-
Notifications
You must be signed in to change notification settings - Fork 1.4k
ADLS file system upgrade #9855
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ADLS file system upgrade #9855
Conversation
0ff60b6 to
66bb5e4
Compare
66bb5e4 to
175bf58
Compare
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #9855 +/- ##
============================================
- Coverage 70.34% 70.32% -0.03%
+ Complexity 5014 4936 -78
============================================
Files 1972 1972
Lines 105692 105687 -5
Branches 15993 15988 -5
============================================
- Hits 74350 74321 -29
- Misses 26137 26170 +33
+ Partials 5205 5196 -9
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
snleee
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM otherwise
...file-system/pinot-adls/src/main/java/org/apache/pinot/plugin/filesystem/ADLSGen2PinotFS.java
Outdated
Show resolved
Hide resolved
| } | ||
| default: | ||
| throw new IllegalStateException("Expecting valid authType. One of (ACCESS_KEY, AZURE_AD, AZURE_AD_WITH_PROXY"); | ||
| throw new IllegalArgumentException( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we try to initialize the client using DefaultAzureCredential to have a way to pass the credentials to azure client using ENV variables (or system properties)? Or, that is not the scope of this PR?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Make sense, updated the default behavior to use DefaultAzureCredentialBuilder: https://learn.microsoft.com/en-us/java/api/com.azure.identity.defaultazurecredentialbuilder?view=azure-java-stable
| return blobClient.openInputStream(); | ||
| // Another approach is to download the file to the local disk to a temp path and return the file input stream. In | ||
| // this case, we need to override "close()" and delete temp file. | ||
| return _fileSystemClient.getFileClient(AzurePinotFSUtil.convertUriToUrlEncodedAzureStylePath(uri)).openInputStream() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for addressing this!
|
@jackjlli please also check, there is a behavior change for handling the default scenario for the AzurePinotFS. Since it's on the failover code path, I won't mark it as backward incompatible. |
NONE, meaning no cred is added.