HDFS-7478. Move org.apache.hadoop.hdfs.server.namenode.NNConf to FSNamesystem. Contributed by Li Lu.
This commit is contained in:
parent
2829b7a96f
commit
6a5596e3b4
@ -430,6 +430,9 @@ Release 2.7.0 - UNRELEASED
|
|||||||
HDFS-7468. Moving verify* functions to corresponding classes.
|
HDFS-7468. Moving verify* functions to corresponding classes.
|
||||||
(Li Lu via wheat9)
|
(Li Lu via wheat9)
|
||||||
|
|
||||||
|
HDFS-7478. Move org.apache.hadoop.hdfs.server.namenode.NNConf to
|
||||||
|
FSNamesystem. (Li Lu via wheat9)
|
||||||
|
|
||||||
OPTIMIZATIONS
|
OPTIMIZATIONS
|
||||||
|
|
||||||
HDFS-7454. Reduce memory footprint for AclEntries in NameNode.
|
HDFS-7454. Reduce memory footprint for AclEntries in NameNode.
|
||||||
|
@ -532,7 +532,9 @@ private void logAuditEvent(boolean succeeded,
|
|||||||
|
|
||||||
private final RetryCache retryCache;
|
private final RetryCache retryCache;
|
||||||
|
|
||||||
private final NNConf nnConf;
|
private final boolean aclsEnabled;
|
||||||
|
private final boolean xattrsEnabled;
|
||||||
|
private final int xattrMaxSize;
|
||||||
|
|
||||||
private KeyProviderCryptoExtension provider = null;
|
private KeyProviderCryptoExtension provider = null;
|
||||||
|
|
||||||
@ -848,7 +850,23 @@ static FSNamesystem loadFromDisk(Configuration conf) throws IOException {
|
|||||||
this.isDefaultAuditLogger = auditLoggers.size() == 1 &&
|
this.isDefaultAuditLogger = auditLoggers.size() == 1 &&
|
||||||
auditLoggers.get(0) instanceof DefaultAuditLogger;
|
auditLoggers.get(0) instanceof DefaultAuditLogger;
|
||||||
this.retryCache = ignoreRetryCache ? null : initRetryCache(conf);
|
this.retryCache = ignoreRetryCache ? null : initRetryCache(conf);
|
||||||
this.nnConf = new NNConf(conf);
|
|
||||||
|
this.aclsEnabled = conf.getBoolean(
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_KEY,
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_DEFAULT);
|
||||||
|
LOG.info("ACLs enabled? " + aclsEnabled);
|
||||||
|
this.xattrsEnabled = conf.getBoolean(
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_XATTRS_ENABLED_KEY,
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_XATTRS_ENABLED_DEFAULT);
|
||||||
|
LOG.info("XAttrs enabled? " + xattrsEnabled);
|
||||||
|
this.xattrMaxSize = conf.getInt(
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_MAX_XATTR_SIZE_KEY,
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_MAX_XATTR_SIZE_DEFAULT);
|
||||||
|
Preconditions.checkArgument(xattrMaxSize >= 0,
|
||||||
|
"Cannot set a negative value for the maximum size of an xattr (%s).",
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_MAX_XATTR_SIZE_KEY);
|
||||||
|
final String unlimited = xattrMaxSize == 0 ? " (unlimited)" : "";
|
||||||
|
LOG.info("Maximum size of an xattr: " + xattrMaxSize + unlimited);
|
||||||
} catch(IOException e) {
|
} catch(IOException e) {
|
||||||
LOG.error(getClass().getSimpleName() + " initialization failed.", e);
|
LOG.error(getClass().getSimpleName() + " initialization failed.", e);
|
||||||
close();
|
close();
|
||||||
@ -7827,7 +7845,7 @@ public BatchedListEntries<CachePoolEntry> listCachePools(String prevKey)
|
|||||||
void modifyAclEntries(final String srcArg, List<AclEntry> aclSpec)
|
void modifyAclEntries(final String srcArg, List<AclEntry> aclSpec)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkAclsConfigFlag();
|
checkAclsConfigFlag();
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
checkOperation(OperationCategory.WRITE);
|
checkOperation(OperationCategory.WRITE);
|
||||||
@ -7854,7 +7872,7 @@ void modifyAclEntries(final String srcArg, List<AclEntry> aclSpec)
|
|||||||
void removeAclEntries(final String srcArg, List<AclEntry> aclSpec)
|
void removeAclEntries(final String srcArg, List<AclEntry> aclSpec)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkAclsConfigFlag();
|
checkAclsConfigFlag();
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
checkOperation(OperationCategory.WRITE);
|
checkOperation(OperationCategory.WRITE);
|
||||||
@ -7880,7 +7898,7 @@ void removeAclEntries(final String srcArg, List<AclEntry> aclSpec)
|
|||||||
|
|
||||||
void removeDefaultAcl(final String srcArg) throws IOException {
|
void removeDefaultAcl(final String srcArg) throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkAclsConfigFlag();
|
checkAclsConfigFlag();
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
checkOperation(OperationCategory.WRITE);
|
checkOperation(OperationCategory.WRITE);
|
||||||
@ -7906,7 +7924,7 @@ void removeDefaultAcl(final String srcArg) throws IOException {
|
|||||||
|
|
||||||
void removeAcl(final String srcArg) throws IOException {
|
void removeAcl(final String srcArg) throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkAclsConfigFlag();
|
checkAclsConfigFlag();
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
checkOperation(OperationCategory.WRITE);
|
checkOperation(OperationCategory.WRITE);
|
||||||
@ -7932,7 +7950,7 @@ void removeAcl(final String srcArg) throws IOException {
|
|||||||
|
|
||||||
void setAcl(final String srcArg, List<AclEntry> aclSpec) throws IOException {
|
void setAcl(final String srcArg, List<AclEntry> aclSpec) throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkAclsConfigFlag();
|
checkAclsConfigFlag();
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
checkOperation(OperationCategory.WRITE);
|
checkOperation(OperationCategory.WRITE);
|
||||||
@ -7957,7 +7975,7 @@ void setAcl(final String srcArg, List<AclEntry> aclSpec) throws IOException {
|
|||||||
}
|
}
|
||||||
|
|
||||||
AclStatus getAclStatus(String src) throws IOException {
|
AclStatus getAclStatus(String src) throws IOException {
|
||||||
nnConf.checkAclsConfigFlag();
|
checkAclsConfigFlag();
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
checkOperation(OperationCategory.READ);
|
checkOperation(OperationCategory.READ);
|
||||||
byte[][] pathComponents = FSDirectory.getPathComponentsForReservedPath(src);
|
byte[][] pathComponents = FSDirectory.getPathComponentsForReservedPath(src);
|
||||||
@ -8141,7 +8159,7 @@ void setXAttr(String src, XAttr xAttr, EnumSet<XAttrSetFlag> flag,
|
|||||||
private void setXAttrInt(final String srcArg, XAttr xAttr,
|
private void setXAttrInt(final String srcArg, XAttr xAttr,
|
||||||
EnumSet<XAttrSetFlag> flag, boolean logRetryCache) throws IOException {
|
EnumSet<XAttrSetFlag> flag, boolean logRetryCache) throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkXAttrsConfigFlag();
|
checkXAttrsConfigFlag();
|
||||||
checkXAttrSize(xAttr);
|
checkXAttrSize(xAttr);
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
@ -8172,17 +8190,17 @@ private void setXAttrInt(final String srcArg, XAttr xAttr,
|
|||||||
* the configured limit. Setting a limit of zero disables this check.
|
* the configured limit. Setting a limit of zero disables this check.
|
||||||
*/
|
*/
|
||||||
private void checkXAttrSize(XAttr xAttr) {
|
private void checkXAttrSize(XAttr xAttr) {
|
||||||
if (nnConf.xattrMaxSize == 0) {
|
if (xattrMaxSize == 0) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
int size = xAttr.getName().getBytes(Charsets.UTF_8).length;
|
int size = xAttr.getName().getBytes(Charsets.UTF_8).length;
|
||||||
if (xAttr.getValue() != null) {
|
if (xAttr.getValue() != null) {
|
||||||
size += xAttr.getValue().length;
|
size += xAttr.getValue().length;
|
||||||
}
|
}
|
||||||
if (size > nnConf.xattrMaxSize) {
|
if (size > xattrMaxSize) {
|
||||||
throw new HadoopIllegalArgumentException(
|
throw new HadoopIllegalArgumentException(
|
||||||
"The XAttr is too big. The maximum combined size of the"
|
"The XAttr is too big. The maximum combined size of the"
|
||||||
+ " name and value is " + nnConf.xattrMaxSize
|
+ " name and value is " + xattrMaxSize
|
||||||
+ ", but the total size is " + size);
|
+ ", but the total size is " + size);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -8190,7 +8208,7 @@ private void checkXAttrSize(XAttr xAttr) {
|
|||||||
List<XAttr> getXAttrs(final String srcArg, List<XAttr> xAttrs)
|
List<XAttr> getXAttrs(final String srcArg, List<XAttr> xAttrs)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkXAttrsConfigFlag();
|
checkXAttrsConfigFlag();
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
final boolean isRawPath = FSDirectory.isReservedRawName(src);
|
final boolean isRawPath = FSDirectory.isReservedRawName(src);
|
||||||
boolean getAll = xAttrs == null || xAttrs.isEmpty();
|
boolean getAll = xAttrs == null || xAttrs.isEmpty();
|
||||||
@ -8247,7 +8265,7 @@ List<XAttr> getXAttrs(final String srcArg, List<XAttr> xAttrs)
|
|||||||
}
|
}
|
||||||
|
|
||||||
List<XAttr> listXAttrs(String src) throws IOException {
|
List<XAttr> listXAttrs(String src) throws IOException {
|
||||||
nnConf.checkXAttrsConfigFlag();
|
checkXAttrsConfigFlag();
|
||||||
final FSPermissionChecker pc = getPermissionChecker();
|
final FSPermissionChecker pc = getPermissionChecker();
|
||||||
final boolean isRawPath = FSDirectory.isReservedRawName(src);
|
final boolean isRawPath = FSDirectory.isReservedRawName(src);
|
||||||
checkOperation(OperationCategory.READ);
|
checkOperation(OperationCategory.READ);
|
||||||
@ -8297,7 +8315,7 @@ void removeXAttr(String src, XAttr xAttr, boolean logRetryCache)
|
|||||||
void removeXAttrInt(final String srcArg, XAttr xAttr, boolean logRetryCache)
|
void removeXAttrInt(final String srcArg, XAttr xAttr, boolean logRetryCache)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
String src = srcArg;
|
String src = srcArg;
|
||||||
nnConf.checkXAttrsConfigFlag();
|
checkXAttrsConfigFlag();
|
||||||
HdfsFileStatus resultingStat = null;
|
HdfsFileStatus resultingStat = null;
|
||||||
FSPermissionChecker pc = getPermissionChecker();
|
FSPermissionChecker pc = getPermissionChecker();
|
||||||
XAttrPermissionFilter.checkPermissionForApi(pc, xAttr,
|
XAttrPermissionFilter.checkPermissionForApi(pc, xAttr,
|
||||||
@ -8452,5 +8470,23 @@ private static void enableAsyncAuditLog() {
|
|||||||
logger.addAppender(asyncAppender);
|
logger.addAppender(asyncAppender);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void checkAclsConfigFlag() throws AclException {
|
||||||
|
if (!aclsEnabled) {
|
||||||
|
throw new AclException(String.format(
|
||||||
|
"The ACL operation has been rejected. "
|
||||||
|
+ "Support for ACLs has been disabled by setting %s to false.",
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_KEY));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void checkXAttrsConfigFlag() throws IOException {
|
||||||
|
if (!xattrsEnabled) {
|
||||||
|
throw new IOException(String.format(
|
||||||
|
"The XAttr operation has been rejected. "
|
||||||
|
+ "Support for XAttrs has been disabled by setting %s to false.",
|
||||||
|
DFSConfigKeys.DFS_NAMENODE_XATTRS_ENABLED_KEY));
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,104 +0,0 @@
|
|||||||
/**
|
|
||||||
* Licensed to the Apache Software Foundation (ASF) under one
|
|
||||||
* or more contributor license agreements. See the NOTICE file
|
|
||||||
* distributed with this work for additional information
|
|
||||||
* regarding copyright ownership. The ASF licenses this file
|
|
||||||
* to you under the Apache License, Version 2.0 (the
|
|
||||||
* "License"); you may not use this file except in compliance
|
|
||||||
* with the License. You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package org.apache.hadoop.hdfs.server.namenode;
|
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
|
|
||||||
import org.apache.commons.logging.LogFactory;
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
|
||||||
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
|
||||||
import org.apache.hadoop.hdfs.protocol.AclException;
|
|
||||||
|
|
||||||
import com.google.common.base.Preconditions;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class is a common place for NN configuration.
|
|
||||||
*/
|
|
||||||
@InterfaceAudience.Private
|
|
||||||
final class NNConf {
|
|
||||||
/**
|
|
||||||
* Support for ACLs is controlled by a configuration flag. If the
|
|
||||||
* configuration flag is false, then the NameNode will reject all
|
|
||||||
* ACL-related operations.
|
|
||||||
*/
|
|
||||||
private final boolean aclsEnabled;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Support for XAttrs is controlled by a configuration flag. If the
|
|
||||||
* configuration flag is false, then the NameNode will reject all
|
|
||||||
* XAttr-related operations.
|
|
||||||
*/
|
|
||||||
private final boolean xattrsEnabled;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Maximum size of a single name-value extended attribute.
|
|
||||||
*/
|
|
||||||
final int xattrMaxSize;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new NNConf from configuration.
|
|
||||||
*
|
|
||||||
* @param conf Configuration to check
|
|
||||||
*/
|
|
||||||
public NNConf(Configuration conf) {
|
|
||||||
aclsEnabled = conf.getBoolean(DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_KEY,
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_DEFAULT);
|
|
||||||
LogFactory.getLog(NNConf.class).info("ACLs enabled? " + aclsEnabled);
|
|
||||||
xattrsEnabled = conf.getBoolean(
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_XATTRS_ENABLED_KEY,
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_XATTRS_ENABLED_DEFAULT);
|
|
||||||
LogFactory.getLog(NNConf.class).info("XAttrs enabled? " + xattrsEnabled);
|
|
||||||
xattrMaxSize = conf.getInt(
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_MAX_XATTR_SIZE_KEY,
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_MAX_XATTR_SIZE_DEFAULT);
|
|
||||||
Preconditions.checkArgument(xattrMaxSize >= 0,
|
|
||||||
"Cannot set a negative value for the maximum size of an xattr (%s).",
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_MAX_XATTR_SIZE_KEY);
|
|
||||||
final String unlimited = xattrMaxSize == 0 ? " (unlimited)" : "";
|
|
||||||
LogFactory.getLog(NNConf.class).info(
|
|
||||||
"Maximum size of an xattr: " + xattrMaxSize + unlimited);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks the flag on behalf of an ACL API call.
|
|
||||||
*
|
|
||||||
* @throws AclException if ACLs are disabled
|
|
||||||
*/
|
|
||||||
public void checkAclsConfigFlag() throws AclException {
|
|
||||||
if (!aclsEnabled) {
|
|
||||||
throw new AclException(String.format(
|
|
||||||
"The ACL operation has been rejected. "
|
|
||||||
+ "Support for ACLs has been disabled by setting %s to false.",
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_KEY));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Checks the flag on behalf of an XAttr API call.
|
|
||||||
* @throws IOException if XAttrs are disabled
|
|
||||||
*/
|
|
||||||
public void checkXAttrsConfigFlag() throws IOException {
|
|
||||||
if (!xattrsEnabled) {
|
|
||||||
throw new IOException(String.format(
|
|
||||||
"The XAttr operation has been rejected. "
|
|
||||||
+ "Support for XAttrs has been disabled by setting %s to false.",
|
|
||||||
DFSConfigKeys.DFS_NAMENODE_XATTRS_ENABLED_KEY));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
Loading…
Reference in New Issue
Block a user