HADOOP-16858. S3Guard fsck: Add option to remove orphaned entries (#1851). Contributed by Gabor Bota.
Adding a new feature to S3GuardTool's fsck: -fix. Change-Id: I2cdb6601fea1d859b54370046b827ef06eb1107d
This commit is contained in:
parent
8d6373483e
commit
c91ff8c18f
|
@ -159,7 +159,9 @@ public class S3GuardFsck {
|
||||||
// Create a handler and handle each violated pairs
|
// Create a handler and handle each violated pairs
|
||||||
S3GuardFsckViolationHandler handler =
|
S3GuardFsckViolationHandler handler =
|
||||||
new S3GuardFsckViolationHandler(rawFS, metadataStore);
|
new S3GuardFsckViolationHandler(rawFS, metadataStore);
|
||||||
comparePairs.forEach(handler::handle);
|
for (ComparePair comparePair : comparePairs) {
|
||||||
|
handler.logError(comparePair);
|
||||||
|
}
|
||||||
|
|
||||||
LOG.info("Total scan time: {}s", stopwatch.now(TimeUnit.SECONDS));
|
LOG.info("Total scan time: {}s", stopwatch.now(TimeUnit.SECONDS));
|
||||||
LOG.info("Scanned entries: {}", scannedItems);
|
LOG.info("Scanned entries: {}", scannedItems);
|
||||||
|
@ -344,6 +346,31 @@ public class S3GuardFsck {
|
||||||
return rawFS.makeQualified(new Path(s));
|
return rawFS.makeQualified(new Path(s));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Fix violations found during check.
|
||||||
|
*
|
||||||
|
* Currently only supports handling the following violation:
|
||||||
|
* - Violation.ORPHAN_DDB_ENTRY
|
||||||
|
*
|
||||||
|
* @param violations to be handled
|
||||||
|
* @throws IOException throws the error if there's any during handling
|
||||||
|
*/
|
||||||
|
public void fixViolations(List<ComparePair> violations) throws IOException {
|
||||||
|
S3GuardFsckViolationHandler handler =
|
||||||
|
new S3GuardFsckViolationHandler(rawFS, metadataStore);
|
||||||
|
|
||||||
|
for (ComparePair v : violations) {
|
||||||
|
if (v.getViolations().contains(Violation.ORPHAN_DDB_ENTRY)) {
|
||||||
|
try {
|
||||||
|
handler.doFix(v);
|
||||||
|
} catch (IOException e) {
|
||||||
|
LOG.error("Error during handling the violation: ", e);
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A compare pair with the pair of metadata and the list of violations.
|
* A compare pair with the pair of metadata and the list of violations.
|
||||||
*/
|
*/
|
||||||
|
@ -542,7 +569,9 @@ public class S3GuardFsck {
|
||||||
// Create a handler and handle each violated pairs
|
// Create a handler and handle each violated pairs
|
||||||
S3GuardFsckViolationHandler handler =
|
S3GuardFsckViolationHandler handler =
|
||||||
new S3GuardFsckViolationHandler(rawFS, metadataStore);
|
new S3GuardFsckViolationHandler(rawFS, metadataStore);
|
||||||
comparePairs.forEach(handler::handle);
|
for (ComparePair comparePair : comparePairs) {
|
||||||
|
handler.logError(comparePair);
|
||||||
|
}
|
||||||
|
|
||||||
stopwatch.stop();
|
stopwatch.stop();
|
||||||
LOG.info("Total scan time: {}s", stopwatch.now(TimeUnit.SECONDS));
|
LOG.info("Total scan time: {}s", stopwatch.now(TimeUnit.SECONDS));
|
||||||
|
|
|
@ -18,6 +18,7 @@
|
||||||
|
|
||||||
package org.apache.hadoop.fs.s3a.s3guard;
|
package org.apache.hadoop.fs.s3a.s3guard;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
import java.lang.reflect.InvocationTargetException;
|
import java.lang.reflect.InvocationTargetException;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
@ -26,6 +27,7 @@ import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import org.apache.hadoop.fs.FileStatus;
|
import org.apache.hadoop.fs.FileStatus;
|
||||||
|
import org.apache.hadoop.fs.Path;
|
||||||
import org.apache.hadoop.fs.s3a.S3AFileStatus;
|
import org.apache.hadoop.fs.s3a.S3AFileStatus;
|
||||||
import org.apache.hadoop.fs.s3a.S3AFileSystem;
|
import org.apache.hadoop.fs.s3a.S3AFileSystem;
|
||||||
|
|
||||||
|
@ -43,6 +45,10 @@ public class S3GuardFsckViolationHandler {
|
||||||
|
|
||||||
private static String newLine = System.getProperty("line.separator");
|
private static String newLine = System.getProperty("line.separator");
|
||||||
|
|
||||||
|
public enum HandleMode {
|
||||||
|
FIX, LOG
|
||||||
|
}
|
||||||
|
|
||||||
public S3GuardFsckViolationHandler(S3AFileSystem fs,
|
public S3GuardFsckViolationHandler(S3AFileSystem fs,
|
||||||
DynamoDBMetadataStore ddbms) {
|
DynamoDBMetadataStore ddbms) {
|
||||||
|
|
||||||
|
@ -50,7 +56,7 @@ public class S3GuardFsckViolationHandler {
|
||||||
this.rawFs = fs;
|
this.rawFs = fs;
|
||||||
}
|
}
|
||||||
|
|
||||||
public void handle(S3GuardFsck.ComparePair comparePair) {
|
public void logError(S3GuardFsck.ComparePair comparePair) throws IOException {
|
||||||
if (!comparePair.containsViolation()) {
|
if (!comparePair.containsViolation()) {
|
||||||
LOG.debug("There is no violation in the compare pair: {}", comparePair);
|
LOG.debug("There is no violation in the compare pair: {}", comparePair);
|
||||||
return;
|
return;
|
||||||
|
@ -60,11 +66,26 @@ public class S3GuardFsckViolationHandler {
|
||||||
sB.append(newLine)
|
sB.append(newLine)
|
||||||
.append("On path: ").append(comparePair.getPath()).append(newLine);
|
.append("On path: ").append(comparePair.getPath()).append(newLine);
|
||||||
|
|
||||||
handleComparePair(comparePair, sB);
|
handleComparePair(comparePair, sB, HandleMode.LOG);
|
||||||
|
|
||||||
LOG.error(sB.toString());
|
LOG.error(sB.toString());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void doFix(S3GuardFsck.ComparePair comparePair) throws IOException {
|
||||||
|
if (!comparePair.containsViolation()) {
|
||||||
|
LOG.debug("There is no violation in the compare pair: {}", comparePair);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
StringBuilder sB = new StringBuilder();
|
||||||
|
sB.append(newLine)
|
||||||
|
.append("On path: ").append(comparePair.getPath()).append(newLine);
|
||||||
|
|
||||||
|
handleComparePair(comparePair, sB, HandleMode.FIX);
|
||||||
|
|
||||||
|
LOG.info(sB.toString());
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create a new instance of the violation handler for all the violations
|
* Create a new instance of the violation handler for all the violations
|
||||||
* found in the compare pair and use it.
|
* found in the compare pair and use it.
|
||||||
|
@ -72,16 +93,28 @@ public class S3GuardFsckViolationHandler {
|
||||||
* @param comparePair the compare pair with violations
|
* @param comparePair the compare pair with violations
|
||||||
* @param sB StringBuilder to append error strings from violations.
|
* @param sB StringBuilder to append error strings from violations.
|
||||||
*/
|
*/
|
||||||
protected static void handleComparePair(S3GuardFsck.ComparePair comparePair,
|
protected void handleComparePair(S3GuardFsck.ComparePair comparePair,
|
||||||
StringBuilder sB) {
|
StringBuilder sB, HandleMode handleMode) throws IOException {
|
||||||
|
|
||||||
for (S3GuardFsck.Violation violation : comparePair.getViolations()) {
|
for (S3GuardFsck.Violation violation : comparePair.getViolations()) {
|
||||||
try {
|
try {
|
||||||
ViolationHandler handler = violation.getHandler()
|
ViolationHandler handler = violation.getHandler()
|
||||||
.getDeclaredConstructor(S3GuardFsck.ComparePair.class)
|
.getDeclaredConstructor(S3GuardFsck.ComparePair.class)
|
||||||
.newInstance(comparePair);
|
.newInstance(comparePair);
|
||||||
|
|
||||||
|
switch (handleMode) {
|
||||||
|
case FIX:
|
||||||
final String errorStr = handler.getError();
|
final String errorStr = handler.getError();
|
||||||
sB.append(errorStr);
|
sB.append(errorStr);
|
||||||
|
break;
|
||||||
|
case LOG:
|
||||||
|
final String fixStr = handler.fixViolation(rawFs, metadataStore);
|
||||||
|
sB.append(fixStr);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
throw new UnsupportedOperationException("Unknown handleMode: " + handleMode);
|
||||||
|
}
|
||||||
|
|
||||||
} catch (NoSuchMethodException e) {
|
} catch (NoSuchMethodException e) {
|
||||||
LOG.error("Can not find declared constructor for handler: {}",
|
LOG.error("Can not find declared constructor for handler: {}",
|
||||||
violation.getHandler());
|
violation.getHandler());
|
||||||
|
@ -137,6 +170,12 @@ public class S3GuardFsckViolationHandler {
|
||||||
public DirListingMetadata getMsDirListing() {
|
public DirListingMetadata getMsDirListing() {
|
||||||
return msDirListing;
|
return msDirListing;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public String fixViolation(S3AFileSystem fs,
|
||||||
|
DynamoDBMetadataStore ddbms) throws IOException {
|
||||||
|
return String.format("Fixing of violation: %s is not supported yet.",
|
||||||
|
this.getClass().getSimpleName());
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -357,6 +396,16 @@ public class S3GuardFsckViolationHandler {
|
||||||
public String getError() {
|
public String getError() {
|
||||||
return "The DDB entry is orphan - there is no parent in the MS.";
|
return "The DDB entry is orphan - there is no parent in the MS.";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String fixViolation(S3AFileSystem fs, DynamoDBMetadataStore ddbms)
|
||||||
|
throws IOException {
|
||||||
|
final Path path = getPathMetadata().getFileStatus().getPath();
|
||||||
|
ddbms.forgetMetadata(path);
|
||||||
|
return String.format(
|
||||||
|
"Fixing violation by removing metadata entry from the " +
|
||||||
|
"MS on path: %s", path);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -25,6 +25,7 @@ import java.io.PrintStream;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
import java.net.URISyntaxException;
|
import java.net.URISyntaxException;
|
||||||
import java.nio.file.AccessDeniedException;
|
import java.nio.file.AccessDeniedException;
|
||||||
|
import java.util.Arrays;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
|
@ -1609,6 +1610,7 @@ public abstract class S3GuardTool extends Configured implements Tool,
|
||||||
static class Fsck extends S3GuardTool {
|
static class Fsck extends S3GuardTool {
|
||||||
public static final String CHECK_FLAG = "check";
|
public static final String CHECK_FLAG = "check";
|
||||||
public static final String DDB_MS_CONSISTENCY_FLAG = "internal";
|
public static final String DDB_MS_CONSISTENCY_FLAG = "internal";
|
||||||
|
public static final String FIX_FLAG = "fix";
|
||||||
|
|
||||||
public static final String NAME = "fsck";
|
public static final String NAME = "fsck";
|
||||||
public static final String PURPOSE = "Compares S3 with MetadataStore, and "
|
public static final String PURPOSE = "Compares S3 with MetadataStore, and "
|
||||||
|
@ -1620,10 +1622,15 @@ public abstract class S3GuardTool extends Configured implements Tool,
|
||||||
" -" + CHECK_FLAG + " Check the metadata store for errors, but do "
|
" -" + CHECK_FLAG + " Check the metadata store for errors, but do "
|
||||||
+ "not fix any issues.\n" +
|
+ "not fix any issues.\n" +
|
||||||
" -" + DDB_MS_CONSISTENCY_FLAG + " Check the dynamodb metadata store "
|
" -" + DDB_MS_CONSISTENCY_FLAG + " Check the dynamodb metadata store "
|
||||||
+ "for internal consistency.\n";
|
+ "for internal consistency.\n" +
|
||||||
|
" -" + FIX_FLAG + " Fix the errors found in the metadata store. Can " +
|
||||||
|
"be used with " + CHECK_FLAG + " or " + DDB_MS_CONSISTENCY_FLAG + " flags. "
|
||||||
|
+ "\n\t\tFixes: \n" +
|
||||||
|
"\t\t\t- Remove orphan entries from DDB." +
|
||||||
|
"\n";
|
||||||
|
|
||||||
Fsck(Configuration conf) {
|
Fsck(Configuration conf) {
|
||||||
super(conf, CHECK_FLAG, DDB_MS_CONSISTENCY_FLAG);
|
super(conf, CHECK_FLAG, DDB_MS_CONSISTENCY_FLAG, FIX_FLAG);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -1648,17 +1655,19 @@ public abstract class S3GuardTool extends Configured implements Tool,
|
||||||
final CommandFormat commandFormat = getCommandFormat();
|
final CommandFormat commandFormat = getCommandFormat();
|
||||||
|
|
||||||
// check if there's more than one arguments
|
// check if there's more than one arguments
|
||||||
int flags = 0;
|
// from CHECK and INTERNAL CONSISTENCY
|
||||||
if (commandFormat.getOpt(CHECK_FLAG)) {
|
int flags = countTrue(commandFormat.getOpt(CHECK_FLAG),
|
||||||
flags++;
|
commandFormat.getOpt(DDB_MS_CONSISTENCY_FLAG));
|
||||||
}
|
|
||||||
if (commandFormat.getOpt(DDB_MS_CONSISTENCY_FLAG)) {
|
|
||||||
flags++;
|
|
||||||
}
|
|
||||||
if (flags > 1) {
|
if (flags > 1) {
|
||||||
out.println(USAGE);
|
out.println(USAGE);
|
||||||
throw invalidArgs("There should be only one parameter used for checking.");
|
throw invalidArgs("There should be only one parameter used for checking.");
|
||||||
}
|
}
|
||||||
|
if (flags == 0 && commandFormat.getOpt(FIX_FLAG)) {
|
||||||
|
errorln(FIX_FLAG + " flag can be used with either " + CHECK_FLAG + " or " +
|
||||||
|
DDB_MS_CONSISTENCY_FLAG + " flag, but not alone.");
|
||||||
|
errorln(USAGE);
|
||||||
|
return ERROR;
|
||||||
|
}
|
||||||
|
|
||||||
String s3Path = paths.get(0);
|
String s3Path = paths.get(0);
|
||||||
try {
|
try {
|
||||||
|
@ -1707,6 +1716,11 @@ public abstract class S3GuardTool extends Configured implements Tool,
|
||||||
return ERROR;
|
return ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (commandFormat.getOpt(FIX_FLAG)) {
|
||||||
|
S3GuardFsck s3GuardFsck = new S3GuardFsck(fs, ms);
|
||||||
|
s3GuardFsck.fixViolations(violations);
|
||||||
|
}
|
||||||
|
|
||||||
out.flush();
|
out.flush();
|
||||||
|
|
||||||
// We fail if there were compare pairs, as the returned compare pairs
|
// We fail if there were compare pairs, as the returned compare pairs
|
||||||
|
@ -1716,6 +1730,10 @@ public abstract class S3GuardTool extends Configured implements Tool,
|
||||||
}
|
}
|
||||||
return exitValue;
|
return exitValue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int countTrue(Boolean... bools) {
|
||||||
|
return (int) Arrays.stream(bools).filter(p -> p).count();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
* Audits a DynamoDB S3Guard repository for all the entries being
|
* Audits a DynamoDB S3Guard repository for all the entries being
|
||||||
|
|
|
@ -1165,7 +1165,7 @@ Compares S3 with MetadataStore, and returns a failure status if any
|
||||||
rules or invariants are violated. Only works with DynamoDB metadata stores.
|
rules or invariants are violated. Only works with DynamoDB metadata stores.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
hadoop s3guard fsck [-check | -internal] (s3a://BUCKET | s3a://PATH_PREFIX)
|
hadoop s3guard fsck [-check | -internal] [-fix] (s3a://BUCKET | s3a://PATH_PREFIX)
|
||||||
```
|
```
|
||||||
|
|
||||||
`-check` operation checks the metadata store from the S3 perspective, but
|
`-check` operation checks the metadata store from the S3 perspective, but
|
||||||
|
@ -1175,6 +1175,12 @@ The consistency issues will be logged in ERROR loglevel.
|
||||||
`-internal` operation checks the internal consistency of the metadata store,
|
`-internal` operation checks the internal consistency of the metadata store,
|
||||||
but does not fix any issues.
|
but does not fix any issues.
|
||||||
|
|
||||||
|
`-fix` operation fixes consistency issues between the metadatastore and the S3
|
||||||
|
bucket. This parameter is optional, and can be used together with check or
|
||||||
|
internal parameters, but not alone.
|
||||||
|
The following fix is implemented:
|
||||||
|
- Remove orphan entries from DDB
|
||||||
|
|
||||||
The errors found will be logged at the ERROR log level.
|
The errors found will be logged at the ERROR log level.
|
||||||
|
|
||||||
*Note*: `-check` and `-internal` operations can be used only as separate
|
*Note*: `-check` and `-internal` operations can be used only as separate
|
||||||
|
|
|
@ -24,6 +24,7 @@ import java.net.URI;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.UUID;
|
import java.util.UUID;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import org.assertj.core.api.Assertions;
|
import org.assertj.core.api.Assertions;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
|
@ -499,6 +500,19 @@ public class ITestS3GuardFsck extends AbstractS3ATestBase {
|
||||||
assertComparePairsSize(comparePairs, 1);
|
assertComparePairsSize(comparePairs, 1);
|
||||||
checkForViolationInPairs(file, comparePairs,
|
checkForViolationInPairs(file, comparePairs,
|
||||||
S3GuardFsck.Violation.ORPHAN_DDB_ENTRY);
|
S3GuardFsck.Violation.ORPHAN_DDB_ENTRY);
|
||||||
|
|
||||||
|
// fix the violation
|
||||||
|
s3GuardFsck.fixViolations(
|
||||||
|
comparePairs.stream().filter(cP -> cP.getViolations()
|
||||||
|
.contains(S3GuardFsck.Violation.ORPHAN_DDB_ENTRY))
|
||||||
|
.collect(Collectors.toList())
|
||||||
|
);
|
||||||
|
|
||||||
|
// assert that the violation is fixed
|
||||||
|
final List<S3GuardFsck.ComparePair> fixedComparePairs =
|
||||||
|
s3GuardFsck.checkDdbInternalConsistency(cwd);
|
||||||
|
checkNoViolationInPairs(file, fixedComparePairs,
|
||||||
|
S3GuardFsck.Violation.ORPHAN_DDB_ENTRY);
|
||||||
} finally {
|
} finally {
|
||||||
cleanup(file, cwd);
|
cleanup(file, cwd);
|
||||||
}
|
}
|
||||||
|
@ -596,14 +610,27 @@ public class ITestS3GuardFsck extends AbstractS3ATestBase {
|
||||||
.contains(violation);
|
.contains(violation);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void checkNoViolationInPairs(Path file2,
|
/**
|
||||||
|
* Check that there is no violation in the pair provided.
|
||||||
|
*
|
||||||
|
* @param file the path to filter to in the comparePairs list.
|
||||||
|
* @param comparePairs the list to validate.
|
||||||
|
* @param violation the violation that should not be in the list.
|
||||||
|
*/
|
||||||
|
private void checkNoViolationInPairs(Path file,
|
||||||
List<S3GuardFsck.ComparePair> comparePairs,
|
List<S3GuardFsck.ComparePair> comparePairs,
|
||||||
S3GuardFsck.Violation violation) {
|
S3GuardFsck.Violation violation) {
|
||||||
final S3GuardFsck.ComparePair file2Pair = comparePairs.stream()
|
|
||||||
.filter(p -> p.getPath().equals(file2))
|
if (comparePairs.size() == 0) {
|
||||||
|
LOG.info("Compare pairs is empty, so there's no violation. (As expected.)");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
final S3GuardFsck.ComparePair comparePair = comparePairs.stream()
|
||||||
|
.filter(p -> p.getPath().equals(file))
|
||||||
.findFirst().get();
|
.findFirst().get();
|
||||||
assertNotNull("The pair should not be null.", file2Pair);
|
assertNotNull("The pair should not be null.", comparePair);
|
||||||
Assertions.assertThat(file2Pair.getViolations())
|
Assertions.assertThat(comparePair.getViolations())
|
||||||
.describedAs("Violations in the pair")
|
.describedAs("Violations in the pair")
|
||||||
.doesNotContain(violation);
|
.doesNotContain(violation);
|
||||||
}
|
}
|
||||||
|
|
|
@ -354,6 +354,40 @@ public class ITestS3GuardToolDynamoDB extends AbstractS3GuardToolTestBase {
|
||||||
"s3a://" + getFileSystem().getBucket()));
|
"s3a://" + getFileSystem().getBucket()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCLIFsckDDbFixOnlyFails() throws Exception {
|
||||||
|
describe("This test serves the purpose to run fsck with the correct " +
|
||||||
|
"parameters, so there will be no exception thrown.");
|
||||||
|
final int result = run(S3GuardTool.Fsck.NAME,
|
||||||
|
"-" + Fsck.FIX_FLAG,
|
||||||
|
"s3a://" + getFileSystem().getBucket());
|
||||||
|
LOG.info("The return value of the run: {}", result);
|
||||||
|
assertEquals(ERROR, result);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test that the fix flag is accepted by the fsck.
|
||||||
|
*
|
||||||
|
* Note that we don't have an assert at the end of this test because
|
||||||
|
* there maybe some errors found during the check and the returned value
|
||||||
|
* will be ERROR and not SUCCESS. So if we assert on SUCCESS, then the test
|
||||||
|
* could (likely) to be flaky.
|
||||||
|
* If the FIX_FLAG parameter is not accepted here an exception will be thrown
|
||||||
|
* so the test will break.
|
||||||
|
*
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void testCLIFsckDDbFixAndInternalSucceed() throws Exception {
|
||||||
|
describe("This test serves the purpose to run fsck with the correct " +
|
||||||
|
"parameters, so there will be no exception thrown.");
|
||||||
|
final int result = run(S3GuardTool.Fsck.NAME,
|
||||||
|
"-" + Fsck.FIX_FLAG,
|
||||||
|
"-" + Fsck.DDB_MS_CONSISTENCY_FLAG,
|
||||||
|
"s3a://" + getFileSystem().getBucket());
|
||||||
|
LOG.info("The return value of the run: {}", result);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Test that when init, the CMK option can not live without SSE enabled.
|
* Test that when init, the CMK option can not live without SSE enabled.
|
||||||
*/
|
*/
|
||||||
|
|
Loading…
Reference in New Issue