| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.hadoop.yarn.util; |
| |
| import java.io.File; |
| import java.io.FileNotFoundException; |
| import java.io.IOException; |
| import java.net.URISyntaxException; |
| import java.security.PrivilegedExceptionAction; |
| import java.util.Random; |
| import java.util.concurrent.Callable; |
| |
| import org.apache.commons.logging.Log; |
| import org.apache.commons.logging.LogFactory; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.fs.FileContext; |
| import org.apache.hadoop.fs.FileStatus; |
| import org.apache.hadoop.fs.FileSystem; |
| import org.apache.hadoop.fs.FileUtil; |
| import org.apache.hadoop.fs.Options.Rename; |
| import org.apache.hadoop.fs.Path; |
| import org.apache.hadoop.security.UserGroupInformation; |
| import org.apache.hadoop.fs.permission.FsPermission; |
| import org.apache.hadoop.util.RunJar; |
| import org.apache.hadoop.yarn.api.records.LocalResource; |
| import org.apache.hadoop.yarn.api.records.LocalResourceVisibility; |
| import org.apache.hadoop.yarn.util.ConverterUtils; |
| |
| /** |
| * Download a single URL to the local disk. |
| * |
| */ |
| public class FSDownload implements Callable<Path> { |
| |
| private static final Log LOG = LogFactory.getLog(FSDownload.class); |
| |
| private Random rand; |
| private FileContext files; |
| private final UserGroupInformation userUgi; |
| private Configuration conf; |
| private LocalResource resource; |
| |
| /** The local FS dir path under which this resource is to be localized to */ |
| private Path destDirPath; |
| |
| private static final FsPermission cachePerms = new FsPermission( |
| (short) 0755); |
| static final FsPermission PUBLIC_FILE_PERMS = new FsPermission((short) 0555); |
| static final FsPermission PRIVATE_FILE_PERMS = new FsPermission( |
| (short) 0500); |
| static final FsPermission PUBLIC_DIR_PERMS = new FsPermission((short) 0755); |
| static final FsPermission PRIVATE_DIR_PERMS = new FsPermission((short) 0700); |
| |
| |
| public FSDownload(FileContext files, UserGroupInformation ugi, Configuration conf, |
| Path destDirPath, LocalResource resource, Random rand) { |
| this.conf = conf; |
| this.destDirPath = destDirPath; |
| this.files = files; |
| this.userUgi = ugi; |
| this.resource = resource; |
| this.rand = rand; |
| } |
| |
| LocalResource getResource() { |
| return resource; |
| } |
| |
| private Path copy(Path sCopy, Path dstdir) throws IOException { |
| FileSystem sourceFs = sCopy.getFileSystem(conf); |
| Path dCopy = new Path(dstdir, sCopy.getName() + ".tmp"); |
| FileStatus sStat = sourceFs.getFileStatus(sCopy); |
| if (sStat.getModificationTime() != resource.getTimestamp()) { |
| throw new IOException("Resource " + sCopy + |
| " changed on src filesystem (expected " + resource.getTimestamp() + |
| ", was " + sStat.getModificationTime()); |
| } |
| |
| sourceFs.copyToLocalFile(sCopy, dCopy); |
| return dCopy; |
| } |
| |
| private long unpack(File localrsrc, File dst) throws IOException { |
| switch (resource.getType()) { |
| case ARCHIVE: |
| String lowerDst = dst.getName().toLowerCase(); |
| if (lowerDst.endsWith(".jar")) { |
| RunJar.unJar(localrsrc, dst); |
| } else if (lowerDst.endsWith(".zip")) { |
| FileUtil.unZip(localrsrc, dst); |
| } else if (lowerDst.endsWith(".tar.gz") || |
| lowerDst.endsWith(".tgz") || |
| lowerDst.endsWith(".tar")) { |
| FileUtil.unTar(localrsrc, dst); |
| } else { |
| LOG.warn("Cannot unpack " + localrsrc); |
| if (!localrsrc.renameTo(dst)) { |
| throw new IOException("Unable to rename file: [" + localrsrc |
| + "] to [" + dst + "]"); |
| } |
| } |
| break; |
| case FILE: |
| default: |
| if (!localrsrc.renameTo(dst)) { |
| throw new IOException("Unable to rename file: [" + localrsrc |
| + "] to [" + dst + "]"); |
| } |
| break; |
| } |
| return 0; |
| // TODO Should calculate here before returning |
| //return FileUtil.getDU(destDir); |
| } |
| |
| @Override |
| public Path call() throws Exception { |
| final Path sCopy; |
| try { |
| sCopy = ConverterUtils.getPathFromYarnURL(resource.getResource()); |
| } catch (URISyntaxException e) { |
| throw new IOException("Invalid resource", e); |
| } |
| |
| Path tmp; |
| do { |
| tmp = new Path(destDirPath, String.valueOf(rand.nextLong())); |
| } while (files.util().exists(tmp)); |
| destDirPath = tmp; |
| |
| files.mkdir(destDirPath, cachePerms, false); |
| final Path dst_work = new Path(destDirPath + "_tmp"); |
| files.mkdir(dst_work, cachePerms, false); |
| |
| Path dFinal = files.makeQualified(new Path(dst_work, sCopy.getName())); |
| try { |
| Path dTmp = null == userUgi |
| ? files.makeQualified(copy(sCopy, dst_work)) |
| : userUgi.doAs(new PrivilegedExceptionAction<Path>() { |
| public Path run() throws Exception { |
| return files.makeQualified(copy(sCopy, dst_work)); |
| }; |
| }); |
| unpack(new File(dTmp.toUri()), new File(dFinal.toUri())); |
| changePermissions(dFinal.getFileSystem(conf), dFinal); |
| files.rename(dst_work, destDirPath, Rename.OVERWRITE); |
| } catch (Exception e) { |
| try { files.delete(destDirPath, true); } catch (IOException ignore) { } |
| throw e; |
| } finally { |
| try { |
| files.delete(dst_work, true); |
| } catch (FileNotFoundException ignore) { } |
| // clear ref to internal var |
| rand = null; |
| conf = null; |
| resource = null; |
| } |
| return files.makeQualified(new Path(destDirPath, sCopy.getName())); |
| } |
| |
| /** |
| * Recursively change permissions of all files/dirs on path based |
| * on resource visibility. |
| * Change to 755 or 700 for dirs, 555 or 500 for files. |
| * @param fs FileSystem |
| * @param path Path to modify perms for |
| * @throws IOException |
| * @throws InterruptedException |
| */ |
| private void changePermissions(FileSystem fs, final Path path) |
| throws IOException, InterruptedException { |
| FileStatus fStatus = fs.getFileStatus(path); |
| FsPermission perm = cachePerms; |
| // set public perms as 755 or 555 based on dir or file |
| if (resource.getVisibility() == LocalResourceVisibility.PUBLIC) { |
| perm = fStatus.isDirectory() ? PUBLIC_DIR_PERMS : PUBLIC_FILE_PERMS; |
| } |
| // set private perms as 700 or 500 |
| else { |
| // PRIVATE: |
| // APPLICATION: |
| perm = fStatus.isDirectory() ? PRIVATE_DIR_PERMS : PRIVATE_FILE_PERMS; |
| } |
| LOG.debug("Changing permissions for path " + path |
| + " to perm " + perm); |
| final FsPermission fPerm = perm; |
| if (null == userUgi) { |
| files.setPermission(path, perm); |
| } |
| else { |
| userUgi.doAs(new PrivilegedExceptionAction<Void>() { |
| public Void run() throws Exception { |
| files.setPermission(path, fPerm); |
| return null; |
| } |
| }); |
| } |
| if (fStatus.isDirectory() |
| && !fStatus.isSymlink()) { |
| FileStatus[] statuses = fs.listStatus(path); |
| for (FileStatus status : statuses) { |
| changePermissions(fs, status.getPath()); |
| } |
| } |
| } |
| |
| } |