[ 
https://issues.apache.org/jira/browse/PHOENIX-3684?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15870837#comment-15870837
 ] 

Hadoop QA commented on PHOENIX-3684:
------------------------------------

{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  
http://issues.apache.org/jira/secure/attachment/12853138/PHOENIX-3684.001.patch
  against master branch at commit c3b16cef5de15df059b5c979a1b54110e5b0ca00.
  ATTACHMENT ID: 12853138

    {color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

    {color:green}+1 tests included{color}.  The patch appears to include 6 new 
or modified tests.

    {color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

    {color:red}-1 javadoc{color}.  The javadoc tool appears to have generated 
43 warning messages.

    {color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

    {color:red}-1 lineLengths{color}.  The patch introduces the following lines 
longer than 100:
    +                        if (!currentUser.hasKerberosCredentials() || 
!isSameName(currentUser.getUserName(), principal)) {
+        static boolean isSameName(String currentName, String newName, String 
hostname) throws IOException {
+                newName = 
org.apache.hadoop.security.SecurityUtil.getServerPrincipal(newName, hostname);
+        assertTrue(ConnectionInfo.isSameName("user/[email protected]", 
"user/[email protected]"));
+        assertTrue(ConnectionInfo.isSameName("user/[email protected]", 
"user/[email protected]", "localhost"));
+        assertFalse(ConnectionInfo.isSameName("user/[email protected]", 
"user/[email protected]", "localhost"));
+        assertFalse(ConnectionInfo.isSameName("[email protected]", 
"user/[email protected]", "localhost"));
+        
connections.add(ConnectionInfo.create(url1).normalize(ReadOnlyProps.EMPTY_PROPS,
 EMPTY_PROPERTIES));
+        
connections.add(ConnectionInfo.create(url1).normalize(ReadOnlyProps.EMPTY_PROPS,
 EMPTY_PROPERTIES));
+        
connections.add(ConnectionInfo.create(url2).normalize(ReadOnlyProps.EMPTY_PROPS,
 EMPTY_PROPERTIES));

     {color:red}-1 core tests{color}.  The patch failed these unit tests:
     
./phoenix-core/target/failsafe-reports/TEST-org.apache.phoenix.iterate.RoundRobinResultIteratorWithStatsIT

Test results: 
https://builds.apache.org/job/PreCommit-PHOENIX-Build/772//testReport/
Javadoc warnings: 
https://builds.apache.org/job/PreCommit-PHOENIX-Build/772//artifact/patchprocess/patchJavadocWarnings.txt
Console output: 
https://builds.apache.org/job/PreCommit-PHOENIX-Build/772//console

This message is automatically generated.

> ConnectionQueryServices connection leak on principal with "_HOST"
> -----------------------------------------------------------------
>
>                 Key: PHOENIX-3684
>                 URL: https://issues.apache.org/jira/browse/PHOENIX-3684
>             Project: Phoenix
>          Issue Type: Bug
>            Reporter: Arpit Gupta
>            Assignee: Josh Elser
>            Priority: Blocker
>             Fix For: 4.9.1, 4.10.0
>
>         Attachments: PHOENIX-3684.001.patch
>
>
> Through some internal testing, we found that Ambari's use of Phoenix to host 
> metrics data was leaking ConnectionQueryServices (and thus HConnections and 
> ZK connections), ultimately running into ZK's rate limiting maxClientCnxns.
> After a bit of digging around (and revisiting the old issues around this 
> topic PHOENIX-3607, PHOENIX-3611, etc), I finally realized that the logic in 
> ConnectionInfo was simply not correctly handling the {{_HOST}} special string 
> in the principal (that UGI will replace with the FQDN for the current host).
> This resulted in Phoenix repeatedly re-logging in the user when they created 
> a new Connection instead of using the UGI current user, leaking another set 
> of connections.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to