HADOOP-17873. ABFS: Fix transient failures in ITestAbfsStreamStatistics and ITestAbfsRestOperationException (#3699)
Successor for the reverted PR #3341, using the hadoop @VisibleForTesting attribute Contributed by Sumangala Patki
This commit is contained in:
parent
be4c638e4c
commit
7bcf853ff4
@ -604,6 +604,7 @@
|
|||||||
<exclude>**/azurebfs/ITestAzureBlobFileSystemListStatus.java</exclude>
|
<exclude>**/azurebfs/ITestAzureBlobFileSystemListStatus.java</exclude>
|
||||||
<exclude>**/azurebfs/extensions/ITestAbfsDelegationTokens.java</exclude>
|
<exclude>**/azurebfs/extensions/ITestAbfsDelegationTokens.java</exclude>
|
||||||
<exclude>**/azurebfs/ITestSmallWriteOptimization.java</exclude>
|
<exclude>**/azurebfs/ITestSmallWriteOptimization.java</exclude>
|
||||||
|
<exclude>**/azurebfs/ITestAbfsStreamStatistics*.java</exclude>
|
||||||
<exclude>**/azurebfs/services/ITestReadBufferManager.java</exclude>
|
<exclude>**/azurebfs/services/ITestReadBufferManager.java</exclude>
|
||||||
<exclude>**/azurebfs/commit/*.java</exclude>
|
<exclude>**/azurebfs/commit/*.java</exclude>
|
||||||
</excludes>
|
</excludes>
|
||||||
@ -647,6 +648,7 @@
|
|||||||
<include>**/azurebfs/extensions/ITestAbfsDelegationTokens.java</include>
|
<include>**/azurebfs/extensions/ITestAbfsDelegationTokens.java</include>
|
||||||
<include>**/azurebfs/ITestSmallWriteOptimization.java</include>
|
<include>**/azurebfs/ITestSmallWriteOptimization.java</include>
|
||||||
<include>**/azurebfs/services/ITestReadBufferManager.java</include>
|
<include>**/azurebfs/services/ITestReadBufferManager.java</include>
|
||||||
|
<include>**/azurebfs/ITestAbfsStreamStatistics*.java</include>
|
||||||
<include>**/azurebfs/commit/*.java</include>
|
<include>**/azurebfs/commit/*.java</include>
|
||||||
</includes>
|
</includes>
|
||||||
</configuration>
|
</configuration>
|
||||||
|
@ -22,6 +22,7 @@
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.VisibleForTesting;
|
||||||
import org.apache.hadoop.util.Preconditions;
|
import org.apache.hadoop.util.Preconditions;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
@ -138,4 +139,9 @@ public String getUserAgentSuffix() {
|
|||||||
String suffix = ExtensionHelper.getUserAgentSuffix(adaptee, "");
|
String suffix = ExtensionHelper.getUserAgentSuffix(adaptee, "");
|
||||||
return suffix != null ? suffix : "";
|
return suffix != null ? suffix : "";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@VisibleForTesting
|
||||||
|
protected CustomTokenProviderAdaptee getCustomTokenProviderAdaptee() {
|
||||||
|
return adaptee;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -1289,4 +1289,9 @@ public ListenableFuture<?> submit(Runnable runnable) {
|
|||||||
public <V> void addCallback(ListenableFuture<V> future, FutureCallback<V> callback) {
|
public <V> void addCallback(ListenableFuture<V> future, FutureCallback<V> callback) {
|
||||||
Futures.addCallback(future, callback, executorService);
|
Futures.addCallback(future, callback, executorService);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@VisibleForTesting
|
||||||
|
protected AccessTokenProvider getTokenProvider() {
|
||||||
|
return tokenProvider;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -37,10 +37,12 @@
|
|||||||
import org.apache.hadoop.fs.Path;
|
import org.apache.hadoop.fs.Path;
|
||||||
import org.apache.hadoop.fs.azurebfs.constants.FSOperationType;
|
import org.apache.hadoop.fs.azurebfs.constants.FSOperationType;
|
||||||
import org.apache.hadoop.fs.azurebfs.contracts.exceptions.AzureBlobFileSystemException;
|
import org.apache.hadoop.fs.azurebfs.contracts.exceptions.AzureBlobFileSystemException;
|
||||||
|
import org.apache.hadoop.fs.azurebfs.oauth2.AccessTokenProvider;
|
||||||
import org.apache.hadoop.fs.azurebfs.security.AbfsDelegationTokenManager;
|
import org.apache.hadoop.fs.azurebfs.security.AbfsDelegationTokenManager;
|
||||||
import org.apache.hadoop.fs.azurebfs.services.AbfsClient;
|
import org.apache.hadoop.fs.azurebfs.services.AbfsClient;
|
||||||
import org.apache.hadoop.fs.azurebfs.services.AbfsOutputStream;
|
import org.apache.hadoop.fs.azurebfs.services.AbfsOutputStream;
|
||||||
import org.apache.hadoop.fs.azurebfs.services.AuthType;
|
import org.apache.hadoop.fs.azurebfs.services.AuthType;
|
||||||
|
import org.apache.hadoop.fs.azurebfs.services.TestAbfsClient;
|
||||||
import org.apache.hadoop.fs.azure.AzureNativeFileSystemStore;
|
import org.apache.hadoop.fs.azure.AzureNativeFileSystemStore;
|
||||||
import org.apache.hadoop.fs.azure.NativeAzureFileSystem;
|
import org.apache.hadoop.fs.azure.NativeAzureFileSystem;
|
||||||
import org.apache.hadoop.fs.azure.metrics.AzureFileSystemInstrumentation;
|
import org.apache.hadoop.fs.azure.metrics.AzureFileSystemInstrumentation;
|
||||||
@ -251,6 +253,9 @@ public Hashtable<String, String> call() throws Exception {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public AccessTokenProvider getAccessTokenProvider(final AzureBlobFileSystem fs) {
|
||||||
|
return TestAbfsClient.getAccessTokenProvider(fs.getAbfsStore().getClient());
|
||||||
|
}
|
||||||
|
|
||||||
public void loadConfiguredFileSystem() throws Exception {
|
public void loadConfiguredFileSystem() throws Exception {
|
||||||
// disable auto-creation of filesystem
|
// disable auto-creation of filesystem
|
||||||
|
@ -112,7 +112,10 @@ public void testWithDifferentCustomTokenFetchRetry(int numOfRetries) throws Exce
|
|||||||
final AzureBlobFileSystem fs1 =
|
final AzureBlobFileSystem fs1 =
|
||||||
(AzureBlobFileSystem) FileSystem.newInstance(fs.getUri(),
|
(AzureBlobFileSystem) FileSystem.newInstance(fs.getUri(),
|
||||||
config);
|
config);
|
||||||
RetryTestTokenProvider.ResetStatusToFirstTokenFetch();
|
RetryTestTokenProvider retryTestTokenProvider
|
||||||
|
= RetryTestTokenProvider.getCurrentRetryTestProviderInstance(
|
||||||
|
getAccessTokenProvider(fs1));
|
||||||
|
retryTestTokenProvider.resetStatusToFirstTokenFetch();
|
||||||
|
|
||||||
intercept(Exception.class,
|
intercept(Exception.class,
|
||||||
()-> {
|
()-> {
|
||||||
@ -120,10 +123,10 @@ public void testWithDifferentCustomTokenFetchRetry(int numOfRetries) throws Exce
|
|||||||
});
|
});
|
||||||
|
|
||||||
// Number of retries done should be as configured
|
// Number of retries done should be as configured
|
||||||
Assert.assertTrue(
|
Assert.assertEquals(
|
||||||
"Number of token fetch retries (" + RetryTestTokenProvider.reTryCount
|
"Number of token fetch retries done does not match with fs.azure"
|
||||||
+ ") done, does not match with fs.azure.custom.token.fetch.retry.count configured (" + numOfRetries
|
+ ".custom.token.fetch.retry.count configured", numOfRetries,
|
||||||
+ ")", RetryTestTokenProvider.reTryCount == numOfRetries);
|
retryTestTokenProvider.getRetryCount());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -30,12 +30,12 @@
|
|||||||
*/
|
*/
|
||||||
public class RetryTestTokenProvider implements CustomTokenProviderAdaptee {
|
public class RetryTestTokenProvider implements CustomTokenProviderAdaptee {
|
||||||
|
|
||||||
// Need to track first token fetch otherwise will get counted as a retry too.
|
private static final Logger LOG = LoggerFactory.getLogger(
|
||||||
private static boolean isThisFirstTokenFetch = true;
|
RetryTestTokenProvider.class);
|
||||||
public static int reTryCount = 0;
|
|
||||||
|
|
||||||
private static final Logger LOG = LoggerFactory
|
// Need to track first token fetch otherwise will get counted as a retry too.
|
||||||
.getLogger(RetryTestTokenProvider.class);
|
private boolean isThisFirstTokenFetch = true;
|
||||||
|
private int retryCount = 0;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void initialize(Configuration configuration, String accountName)
|
public void initialize(Configuration configuration, String accountName)
|
||||||
@ -43,9 +43,13 @@ public void initialize(Configuration configuration, String accountName)
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void ResetStatusToFirstTokenFetch() {
|
/**
|
||||||
|
* Clear earlier retry details and reset RetryTestTokenProvider instance to
|
||||||
|
* state of first access token fetch call.
|
||||||
|
*/
|
||||||
|
public void resetStatusToFirstTokenFetch() {
|
||||||
isThisFirstTokenFetch = true;
|
isThisFirstTokenFetch = true;
|
||||||
reTryCount = 0;
|
retryCount = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@ -53,7 +57,7 @@ public String getAccessToken() throws IOException {
|
|||||||
if (isThisFirstTokenFetch) {
|
if (isThisFirstTokenFetch) {
|
||||||
isThisFirstTokenFetch = false;
|
isThisFirstTokenFetch = false;
|
||||||
} else {
|
} else {
|
||||||
reTryCount++;
|
retryCount++;
|
||||||
}
|
}
|
||||||
|
|
||||||
LOG.debug("RetryTestTokenProvider: Throw an exception in fetching tokens");
|
LOG.debug("RetryTestTokenProvider: Throw an exception in fetching tokens");
|
||||||
@ -64,4 +68,13 @@ public String getAccessToken() throws IOException {
|
|||||||
public Date getExpiryTime() {
|
public Date getExpiryTime() {
|
||||||
return new Date();
|
return new Date();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static RetryTestTokenProvider getCurrentRetryTestProviderInstance(
|
||||||
|
AccessTokenProvider customTokenProvider) {
|
||||||
|
return (RetryTestTokenProvider) ((CustomTokenProviderAdapter) customTokenProvider).getCustomTokenProviderAdaptee();
|
||||||
|
}
|
||||||
|
|
||||||
|
public int getRetryCount() {
|
||||||
|
return retryCount;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -395,4 +395,8 @@ public static AbfsRestOperation getRestOp(AbfsRestOperationType type,
|
|||||||
url,
|
url,
|
||||||
requestHeaders);
|
requestHeaders);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static AccessTokenProvider getAccessTokenProvider(AbfsClient client) {
|
||||||
|
return client.getTokenProvider();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user