Github user kishorvpatil commented on a diff in the pull request:

    https://github.com/apache/storm/pull/1642#discussion_r76637608
  
    --- Diff: 
storm-core/src/jvm/org/apache/storm/daemon/supervisor/AdvancedFSOps.java ---
    @@ -0,0 +1,300 @@
    +/**
    + * Licensed to the Apache Software Foundation (ASF) under one
    + * or more contributor license agreements.  See the NOTICE file
    + * distributed with this work for additional information
    + * regarding copyright ownership.  The ASF licenses this file
    + * to you under the Apache License, Version 2.0 (the
    + * "License"); you may not use this file except in compliance
    + * with the License.  You may obtain a copy of the License at
    + *
    + * http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.storm.daemon.supervisor;
    +
    +import java.io.File;
    +import java.io.FileNotFoundException;
    +import java.io.FileWriter;
    +import java.io.IOException;
    +import java.io.Writer;
    +import java.nio.file.FileSystems;
    +import java.nio.file.Files;
    +import java.nio.file.Path;
    +import java.nio.file.Paths;
    +import java.nio.file.StandardCopyOption;
    +import java.nio.file.attribute.PosixFilePermission;
    +import java.util.ArrayList;
    +import java.util.Arrays;
    +import java.util.HashSet;
    +import java.util.List;
    +import java.util.Map;
    +import java.util.Set;
    +
    +import org.apache.commons.io.FileUtils;
    +import org.apache.storm.Config;
    +import org.apache.storm.utils.Utils;
    +import org.slf4j.Logger;
    +import org.slf4j.LoggerFactory;
    +
    +public class AdvancedFSOps {
    +    private static final Logger LOG = 
LoggerFactory.getLogger(AdvancedFSOps.class);
    +    
    +    /**
    +     * Factory to create a new AdvancedFSOps
    +     * @param conf the configuration of the process
    +     * @return the appropriate instance of the class for this config and 
environment.
    +     */
    +    public static AdvancedFSOps mk(Map<String, Object> conf) {
    +        if (Utils.isOnWindows()) {
    +            return new AdvancedWindowsFSOps(conf);
    +        }
    +        if 
(Utils.getBoolean(conf.get(Config.SUPERVISOR_RUN_WORKER_AS_USER), false)) {
    +            return new AdvancedRunAsUserFSOps(conf);
    +        }
    +        return new AdvancedFSOps();
    +    }
    +    
    +    private static class AdvancedRunAsUserFSOps extends AdvancedFSOps {
    +        private final Map<String, Object> _conf;
    +        
    +        public AdvancedRunAsUserFSOps(Map<String, Object> conf) {
    +            if (Utils.isOnWindows()) {
    +                throw new RuntimeException("ERROR: Windows doesn't support 
running workers as different users yet");
    +            }
    +            _conf = conf;
    +        }
    +        
    +        @Override
    +        public void setupBlobPermissions(File path, String user) throws 
IOException {
    +            String logPrefix = "setup blob permissions for " + path;
    +            SupervisorUtils.processLauncherAndWait(_conf, user, 
Arrays.asList("blob", path.toString()), null, logPrefix);
    +        }
    +        
    +        @Override
    +        public void deleteIfExists(File path, String user, String 
logPrefix) throws IOException {
    +            String absolutePath = path.getAbsolutePath();
    +            LOG.debug("Deleting path {}", absolutePath);
    +            if (user == null) {
    +                user = Files.getOwner(path.toPath()).getName();
    +            }
    +            List<String> commands = new ArrayList<>();
    +            commands.add("rmr");
    +            commands.add(absolutePath);
    +            SupervisorUtils.processLauncherAndWait(_conf, user, commands, 
null, logPrefix);
    +            if (Utils.checkFileExists(absolutePath)) {
    +                throw new RuntimeException(path + " was not deleted.");
    +            }
    +        }
    +        
    +        @Override
    +        public void setupStormCodeDir(Map<String, Object> topologyConf, 
File path) throws IOException {
    +            SupervisorUtils.setupStormCodeDir(_conf, topologyConf, 
path.getCanonicalPath());
    +        }
    +    }
    +    
    +    /**
    +     * Operations that need to override the default ones when running on 
Windows
    +     *
    +     */
    +    private static class AdvancedWindowsFSOps extends AdvancedFSOps {
    +
    +        public AdvancedWindowsFSOps(Map<String, Object> conf) {
    +            if 
(Utils.getBoolean(conf.get(Config.SUPERVISOR_RUN_WORKER_AS_USER), false)) {
    +                throw new RuntimeException("ERROR: Windows doesn't support 
running workers as different users yet");
    +            }
    +        }
    +        
    +        @Override
    +        public void restrictDirectoryPermissions(String dir) throws 
IOException {
    +            //NOOP, if windows gets support for run as user we will need 
to find a way to suppor this
    +        }
    +        
    +        @Override
    +        public void moveDriectoryPreferAtomic(File fromDir, File toDir) 
throws IOException {
    +            // Files/move with non-empty directory doesn't work well on 
Windows
    +            // This is not atomic but it does work
    +            FileUtils.moveDirectory(fromDir, toDir);
    +        }
    +        
    +        @Override
    +        public boolean supportsAtomicDirectoryMove() {
    +            // Files/move with non-empty directory doesn't work well on 
Windows
    +            // FileUtils.moveDirectory is not atomic
    +            return false;
    +        }
    +    }
    +    
    +    
    +    protected AdvancedFSOps() {
    +        //NOOP, but restricted permissions
    +    }
    +
    +    /**
    +     * Set directory permissions to (OWNER)RWX (GROUP)R-X (OTHER)---
    +     * On some systems that do not support this, it may become a noop
    +     * @param dir the directory to change permissions on
    +     * @throws IOException on any error
    +     */
    +    public void restrictDirectoryPermissions(String dir) throws 
IOException {
    +        Set<PosixFilePermission> perms = new HashSet<>(
    +                Arrays.asList(PosixFilePermission.OWNER_READ, 
PosixFilePermission.OWNER_WRITE,
    +                        PosixFilePermission.OWNER_EXECUTE, 
PosixFilePermission.GROUP_READ,
    +                        PosixFilePermission.GROUP_EXECUTE));
    +        
Files.setPosixFilePermissions(FileSystems.getDefault().getPath(dir), perms);
    +    }
    +
    +    /**
    +     * Move fromDir to toDir, and try to make it an atomic move if possible
    +     * @param fromDir what to move
    +     * @param toDir where to move it from
    +     * @throws IOException on any error
    +     */
    +    public void moveDriectoryPreferAtomic(File fromDir, File toDir) throws 
IOException {
    +        FileUtils.forceMkdir(toDir);
    +        Files.move(fromDir.toPath(), toDir.toPath(), 
StandardCopyOption.ATOMIC_MOVE);
    +    }
    +    
    +    /**
    +     * @return true if an atomic directory move works, else false.
    +     */
    +    public boolean supportsAtomicDirectoryMove() {
    +        return true;
    +    }
    +    
    +    /**
    +     * Setup permissions properly for an internal blob store path
    +     * @param path the path to the permissions
    +     * @param user the user to change the permissions for
    +     * @throws IOException on any error
    +     */
    +    public void setupBlobPermissions(File path, String user) throws 
IOException {
    +        //Normally this is a NOOP
    +    }
    +
    +    /**
    +     * Delete a file or a directory and all of the children. If it exists.
    +     * @param path what to delete
    +     * @param user who to delete it as if doing it as someone else is 
supported
    +     * @param logPrefix if an external process needs to be launched to 
delete 
    +     * the object what prefix to include in the logs
    +     * @throws IOException on any error.
    +     */
    +    public void deleteIfExists(File path, String user, String logPrefix) 
throws IOException {
    +        LOG.debug("Deleting path {}", path);
    --- End diff --
    
    Again, can this be info level log entry?


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to