You are viewing a plain text version of this content. The canonical link for it is here.
Posted to hdfs-commits@hadoop.apache.org by su...@apache.org on 2014/07/12 04:24:55 UTC
svn commit: r1609878 [9/9] - in
/hadoop/common/branches/YARN-1051/hadoop-hdfs-project: hadoop-hdfs-httpfs/
hadoop-hdfs-httpfs/src/main/java/org/apache/hadoop/fs/http/client/
hadoop-hdfs-httpfs/src/main/java/org/apache/hadoop/fs/http/server/
hadoop-hdfs...
Modified: hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/shortcircuit/TestShortCircuitLocalRead.java
URL: http://svn.apache.org/viewvc/hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/shortcircuit/TestShortCircuitLocalRead.java?rev=1609878&r1=1609877&r2=1609878&view=diff
==============================================================================
--- hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/shortcircuit/TestShortCircuitLocalRead.java (original)
+++ hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/shortcircuit/TestShortCircuitLocalRead.java Sat Jul 12 02:24:40 2014
@@ -291,17 +291,17 @@ public class TestShortCircuitLocalRead {
}
}
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testFileLocalReadNoChecksum() throws Exception {
doTestShortCircuitRead(true, 3*blockSize+100, 0);
}
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testFileLocalReadChecksum() throws Exception {
doTestShortCircuitRead(false, 3*blockSize+100, 0);
}
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testSmallFileLocalRead() throws Exception {
doTestShortCircuitRead(false, 13, 0);
doTestShortCircuitRead(false, 13, 5);
@@ -309,7 +309,7 @@ public class TestShortCircuitLocalRead {
doTestShortCircuitRead(true, 13, 5);
}
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testLocalReadLegacy() throws Exception {
doTestShortCircuitReadLegacy(true, 13, 0, getCurrentUser(),
getCurrentUser(), false);
@@ -320,18 +320,18 @@ public class TestShortCircuitLocalRead {
* to use short circuit. The test ensures reader falls back to non
* shortcircuit reads when shortcircuit is disallowed.
*/
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testLocalReadFallback() throws Exception {
doTestShortCircuitReadLegacy(true, 13, 0, getCurrentUser(), "notallowed", true);
}
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testReadFromAnOffset() throws Exception {
doTestShortCircuitRead(false, 3*blockSize+100, 777);
doTestShortCircuitRead(true, 3*blockSize+100, 777);
}
- @Test(timeout=10000)
+ @Test(timeout=60000)
public void testLongFile() throws Exception {
doTestShortCircuitRead(false, 10*blockSize+100, 777);
doTestShortCircuitRead(true, 10*blockSize+100, 777);
@@ -578,6 +578,7 @@ public class TestShortCircuitLocalRead {
fs.delete(file1, false);
}
+ @Test(timeout=60000)
public void testReadWithRemoteBlockReader() throws IOException, InterruptedException {
doTestShortCircuitReadWithRemoteBlockReader(true, 3*blockSize+100, getCurrentUser(), 0, false);
}
Modified: hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/tools/offlineImageViewer/TestOfflineImageViewer.java
URL: http://svn.apache.org/viewvc/hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/tools/offlineImageViewer/TestOfflineImageViewer.java?rev=1609878&r1=1609877&r2=1609878&view=diff
==============================================================================
--- hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/tools/offlineImageViewer/TestOfflineImageViewer.java (original)
+++ hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/tools/offlineImageViewer/TestOfflineImageViewer.java Sat Jul 12 02:24:40 2014
@@ -143,6 +143,8 @@ public class TestOfflineImageViewer {
hdfs.mkdirs(xattr);
hdfs.setXAttr(xattr, "user.a1", new byte[]{ 0x31, 0x32, 0x33 });
hdfs.setXAttr(xattr, "user.a2", new byte[]{ 0x37, 0x38, 0x39 });
+ // OIV should be able to handle empty value XAttrs
+ hdfs.setXAttr(xattr, "user.a3", null);
writtenFiles.put(xattr.toString(), hdfs.getFileStatus(xattr));
// Write results to the fsimage file
Modified: hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/web/TestWebHdfsTokens.java
URL: http://svn.apache.org/viewvc/hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/web/TestWebHdfsTokens.java?rev=1609878&r1=1609877&r2=1609878&view=diff
==============================================================================
--- hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/web/TestWebHdfsTokens.java (original)
+++ hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/web/TestWebHdfsTokens.java Sat Jul 12 02:24:40 2014
@@ -19,47 +19,63 @@
package org.apache.hadoop.hdfs.web;
import static org.apache.hadoop.security.UserGroupInformation.AuthenticationMethod.KERBEROS;
+import static org.apache.hadoop.security.UserGroupInformation.AuthenticationMethod.SIMPLE;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertFalse;
-import static org.mockito.Matchers.any;
-import static org.mockito.Mockito.doReturn;
-import static org.mockito.Mockito.mock;
-import static org.mockito.Mockito.never;
-import static org.mockito.Mockito.reset;
-import static org.mockito.Mockito.spy;
-import static org.mockito.Mockito.verify;
+import static org.mockito.Matchers.*;
+import static org.mockito.Mockito.*;
+import java.io.File;
import java.io.IOException;
+import java.io.InputStream;
+import java.net.InetSocketAddress;
import java.net.URI;
+import java.security.PrivilegedExceptionAction;
import org.apache.hadoop.conf.Configuration;
+import org.apache.hadoop.fs.FileSystem;
+import org.apache.hadoop.fs.FileUtil;
+import org.apache.hadoop.fs.Path;
+import org.apache.hadoop.hdfs.DFSConfigKeys;
+import org.apache.hadoop.hdfs.DFSUtil;
+import org.apache.hadoop.hdfs.HdfsConfiguration;
+import org.apache.hadoop.hdfs.MiniDFSCluster;
+import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier;
import org.apache.hadoop.hdfs.web.resources.DeleteOpParam;
import org.apache.hadoop.hdfs.web.resources.GetOpParam;
import org.apache.hadoop.hdfs.web.resources.HttpOpParam;
import org.apache.hadoop.hdfs.web.resources.PostOpParam;
import org.apache.hadoop.hdfs.web.resources.PutOpParam;
+import org.apache.hadoop.http.HttpConfig;
+import org.apache.hadoop.io.IOUtils;
+import org.apache.hadoop.net.NetUtils;
import org.apache.hadoop.security.SecurityUtil;
import org.apache.hadoop.security.UserGroupInformation;
+import org.apache.hadoop.security.ssl.KeyStoreTestUtil;
+import org.apache.hadoop.security.token.SecretManager.InvalidToken;
import org.apache.hadoop.security.token.Token;
+import org.junit.Assert;
import org.junit.BeforeClass;
import org.junit.Test;
-import org.mockito.internal.util.reflection.Whitebox;
public class TestWebHdfsTokens {
private static Configuration conf;
+ URI uri = null;
@BeforeClass
public static void setUp() {
conf = new Configuration();
SecurityUtil.setAuthenticationMethod(KERBEROS, conf);
UserGroupInformation.setConfiguration(conf);
+ UserGroupInformation.setLoginUser(
+ UserGroupInformation.createUserForTesting(
+ "LoginUser", new String[]{"supergroup"}));
}
private WebHdfsFileSystem spyWebhdfsInSecureSetup() throws IOException {
WebHdfsFileSystem fsOrig = new WebHdfsFileSystem();
fsOrig.initialize(URI.create("webhdfs://127.0.0.1:0"), conf);
WebHdfsFileSystem fs = spy(fsOrig);
- Whitebox.setInternalState(fsOrig.tokenAspect, "fs", fs);
return fs;
}
@@ -89,7 +105,7 @@ public class TestWebHdfsTokens {
}
@Test(timeout = 5000)
- public void testNoTokenForCanclToken() throws IOException {
+ public void testNoTokenForRenewToken() throws IOException {
checkNoTokenForOperation(PutOpParam.Op.RENEWDELEGATIONTOKEN);
}
@@ -139,4 +155,277 @@ public class TestWebHdfsTokens {
assertFalse(op.getRequireAuth());
}
}
+
+ @SuppressWarnings("unchecked") // for any(Token.class)
+ @Test
+ public void testLazyTokenFetchForWebhdfs() throws Exception {
+ MiniDFSCluster cluster = null;
+ WebHdfsFileSystem fs = null;
+ try {
+ final Configuration clusterConf = new HdfsConfiguration(conf);
+ SecurityUtil.setAuthenticationMethod(SIMPLE, clusterConf);
+ clusterConf.setBoolean(DFSConfigKeys
+ .DFS_NAMENODE_DELEGATION_TOKEN_ALWAYS_USE_KEY, true);
+
+ // trick the NN into thinking security is enabled w/o it trying
+ // to login from a keytab
+ UserGroupInformation.setConfiguration(clusterConf);
+ cluster = new MiniDFSCluster.Builder(clusterConf).numDataNodes(1).build();
+ cluster.waitActive();
+ SecurityUtil.setAuthenticationMethod(KERBEROS, clusterConf);
+ UserGroupInformation.setConfiguration(clusterConf);
+
+ uri = DFSUtil.createUri(
+ "webhdfs", cluster.getNameNode().getHttpAddress());
+ validateLazyTokenFetch(clusterConf);
+ } finally {
+ IOUtils.cleanup(null, fs);
+ if (cluster != null) {
+ cluster.shutdown();
+ }
+ }
+ }
+
+ @SuppressWarnings("unchecked") // for any(Token.class)
+ @Test
+ public void testLazyTokenFetchForSWebhdfs() throws Exception {
+ MiniDFSCluster cluster = null;
+ SWebHdfsFileSystem fs = null;
+ try {
+ final Configuration clusterConf = new HdfsConfiguration(conf);
+ SecurityUtil.setAuthenticationMethod(SIMPLE, clusterConf);
+ clusterConf.setBoolean(DFSConfigKeys
+ .DFS_NAMENODE_DELEGATION_TOKEN_ALWAYS_USE_KEY, true);
+ String BASEDIR = System.getProperty("test.build.dir",
+ "target/test-dir") + "/" + TestWebHdfsTokens.class.getSimpleName();
+ String keystoresDir;
+ String sslConfDir;
+
+ clusterConf.setBoolean(DFSConfigKeys.DFS_WEBHDFS_ENABLED_KEY, true);
+ clusterConf.set(DFSConfigKeys.DFS_HTTP_POLICY_KEY, HttpConfig.Policy.HTTPS_ONLY.name());
+ clusterConf.set(DFSConfigKeys.DFS_NAMENODE_HTTPS_ADDRESS_KEY, "localhost:0");
+ clusterConf.set(DFSConfigKeys.DFS_DATANODE_HTTPS_ADDRESS_KEY, "localhost:0");
+
+ File base = new File(BASEDIR);
+ FileUtil.fullyDelete(base);
+ base.mkdirs();
+ keystoresDir = new File(BASEDIR).getAbsolutePath();
+ sslConfDir = KeyStoreTestUtil.getClasspathDir(TestWebHdfsTokens.class);
+ KeyStoreTestUtil.setupSSLConfig(keystoresDir, sslConfDir, clusterConf, false);
+
+ // trick the NN into thinking security is enabled w/o it trying
+ // to login from a keytab
+ UserGroupInformation.setConfiguration(clusterConf);
+ cluster = new MiniDFSCluster.Builder(clusterConf).numDataNodes(1).build();
+ cluster.waitActive();
+ InetSocketAddress addr = cluster.getNameNode().getHttpsAddress();
+ String nnAddr = NetUtils.getHostPortString(addr);
+ clusterConf.set(DFSConfigKeys.DFS_NAMENODE_HTTPS_ADDRESS_KEY, nnAddr);
+ SecurityUtil.setAuthenticationMethod(KERBEROS, clusterConf);
+ UserGroupInformation.setConfiguration(clusterConf);
+
+ uri = DFSUtil.createUri(
+ "swebhdfs", cluster.getNameNode().getHttpsAddress());
+ validateLazyTokenFetch(clusterConf);
+ } finally {
+ IOUtils.cleanup(null, fs);
+ if (cluster != null) {
+ cluster.shutdown();
+ }
+ }
+ }
+
+ @SuppressWarnings("unchecked")
+ private void validateLazyTokenFetch(final Configuration clusterConf) throws Exception{
+ final String testUser = "DummyUser";
+ UserGroupInformation ugi = UserGroupInformation.createUserForTesting(
+ testUser, new String[]{"supergroup"});
+ WebHdfsFileSystem fs = ugi.doAs(new PrivilegedExceptionAction<WebHdfsFileSystem>() {
+ @Override
+ public WebHdfsFileSystem run() throws IOException {
+ return spy((WebHdfsFileSystem) FileSystem.newInstance(uri, clusterConf));
+ }
+ });
+ // verify token ops don't get a token
+ Assert.assertNull(fs.getRenewToken());
+ Token<?> token = fs.getDelegationToken(null);
+ fs.renewDelegationToken(token);
+ fs.cancelDelegationToken(token);
+ verify(fs, never()).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ Assert.assertNull(fs.getRenewToken());
+ reset(fs);
+
+ // verify first non-token op gets a token
+ final Path p = new Path("/f");
+ fs.create(p, (short)1).close();
+ verify(fs, times(1)).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, times(1)).getDelegationToken(anyString());
+ verify(fs, times(1)).setDelegationToken(any(Token.class));
+ token = fs.getRenewToken();
+ Assert.assertNotNull(token);
+ Assert.assertEquals(testUser, getTokenOwner(token));
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ reset(fs);
+
+ // verify prior token is reused
+ fs.getFileStatus(p);
+ verify(fs, times(1)).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ Token<?> token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertSame(token, token2);
+ reset(fs);
+
+ // verify renew of expired token fails w/o getting a new token
+ token = fs.getRenewToken();
+ fs.cancelDelegationToken(token);
+ try {
+ fs.renewDelegationToken(token);
+ Assert.fail("should have failed");
+ } catch (InvalidToken it) {
+ } catch (Exception ex) {
+ Assert.fail("wrong exception:"+ex);
+ }
+ verify(fs, never()).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertSame(token, token2);
+ reset(fs);
+
+ // verify cancel of expired token fails w/o getting a new token
+ try {
+ fs.cancelDelegationToken(token);
+ Assert.fail("should have failed");
+ } catch (InvalidToken it) {
+ } catch (Exception ex) {
+ Assert.fail("wrong exception:"+ex);
+ }
+ verify(fs, never()).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertSame(token, token2);
+ reset(fs);
+
+ // verify an expired token is replaced with a new token
+ fs.open(p).close();
+ verify(fs, times(2)).getDelegationToken(); // first bad, then good
+ verify(fs, times(1)).replaceExpiredDelegationToken();
+ verify(fs, times(1)).getDelegationToken(null);
+ verify(fs, times(1)).setDelegationToken(any(Token.class));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertNotSame(token, token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertEquals(testUser, getTokenOwner(token2));
+ reset(fs);
+
+ // verify with open because it's a little different in how it
+ // opens connections
+ fs.cancelDelegationToken(fs.getRenewToken());
+ InputStream is = fs.open(p);
+ is.read();
+ is.close();
+ verify(fs, times(2)).getDelegationToken(); // first bad, then good
+ verify(fs, times(1)).replaceExpiredDelegationToken();
+ verify(fs, times(1)).getDelegationToken(null);
+ verify(fs, times(1)).setDelegationToken(any(Token.class));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertNotSame(token, token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertEquals(testUser, getTokenOwner(token2));
+ reset(fs);
+
+ // verify fs close cancels the token
+ fs.close();
+ verify(fs, never()).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ verify(fs, times(1)).cancelDelegationToken(eq(token2));
+
+ // add a token to ugi for a new fs, verify it uses that token
+ token = fs.getDelegationToken(null);
+ ugi.addToken(token);
+ fs = ugi.doAs(new PrivilegedExceptionAction<WebHdfsFileSystem>() {
+ @Override
+ public WebHdfsFileSystem run() throws IOException {
+ return spy((WebHdfsFileSystem) FileSystem.newInstance(uri, clusterConf));
+ }
+ });
+ Assert.assertNull(fs.getRenewToken());
+ fs.getFileStatus(new Path("/"));
+ verify(fs, times(1)).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, times(1)).setDelegationToken(eq(token));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertSame(token, token2);
+ reset(fs);
+
+ // verify it reuses the prior ugi token
+ fs.getFileStatus(new Path("/"));
+ verify(fs, times(1)).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertSame(token, token2);
+ reset(fs);
+
+ // verify an expired ugi token is NOT replaced with a new token
+ fs.cancelDelegationToken(token);
+ for (int i=0; i<2; i++) {
+ try {
+ fs.getFileStatus(new Path("/"));
+ Assert.fail("didn't fail");
+ } catch (InvalidToken it) {
+ } catch (Exception ex) {
+ Assert.fail("wrong exception:"+ex);
+ }
+ verify(fs, times(1)).getDelegationToken();
+ verify(fs, times(1)).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ token2 = fs.getRenewToken();
+ Assert.assertNotNull(token2);
+ Assert.assertEquals(fs.getTokenKind(), token.getKind());
+ Assert.assertSame(token, token2);
+ reset(fs);
+ }
+
+ // verify fs close does NOT cancel the ugi token
+ fs.close();
+ verify(fs, never()).getDelegationToken();
+ verify(fs, never()).replaceExpiredDelegationToken();
+ verify(fs, never()).getDelegationToken(anyString());
+ verify(fs, never()).setDelegationToken(any(Token.class));
+ verify(fs, never()).cancelDelegationToken(any(Token.class));
+ }
+
+ private String getTokenOwner(Token<?> token) throws IOException {
+ // webhdfs doesn't register properly with the class loader
+ @SuppressWarnings({ "rawtypes", "unchecked" })
+ Token<?> clone = new Token(token);
+ clone.setKind(DelegationTokenIdentifier.HDFS_DELEGATION_KIND);
+ return clone.decodeIdentifier().getUser().getUserName();
+ }
}
Modified: hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/editsStored
URL: http://svn.apache.org/viewvc/hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/editsStored?rev=1609878&r1=1609877&r2=1609878&view=diff
==============================================================================
Binary files - no diff available.
Modified: hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/editsStored.xml
URL: http://svn.apache.org/viewvc/hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/editsStored.xml?rev=1609878&r1=1609877&r2=1609878&view=diff
==============================================================================
--- hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/editsStored.xml (original)
+++ hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/editsStored.xml Sat Jul 12 02:24:40 2014
@@ -13,8 +13,8 @@
<TXID>2</TXID>
<DELEGATION_KEY>
<KEY_ID>1</KEY_ID>
- <EXPIRY_DATE>1394849922137</EXPIRY_DATE>
- <KEY>37e1a64049bbef35</KEY>
+ <EXPIRY_DATE>1403590428625</EXPIRY_DATE>
+ <KEY>16f34bfba67b2552</KEY>
</DELEGATION_KEY>
</DATA>
</RECORD>
@@ -24,8 +24,8 @@
<TXID>3</TXID>
<DELEGATION_KEY>
<KEY_ID>2</KEY_ID>
- <EXPIRY_DATE>1394849922140</EXPIRY_DATE>
- <KEY>7c0bf5039242fc54</KEY>
+ <EXPIRY_DATE>1403590428631</EXPIRY_DATE>
+ <KEY>dbe6282854469833</KEY>
</DELEGATION_KEY>
</DATA>
</RECORD>
@@ -37,18 +37,18 @@
<INODEID>16386</INODEID>
<PATH>/file_create</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722811</MTIME>
- <ATIME>1394158722811</ATIME>
+ <MTIME>1402899229669</MTIME>
+ <ATIME>1402899229669</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
- <CLIENT_NAME>DFSClient_NONMAPREDUCE_221786725_1</CLIENT_NAME>
+ <CLIENT_NAME>DFSClient_NONMAPREDUCE_1233039831_1</CLIENT_NAME>
<CLIENT_MACHINE>127.0.0.1</CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>6</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>8</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -59,13 +59,13 @@
<INODEID>0</INODEID>
<PATH>/file_create</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722832</MTIME>
- <ATIME>1394158722811</ATIME>
+ <MTIME>1402899229711</MTIME>
+ <ATIME>1402899229669</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
<CLIENT_NAME></CLIENT_NAME>
<CLIENT_MACHINE></CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
@@ -78,9 +78,9 @@
<LENGTH>0</LENGTH>
<SRC>/file_create</SRC>
<DST>/file_moved</DST>
- <TIMESTAMP>1394158722836</TIMESTAMP>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>8</RPC_CALLID>
+ <TIMESTAMP>1402899229718</TIMESTAMP>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>10</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -89,9 +89,9 @@
<TXID>7</TXID>
<LENGTH>0</LENGTH>
<PATH>/file_moved</PATH>
- <TIMESTAMP>1394158722842</TIMESTAMP>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>9</RPC_CALLID>
+ <TIMESTAMP>1402899229730</TIMESTAMP>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>11</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -101,9 +101,9 @@
<LENGTH>0</LENGTH>
<INODEID>16387</INODEID>
<PATH>/directory_mkdir</PATH>
- <TIMESTAMP>1394158722848</TIMESTAMP>
+ <TIMESTAMP>1402899229748</TIMESTAMP>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>493</MODE>
</PERMISSION_STATUS>
@@ -136,8 +136,8 @@
<TXID>12</TXID>
<SNAPSHOTROOT>/directory_mkdir</SNAPSHOTROOT>
<SNAPSHOTNAME>snapshot1</SNAPSHOTNAME>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>14</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>16</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -147,8 +147,8 @@
<SNAPSHOTROOT>/directory_mkdir</SNAPSHOTROOT>
<SNAPSHOTOLDNAME>snapshot1</SNAPSHOTOLDNAME>
<SNAPSHOTNEWNAME>snapshot2</SNAPSHOTNEWNAME>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>15</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>17</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -157,8 +157,8 @@
<TXID>14</TXID>
<SNAPSHOTROOT>/directory_mkdir</SNAPSHOTROOT>
<SNAPSHOTNAME>snapshot2</SNAPSHOTNAME>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>16</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>18</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -169,18 +169,18 @@
<INODEID>16388</INODEID>
<PATH>/file_create</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722872</MTIME>
- <ATIME>1394158722872</ATIME>
+ <MTIME>1402899229871</MTIME>
+ <ATIME>1402899229871</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
- <CLIENT_NAME>DFSClient_NONMAPREDUCE_221786725_1</CLIENT_NAME>
+ <CLIENT_NAME>DFSClient_NONMAPREDUCE_1233039831_1</CLIENT_NAME>
<CLIENT_MACHINE>127.0.0.1</CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>17</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>19</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -191,13 +191,13 @@
<INODEID>0</INODEID>
<PATH>/file_create</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722874</MTIME>
- <ATIME>1394158722872</ATIME>
+ <MTIME>1402899229881</MTIME>
+ <ATIME>1402899229871</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
<CLIENT_NAME></CLIENT_NAME>
<CLIENT_MACHINE></CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
@@ -253,10 +253,10 @@
<LENGTH>0</LENGTH>
<SRC>/file_create</SRC>
<DST>/file_moved</DST>
- <TIMESTAMP>1394158722890</TIMESTAMP>
+ <TIMESTAMP>1402899229963</TIMESTAMP>
<OPTIONS>NONE</OPTIONS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>24</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>26</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -267,18 +267,18 @@
<INODEID>16389</INODEID>
<PATH>/file_concat_target</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722895</MTIME>
- <ATIME>1394158722895</ATIME>
+ <MTIME>1402899229981</MTIME>
+ <ATIME>1402899229981</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
- <CLIENT_NAME>DFSClient_NONMAPREDUCE_221786725_1</CLIENT_NAME>
+ <CLIENT_NAME>DFSClient_NONMAPREDUCE_1233039831_1</CLIENT_NAME>
<CLIENT_MACHINE>127.0.0.1</CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>26</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>28</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -383,8 +383,8 @@
<INODEID>0</INODEID>
<PATH>/file_concat_target</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722986</MTIME>
- <ATIME>1394158722895</ATIME>
+ <MTIME>1402899230219</MTIME>
+ <ATIME>1402899229981</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
<CLIENT_NAME></CLIENT_NAME>
<CLIENT_MACHINE></CLIENT_MACHINE>
@@ -404,7 +404,7 @@
<GENSTAMP>1003</GENSTAMP>
</BLOCK>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
@@ -418,18 +418,18 @@
<INODEID>16390</INODEID>
<PATH>/file_concat_0</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158722989</MTIME>
- <ATIME>1394158722989</ATIME>
+ <MTIME>1402899230235</MTIME>
+ <ATIME>1402899230235</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
- <CLIENT_NAME>DFSClient_NONMAPREDUCE_221786725_1</CLIENT_NAME>
+ <CLIENT_NAME>DFSClient_NONMAPREDUCE_1233039831_1</CLIENT_NAME>
<CLIENT_MACHINE>127.0.0.1</CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>39</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>41</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -534,8 +534,8 @@
<INODEID>0</INODEID>
<PATH>/file_concat_0</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158723010</MTIME>
- <ATIME>1394158722989</ATIME>
+ <MTIME>1402899230307</MTIME>
+ <ATIME>1402899230235</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
<CLIENT_NAME></CLIENT_NAME>
<CLIENT_MACHINE></CLIENT_MACHINE>
@@ -555,7 +555,7 @@
<GENSTAMP>1006</GENSTAMP>
</BLOCK>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
@@ -569,18 +569,18 @@
<INODEID>16391</INODEID>
<PATH>/file_concat_1</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158723012</MTIME>
- <ATIME>1394158723012</ATIME>
+ <MTIME>1402899230320</MTIME>
+ <ATIME>1402899230320</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
- <CLIENT_NAME>DFSClient_NONMAPREDUCE_221786725_1</CLIENT_NAME>
+ <CLIENT_NAME>DFSClient_NONMAPREDUCE_1233039831_1</CLIENT_NAME>
<CLIENT_MACHINE>127.0.0.1</CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>51</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>53</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -685,8 +685,8 @@
<INODEID>0</INODEID>
<PATH>/file_concat_1</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158723035</MTIME>
- <ATIME>1394158723012</ATIME>
+ <MTIME>1402899230383</MTIME>
+ <ATIME>1402899230320</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
<CLIENT_NAME></CLIENT_NAME>
<CLIENT_MACHINE></CLIENT_MACHINE>
@@ -706,7 +706,7 @@
<GENSTAMP>1009</GENSTAMP>
</BLOCK>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
@@ -718,13 +718,13 @@
<TXID>56</TXID>
<LENGTH>0</LENGTH>
<TRG>/file_concat_target</TRG>
- <TIMESTAMP>1394158723039</TIMESTAMP>
+ <TIMESTAMP>1402899230394</TIMESTAMP>
<SOURCES>
<SOURCE1>/file_concat_0</SOURCE1>
<SOURCE2>/file_concat_1</SOURCE2>
</SOURCES>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>62</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>64</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -735,15 +735,15 @@
<INODEID>16392</INODEID>
<PATH>/file_symlink</PATH>
<VALUE>/file_concat_target</VALUE>
- <MTIME>1394158723044</MTIME>
- <ATIME>1394158723044</ATIME>
+ <MTIME>1402899230406</MTIME>
+ <ATIME>1402899230406</ATIME>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>511</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>63</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>65</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -754,18 +754,18 @@
<INODEID>16393</INODEID>
<PATH>/hard-lease-recovery-test</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158723047</MTIME>
- <ATIME>1394158723047</ATIME>
+ <MTIME>1402899230413</MTIME>
+ <ATIME>1402899230413</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
- <CLIENT_NAME>DFSClient_NONMAPREDUCE_221786725_1</CLIENT_NAME>
+ <CLIENT_NAME>DFSClient_NONMAPREDUCE_1233039831_1</CLIENT_NAME>
<CLIENT_MACHINE>127.0.0.1</CLIENT_MACHINE>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>64</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>66</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -821,7 +821,7 @@
<OPCODE>OP_REASSIGN_LEASE</OPCODE>
<DATA>
<TXID>64</TXID>
- <LEASEHOLDER>DFSClient_NONMAPREDUCE_221786725_1</LEASEHOLDER>
+ <LEASEHOLDER>DFSClient_NONMAPREDUCE_1233039831_1</LEASEHOLDER>
<PATH>/hard-lease-recovery-test</PATH>
<NEWHOLDER>HDFS_NameNode</NEWHOLDER>
</DATA>
@@ -834,8 +834,8 @@
<INODEID>0</INODEID>
<PATH>/hard-lease-recovery-test</PATH>
<REPLICATION>1</REPLICATION>
- <MTIME>1394158725708</MTIME>
- <ATIME>1394158723047</ATIME>
+ <MTIME>1402899232526</MTIME>
+ <ATIME>1402899230413</ATIME>
<BLOCKSIZE>512</BLOCKSIZE>
<CLIENT_NAME></CLIENT_NAME>
<CLIENT_MACHINE></CLIENT_MACHINE>
@@ -845,7 +845,7 @@
<GENSTAMP>1011</GENSTAMP>
</BLOCK>
<PERMISSION_STATUS>
- <USERNAME>jing</USERNAME>
+ <USERNAME>andrew</USERNAME>
<GROUPNAME>supergroup</GROUPNAME>
<MODE>420</MODE>
</PERMISSION_STATUS>
@@ -856,13 +856,13 @@
<DATA>
<TXID>66</TXID>
<POOLNAME>pool1</POOLNAME>
- <OWNERNAME>jing</OWNERNAME>
- <GROUPNAME>staff</GROUPNAME>
+ <OWNERNAME>andrew</OWNERNAME>
+ <GROUPNAME>andrew</GROUPNAME>
<MODE>493</MODE>
<LIMIT>9223372036854775807</LIMIT>
<MAXRELATIVEEXPIRY>2305843009213693951</MAXRELATIVEEXPIRY>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>71</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>73</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -871,8 +871,8 @@
<TXID>67</TXID>
<POOLNAME>pool1</POOLNAME>
<LIMIT>99</LIMIT>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>72</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>74</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -883,9 +883,9 @@
<PATH>/path</PATH>
<REPLICATION>1</REPLICATION>
<POOL>pool1</POOL>
- <EXPIRATION>2305844403372420029</EXPIRATION>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>73</RPC_CALLID>
+ <EXPIRATION>2305844412112927450</EXPIRATION>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>75</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -894,8 +894,8 @@
<TXID>69</TXID>
<ID>1</ID>
<REPLICATION>2</REPLICATION>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>74</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>76</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -903,8 +903,8 @@
<DATA>
<TXID>70</TXID>
<ID>1</ID>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>75</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>77</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -912,8 +912,8 @@
<DATA>
<TXID>71</TXID>
<POOLNAME>pool1</POOLNAME>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>76</RPC_CALLID>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>78</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
@@ -921,51 +921,91 @@
<DATA>
<TXID>72</TXID>
<SRC>/file_concat_target</SRC>
+ <ENTRY>
+ <SCOPE>ACCESS</SCOPE>
+ <TYPE>USER</TYPE>
+ <PERM>rw-</PERM>
+ </ENTRY>
+ <ENTRY>
+ <SCOPE>ACCESS</SCOPE>
+ <TYPE>USER</TYPE>
+ <NAME>user</NAME>
+ <PERM>rw-</PERM>
+ </ENTRY>
+ <ENTRY>
+ <SCOPE>ACCESS</SCOPE>
+ <TYPE>GROUP</TYPE>
+ <PERM>-w-</PERM>
+ </ENTRY>
+ <ENTRY>
+ <SCOPE>ACCESS</SCOPE>
+ <TYPE>MASK</TYPE>
+ <PERM>rw-</PERM>
+ </ENTRY>
+ <ENTRY>
+ <SCOPE>ACCESS</SCOPE>
+ <TYPE>OTHER</TYPE>
+ <PERM>---</PERM>
+ </ENTRY>
</DATA>
</RECORD>
<RECORD>
- <OPCODE>OP_ROLLING_UPGRADE_START</OPCODE>
+ <OPCODE>OP_SET_XATTR</OPCODE>
<DATA>
<TXID>73</TXID>
- <STARTTIME>1394158726098</STARTTIME>
+ <SRC>/file_concat_target</SRC>
+ <XATTR>
+ <NAMESPACE>USER</NAMESPACE>
+ <NAME>a1</NAME>
+ <VALUE>0x313233</VALUE>
+ </XATTR>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>80</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
- <OPCODE>OP_ROLLING_UPGRADE_FINALIZE</OPCODE>
+ <OPCODE>OP_SET_XATTR</OPCODE>
<DATA>
<TXID>74</TXID>
- <FINALIZETIME>1394158726098</FINALIZETIME>
+ <SRC>/file_concat_target</SRC>
+ <XATTR>
+ <NAMESPACE>USER</NAMESPACE>
+ <NAME>a2</NAME>
+ <VALUE>0x373839</VALUE>
+ </XATTR>
+ <RPC_CLIENTID>e03f4a52-3d85-4e05-8942-286185e639bd</RPC_CLIENTID>
+ <RPC_CALLID>81</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
- <OPCODE>OP_SET_XATTR</OPCODE>
+ <OPCODE>OP_REMOVE_XATTR</OPCODE>
<DATA>
<TXID>75</TXID>
<SRC>/file_concat_target</SRC>
<XATTR>
<NAMESPACE>USER</NAMESPACE>
- <NAME>a1</NAME>
- <VALUE>0x313233</VALUE>
+ <NAME>a2</NAME>
</XATTR>
- <RPC_CLIENTID>9b85a845-bbfa-42f6-8a16-c433614b8eb9</RPC_CLIENTID>
- <RPC_CALLID>80</RPC_CALLID>
</DATA>
</RECORD>
<RECORD>
- <OPCODE>OP_REMOVE_XATTR</OPCODE>
+ <OPCODE>OP_ROLLING_UPGRADE_START</OPCODE>
<DATA>
<TXID>76</TXID>
- <SRC>/file_concat_target</SRC>
- <XATTR>
- <NAMESPACE>USER</NAMESPACE>
- <NAME>a1</NAME>
- </XATTR>
+ <STARTTIME>1402899233646</STARTTIME>
</DATA>
</RECORD>
<RECORD>
- <OPCODE>OP_END_LOG_SEGMENT</OPCODE>
+ <OPCODE>OP_ROLLING_UPGRADE_FINALIZE</OPCODE>
<DATA>
<TXID>77</TXID>
+ <FINALIZETIME>1402899233647</FINALIZETIME>
+ </DATA>
+ </RECORD>
+ <RECORD>
+ <OPCODE>OP_END_LOG_SEGMENT</OPCODE>
+ <DATA>
+ <TXID>78</TXID>
</DATA>
</RECORD>
</EDITS>
Modified: hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/testHDFSConf.xml
URL: http://svn.apache.org/viewvc/hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/testHDFSConf.xml?rev=1609878&r1=1609877&r2=1609878&view=diff
==============================================================================
--- hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/testHDFSConf.xml (original)
+++ hadoop/common/branches/YARN-1051/hadoop-hdfs-project/hadoop-hdfs/src/test/resources/testHDFSConf.xml Sat Jul 12 02:24:40 2014
@@ -15714,8 +15714,8 @@
</cleanup-commands>
<comparators>
<comparator>
- <type>ExactComparator</type>
- <expected-output></expected-output>
+ <type>RegexpComparator</type>
+ <expected-output>Refresh service acl successful(\n)*</expected-output>
</comparator>
</comparators>
</test><!--
@@ -15951,8 +15951,8 @@
</cleanup-commands>
<comparators>
<comparator>
- <type>ExactComparator</type>
- <expected-output></expected-output>
+ <type>RegexpComparator</type>
+ <expected-output>Save namespace successful(\n)*</expected-output>
</comparator>
</comparators>
</test>
@@ -16367,8 +16367,8 @@
</cleanup-commands>
<comparators>
<comparator>
- <type>ExactComparator</type>
- <expected-output></expected-output>
+ <type>RegexpComparator</type>
+ <expected-output>Refresh user to groups mapping successful(\n)*</expected-output>
</comparator>
</comparators>
</test>
@@ -16383,8 +16383,8 @@
</cleanup-commands>
<comparators>
<comparator>
- <type>ExactComparator</type>
- <expected-output></expected-output>
+ <type>RegexpComparator</type>
+ <expected-output>Refresh super user groups configuration successful(\n)*</expected-output>
</comparator>
</comparators>
</test>
@@ -16453,8 +16453,8 @@
</cleanup-commands>
<comparators>
<comparator>
- <type>ExactComparator</type>
- <expected-output></expected-output>
+ <type>RegexpComparator</type>
+ <expected-output>Balancer bandwidth is set to 104857600(\n)*</expected-output>
</comparator>
</comparators>
</test>
@@ -16469,8 +16469,8 @@
</cleanup-commands>
<comparators>
<comparator>
- <type>ExactComparator</type>
- <expected-output></expected-output>
+ <type>SubstringComparator</type>
+ <expected-output>Finalize upgrade successful</expected-output>
</comparator>
</comparators>
</test>