Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix fury bug #476

Merged
merged 7 commits into from
Aug 22, 2024
Merged

Fix fury bug #476

merged 7 commits into from
Aug 22, 2024

Conversation

heliang666s
Copy link
Contributor

What is the purpose of the change

Fix fury bug

apache/dubbo#14536

Brief changelog

Fix FuryInputStream.java.By the way,add more tests.

Verifying this change

XXXXX

Follow this checklist to help us incorporate your contribution quickly and easily:

  • Make sure there is a GITHUB_issue field for the change (usually before
    you start working on it). Trivial changes like typos do not require a GITHUB issue. Your pull request should address
    just this issue, without pulling in other changes - one PR resolves one issue.
  • Format the pull request title like [Dubbo-XXX] Fix UnknownException when host config not exist #XXX. Each commit
    in the pull request should have a meaningful subject line and body.
  • Write a pull request description that is detailed enough to understand what the pull request does, how, and why.
  • Write necessary unit-test to verify your logic correction, more mock a little better when cross module dependency
    exist. If the new feature or significant change is committed, please remember to add sample
    in dubbo samples project.
  • Run mvn clean install -DskipTests=false & mvn clean test-compile failsafe:integration-test to make sure
    unit-test and integration-test pass.
  • If this contribution is large, please follow
    the Software Donation Guide.

@yunshen-Lee
Copy link

After testing, there are still issues with deserialization.
Caused by: java.lang.ArrayIndexOutOfBoundsException: 49
at org.apache.fury.resolver.MetaStringBytes.decode(MetaStringBytes.java:69) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.resolver.ClassResolver.populateBytesToClassInfo(ClassResolver.java:1708) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.resolver.ClassResolver.loadBytesToClassInfo(ClassResolver.java:1699) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.resolver.ClassResolver.readClassInfoFromBytes(ClassResolver.java:1686) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.resolver.ClassResolver.readClassInfo(ClassResolver.java:1608) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.Fury.readRef(Fury.java:857) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.Fury.deserializeJavaObjectAndClass(Fury.java:1225) ~[fury-core-0.7.0.jar!/:0.7.0]
at org.apache.fury.Fury.deserializeJavaObjectAndClass(Fury.java:1245) ~[fury-core-0.7.0.jar!/:0.7.0]

@songxiaosheng
Copy link
Member

please fix conflict

@heliang666s
Copy link
Contributor Author

please fix conflict

have done

@codecov-commenter
Copy link

codecov-commenter commented Aug 20, 2024

Codecov Report

Attention: Patch coverage is 0% with 39 lines in your changes missing coverage. Please review.

Project coverage is 0.00%. Comparing base (9b48975) to head (a1ccc34).
Report is 134 commits behind head on master.

Files Patch % Lines
...o/common/serialize/fury/dubbo/FuryObjectInput.java 0.00% 36 Missing ⚠️
...mmon/serialize/fury/dubbo/FuryCheckerListener.java 0.00% 2 Missing ⚠️
.../common/serialize/fury/dubbo/FuryObjectOutput.java 0.00% 1 Missing ⚠️
Additional details and impacted files
@@             Coverage Diff             @@
##             master    #476      +/-   ##
===========================================
- Coverage      0.27%   0.00%   -0.28%     
===========================================
  Files           299     521     +222     
  Lines         13730   17254    +3524     
  Branches       1737    2010     +273     
===========================================
- Hits             38       0      -38     
- Misses        13689   17254    +3565     
+ Partials          3       0       -3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@AlbumenJ
Copy link
Member

@chaokunyang PTAL

@@ -40,7 +40,7 @@ public FuryObjectInput(Fury fury, MemoryBuffer buffer, InputStream input) {

@Override
public Object readObject() {
return fury.deserialize(new FuryInputStream(input, buffer.size()));
return fury.deserializeJavaObjectAndClass(new FuryInputStream(input, buffer.size()));
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we use BlockedStreamUtils.deserialize(fury, output, obj); and BlockedStreamUtils.serialize(fury, output, obj); instead?

FuryInputStream will buffer data internally for speed, which may read more data than needed

@chickenlj chickenlj merged commit 036a8d6 into apache:master Aug 22, 2024
10 checks passed
@heliang666s heliang666s deleted the fury-bug branch January 17, 2025 03:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants