| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.hadoop.fs.viewfs; |
| |
| import com.google.common.collect.Lists; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.fs.FileContext; |
| import org.apache.hadoop.fs.FileContextTestHelper; |
| import org.apache.hadoop.fs.FsConstants; |
| import org.apache.hadoop.fs.Path; |
| import org.apache.hadoop.fs.permission.AclEntry; |
| import org.apache.hadoop.fs.permission.AclStatus; |
| import org.apache.hadoop.fs.permission.FsPermission; |
| import org.apache.hadoop.hdfs.DFSConfigKeys; |
| import org.apache.hadoop.hdfs.MiniDFSCluster; |
| import org.apache.hadoop.hdfs.MiniDFSNNTopology; |
| import org.junit.After; |
| import org.junit.AfterClass; |
| import org.junit.Before; |
| import org.junit.BeforeClass; |
| import org.junit.Test; |
| import java.util.List; |
| |
| import java.io.IOException; |
| |
| import static org.apache.hadoop.fs.permission.AclEntryScope.ACCESS; |
| import static org.apache.hadoop.fs.permission.AclEntryScope.DEFAULT; |
| import static org.apache.hadoop.fs.permission.AclEntryType.*; |
| import static org.apache.hadoop.fs.permission.FsAction.*; |
| import static org.apache.hadoop.fs.permission.FsAction.NONE; |
| import static org.apache.hadoop.hdfs.server.namenode.AclTestHelpers.aclEntry; |
| import static org.junit.Assert.assertArrayEquals; |
| import static org.junit.Assert.assertEquals; |
| |
| /** |
| * Verify ACL through ViewFs functionality. |
| */ |
| public class TestViewFsWithAcls { |
| |
| private static MiniDFSCluster cluster; |
| private static Configuration clusterConf = new Configuration(); |
| private static FileContext fc, fc2; |
| private FileContext fcView, fcTarget, fcTarget2; |
| private Configuration fsViewConf; |
| private Path targetTestRoot, targetTestRoot2, mountOnNn1, mountOnNn2; |
| private FileContextTestHelper fileContextTestHelper = |
| new FileContextTestHelper("/tmp/TestViewFsWithAcls"); |
| |
| @BeforeClass |
| public static void clusterSetupAtBeginning() throws IOException { |
| clusterConf.setBoolean(DFSConfigKeys.DFS_NAMENODE_ACLS_ENABLED_KEY, true); |
| cluster = new MiniDFSCluster.Builder(clusterConf) |
| .nnTopology(MiniDFSNNTopology.simpleFederatedTopology(2)) |
| .numDataNodes(2) |
| .build(); |
| cluster.waitClusterUp(); |
| |
| fc = FileContext.getFileContext(cluster.getURI(0), clusterConf); |
| fc2 = FileContext.getFileContext(cluster.getURI(1), clusterConf); |
| } |
| |
| @AfterClass |
| public static void ClusterShutdownAtEnd() throws Exception { |
| if (cluster != null) { |
| cluster.shutdown(); |
| } |
| } |
| |
| @Before |
| public void setUp() throws Exception { |
| fcTarget = fc; |
| fcTarget2 = fc2; |
| targetTestRoot = fileContextTestHelper.getAbsoluteTestRootPath(fc); |
| targetTestRoot2 = fileContextTestHelper.getAbsoluteTestRootPath(fc2); |
| |
| fcTarget.delete(targetTestRoot, true); |
| fcTarget2.delete(targetTestRoot2, true); |
| fcTarget.mkdir(targetTestRoot, new FsPermission((short)0750), true); |
| fcTarget2.mkdir(targetTestRoot2, new FsPermission((short)0750), true); |
| |
| fsViewConf = ViewFileSystemTestSetup.createConfig(); |
| setupMountPoints(); |
| fcView = FileContext.getFileContext(FsConstants.VIEWFS_URI, fsViewConf); |
| } |
| |
| private void setupMountPoints() { |
| mountOnNn1 = new Path("/mountOnNn1"); |
| mountOnNn2 = new Path("/mountOnNn2"); |
| ConfigUtil.addLink(fsViewConf, mountOnNn1.toString(), targetTestRoot.toUri()); |
| ConfigUtil.addLink(fsViewConf, mountOnNn2.toString(), targetTestRoot2.toUri()); |
| } |
| |
| @After |
| public void tearDown() throws Exception { |
| fcTarget.delete(fileContextTestHelper.getTestRootPath(fcTarget), true); |
| fcTarget2.delete(fileContextTestHelper.getTestRootPath(fcTarget2), true); |
| } |
| |
| /** |
| * Verify a ViewFs wrapped over multiple federated NameNodes will |
| * dispatch the ACL operations to the correct NameNode. |
| */ |
| @Test |
| public void testAclOnMountEntry() throws Exception { |
| // Set ACLs on the first namespace and verify they are correct |
| List<AclEntry> aclSpec = Lists.newArrayList( |
| aclEntry(ACCESS, USER, READ_WRITE), |
| aclEntry(ACCESS, USER, "foo", READ), |
| aclEntry(ACCESS, GROUP, READ), |
| aclEntry(ACCESS, OTHER, NONE)); |
| fcView.setAcl(mountOnNn1, aclSpec); |
| |
| AclEntry[] expected = new AclEntry[] { |
| aclEntry(ACCESS, USER, "foo", READ), |
| aclEntry(ACCESS, GROUP, READ) }; |
| assertArrayEquals(expected, aclEntryArray(fcView.getAclStatus(mountOnNn1))); |
| // Double-check by getting ACL status using FileSystem |
| // instead of ViewFs |
| assertArrayEquals(expected, aclEntryArray(fc.getAclStatus(targetTestRoot))); |
| |
| // Modify the ACL entries on the first namespace |
| aclSpec = Lists.newArrayList( |
| aclEntry(DEFAULT, USER, "foo", READ)); |
| fcView.modifyAclEntries(mountOnNn1, aclSpec); |
| expected = new AclEntry[] { |
| aclEntry(ACCESS, USER, "foo", READ), |
| aclEntry(ACCESS, GROUP, READ), |
| aclEntry(DEFAULT, USER, READ_WRITE), |
| aclEntry(DEFAULT, USER, "foo", READ), |
| aclEntry(DEFAULT, GROUP, READ), |
| aclEntry(DEFAULT, MASK, READ), |
| aclEntry(DEFAULT, OTHER, NONE) }; |
| assertArrayEquals(expected, aclEntryArray(fcView.getAclStatus(mountOnNn1))); |
| |
| fcView.removeDefaultAcl(mountOnNn1); |
| expected = new AclEntry[] { |
| aclEntry(ACCESS, USER, "foo", READ), |
| aclEntry(ACCESS, GROUP, READ) }; |
| assertArrayEquals(expected, aclEntryArray(fcView.getAclStatus(mountOnNn1))); |
| assertArrayEquals(expected, aclEntryArray(fc.getAclStatus(targetTestRoot))); |
| |
| // Paranoid check: verify the other namespace does not |
| // have ACLs set on the same path. |
| assertEquals(0, fcView.getAclStatus(mountOnNn2).getEntries().size()); |
| assertEquals(0, fc2.getAclStatus(targetTestRoot2).getEntries().size()); |
| |
| // Remove the ACL entries on the first namespace |
| fcView.removeAcl(mountOnNn1); |
| assertEquals(0, fcView.getAclStatus(mountOnNn1).getEntries().size()); |
| assertEquals(0, fc.getAclStatus(targetTestRoot).getEntries().size()); |
| |
| // Now set ACLs on the second namespace |
| aclSpec = Lists.newArrayList( |
| aclEntry(ACCESS, USER, "bar", READ)); |
| fcView.modifyAclEntries(mountOnNn2, aclSpec); |
| expected = new AclEntry[] { |
| aclEntry(ACCESS, USER, "bar", READ), |
| aclEntry(ACCESS, GROUP, READ_EXECUTE) }; |
| assertArrayEquals(expected, aclEntryArray(fcView.getAclStatus(mountOnNn2))); |
| assertArrayEquals(expected, aclEntryArray(fc2.getAclStatus(targetTestRoot2))); |
| |
| // Remove the ACL entries on the second namespace |
| fcView.removeAclEntries(mountOnNn2, Lists.newArrayList( |
| aclEntry(ACCESS, USER, "bar", READ) |
| )); |
| expected = new AclEntry[] { aclEntry(ACCESS, GROUP, READ_EXECUTE) }; |
| assertArrayEquals(expected, aclEntryArray(fc2.getAclStatus(targetTestRoot2))); |
| fcView.removeAcl(mountOnNn2); |
| assertEquals(0, fcView.getAclStatus(mountOnNn2).getEntries().size()); |
| assertEquals(0, fc2.getAclStatus(targetTestRoot2).getEntries().size()); |
| } |
| |
| private AclEntry[] aclEntryArray(AclStatus aclStatus) { |
| return aclStatus.getEntries().toArray(new AclEntry[0]); |
| } |
| |
| } |