HDFS-9244. Support nested encryption zones.
Change-Id: I43a13035a8b27956e90967ee82058efb647c3415
This commit is contained in:
parent
58acbf940a
commit
dbe49c1bd6
@ -2346,13 +2346,13 @@ public Collection<ErasureCodingPolicy> getAllErasureCodingPolicies()
|
|||||||
*/
|
*/
|
||||||
@Override
|
@Override
|
||||||
public Path getTrashRoot(Path path) throws IOException {
|
public Path getTrashRoot(Path path) throws IOException {
|
||||||
if ((path == null) || !dfs.isHDFSEncryptionEnabled()) {
|
if ((path == null) || path.isRoot() || !dfs.isHDFSEncryptionEnabled()) {
|
||||||
return super.getTrashRoot(path);
|
return super.getTrashRoot(path);
|
||||||
}
|
}
|
||||||
|
|
||||||
String absSrc = path.toUri().getPath();
|
String parentSrc = path.getParent().toUri().getPath();
|
||||||
EncryptionZone ez = dfs.getEZForPath(absSrc);
|
EncryptionZone ez = dfs.getEZForPath(parentSrc);
|
||||||
if ((ez != null) && !ez.getPath().equals(absSrc)) {
|
if ((ez != null)) {
|
||||||
return this.makeQualified(
|
return this.makeQualified(
|
||||||
new Path(ez.getPath() + "/" + FileSystem.TRASH_PREFIX +
|
new Path(ez.getPath() + "/" + FileSystem.TRASH_PREFIX +
|
||||||
dfs.ugi.getShortUserName()));
|
dfs.ugi.getShortUserName()));
|
||||||
|
@ -1008,6 +1008,8 @@ Release 2.8.0 - UNRELEASED
|
|||||||
HDFS-9184. Logging HDFS operation's caller context into audit logs.
|
HDFS-9184. Logging HDFS operation's caller context into audit logs.
|
||||||
(Mingliang Liu via jitendra)
|
(Mingliang Liu via jitendra)
|
||||||
|
|
||||||
|
HDFS-9244. Support nested encryption zones. (zhz)
|
||||||
|
|
||||||
IMPROVEMENTS
|
IMPROVEMENTS
|
||||||
|
|
||||||
HDFS-9257. improve error message for "Absolute path required" in INode.java
|
HDFS-9257. improve error message for "Absolute path required" in INode.java
|
||||||
|
@ -17,6 +17,7 @@
|
|||||||
*/
|
*/
|
||||||
package org.apache.hadoop.hdfs.server.namenode;
|
package org.apache.hadoop.hdfs.server.namenode;
|
||||||
|
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.EnumSet;
|
import java.util.EnumSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
@ -194,7 +195,7 @@ String getKeyName(final INodesInPath iip) {
|
|||||||
* Looks up the EncryptionZoneInt for a path within an encryption zone.
|
* Looks up the EncryptionZoneInt for a path within an encryption zone.
|
||||||
* Returns null if path is not within an EZ.
|
* Returns null if path is not within an EZ.
|
||||||
* <p/>
|
* <p/>
|
||||||
* Must be called while holding the manager lock.
|
* Called while holding the FSDirectory lock.
|
||||||
*/
|
*/
|
||||||
private EncryptionZoneInt getEncryptionZoneForPath(INodesInPath iip) {
|
private EncryptionZoneInt getEncryptionZoneForPath(INodesInPath iip) {
|
||||||
assert dir.hasReadLock();
|
assert dir.hasReadLock();
|
||||||
@ -212,6 +213,20 @@ private EncryptionZoneInt getEncryptionZoneForPath(INodesInPath iip) {
|
|||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Looks up the nearest ancestor EncryptionZoneInt that contains the given
|
||||||
|
* path (excluding itself).
|
||||||
|
* Returns null if path is not within an EZ, or the path is the root dir '/'
|
||||||
|
* <p/>
|
||||||
|
* Called while holding the FSDirectory lock.
|
||||||
|
*/
|
||||||
|
private EncryptionZoneInt getParentEncryptionZoneForPath(INodesInPath iip) {
|
||||||
|
assert dir.hasReadLock();
|
||||||
|
Preconditions.checkNotNull(iip);
|
||||||
|
INodesInPath parentIIP = iip.getParentINodesInPath();
|
||||||
|
return parentIIP == null ? null : getEncryptionZoneForPath(parentIIP);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns an EncryptionZone representing the ez for a given path.
|
* Returns an EncryptionZone representing the ez for a given path.
|
||||||
* Returns an empty marker EncryptionZone if path is not in an ez.
|
* Returns an empty marker EncryptionZone if path is not in an ez.
|
||||||
@ -231,7 +246,7 @@ EncryptionZone getEZINodeForPath(INodesInPath iip) {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Throws an exception if the provided path cannot be renamed into the
|
* Throws an exception if the provided path cannot be renamed into the
|
||||||
* destination because of differing encryption zones.
|
* destination because of differing parent encryption zones.
|
||||||
* <p/>
|
* <p/>
|
||||||
* Called while holding the FSDirectory lock.
|
* Called while holding the FSDirectory lock.
|
||||||
*
|
*
|
||||||
@ -243,30 +258,24 @@ EncryptionZone getEZINodeForPath(INodesInPath iip) {
|
|||||||
void checkMoveValidity(INodesInPath srcIIP, INodesInPath dstIIP, String src)
|
void checkMoveValidity(INodesInPath srcIIP, INodesInPath dstIIP, String src)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
assert dir.hasReadLock();
|
assert dir.hasReadLock();
|
||||||
final EncryptionZoneInt srcEZI = getEncryptionZoneForPath(srcIIP);
|
final EncryptionZoneInt srcParentEZI =
|
||||||
final EncryptionZoneInt dstEZI = getEncryptionZoneForPath(dstIIP);
|
getParentEncryptionZoneForPath(srcIIP);
|
||||||
final boolean srcInEZ = (srcEZI != null);
|
final EncryptionZoneInt dstParentEZI =
|
||||||
final boolean dstInEZ = (dstEZI != null);
|
getParentEncryptionZoneForPath(dstIIP);
|
||||||
if (srcInEZ) {
|
final boolean srcInEZ = (srcParentEZI != null);
|
||||||
if (!dstInEZ) {
|
final boolean dstInEZ = (dstParentEZI != null);
|
||||||
if (srcEZI.getINodeId() == srcIIP.getLastINode().getId()) {
|
if (srcInEZ && !dstInEZ) {
|
||||||
// src is ez root and dest is not in an ez. Allow the rename.
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
throw new IOException(
|
throw new IOException(
|
||||||
src + " can't be moved from an encryption zone.");
|
src + " can't be moved from an encryption zone.");
|
||||||
}
|
} else if (dstInEZ && !srcInEZ) {
|
||||||
} else {
|
|
||||||
if (dstInEZ) {
|
|
||||||
throw new IOException(
|
throw new IOException(
|
||||||
src + " can't be moved into an encryption zone.");
|
src + " can't be moved into an encryption zone.");
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (srcInEZ) {
|
if (srcInEZ) {
|
||||||
if (srcEZI != dstEZI) {
|
if (srcParentEZI != dstParentEZI) {
|
||||||
final String srcEZPath = getFullPathName(srcEZI);
|
final String srcEZPath = getFullPathName(srcParentEZI);
|
||||||
final String dstEZPath = getFullPathName(dstEZI);
|
final String dstEZPath = getFullPathName(dstParentEZI);
|
||||||
final StringBuilder sb = new StringBuilder(src);
|
final StringBuilder sb = new StringBuilder(src);
|
||||||
sb.append(" can't be moved from encryption zone ");
|
sb.append(" can't be moved from encryption zone ");
|
||||||
sb.append(srcEZPath);
|
sb.append(srcEZPath);
|
||||||
@ -287,21 +296,25 @@ XAttr createEncryptionZone(String src, CipherSuite suite,
|
|||||||
CryptoProtocolVersion version, String keyName)
|
CryptoProtocolVersion version, String keyName)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
assert dir.hasWriteLock();
|
assert dir.hasWriteLock();
|
||||||
|
|
||||||
|
// Check if src is a valid path for new EZ creation
|
||||||
final INodesInPath srcIIP = dir.getINodesInPath4Write(src, false);
|
final INodesInPath srcIIP = dir.getINodesInPath4Write(src, false);
|
||||||
|
if (srcIIP == null || srcIIP.getLastINode() == null) {
|
||||||
|
throw new FileNotFoundException("cannot find " + src);
|
||||||
|
}
|
||||||
if (dir.isNonEmptyDirectory(srcIIP)) {
|
if (dir.isNonEmptyDirectory(srcIIP)) {
|
||||||
throw new IOException(
|
throw new IOException(
|
||||||
"Attempt to create an encryption zone for a non-empty directory.");
|
"Attempt to create an encryption zone for a non-empty directory.");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (srcIIP != null &&
|
INode srcINode = srcIIP.getLastINode();
|
||||||
srcIIP.getLastINode() != null &&
|
if (!srcINode.isDirectory()) {
|
||||||
!srcIIP.getLastINode().isDirectory()) {
|
|
||||||
throw new IOException("Attempt to create an encryption zone for a file.");
|
throw new IOException("Attempt to create an encryption zone for a file.");
|
||||||
}
|
}
|
||||||
EncryptionZoneInt ezi = getEncryptionZoneForPath(srcIIP);
|
|
||||||
if (ezi != null) {
|
if (encryptionZones.get(srcINode.getId()) != null) {
|
||||||
throw new IOException("Directory " + src + " is already in an " +
|
throw new IOException("Directory " + src + " is already an encryption " +
|
||||||
"encryption zone. (" + getFullPathName(ezi) + ")");
|
"zone.");
|
||||||
}
|
}
|
||||||
|
|
||||||
final HdfsProtos.ZoneEncryptionInfoProto proto =
|
final HdfsProtos.ZoneEncryptionInfoProto proto =
|
||||||
|
@ -239,17 +239,7 @@ public void testBasicOperations() throws Exception {
|
|||||||
try {
|
try {
|
||||||
dfsAdmin.createEncryptionZone(zone1, TEST_KEY);
|
dfsAdmin.createEncryptionZone(zone1, TEST_KEY);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
assertExceptionContains("already in an encryption zone", e);
|
assertExceptionContains("is already an encryption zone", e);
|
||||||
}
|
|
||||||
|
|
||||||
/* Test failure of create EZ operation in an existing EZ. */
|
|
||||||
final Path zone1Child = new Path(zone1, "child");
|
|
||||||
fsWrapper.mkdir(zone1Child, FsPermission.getDirDefault(), false);
|
|
||||||
try {
|
|
||||||
dfsAdmin.createEncryptionZone(zone1Child, TEST_KEY);
|
|
||||||
fail("EZ in an EZ");
|
|
||||||
} catch (IOException e) {
|
|
||||||
assertExceptionContains("already in an encryption zone", e);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* create EZ on parent of an EZ should fail */
|
/* create EZ on parent of an EZ should fail */
|
||||||
@ -392,15 +382,6 @@ public void testBasicOperationsRootDir() throws Exception {
|
|||||||
assertNumZones(++numZones);
|
assertNumZones(++numZones);
|
||||||
assertZonePresent(null, rootDir.toString());
|
assertZonePresent(null, rootDir.toString());
|
||||||
|
|
||||||
/* create EZ on child of rootDir which is already an EZ should fail */
|
|
||||||
fsWrapper.mkdir(zone1, FsPermission.getDirDefault(), true);
|
|
||||||
try {
|
|
||||||
dfsAdmin.createEncryptionZone(zone1, TEST_KEY);
|
|
||||||
fail("EZ over an EZ");
|
|
||||||
} catch (IOException e) {
|
|
||||||
assertExceptionContains("already in an encryption zone", e);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Verify rootDir ez is present after restarting the NameNode
|
// Verify rootDir ez is present after restarting the NameNode
|
||||||
// and saving/loading from fsimage.
|
// and saving/loading from fsimage.
|
||||||
fs.setSafeMode(SafeModeAction.SAFEMODE_ENTER);
|
fs.setSafeMode(SafeModeAction.SAFEMODE_ENTER);
|
||||||
@ -409,14 +390,6 @@ public void testBasicOperationsRootDir() throws Exception {
|
|||||||
cluster.restartNameNode(true);
|
cluster.restartNameNode(true);
|
||||||
assertNumZones(numZones);
|
assertNumZones(numZones);
|
||||||
assertZonePresent(null, rootDir.toString());
|
assertZonePresent(null, rootDir.toString());
|
||||||
|
|
||||||
/* create EZ on child of rootDir which is already an EZ should fail */
|
|
||||||
try {
|
|
||||||
dfsAdmin.createEncryptionZone(zone1, TEST_KEY);
|
|
||||||
fail("EZ over an EZ");
|
|
||||||
} catch (IOException e) {
|
|
||||||
assertExceptionContains("already in an encryption zone", e);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -1436,6 +1409,23 @@ public void testEncryptionZoneWithTrash() throws Exception {
|
|||||||
// Delete encryption zone from the shell with trash enabled
|
// Delete encryption zone from the shell with trash enabled
|
||||||
// Verify the zone is moved to appropriate trash location in user's home dir
|
// Verify the zone is moved to appropriate trash location in user's home dir
|
||||||
verifyShellDeleteWithTrash(shell, zone1);
|
verifyShellDeleteWithTrash(shell, zone1);
|
||||||
|
|
||||||
|
final Path topEZ = new Path("/topEZ");
|
||||||
|
fs.mkdirs(topEZ);
|
||||||
|
dfsAdmin.createEncryptionZone(topEZ, TEST_KEY);
|
||||||
|
final String NESTED_EZ_TEST_KEY = "nested_ez_test_key";
|
||||||
|
DFSTestUtil.createKey(NESTED_EZ_TEST_KEY, cluster, conf);
|
||||||
|
final Path nestedEZ = new Path(topEZ, "nestedEZ");
|
||||||
|
fs.mkdirs(nestedEZ);
|
||||||
|
dfsAdmin.createEncryptionZone(nestedEZ, NESTED_EZ_TEST_KEY);
|
||||||
|
final Path topEZFile = new Path(topEZ, "file");
|
||||||
|
final Path nestedEZFile = new Path(nestedEZ, "file");
|
||||||
|
DFSTestUtil.createFile(fs, topEZFile, len, (short) 1, 0xFEED);
|
||||||
|
DFSTestUtil.createFile(fs, nestedEZFile, len, (short) 1, 0xFEED);
|
||||||
|
verifyShellDeleteWithTrash(shell, topEZFile);
|
||||||
|
verifyShellDeleteWithTrash(shell, nestedEZFile);
|
||||||
|
verifyShellDeleteWithTrash(shell, nestedEZ);
|
||||||
|
verifyShellDeleteWithTrash(shell, topEZ);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void verifyShellDeleteWithTrash(FsShell shell, Path path)
|
private void verifyShellDeleteWithTrash(FsShell shell, Path path)
|
||||||
|
@ -0,0 +1,215 @@
|
|||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.hdfs.server.namenode;
|
||||||
|
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.crypto.key.JavaKeyStoreProvider;
|
||||||
|
import org.apache.hadoop.fs.FileSystemTestHelper;
|
||||||
|
import org.apache.hadoop.fs.Path;
|
||||||
|
import org.apache.hadoop.fs.permission.FsPermission;
|
||||||
|
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
||||||
|
import org.apache.hadoop.hdfs.DFSTestUtil;
|
||||||
|
import org.apache.hadoop.hdfs.DistributedFileSystem;
|
||||||
|
import org.apache.hadoop.hdfs.HdfsConfiguration;
|
||||||
|
import org.apache.hadoop.hdfs.MiniDFSCluster;
|
||||||
|
import org.apache.hadoop.hdfs.protocol.HdfsConstants;
|
||||||
|
import org.apache.log4j.Level;
|
||||||
|
import org.apache.log4j.Logger;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test the behavior of nested encryption zones.
|
||||||
|
*/
|
||||||
|
public class TestNestedEncryptionZones {
|
||||||
|
private File testRootDir;
|
||||||
|
private final String TOP_EZ_KEY = "topezkey";
|
||||||
|
private final String NESTED_EZ_KEY = "nestedezkey";
|
||||||
|
|
||||||
|
private MiniDFSCluster cluster;
|
||||||
|
protected DistributedFileSystem fs;
|
||||||
|
|
||||||
|
private final Path rootDir = new Path("/");
|
||||||
|
private final Path rawDir = new Path("/.reserved/raw/");
|
||||||
|
private final Path topEZDir = new Path(rootDir, "topEZ");
|
||||||
|
private final Path nestedEZDir = new Path(topEZDir, "nestedEZ");
|
||||||
|
|
||||||
|
private final Path topEZBaseFile = new Path(rootDir, "topEZBaseFile");
|
||||||
|
private Path topEZFile = new Path(topEZDir, "file");
|
||||||
|
private Path topEZRawFile = new Path(rawDir, "topEZ/file");
|
||||||
|
|
||||||
|
private final Path nestedEZBaseFile = new Path(rootDir, "nestedEZBaseFile");
|
||||||
|
private Path nestedEZFile = new Path(nestedEZDir, "file");
|
||||||
|
private Path nestedEZRawFile = new Path(rawDir, "topEZ/nestedEZ/file");
|
||||||
|
|
||||||
|
// File length
|
||||||
|
private final int len = 8196;
|
||||||
|
|
||||||
|
private String getKeyProviderURI() {
|
||||||
|
return JavaKeyStoreProvider.SCHEME_NAME + "://file" +
|
||||||
|
new Path(testRootDir.toString(), "test.jks").toUri();
|
||||||
|
}
|
||||||
|
|
||||||
|
private void setProvider() {
|
||||||
|
// Need to set the client's KeyProvider to the NN's for JKS,
|
||||||
|
// else the updates do not get flushed properly
|
||||||
|
fs.getClient().setKeyProvider(cluster.getNameNode().getNamesystem()
|
||||||
|
.getProvider());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void setup() throws Exception {
|
||||||
|
Configuration conf = new HdfsConfiguration();
|
||||||
|
FileSystemTestHelper fsHelper = new FileSystemTestHelper();
|
||||||
|
// Set up java key store
|
||||||
|
String testRoot = fsHelper.getTestRootDir();
|
||||||
|
testRootDir = new File(testRoot).getAbsoluteFile();
|
||||||
|
conf.set(DFSConfigKeys.DFS_ENCRYPTION_KEY_PROVIDER_URI, getKeyProviderURI());
|
||||||
|
conf.setBoolean(DFSConfigKeys.DFS_NAMENODE_DELEGATION_TOKEN_ALWAYS_USE_KEY, true);
|
||||||
|
// Lower the batch size for testing
|
||||||
|
conf.setInt(DFSConfigKeys.DFS_NAMENODE_LIST_ENCRYPTION_ZONES_NUM_RESPONSES,
|
||||||
|
2);
|
||||||
|
cluster = new MiniDFSCluster.Builder(conf).numDataNodes(1).build();
|
||||||
|
Logger.getLogger(EncryptionZoneManager.class).setLevel(Level.TRACE);
|
||||||
|
fs = cluster.getFileSystem();
|
||||||
|
setProvider();
|
||||||
|
|
||||||
|
// Create test keys and EZs
|
||||||
|
DFSTestUtil.createKey(TOP_EZ_KEY, cluster, conf);
|
||||||
|
DFSTestUtil.createKey(NESTED_EZ_KEY, cluster, conf);
|
||||||
|
fs.mkdir(topEZDir, FsPermission.getDirDefault());
|
||||||
|
fs.createEncryptionZone(topEZDir, TOP_EZ_KEY);
|
||||||
|
fs.mkdir(nestedEZDir, FsPermission.getDirDefault());
|
||||||
|
fs.createEncryptionZone(nestedEZDir, NESTED_EZ_KEY);
|
||||||
|
|
||||||
|
DFSTestUtil.createFile(fs, topEZBaseFile, len, (short) 1, 0xFEED);
|
||||||
|
DFSTestUtil.createFile(fs, topEZFile, len, (short) 1, 0xFEED);
|
||||||
|
DFSTestUtil.createFile(fs, nestedEZBaseFile, len, (short) 1, 0xFEED);
|
||||||
|
DFSTestUtil.createFile(fs, nestedEZFile, len, (short) 1, 0xFEED);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test(timeout = 60000)
|
||||||
|
public void testNestedEncryptionZones() throws Exception {
|
||||||
|
verifyEncryption();
|
||||||
|
|
||||||
|
// Restart NameNode to test if nested EZs can be loaded from edit logs
|
||||||
|
cluster.restartNameNodes();
|
||||||
|
cluster.waitActive();
|
||||||
|
verifyEncryption();
|
||||||
|
|
||||||
|
// Checkpoint and restart NameNode, to test if nested EZs can be loaded
|
||||||
|
// from fsimage
|
||||||
|
fs.setSafeMode(HdfsConstants.SafeModeAction.SAFEMODE_ENTER);
|
||||||
|
fs.saveNamespace();
|
||||||
|
fs.setSafeMode(HdfsConstants.SafeModeAction.SAFEMODE_LEAVE);
|
||||||
|
cluster.restartNameNodes();
|
||||||
|
cluster.waitActive();
|
||||||
|
verifyEncryption();
|
||||||
|
|
||||||
|
Path renamedTopEZFile = new Path(topEZDir, "renamedFile");
|
||||||
|
Path renamedNestedEZFile = new Path(nestedEZDir, "renamedFile");
|
||||||
|
try {
|
||||||
|
fs.rename(topEZFile, renamedTopEZFile);
|
||||||
|
fs.rename(nestedEZFile, renamedNestedEZFile);
|
||||||
|
} catch (Exception e) {
|
||||||
|
fail("Should be able to rename files within the same EZ.");
|
||||||
|
}
|
||||||
|
|
||||||
|
topEZFile = renamedTopEZFile;
|
||||||
|
nestedEZFile = renamedNestedEZFile;
|
||||||
|
topEZRawFile = new Path(rawDir, "topEZ/renamedFile");
|
||||||
|
nestedEZRawFile = new Path(rawDir, "topEZ/nestedEZ/renamedFile");
|
||||||
|
verifyEncryption();
|
||||||
|
|
||||||
|
// Verify that files in top EZ cannot be moved into the nested EZ, and
|
||||||
|
// vice versa.
|
||||||
|
try {
|
||||||
|
fs.rename(topEZFile, new Path(nestedEZDir, "movedTopEZFile"));
|
||||||
|
fail("Shouldn't be able to rename between top EZ and nested EZ.");
|
||||||
|
} catch (Exception e) {
|
||||||
|
assertTrue(e.getMessage().contains(
|
||||||
|
"can't be moved from encryption zone " + topEZDir.toString() +
|
||||||
|
" to encryption zone " + nestedEZDir.toString()));
|
||||||
|
}
|
||||||
|
try {
|
||||||
|
fs.rename(nestedEZFile, new Path(topEZDir, "movedNestedEZFile"));
|
||||||
|
fail("Shouldn't be able to rename between top EZ and nested EZ.");
|
||||||
|
} catch (Exception e) {
|
||||||
|
assertTrue(e.getMessage().contains(
|
||||||
|
"can't be moved from encryption zone " + nestedEZDir.toString() +
|
||||||
|
" to encryption zone " + topEZDir.toString()));
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify that the nested EZ cannot be moved out of the top EZ.
|
||||||
|
try {
|
||||||
|
fs.rename(nestedEZFile, new Path(rootDir, "movedNestedEZFile"));
|
||||||
|
fail("Shouldn't be able to move the nested EZ out of the top EZ.");
|
||||||
|
} catch (Exception e) {
|
||||||
|
assertTrue(e.getMessage().contains(
|
||||||
|
"can't be moved from an encryption zone"));
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify that a non-nested EZ cannot be moved into another EZ
|
||||||
|
Path topEZ2Dir = new Path(rootDir, "topEZ2");
|
||||||
|
fs.mkdir(topEZ2Dir, FsPermission.getDirDefault());
|
||||||
|
fs.createEncryptionZone(topEZ2Dir, TOP_EZ_KEY);
|
||||||
|
try {
|
||||||
|
fs.rename(topEZ2Dir, new Path(topEZDir, "topEZ2"));
|
||||||
|
fail("Shouldn't be able to move a non-nested EZ into another " +
|
||||||
|
"existing EZ.");
|
||||||
|
} catch (Exception e){
|
||||||
|
assertTrue(e.getMessage().contains(
|
||||||
|
"can't be moved into an encryption zone"));
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
fs.rename(topEZDir, new Path(rootDir, "newTopEZDir"));
|
||||||
|
} catch (Exception e) {
|
||||||
|
fail("Should be able to rename the root dir of an EZ.");
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
fs.rename(new Path(rootDir, "newTopEZDir/nestedEZDir"),
|
||||||
|
new Path(rootDir, "newTopEZDir/newNestedEZDir"));
|
||||||
|
} catch (Exception e) {
|
||||||
|
fail("Should be able to rename the nested EZ dir within " +
|
||||||
|
"the same top EZ.");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void verifyEncryption() throws Exception {
|
||||||
|
assertEquals("Top EZ dir is encrypted",
|
||||||
|
true, fs.getFileStatus(topEZDir).isEncrypted());
|
||||||
|
assertEquals("Nested EZ dir is encrypted",
|
||||||
|
true, fs.getFileStatus(nestedEZDir).isEncrypted());
|
||||||
|
assertEquals("Top zone file is encrypted",
|
||||||
|
true, fs.getFileStatus(topEZFile).isEncrypted());
|
||||||
|
assertEquals("Nested zone file is encrypted",
|
||||||
|
true, fs.getFileStatus(nestedEZFile).isEncrypted());
|
||||||
|
|
||||||
|
DFSTestUtil.verifyFilesEqual(fs, topEZBaseFile, topEZFile, len);
|
||||||
|
DFSTestUtil.verifyFilesEqual(fs, nestedEZBaseFile, nestedEZFile, len);
|
||||||
|
DFSTestUtil.verifyFilesNotEqual(fs, topEZRawFile, nestedEZRawFile, len);
|
||||||
|
}
|
||||||
|
}
|
@ -63,7 +63,7 @@
|
|||||||
</test>
|
</test>
|
||||||
|
|
||||||
<test>
|
<test>
|
||||||
<description>Test failure of create ez on an existing ez</description>
|
<description>Test failure of creating EZ on an existing EZ</description>
|
||||||
<test-commands>
|
<test-commands>
|
||||||
<command>-fs NAMENODE -mkdir /foo</command>
|
<command>-fs NAMENODE -mkdir /foo</command>
|
||||||
<command>-fs NAMENODE -ls /</command>-
|
<command>-fs NAMENODE -ls /</command>-
|
||||||
@ -76,13 +76,13 @@
|
|||||||
<comparators>
|
<comparators>
|
||||||
<comparator>
|
<comparator>
|
||||||
<type>SubstringComparator</type>
|
<type>SubstringComparator</type>
|
||||||
<expected-output>Directory /foo is already in an encryption zone</expected-output>
|
<expected-output>Directory /foo is already an encryption zone</expected-output>
|
||||||
</comparator>
|
</comparator>
|
||||||
</comparators>
|
</comparators>
|
||||||
</test>
|
</test>
|
||||||
|
|
||||||
<test>
|
<test>
|
||||||
<description>Test failure of Create EZ operation in an existing EZ.</description>
|
<description>Test success of creating an EZ as a subdir of an existing EZ.</description>
|
||||||
<test-commands>
|
<test-commands>
|
||||||
<command>-fs NAMENODE -mkdir /foo</command>
|
<command>-fs NAMENODE -mkdir /foo</command>
|
||||||
<command>-fs NAMENODE -ls /</command>-
|
<command>-fs NAMENODE -ls /</command>-
|
||||||
@ -97,7 +97,7 @@
|
|||||||
<comparators>
|
<comparators>
|
||||||
<comparator>
|
<comparator>
|
||||||
<type>SubstringComparator</type>
|
<type>SubstringComparator</type>
|
||||||
<expected-output>Directory /foo/bar is already in an encryption zone. (/foo)</expected-output>
|
<expected-output>Added encryption zone /foo/bar</expected-output>
|
||||||
</comparator>
|
</comparator>
|
||||||
</comparators>
|
</comparators>
|
||||||
</test>
|
</test>
|
||||||
|
Loading…
Reference in New Issue
Block a user