Browse Source

KAFKA-9025: Add a option for path existence check in ZkSecurityMigrator

https://issues.apache.org/jira/browse/KAFKA-9025

If a chroot is configured, ZkSecurityMigrator should prompt a confirm to user to ensure whether chroot is specified correctly.

Author: huxihx <huxi_2b@hotmail.com>
Author: huxi <huxi_2b@hotmail.com>

Reviewers: Manikumar Reddy <manikumar.reddy@gmail.com>

Closes #7618 from huxihx/KAFKA-9025
pull/7810/head
huxihx 5 years ago committed by Manikumar Reddy
parent
commit
72df28fe8c
  1. 22
      core/src/main/scala/kafka/admin/ZkSecurityMigrator.scala

22
core/src/main/scala/kafka/admin/ZkSecurityMigrator.scala

@ -17,7 +17,7 @@ @@ -17,7 +17,7 @@
package kafka.admin
import kafka.utils.{CommandDefaultOptions, CommandLineUtils, Logging}
import kafka.utils.{CommandDefaultOptions, CommandLineUtils, Exit, Logging}
import kafka.zk.{ControllerZNode, KafkaZkClient, ZkData, ZkSecurityMigratorUtils}
import org.apache.kafka.common.security.JaasUtils
import org.apache.kafka.common.utils.Time
@ -95,8 +95,9 @@ object ZkSecurityMigrator extends Logging { @@ -95,8 +95,9 @@ object ZkSecurityMigrator extends Logging {
val zkConnectionTimeout = opts.options.valueOf(opts.zkConnectionTimeoutOpt).intValue
val zkClient = KafkaZkClient(zkUrl, zkAcl, zkSessionTimeout, zkConnectionTimeout,
Int.MaxValue, Time.SYSTEM)
val enablePathCheck = opts.options.has(opts.enablePathCheckOpt)
val migrator = new ZkSecurityMigrator(zkClient)
migrator.run()
migrator.run(enablePathCheck)
}
def main(args: Array[String]): Unit = {
@ -118,6 +119,8 @@ object ZkSecurityMigrator extends Logging { @@ -118,6 +119,8 @@ object ZkSecurityMigrator extends Logging {
withRequiredArg().ofType(classOf[java.lang.Integer]).defaultsTo(30000)
val zkConnectionTimeoutOpt = parser.accepts("zookeeper.connection.timeout", "Sets the ZooKeeper connection timeout.").
withRequiredArg().ofType(classOf[java.lang.Integer]).defaultsTo(30000)
val enablePathCheckOpt = parser.accepts("enable.path.check", "Checks if all the root paths exist in ZooKeeper " +
"before migration. If not, exit the command.")
options = parser.parse(args : _*)
}
}
@ -218,9 +221,10 @@ class ZkSecurityMigrator(zkClient: KafkaZkClient) extends Logging { @@ -218,9 +221,10 @@ class ZkSecurityMigrator(zkClient: KafkaZkClient) extends Logging {
}
}
private def run(): Unit = {
private def run(enablePathCheck: Boolean): Unit = {
try {
setAclIndividually("/")
checkPathExistenceAndMaybeExit(enablePathCheck)
for (path <- ZkData.SecureRootPaths) {
debug("Going to set ACL for %s".format(path))
if (path == ControllerZNode.path && !zkClient.pathExists(path)) {
@ -250,4 +254,16 @@ class ZkSecurityMigrator(zkClient: KafkaZkClient) extends Logging { @@ -250,4 +254,16 @@ class ZkSecurityMigrator(zkClient: KafkaZkClient) extends Logging {
zkClient.close
}
}
private def checkPathExistenceAndMaybeExit(enablePathCheck: Boolean): Unit = {
val nonExistingSecureRootPaths = ZkData.SecureRootPaths.filterNot(zkClient.pathExists)
if (nonExistingSecureRootPaths.nonEmpty) {
println(s"Warning: The following secure root paths do not exist in ZooKeeper: ${nonExistingSecureRootPaths.mkString(",")}")
println("That might be due to an incorrect chroot is specified when executing the command.")
if (enablePathCheck) {
println("Exit the command.")
Exit.exit(0)
}
}
}
}

Loading…
Cancel
Save