Skip to content

Conversation

@xiangfu0
Copy link
Contributor

@xiangfu0 xiangfu0 commented Nov 23, 2022

  1. upgrade azure-data-lake-store-sdk version to 2.3.10
  2. use DataLakeFileSystemClient for open method as well
  3. support a new auth type NONE, meaning no cred is added.

@xiangfu0 xiangfu0 requested a review from snleee November 23, 2022 21:20
@xiangfu0 xiangfu0 changed the title Upgrade adls lib, support non-cred client ADLS file system upgrade Nov 23, 2022
@xiangfu0 xiangfu0 force-pushed the adls-default-credential branch from 0ff60b6 to 66bb5e4 Compare November 23, 2022 21:28
@xiangfu0 xiangfu0 force-pushed the adls-default-credential branch from 66bb5e4 to 175bf58 Compare November 23, 2022 21:36
@codecov-commenter
Copy link

codecov-commenter commented Nov 23, 2022

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 70.32%. Comparing base (2140954) to head (bd01cef).
Report is 2792 commits behind head on master.

Additional details and impacted files
@@             Coverage Diff              @@
##             master    #9855      +/-   ##
============================================
- Coverage     70.34%   70.32%   -0.03%     
+ Complexity     5014     4936      -78     
============================================
  Files          1972     1972              
  Lines        105692   105687       -5     
  Branches      15993    15988       -5     
============================================
- Hits          74350    74321      -29     
- Misses        26137    26170      +33     
+ Partials       5205     5196       -9     
Flag Coverage Δ
integration1 25.14% <ø> (-0.07%) ⬇️
integration2 24.82% <ø> (+0.18%) ⬆️
unittests1 67.72% <ø> (+<0.01%) ⬆️
unittests2 15.73% <ø> (-0.02%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

@snleee snleee left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM otherwise

}
default:
throw new IllegalStateException("Expecting valid authType. One of (ACCESS_KEY, AZURE_AD, AZURE_AD_WITH_PROXY");
throw new IllegalArgumentException(
Copy link
Contributor

@snleee snleee Nov 24, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we try to initialize the client using DefaultAzureCredential to have a way to pass the credentials to azure client using ENV variables (or system properties)? Or, that is not the scope of this PR?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

return blobClient.openInputStream();
// Another approach is to download the file to the local disk to a temp path and return the file input stream. In
// this case, we need to override "close()" and delete temp file.
return _fileSystemClient.getFileClient(AzurePinotFSUtil.convertUriToUrlEncodedAzureStylePath(uri)).openInputStream()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for addressing this!

@xiangfu0
Copy link
Contributor Author

@jackjlli please also check, there is a behavior change for handling the default scenario for the AzurePinotFS. Since it's on the failover code path, I won't mark it as backward incompatible.

@xiangfu0 xiangfu0 merged commit 0c67329 into apache:master Nov 25, 2022
@xiangfu0 xiangfu0 deleted the adls-default-credential branch November 25, 2022 01:55
@xiangfu0 xiangfu0 added 0.12.0 release-notes Referenced by PRs that need attention when compiling the next release notes labels Nov 25, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

0.12.0 release-notes Referenced by PRs that need attention when compiling the next release notes

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants