HADOOP-15792. typo in AzureBlobFileSystem.getIsNamespaceEnabeld.
Contributed by Abhishek Modi.
This commit is contained in:
parent
58fa96b697
commit
e8b8604314
@ -553,7 +553,7 @@ public void setOwner(final Path path, final String owner, final String group)
|
||||
throws IOException {
|
||||
LOG.debug(
|
||||
"AzureBlobFileSystem.setOwner path: {}", path);
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
super.setOwner(path, owner, group);
|
||||
return;
|
||||
}
|
||||
@ -584,7 +584,7 @@ public void setOwner(final Path path, final String owner, final String group)
|
||||
public void setPermission(final Path path, final FsPermission permission)
|
||||
throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.setPermission path: {}", path);
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
super.setPermission(path, permission);
|
||||
return;
|
||||
}
|
||||
@ -619,7 +619,7 @@ public void modifyAclEntries(final Path path, final List<AclEntry> aclSpec)
|
||||
throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.modifyAclEntries path: {}", path.toString());
|
||||
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
throw new UnsupportedOperationException(
|
||||
"modifyAclEntries is only supported by storage accounts with the "
|
||||
+ "hierarchical namespace enabled.");
|
||||
@ -653,7 +653,7 @@ public void removeAclEntries(final Path path, final List<AclEntry> aclSpec)
|
||||
throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.removeAclEntries path: {}", path);
|
||||
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
throw new UnsupportedOperationException(
|
||||
"removeAclEntries is only supported by storage accounts with the "
|
||||
+ "hierarchical namespace enabled.");
|
||||
@ -683,7 +683,7 @@ public void removeAclEntries(final Path path, final List<AclEntry> aclSpec)
|
||||
public void removeDefaultAcl(final Path path) throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.removeDefaultAcl path: {}", path);
|
||||
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
throw new UnsupportedOperationException(
|
||||
"removeDefaultAcl is only supported by storage accounts with the "
|
||||
+ "hierarchical namespace enabled.");
|
||||
@ -711,7 +711,7 @@ public void removeDefaultAcl(final Path path) throws IOException {
|
||||
public void removeAcl(final Path path) throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.removeAcl path: {}", path);
|
||||
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
throw new UnsupportedOperationException(
|
||||
"removeAcl is only supported by storage accounts with the "
|
||||
+ "hierarchical namespace enabled.");
|
||||
@ -742,7 +742,7 @@ public void setAcl(final Path path, final List<AclEntry> aclSpec)
|
||||
throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.setAcl path: {}", path);
|
||||
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
throw new UnsupportedOperationException(
|
||||
"setAcl is only supported by storage accounts with the hierarchical "
|
||||
+ "namespace enabled.");
|
||||
@ -773,7 +773,7 @@ public void setAcl(final Path path, final List<AclEntry> aclSpec)
|
||||
public AclStatus getAclStatus(final Path path) throws IOException {
|
||||
LOG.debug("AzureBlobFileSystem.getAclStatus path: {}", path.toString());
|
||||
|
||||
if (!getIsNamespaceEnabeld()) {
|
||||
if (!getIsNamespaceEnabled()) {
|
||||
throw new UnsupportedOperationException(
|
||||
"getAclStatus is only supported by storage account with the "
|
||||
+ "hierarchical namespace enabled.");
|
||||
@ -1005,7 +1005,7 @@ AbfsClient getAbfsClient() {
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
boolean getIsNamespaceEnabeld() throws AzureBlobFileSystemException {
|
||||
boolean getIsNamespaceEnabled() throws AzureBlobFileSystemException {
|
||||
return abfsStore.getIsNamespaceEnabled();
|
||||
}
|
||||
|
||||
|
@ -203,7 +203,7 @@ public void testGetFileStatusUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testSetOwnerAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
fs.setOwner(TEST_WRITE_ONLY_FILE_PATH_0, "testUser", "testGroup");
|
||||
}
|
||||
@ -211,7 +211,7 @@ public void testSetOwnerAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testSetOwnerUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
()-> {
|
||||
@ -222,7 +222,7 @@ public void testSetOwnerUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testSetPermissionAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
fs.setPermission(TEST_WRITE_ONLY_FILE_PATH_0, new FsPermission(FsAction.ALL, FsAction.NONE, FsAction.NONE));
|
||||
}
|
||||
@ -230,7 +230,7 @@ public void testSetPermissionAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testSetPermissionUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
()-> {
|
||||
@ -241,7 +241,7 @@ public void testSetPermissionUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
fs.modifyAclEntries(TEST_WRITE_ONLY_FILE_PATH_0, aclSpec);
|
||||
@ -250,7 +250,7 @@ public void testModifyAclEntriesAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
@ -262,7 +262,7 @@ public void testModifyAclEntriesUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
fs.removeAclEntries(TEST_WRITE_ONLY_FILE_PATH_0, aclSpec);
|
||||
@ -271,7 +271,7 @@ public void testRemoveAclEntriesAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
@ -283,7 +283,7 @@ public void testRemoveAclEntriesUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAclAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
fs.removeDefaultAcl(TEST_WRITE_ONLY_FILE_PATH_0);
|
||||
}
|
||||
@ -291,7 +291,7 @@ public void testRemoveDefaultAclAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAclUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
()-> {
|
||||
@ -302,7 +302,7 @@ public void testRemoveDefaultAclUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
fs.removeAcl(TEST_WRITE_ONLY_FILE_PATH_0);
|
||||
}
|
||||
@ -310,7 +310,7 @@ public void testRemoveAclAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
()-> {
|
||||
@ -321,7 +321,7 @@ public void testRemoveAclUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testSetAclAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
fs.setAcl(TEST_WRITE_ONLY_FILE_PATH_0, aclSpec);
|
||||
@ -330,7 +330,7 @@ public void testSetAclAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testSetAclUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
@ -342,7 +342,7 @@ public void testSetAclUnauthorized() throws Exception {
|
||||
@Test
|
||||
public void testGetAclStatusAuthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_THEN_READ_ONLY_PATH).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
fs.getAclStatus(TEST_WRITE_THEN_READ_ONLY_PATH);
|
||||
@ -351,7 +351,7 @@ public void testGetAclStatusAuthorized() throws Exception {
|
||||
@Test
|
||||
public void testGetAclStatusUnauthorized() throws Exception {
|
||||
final AzureBlobFileSystem fs = getFileSystem();
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabeld());
|
||||
assumeTrue("This test case only runs when namespace is enabled", fs.getIsNamespaceEnabled());
|
||||
fs.create(TEST_WRITE_ONLY_FILE_PATH_0).close();
|
||||
List<AclEntry> aclSpec = Arrays.asList(aclEntry(ACCESS, GROUP, "bar", FsAction.ALL));
|
||||
intercept(AbfsAuthorizationException.class,
|
||||
|
@ -45,7 +45,7 @@ public ITestAzureBlobFileSystemBackCompat() throws Exception {
|
||||
public void testBlobBackCompat() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
// test only valid for non-namespace enabled account
|
||||
Assume.assumeFalse(fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeFalse(fs.getIsNamespaceEnabled());
|
||||
String storageConnectionString = getBlobConnectionString();
|
||||
CloudStorageAccount storageAccount = CloudStorageAccount.parse(storageConnectionString);
|
||||
CloudBlobClient blobClient = storageAccount.createCloudBlobClient();
|
||||
|
@ -76,7 +76,7 @@ public static Collection abfsCreateNonRecursiveTestData()
|
||||
public void testFilePermission() throws Exception {
|
||||
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(fs.getIsNamespaceEnabled());
|
||||
fs.getConf().set(CommonConfigurationKeys.FS_PERMISSIONS_UMASK_KEY, DEFAULT_UMASK_VALUE);
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
|
||||
@ -92,7 +92,7 @@ public void testFilePermission() throws Exception {
|
||||
@Test
|
||||
public void testFolderPermission() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(fs.getIsNamespaceEnabled());
|
||||
fs.getConf().set(CommonConfigurationKeys.FS_PERMISSIONS_UMASK_KEY, "027");
|
||||
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
|
@ -525,7 +525,7 @@ private static double toMbps(long bytes, long milliseconds) {
|
||||
private void createTestFile() throws Exception {
|
||||
final AzureBlobFileSystem abFs = this.getFileSystem();
|
||||
// test only valid for non-namespace enabled account
|
||||
Assume.assumeFalse(abFs.getIsNamespaceEnabeld());
|
||||
Assume.assumeFalse(abFs.getIsNamespaceEnabled());
|
||||
FileSystem fs = this.getWasbFileSystem();
|
||||
|
||||
if (fs.exists(TEST_FILE_PATH)) {
|
||||
|
@ -80,7 +80,7 @@ public ITestAzureBlobFilesystemAcl() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntries() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.mkdirs(path, FsPermission.createImmutable((short) RWX_RX));
|
||||
|
||||
@ -113,7 +113,7 @@ public void testModifyAclEntries() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesOnlyAccess() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -137,7 +137,7 @@ public void testModifyAclEntriesOnlyAccess() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesOnlyDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -160,7 +160,7 @@ public void testModifyAclEntriesOnlyDefault() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesMinimal() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -178,7 +178,7 @@ public void testModifyAclEntriesMinimal() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesMinimalDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -198,7 +198,7 @@ public void testModifyAclEntriesMinimalDefault() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesCustomMask() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -217,7 +217,7 @@ public void testModifyAclEntriesCustomMask() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesStickyBit() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) 01750));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -247,7 +247,7 @@ public void testModifyAclEntriesStickyBit() throws Exception {
|
||||
@Test(expected=FileNotFoundException.class)
|
||||
public void testModifyAclEntriesPathNotFound() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
// Path has not been created.
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -261,7 +261,7 @@ public void testModifyAclEntriesPathNotFound() throws Exception {
|
||||
@Test (expected=Exception.class)
|
||||
public void testModifyAclEntriesDefaultOnFile() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -273,7 +273,7 @@ public void testModifyAclEntriesDefaultOnFile() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntries() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -301,7 +301,7 @@ public void testRemoveAclEntries() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesOnlyAccess() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -326,7 +326,7 @@ public void testRemoveAclEntriesOnlyAccess() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesOnlyDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -353,7 +353,7 @@ public void testRemoveAclEntriesOnlyDefault() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesMinimal() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RWX_RW));
|
||||
@ -376,7 +376,7 @@ public void testRemoveAclEntriesMinimal() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesMinimalDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -404,7 +404,7 @@ public void testRemoveAclEntriesMinimalDefault() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclEntriesStickyBit() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) 01750));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -432,7 +432,7 @@ public void testRemoveAclEntriesStickyBit() throws Exception {
|
||||
@Test(expected=FileNotFoundException.class)
|
||||
public void testRemoveAclEntriesPathNotFound() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
// Path has not been created.
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -443,7 +443,7 @@ public void testRemoveAclEntriesPathNotFound() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAcl() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -465,7 +465,7 @@ public void testRemoveDefaultAcl() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAclOnlyAccess() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -487,7 +487,7 @@ public void testRemoveDefaultAclOnlyAccess() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAclOnlyDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -503,7 +503,7 @@ public void testRemoveDefaultAclOnlyDefault() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAclMinimal() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
fs.removeDefaultAcl(path);
|
||||
@ -516,7 +516,7 @@ public void testRemoveDefaultAclMinimal() throws Exception {
|
||||
@Test
|
||||
public void testRemoveDefaultAclStickyBit() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) 01750));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -538,7 +538,7 @@ public void testRemoveDefaultAclStickyBit() throws Exception {
|
||||
@Test(expected=FileNotFoundException.class)
|
||||
public void testRemoveDefaultAclPathNotFound() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
// Path has not been created.
|
||||
fs.removeDefaultAcl(path);
|
||||
@ -547,7 +547,7 @@ public void testRemoveDefaultAclPathNotFound() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAcl() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -569,7 +569,7 @@ public void testRemoveAcl() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclMinimalAcl() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -583,7 +583,7 @@ public void testRemoveAclMinimalAcl() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclStickyBit() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) 01750));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -603,7 +603,7 @@ public void testRemoveAclStickyBit() throws Exception {
|
||||
@Test
|
||||
public void testRemoveAclOnlyDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -622,7 +622,7 @@ public void testRemoveAclOnlyDefault() throws Exception {
|
||||
@Test(expected=FileNotFoundException.class)
|
||||
public void testRemoveAclPathNotFound() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
// Path has not been created.
|
||||
fs.removeAcl(path);
|
||||
@ -631,7 +631,7 @@ public void testRemoveAclPathNotFound() throws Exception {
|
||||
@Test
|
||||
public void testSetAcl() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -657,7 +657,7 @@ public void testSetAcl() throws Exception {
|
||||
@Test
|
||||
public void testSetAclOnlyAccess() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -678,7 +678,7 @@ public void testSetAclOnlyAccess() throws Exception {
|
||||
@Test
|
||||
public void testSetAclOnlyDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -698,7 +698,7 @@ public void testSetAclOnlyDefault() throws Exception {
|
||||
@Test
|
||||
public void testSetAclMinimal() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R_R));
|
||||
@ -722,7 +722,7 @@ public void testSetAclMinimal() throws Exception {
|
||||
@Test
|
||||
public void testSetAclMinimalDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -742,7 +742,7 @@ public void testSetAclMinimalDefault() throws Exception {
|
||||
@Test
|
||||
public void testSetAclCustomMask() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -764,7 +764,7 @@ public void testSetAclCustomMask() throws Exception {
|
||||
@Test
|
||||
public void testSetAclStickyBit() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) 01750));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -790,7 +790,7 @@ public void testSetAclStickyBit() throws Exception {
|
||||
@Test(expected=FileNotFoundException.class)
|
||||
public void testSetAclPathNotFound() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
// Path has not been created.
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -804,7 +804,7 @@ public void testSetAclPathNotFound() throws Exception {
|
||||
@Test(expected=Exception.class)
|
||||
public void testSetAclDefaultOnFile() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -816,7 +816,7 @@ public void testSetAclDefaultOnFile() throws Exception {
|
||||
@Test
|
||||
public void testSetPermission() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -843,7 +843,7 @@ public void testSetPermission() throws Exception {
|
||||
@Test
|
||||
public void testSetPermissionOnlyAccess() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
fs.create(path).close();
|
||||
fs.setPermission(path, FsPermission.createImmutable((short) RW_R));
|
||||
@ -865,7 +865,7 @@ public void testSetPermissionOnlyAccess() throws Exception {
|
||||
@Test
|
||||
public void testSetPermissionOnlyDefault() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -889,7 +889,7 @@ public void testSetPermissionOnlyDefault() throws Exception {
|
||||
@Test
|
||||
public void testDefaultAclNewFile() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -909,7 +909,7 @@ public void testDefaultAclNewFile() throws Exception {
|
||||
@Ignore // wait umask fix to be deployed
|
||||
public void testOnlyAccessAclNewFile() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -927,7 +927,7 @@ public void testOnlyAccessAclNewFile() throws Exception {
|
||||
@Ignore // wait investigation in service
|
||||
public void testDefaultMinimalAclNewFile() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -946,7 +946,7 @@ public void testDefaultMinimalAclNewFile() throws Exception {
|
||||
@Test
|
||||
public void testDefaultAclNewDir() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -973,7 +973,7 @@ public void testDefaultAclNewDir() throws Exception {
|
||||
@Ignore // wait umask fix to be deployed
|
||||
public void testOnlyAccessAclNewDir() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -991,7 +991,7 @@ public void testOnlyAccessAclNewDir() throws Exception {
|
||||
@Ignore // wait investigation in service
|
||||
public void testDefaultMinimalAclNewDir() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -1013,7 +1013,7 @@ public void testDefaultMinimalAclNewDir() throws Exception {
|
||||
@Test
|
||||
public void testDefaultAclNewFileWithMode() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -1035,7 +1035,7 @@ public void testDefaultAclNewFileWithMode() throws Exception {
|
||||
@Test
|
||||
public void testDefaultAclNewDirWithMode() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
FileSystem.mkdirs(fs, path, FsPermission.createImmutable((short) RWX_RX_RX));
|
||||
List<AclEntry> aclSpec = Lists.newArrayList(
|
||||
@ -1059,7 +1059,7 @@ public void testDefaultAclNewDirWithMode() throws Exception {
|
||||
@Test
|
||||
public void testDefaultAclRenamedFile() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
Path dirPath = new Path(path, "dir");
|
||||
FileSystem.mkdirs(fs, dirPath, FsPermission.createImmutable((short) RWX_RX));
|
||||
@ -1081,7 +1081,7 @@ public void testDefaultAclRenamedFile() throws Exception {
|
||||
@Test
|
||||
public void testDefaultAclRenamedDir() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
path = new Path(testRoot, UUID.randomUUID().toString());
|
||||
Path dirPath = new Path(path, "dir");
|
||||
FileSystem.mkdirs(fs, dirPath, FsPermission.createImmutable((short) RWX_RX));
|
||||
@ -1102,7 +1102,7 @@ public void testDefaultAclRenamedDir() throws Exception {
|
||||
@Test
|
||||
public void testEnsureAclOperationWorksForRoot() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
assumeTrue(fs.getIsNamespaceEnabeld());
|
||||
assumeTrue(fs.getIsNamespaceEnabled());
|
||||
|
||||
Path rootPath = new Path("/");
|
||||
|
||||
@ -1127,7 +1127,7 @@ public void testEnsureAclOperationWorksForRoot() throws Exception {
|
||||
@Test
|
||||
public void testSetOwnerForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
|
||||
@ -1144,7 +1144,7 @@ public void testSetOwnerForNonNamespaceEnabledAccount() throws Exception {
|
||||
@Test
|
||||
public void testSetPermissionForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
|
||||
@ -1163,7 +1163,7 @@ public void testSetPermissionForNonNamespaceEnabledAccount() throws Exception {
|
||||
@Test
|
||||
public void testModifyAclEntriesForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
try {
|
||||
@ -1180,7 +1180,7 @@ public void testModifyAclEntriesForNonNamespaceEnabledAccount() throws Exception
|
||||
@Test
|
||||
public void testRemoveAclEntriesEntriesForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
try {
|
||||
@ -1197,7 +1197,7 @@ public void testRemoveAclEntriesEntriesForNonNamespaceEnabledAccount() throws Ex
|
||||
@Test
|
||||
public void testRemoveDefaultAclForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
try {
|
||||
@ -1211,7 +1211,7 @@ public void testRemoveDefaultAclForNonNamespaceEnabledAccount() throws Exception
|
||||
@Test
|
||||
public void testRemoveAclForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
try {
|
||||
@ -1225,7 +1225,7 @@ public void testRemoveAclForNonNamespaceEnabledAccount() throws Exception {
|
||||
@Test
|
||||
public void testSetAclForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
try {
|
||||
@ -1242,7 +1242,7 @@ public void testSetAclForNonNamespaceEnabledAccount() throws Exception {
|
||||
@Test
|
||||
public void testGetAclStatusForNonNamespaceEnabledAccount() throws Exception {
|
||||
final AzureBlobFileSystem fs = this.getFileSystem();
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeTrue(!fs.getIsNamespaceEnabled());
|
||||
final Path filePath = new Path(methodName.getMethodName());
|
||||
fs.create(filePath);
|
||||
try {
|
||||
|
@ -59,7 +59,7 @@ public void testListFileStatus() throws Exception {
|
||||
// crate file using abfs
|
||||
AzureBlobFileSystem fs = getFileSystem();
|
||||
// test only valid for non-namespace enabled account
|
||||
Assume.assumeFalse(fs.getIsNamespaceEnabeld());
|
||||
Assume.assumeFalse(fs.getIsNamespaceEnabled());
|
||||
|
||||
NativeAzureFileSystem wasb = getWasbFileSystem();
|
||||
|
||||
@ -93,7 +93,7 @@ public void testReadFile() throws Exception {
|
||||
|
||||
AzureBlobFileSystem abfs = getFileSystem();
|
||||
// test only valid for non-namespace enabled account
|
||||
Assume.assumeFalse(abfs.getIsNamespaceEnabeld());
|
||||
Assume.assumeFalse(abfs.getIsNamespaceEnabled());
|
||||
|
||||
NativeAzureFileSystem wasb = getWasbFileSystem();
|
||||
|
||||
@ -132,7 +132,7 @@ public void testDir() throws Exception {
|
||||
|
||||
AzureBlobFileSystem abfs = getFileSystem();
|
||||
// test only valid for non-namespace enabled account
|
||||
Assume.assumeFalse(abfs.getIsNamespaceEnabeld());
|
||||
Assume.assumeFalse(abfs.getIsNamespaceEnabled());
|
||||
|
||||
NativeAzureFileSystem wasb = getWasbFileSystem();
|
||||
|
||||
@ -166,7 +166,7 @@ public void testSetWorkingDirectory() throws Exception {
|
||||
//create folders
|
||||
AzureBlobFileSystem abfs = getFileSystem();
|
||||
// test only valid for non-namespace enabled account
|
||||
Assume.assumeFalse(abfs.getIsNamespaceEnabeld());
|
||||
Assume.assumeFalse(abfs.getIsNamespaceEnabled());
|
||||
|
||||
NativeAzureFileSystem wasb = getWasbFileSystem();
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user