.getCmdType();
|
Type cmdType = request.getCmdType();
|
||||||
OMResponse.Builder responseBuilder = OMResponse.newBuilder()
|
OMResponse.Builder responseBuilder = OMResponse.newBuilder()
|
||||||
.setCmdType(cmdType)
|
.setCmdType(cmdType)
|
||||||
|
|
|
@ -79,20 +79,20 @@ public class OzoneNativeAuthorizer implements IAccessAuthorizer {
|
||||||
|
|
||||||
switch (objInfo.getResourceType()) {
|
switch (objInfo.getResourceType()) {
|
||||||
case VOLUME:
|
case VOLUME:
|
||||||
LOG.trace("Checking access for volume:" + objInfo);
|
LOG.trace("Checking access for volume: {}", objInfo);
|
||||||
return volumeManager.checkAccess(objInfo, context);
|
return volumeManager.checkAccess(objInfo, context);
|
||||||
case BUCKET:
|
case BUCKET:
|
||||||
LOG.trace("Checking access for bucket:" + objInfo);
|
LOG.trace("Checking access for bucket: {}", objInfo);
|
||||||
return (bucketManager.checkAccess(objInfo, context)
|
return (bucketManager.checkAccess(objInfo, context)
|
||||||
&& volumeManager.checkAccess(objInfo, context));
|
&& volumeManager.checkAccess(objInfo, context));
|
||||||
case KEY:
|
case KEY:
|
||||||
LOG.trace("Checking access for Key:" + objInfo);
|
LOG.trace("Checking access for Key: {}", objInfo);
|
||||||
return (keyManager.checkAccess(objInfo, context)
|
return (keyManager.checkAccess(objInfo, context)
|
||||||
&& prefixManager.checkAccess(objInfo, context)
|
&& prefixManager.checkAccess(objInfo, context)
|
||||||
&& bucketManager.checkAccess(objInfo, context)
|
&& bucketManager.checkAccess(objInfo, context)
|
||||||
&& volumeManager.checkAccess(objInfo, context));
|
&& volumeManager.checkAccess(objInfo, context));
|
||||||
case PREFIX:
|
case PREFIX:
|
||||||
LOG.trace("Checking access for Prefix:" + objInfo);
|
LOG.trace("Checking access for Prefix: {]", objInfo);
|
||||||
return (prefixManager.checkAccess(objInfo, context)
|
return (prefixManager.checkAccess(objInfo, context)
|
||||||
&& bucketManager.checkAccess(objInfo, context)
|
&& bucketManager.checkAccess(objInfo, context)
|
||||||
&& volumeManager.checkAccess(objInfo, context));
|
&& volumeManager.checkAccess(objInfo, context));
|
||||||
|
|
|
@ -425,7 +425,9 @@ public class BasicOzoneFileSystem extends FileSystem {
|
||||||
DeleteIterator iterator = new DeleteIterator(f, recursive);
|
DeleteIterator iterator = new DeleteIterator(f, recursive);
|
||||||
return iterator.iterate();
|
return iterator.iterate();
|
||||||
} catch (FileNotFoundException e) {
|
} catch (FileNotFoundException e) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Couldn't delete {} - does not exist", f);
|
LOG.debug("Couldn't delete {} - does not exist", f);
|
||||||
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -110,10 +110,14 @@ public class AWSV4AuthParser implements AWSAuthParser {
|
||||||
|
|
||||||
canonicalRequest = buildCanonicalRequest();
|
canonicalRequest = buildCanonicalRequest();
|
||||||
strToSign.append(hash(canonicalRequest));
|
strToSign.append(hash(canonicalRequest));
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("canonicalRequest:[{}]", canonicalRequest);
|
LOG.debug("canonicalRequest:[{}]", canonicalRequest);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (LOG.isTraceEnabled()) {
|
||||||
headerMap.keySet().forEach(k -> LOG.trace("Header:{},value:{}", k,
|
headerMap.keySet().forEach(k -> LOG.trace("Header:{},value:{}", k,
|
||||||
headerMap.get(k)));
|
headerMap.get(k)));
|
||||||
|
}
|
||||||
|
|
||||||
LOG.debug("StringToSign:[{}]", strToSign);
|
LOG.debug("StringToSign:[{}]", strToSign);
|
||||||
stringToSign = strToSign.toString();
|
stringToSign = strToSign.toString();
|
||||||
|
|
|
@ -86,8 +86,9 @@ public class OzoneClientProducer {
|
||||||
identifier.setSignature(v4RequestParser.getSignature());
|
identifier.setSignature(v4RequestParser.getSignature());
|
||||||
identifier.setAwsAccessId(v4RequestParser.getAwsAccessId());
|
identifier.setAwsAccessId(v4RequestParser.getAwsAccessId());
|
||||||
identifier.setOwner(new Text(v4RequestParser.getAwsAccessId()));
|
identifier.setOwner(new Text(v4RequestParser.getAwsAccessId()));
|
||||||
|
if (LOG.isTraceEnabled()) {
|
||||||
LOG.trace("Adding token for service:{}", omService);
|
LOG.trace("Adding token for service:{}", omService);
|
||||||
|
}
|
||||||
Token<OzoneTokenIdentifier> token = new Token(identifier.getBytes(),
|
Token<OzoneTokenIdentifier> token = new Token(identifier.getBytes(),
|
||||||
identifier.getSignature().getBytes(UTF_8),
|
identifier.getSignature().getBytes(UTF_8),
|
||||||
identifier.getKind(),
|
identifier.getKind(),
|
||||||
|
|
|
@ -42,7 +42,9 @@ public class OS3ExceptionMapper implements ExceptionMapper<OS3Exception> {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Response toResponse(OS3Exception exception) {
|
public Response toResponse(OS3Exception exception) {
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
LOG.debug("Returning exception. ex: {}", exception.toString());
|
LOG.debug("Returning exception. ex: {}", exception.toString());
|
||||||
|
}
|
||||||
exception.setRequestId(requestIdentifier.getRequestId());
|
exception.setRequestId(requestIdentifier.getRequestId());
|
||||||
return Response.status(exception.getHttpCode())
|
return Response.status(exception.getHttpCode())
|
||||||
.entity(exception.toXml()).build();
|
.entity(exception.toXml()).build();
|
||||||
|
|
Loading…
Reference in New Issue