blob: 86a8500bcbd18a0132942f73d6917894b1bc6a1a [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with this
* work for additional information regarding copyright ownership. The ASF
* licenses this file to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations
* under the License.
*/
package org.apache.hadoop.hbase.util;
import java.io.IOException;
import java.security.PrivilegedExceptionAction;
import java.util.HashMap;
import java.util.Map;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.hbase.TableName;
import org.apache.hadoop.hbase.client.Get;
import org.apache.hadoop.hbase.client.Result;
import org.apache.hadoop.hbase.client.Table;
import org.apache.hadoop.hbase.security.HBaseKerberosUtils;
import org.apache.hadoop.hbase.security.User;
import org.apache.hadoop.hbase.util.test.LoadTestDataGenerator;
import org.apache.hadoop.security.UserGroupInformation;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* A MultiThreadReader that helps to work with ACL
*/
public class MultiThreadedReaderWithACL extends MultiThreadedReader {
private static final Logger LOG = LoggerFactory.getLogger(MultiThreadedReaderWithACL.class);
private static final String COMMA = ",";
/**
* Maps user with Table instance. Because the table instance has to be created
* per user inorder to work in that user's context
*/
private Map<String, Table> userVsTable = new HashMap<>();
private Map<String, User> users = new HashMap<>();
private String[] userNames;
public MultiThreadedReaderWithACL(LoadTestDataGenerator dataGen, Configuration conf,
TableName tableName, double verifyPercent, String userNames) throws IOException {
super(dataGen, conf, tableName, verifyPercent);
this.userNames = userNames.split(COMMA);
}
@Override
protected void addReaderThreads(int numThreads) throws IOException {
for (int i = 0; i < numThreads; ++i) {
HBaseReaderThread reader = new HBaseReaderThreadWithACL(i);
readers.add(reader);
}
}
public class HBaseReaderThreadWithACL extends HBaseReaderThread {
public HBaseReaderThreadWithACL(int readerId) throws IOException {
super(readerId);
}
@Override
protected Table createTable() throws IOException {
return null;
}
@Override
protected void closeTable() {
for (Table table : userVsTable.values()) {
try {
table.close();
} catch (Exception e) {
LOG.error("Error while closing the table " + table.getName(), e);
}
}
}
@Override
public void queryKey(final Get get, final boolean verify, final long keyToRead)
throws IOException {
final String rowKey = Bytes.toString(get.getRow());
// read the data
final long start = System.nanoTime();
PrivilegedExceptionAction<Object> action = new PrivilegedExceptionAction<Object>() {
@Override
public Object run() throws Exception {
Table localTable = null;
try {
Result result = null;
int specialPermCellInsertionFactor = Integer.parseInt(dataGenerator.getArgs()[2]);
int mod = ((int) keyToRead % userNames.length);
if (userVsTable.get(userNames[mod]) == null) {
localTable = connection.getTable(tableName);
userVsTable.put(userNames[mod], localTable);
result = localTable.get(get);
} else {
localTable = userVsTable.get(userNames[mod]);
result = localTable.get(get);
}
boolean isNullExpected = ((((int) keyToRead % specialPermCellInsertionFactor)) == 0);
long end = System.nanoTime();
verifyResultsAndUpdateMetrics(verify, get, end - start, result, localTable, isNullExpected);
} catch (IOException e) {
recordFailure(keyToRead);
}
return null;
}
};
if (userNames != null && userNames.length > 0) {
int mod = ((int) keyToRead % userNames.length);
User user;
UserGroupInformation realUserUgi;
if(!users.containsKey(userNames[mod])) {
if(User.isHBaseSecurityEnabled(conf)) {
realUserUgi = HBaseKerberosUtils.loginAndReturnUGI(conf, userNames[mod]);
} else {
realUserUgi = UserGroupInformation.createRemoteUser(userNames[mod]);
}
user = User.create(realUserUgi);
users.put(userNames[mod], user);
} else {
user = users.get(userNames[mod]);
}
try {
user.runAs(action);
} catch (Exception e) {
recordFailure(keyToRead);
}
}
}
private void recordFailure(final long keyToRead) {
numReadFailures.addAndGet(1);
LOG.debug("[" + readerId + "] FAILED read, key = " + (keyToRead + "") + ", "
+ "time from start: " + (System.currentTimeMillis() - startTimeMs) + " ms");
}
}
}