org.apache.hadoop.hdfs.tools.TestDFSHAAdmin.java Source code

Java tutorial

Introduction

Here is the source code for org.apache.hadoop.hdfs.tools.TestDFSHAAdmin.java

Source

/**
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.apache.hadoop.hdfs.tools;

import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.fail;

import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException;
import java.io.PrintStream;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.ha.HAServiceProtocol;
import org.apache.hadoop.ha.HAServiceProtocol.HAServiceState;
import org.apache.hadoop.ha.HAServiceProtocol.RequestSource;
import org.apache.hadoop.ha.HAServiceProtocol.StateChangeRequestInfo;
import org.apache.hadoop.ha.HAServiceStatus;
import org.apache.hadoop.ha.HAServiceTarget;
import org.apache.hadoop.ha.HealthCheckFailedException;
import org.apache.hadoop.ha.ZKFCProtocol;
import org.apache.hadoop.hdfs.DFSConfigKeys;
import org.apache.hadoop.hdfs.DFSUtil;
import org.apache.hadoop.hdfs.HdfsConfiguration;
import org.apache.hadoop.test.MockitoUtil;
import org.apache.hadoop.util.Shell;
import org.junit.Before;
import org.junit.Test;
import org.mockito.ArgumentCaptor;
import org.mockito.Mockito;

import com.google.common.base.Charsets;
import com.google.common.base.Joiner;

public class TestDFSHAAdmin {
    private static final Log LOG = LogFactory.getLog(TestDFSHAAdmin.class);

    private DFSHAAdmin tool;
    private final ByteArrayOutputStream errOutBytes = new ByteArrayOutputStream();
    private final ByteArrayOutputStream outBytes = new ByteArrayOutputStream();
    private String errOutput;
    private String output;
    private HAServiceProtocol mockProtocol;
    private ZKFCProtocol mockZkfcProtocol;

    private static final String NSID = "ns1";

    private static final HAServiceStatus STANDBY_READY_RESULT = new HAServiceStatus(HAServiceState.STANDBY)
            .setReadyToBecomeActive();

    private final ArgumentCaptor<StateChangeRequestInfo> reqInfoCaptor = ArgumentCaptor
            .forClass(StateChangeRequestInfo.class);

    private static final String HOST_A = "1.2.3.1";
    private static final String HOST_B = "1.2.3.2";

    // Fencer shell commands that always return true and false respectively
    // on Unix.
    private static final String FENCER_TRUE_COMMAND_UNIX = "shell(true)";
    private static final String FENCER_FALSE_COMMAND_UNIX = "shell(false)";

    // Fencer shell commands that always return true and false respectively
    // on Windows. Lacking POSIX 'true' and 'false' commands we use the DOS
    // commands 'rem' and 'help.exe'.
    private static final String FENCER_TRUE_COMMAND_WINDOWS = "shell(rem)";
    private static final String FENCER_FALSE_COMMAND_WINDOWS = "shell(help.exe /? >NUL)";

    private HdfsConfiguration getHAConf() {
        HdfsConfiguration conf = new HdfsConfiguration();
        conf.set(DFSConfigKeys.DFS_NAMESERVICES, NSID);
        conf.set(DFSConfigKeys.DFS_NAMESERVICE_ID, NSID);
        conf.set(DFSUtil.addKeySuffixes(DFSConfigKeys.DFS_HA_NAMENODES_KEY_PREFIX, NSID), "nn1,nn2");
        conf.set(DFSConfigKeys.DFS_HA_NAMENODE_ID_KEY, "nn1");
        conf.set(DFSUtil.addKeySuffixes(DFSConfigKeys.DFS_NAMENODE_RPC_ADDRESS_KEY, NSID, "nn1"),
                HOST_A + ":12345");
        conf.set(DFSUtil.addKeySuffixes(DFSConfigKeys.DFS_NAMENODE_RPC_ADDRESS_KEY, NSID, "nn2"),
                HOST_B + ":12345");
        return conf;
    }

    public static String getFencerTrueCommand() {
        return Shell.WINDOWS ? FENCER_TRUE_COMMAND_WINDOWS : FENCER_TRUE_COMMAND_UNIX;
    }

    public static String getFencerFalseCommand() {
        return Shell.WINDOWS ? FENCER_FALSE_COMMAND_WINDOWS : FENCER_FALSE_COMMAND_UNIX;
    }

    @Before
    public void setup() throws IOException {
        mockProtocol = MockitoUtil.mockProtocol(HAServiceProtocol.class);
        mockZkfcProtocol = MockitoUtil.mockProtocol(ZKFCProtocol.class);
        tool = new DFSHAAdmin() {

            @Override
            protected HAServiceTarget resolveTarget(String nnId) {
                HAServiceTarget target = super.resolveTarget(nnId);
                HAServiceTarget spy = Mockito.spy(target);
                // OVerride the target to return our mock protocol
                try {
                    Mockito.doReturn(mockProtocol).when(spy).getProxy(Mockito.<Configuration>any(),
                            Mockito.anyInt());
                    Mockito.doReturn(mockZkfcProtocol).when(spy).getZKFCProxy(Mockito.<Configuration>any(),
                            Mockito.anyInt());
                } catch (IOException e) {
                    throw new AssertionError(e); // mock setup doesn't really throw
                }
                return spy;
            }
        };
        tool.setConf(getHAConf());
        tool.setErrOut(new PrintStream(errOutBytes));
        tool.setOut(new PrintStream(outBytes));
    }

    private void assertOutputContains(String string) {
        if (!errOutput.contains(string) && !output.contains(string)) {
            fail("Expected output to contain '" + string + "' but err_output was:\n" + errOutput
                    + "\n and output was: \n" + output);
        }
    }

    @Test
    public void testNameserviceOption() throws Exception {
        assertEquals(-1, runTool("-ns"));
        assertOutputContains("Missing nameservice ID");
        assertEquals(-1, runTool("-ns", "ns1"));
        assertOutputContains("Missing command");
        // "ns1" isn't defined but we check this lazily and help doesn't use the ns
        assertEquals(0, runTool("-ns", "ns1", "-help", "transitionToActive"));
        assertOutputContains("Transitions the service into Active");
    }

    @Test
    public void testNamenodeResolution() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        assertEquals(0, runTool("-getServiceState", "nn1"));
        Mockito.verify(mockProtocol).getServiceStatus();
        assertEquals(-1, runTool("-getServiceState", "undefined"));
        assertOutputContains("Unable to determine service address for namenode 'undefined'");
    }

    @Test
    public void testHelp() throws Exception {
        assertEquals(0, runTool("-help"));
        assertEquals(0, runTool("-help", "transitionToActive"));
        assertOutputContains("Transitions the service into Active");
    }

    @Test
    public void testTransitionToActive() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        assertEquals(0, runTool("-transitionToActive", "nn1"));
        Mockito.verify(mockProtocol).transitionToActive(reqInfoCaptor.capture());
        assertEquals(RequestSource.REQUEST_BY_USER, reqInfoCaptor.getValue().getSource());
    }

    /**
     * Test that, if automatic HA is enabled, none of the mutative operations
     * will succeed, unless the -forcemanual flag is specified.
     * @throws Exception
     */
    @Test
    public void testMutativeOperationsWithAutoHaEnabled() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();

        // Turn on auto-HA in the config
        HdfsConfiguration conf = getHAConf();
        conf.setBoolean(DFSConfigKeys.DFS_HA_AUTO_FAILOVER_ENABLED_KEY, true);
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);

        // Should fail without the forcemanual flag
        assertEquals(-1, runTool("-transitionToActive", "nn1"));
        assertTrue(errOutput.contains("Refusing to manually manage"));
        assertEquals(-1, runTool("-transitionToStandby", "nn1"));
        assertTrue(errOutput.contains("Refusing to manually manage"));

        Mockito.verify(mockProtocol, Mockito.never()).transitionToActive(anyReqInfo());
        Mockito.verify(mockProtocol, Mockito.never()).transitionToStandby(anyReqInfo());

        // Force flag should bypass the check and change the request source
        // for the RPC
        setupConfirmationOnSystemIn();
        assertEquals(0, runTool("-transitionToActive", "-forcemanual", "nn1"));
        setupConfirmationOnSystemIn();
        assertEquals(0, runTool("-transitionToStandby", "-forcemanual", "nn1"));

        Mockito.verify(mockProtocol, Mockito.times(1)).transitionToActive(reqInfoCaptor.capture());
        Mockito.verify(mockProtocol, Mockito.times(1)).transitionToStandby(reqInfoCaptor.capture());

        // All of the RPCs should have had the "force" source
        for (StateChangeRequestInfo ri : reqInfoCaptor.getAllValues()) {
            assertEquals(RequestSource.REQUEST_BY_USER_FORCED, ri.getSource());
        }
    }

    /**
     * Setup System.in with a stream that feeds a "yes" answer on the
     * next prompt.
     */
    private static void setupConfirmationOnSystemIn() {
        // Answer "yes" to the prompt about transition to active
        System.setIn(new ByteArrayInputStream("yes\n".getBytes()));
    }

    /**
     * Test that, even if automatic HA is enabled, the monitoring operations
     * still function correctly.
     */
    @Test
    public void testMonitoringOperationsWithAutoHaEnabled() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();

        // Turn on auto-HA
        HdfsConfiguration conf = getHAConf();
        conf.setBoolean(DFSConfigKeys.DFS_HA_AUTO_FAILOVER_ENABLED_KEY, true);
        tool.setConf(conf);

        assertEquals(0, runTool("-checkHealth", "nn1"));
        Mockito.verify(mockProtocol).monitorHealth();

        assertEquals(0, runTool("-getServiceState", "nn1"));
        Mockito.verify(mockProtocol).getServiceStatus();
    }

    @Test
    public void testTransitionToStandby() throws Exception {
        assertEquals(0, runTool("-transitionToStandby", "nn1"));
        Mockito.verify(mockProtocol).transitionToStandby(anyReqInfo());
    }

    @Test
    public void testFailoverWithNoFencerConfigured() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        assertEquals(-1, runTool("-failover", "nn1", "nn2"));
    }

    @Test
    public void testFailoverWithFencerConfigured() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-failover", "nn1", "nn2"));
    }

    @Test
    public void testFailoverWithFencerAndNameservice() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-ns", "ns1", "-failover", "nn1", "nn2"));
    }

    @Test
    public void testFailoverWithFencerConfiguredAndForce() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-failover", "nn1", "nn2", "--forcefence"));
    }

    @Test
    public void testFailoverWithForceActive() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-failover", "nn1", "nn2", "--forceactive"));
    }

    @Test
    public void testFailoverWithInvalidFenceArg() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(-1, runTool("-failover", "nn1", "nn2", "notforcefence"));
    }

    @Test
    public void testFailoverWithFenceButNoFencer() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        assertEquals(-1, runTool("-failover", "nn1", "nn2", "--forcefence"));
    }

    @Test
    public void testFailoverWithFenceAndBadFencer() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, "foobar!");
        tool.setConf(conf);
        assertEquals(-1, runTool("-failover", "nn1", "nn2", "--forcefence"));
    }

    @Test
    public void testFailoverWithAutoHa() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        // Turn on auto-HA in the config
        HdfsConfiguration conf = getHAConf();
        conf.setBoolean(DFSConfigKeys.DFS_HA_AUTO_FAILOVER_ENABLED_KEY, true);
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);

        assertEquals(0, runTool("-failover", "nn1", "nn2"));
        Mockito.verify(mockZkfcProtocol).gracefulFailover();
    }

    @Test
    public void testForceFenceOptionListedBeforeArgs() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        HdfsConfiguration conf = getHAConf();
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-failover", "--forcefence", "nn1", "nn2"));
    }

    @Test
    public void testGetServiceStatus() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();
        assertEquals(0, runTool("-getServiceState", "nn1"));
        Mockito.verify(mockProtocol).getServiceStatus();
    }

    @Test
    public void testCheckHealth() throws Exception {
        assertEquals(0, runTool("-checkHealth", "nn1"));
        Mockito.verify(mockProtocol).monitorHealth();

        Mockito.doThrow(new HealthCheckFailedException("fake health check failure")).when(mockProtocol)
                .monitorHealth();
        assertEquals(-1, runTool("-checkHealth", "nn1"));
        assertOutputContains("Health check failed: fake health check failure");
    }

    /**
     * Test that the fencing configuration can be overridden per-nameservice
     * or per-namenode
     */
    @Test
    public void testFencingConfigPerNameNode() throws Exception {
        Mockito.doReturn(STANDBY_READY_RESULT).when(mockProtocol).getServiceStatus();

        final String nsSpecificKey = DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY + "." + NSID;
        final String nnSpecificKey = nsSpecificKey + ".nn1";

        HdfsConfiguration conf = getHAConf();
        // Set the default fencer to succeed
        conf.set(DFSConfigKeys.DFS_HA_FENCE_METHODS_KEY, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-failover", "nn1", "nn2", "--forcefence"));

        // Set the NN-specific fencer to fail. Should fail to fence.
        conf.set(nnSpecificKey, getFencerFalseCommand());
        tool.setConf(conf);
        assertEquals(-1, runTool("-failover", "nn1", "nn2", "--forcefence"));
        conf.unset(nnSpecificKey);

        // Set an NS-specific fencer to fail. Should fail.
        conf.set(nsSpecificKey, getFencerFalseCommand());
        tool.setConf(conf);
        assertEquals(-1, runTool("-failover", "nn1", "nn2", "--forcefence"));

        // Set the NS-specific fencer to succeed. Should succeed
        conf.set(nsSpecificKey, getFencerTrueCommand());
        tool.setConf(conf);
        assertEquals(0, runTool("-failover", "nn1", "nn2", "--forcefence"));
    }

    private Object runTool(String... args) throws Exception {
        errOutBytes.reset();
        outBytes.reset();
        LOG.info("Running: DFSHAAdmin " + Joiner.on(" ").join(args));
        int ret = tool.run(args);
        errOutput = new String(errOutBytes.toByteArray(), Charsets.UTF_8);
        output = new String(outBytes.toByteArray(), Charsets.UTF_8);
        LOG.info("Err_output:\n" + errOutput + "\nOutput:\n" + output);
        return ret;
    }

    private StateChangeRequestInfo anyReqInfo() {
        return Mockito.any();
    }
}