HDFS-12336. Listing encryption zones still fails when deleted EZ is not a direct child of snapshottable directory. Contributed by Wellington Chevreuil.

This commit is contained in:
Xiao Chen 2017-08-29 21:28:02 -07:00
parent 8201ed8009
commit f3661fd08e
5 changed files with 116 additions and 2 deletions

View File

@ -573,7 +573,7 @@ public class EncryptionZoneManager {
return false;
}
INode lastINode = null;
if (inode.getParent() != null || inode.isRoot()) {
if (INode.isValidAbsolutePath(zonePath)) {
INodesInPath iip = dir.getINodesInPath(zonePath, DirOp.READ_LINK);
lastINode = iip.getLastINode();
}

View File

@ -783,8 +783,17 @@ public abstract class INode implements INodeAttributes, Diff.Element<byte[]> {
return StringUtils.split(path, Path.SEPARATOR_CHAR);
}
/**
* Verifies if the path informed is a valid absolute path.
* @param path the absolute path to validate.
* @return true if the path is valid.
*/
static boolean isValidAbsolutePath(final String path){
return path != null && path.startsWith(Path.SEPARATOR);
}
private static void checkAbsolutePath(final String path) {
if (path == null || !path.startsWith(Path.SEPARATOR)) {
if (!isValidAbsolutePath(path)) {
throw new AssertionError("Absolute path required, but got '"
+ path + "'");
}

View File

@ -1867,4 +1867,51 @@ public class TestEncryptionZones {
// Read them back in and compare byte-by-byte
verifyFilesEqual(fs, baseFile, encFile1, len);
}
/**
* Test listing encryption zones after zones had been deleted,
* but still exist under snapshots. This test first moves EZs
* to trash folder, so that an inodereference is created for the EZ,
* then it removes the EZ from trash folder to emulate condition where
* the EZ inode will not be complete.
*/
@Test
public void testListEncryptionZonesWithSnapshots() throws Exception {
final Path snapshottable = new Path("/zones");
final Path zoneDirectChild = new Path(snapshottable, "zone1");
final Path snapshottableChild = new Path(snapshottable, "child");
final Path zoneSubChild = new Path(snapshottableChild, "zone2");
fsWrapper.mkdir(zoneDirectChild, FsPermission.getDirDefault(),
true);
fsWrapper.mkdir(zoneSubChild, FsPermission.getDirDefault(),
true);
dfsAdmin.allowSnapshot(snapshottable);
dfsAdmin.createEncryptionZone(zoneDirectChild, TEST_KEY, NO_TRASH);
dfsAdmin.createEncryptionZone(zoneSubChild, TEST_KEY, NO_TRASH);
final Path snap1 = fs.createSnapshot(snapshottable, "snap1");
Configuration clientConf = new Configuration(conf);
clientConf.setLong(FS_TRASH_INTERVAL_KEY, 1);
FsShell shell = new FsShell(clientConf);
//will "trash" the zone under subfolder of snapshottable directory
verifyShellDeleteWithTrash(shell, snapshottableChild);
//permanently remove zone under subfolder of snapshottable directory
fsWrapper.delete(shell.getCurrentTrashDir(snapshottableChild),
true);
final RemoteIterator<EncryptionZone> it = dfsAdmin.listEncryptionZones();
boolean match = false;
while (it.hasNext()) {
EncryptionZone ez = it.next();
assertNotEquals("EncryptionZone " + zoneSubChild.toString() +
" should not be listed.",
ez.getPath(), zoneSubChild.toString());
}
//will "trash" the zone direct child of snapshottable directory
verifyShellDeleteWithTrash(shell, zoneDirectChild);
//permanently remove zone direct child of snapshottable directory
fsWrapper.delete(shell.getCurrentTrashDir(zoneDirectChild), true);
assertFalse("listEncryptionZones should not return anything, " +
"since both EZs were deleted.",
dfsAdmin.listEncryptionZones().hasNext());
}
}

View File

@ -135,4 +135,30 @@ public class TestEncryptionZoneManager {
assertEquals(0L, result.get(0).getId());
assertEquals("/", result.get(0).getPath());
}
@Test
public void testListEncryptionZonesSubDirInvalid() throws Exception{
INodeDirectory thirdINode = new INodeDirectory(3L, "third".getBytes(),
defaultPermission, System.currentTimeMillis());
when(this.mockedDir.getInode(3L)).thenReturn(thirdINode);
//sets "second" as parent
thirdINode.setParent(this.secondINode);
this.ezManager = new EncryptionZoneManager(mockedDir, new Configuration());
this.ezManager.addEncryptionZone(1L, CipherSuite.AES_CTR_NOPADDING,
CryptoProtocolVersion.ENCRYPTION_ZONES, "test_key");
this.ezManager.addEncryptionZone(3L, CipherSuite.AES_CTR_NOPADDING,
CryptoProtocolVersion.ENCRYPTION_ZONES, "test_key");
// sets root as proper parent for firstINode only,
// leave secondINode with no parent
this.firstINode.setParent(rootINode);
when(mockedDir.getINodesInPath("/first", DirOp.READ_LINK)).
thenReturn(mockedINodesInPath);
when(mockedINodesInPath.getLastINode()).
thenReturn(firstINode);
BatchedListEntries<EncryptionZone> result = ezManager.
listEncryptionZones(0);
assertEquals(1, result.size());
assertEquals(1L, result.get(0).getId());
assertEquals("/first", result.get(0).getPath());
}
}

View File

@ -593,6 +593,7 @@
<crypto-admin-command>-listZones</crypto-admin-command>
</test-commands>
<cleanup-commands>
<command>-fs NAMENODE -deleteSnapshot /snapshotable snapshot1</command>
<command>-fs NAMENODE -rm -r /snapshotable</command>
<command>-fs NAMENODE -rm -r .Trash/Current/*</command>
</cleanup-commands>
@ -683,5 +684,36 @@
</comparator>
</comparators>
</test>
<test>
<description>Test adding two zones to a snapshotable directory;
The second zone is not a direct child of snapshottable directory;
Take snapshot, permanently delete second EZ, then list zones;</description>
<test-commands>
<command>-fs NAMENODE -rm -r .Trash/Current/*</command>
<command>-fs NAMENODE -mkdir /snapshotable</command>
<command>-fs NAMENODE -mkdir /snapshotable/test1</command>
<command>-fs NAMENODE -mkdir /snapshotable/test1/test2</command>
<command>-fs NAMENODE -mkdir /snapshotable/test3</command>
<dfs-admin-command>-fs NAMENODE -allowSnapshot /snapshotable</dfs-admin-command>
<crypto-admin-command>-createZone -path /snapshotable/test1/test2 -keyName myKey</crypto-admin-command>
<crypto-admin-command>-createZone -path /snapshotable/test3 -keyName myKey</crypto-admin-command>
<command>-fs NAMENODE -createSnapshot /snapshotable snapshot1</command>
<command>-fs NAMENODE -rm -r /snapshotable/test1</command>
<command>-fs NAMENODE -rm -r .Trash/Current/*</command>
<crypto-admin-command>-listZones</crypto-admin-command>
</test-commands>
<cleanup-commands>
<command>-fs NAMENODE -deleteSnapshot /snapshotable snapshot1</command>
<command>-fs NAMENODE -rm -r /snapshotable</command>
<command>-fs NAMENODE -rm -r .Trash/Current/*</command>
</cleanup-commands>
<comparators>
<comparator>
<type>RegexpAcrossOutputComparator</type>
<expected-output>(/test3)\s*(myKey)\s*</expected-output>
</comparator>
</comparators>
</test>
</tests>
</configuration>