| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.tez.dag.app.rm.container; |
| |
| import java.io.IOException; |
| import java.nio.ByteBuffer; |
| import java.util.HashMap; |
| import java.util.List; |
| import java.util.Map; |
| import java.util.TreeMap; |
| import java.util.Map.Entry; |
| |
| import org.apache.commons.logging.Log; |
| import org.apache.commons.logging.LogFactory; |
| import org.apache.hadoop.fs.FileStatus; |
| import org.apache.hadoop.fs.FileSystem; |
| import org.apache.hadoop.fs.Path; |
| import org.apache.hadoop.io.DataOutputBuffer; |
| import org.apache.hadoop.security.Credentials; |
| import org.apache.hadoop.security.UserGroupInformation; |
| import org.apache.hadoop.security.token.Token; |
| import org.apache.hadoop.yarn.YarnRuntimeException; |
| import org.apache.hadoop.yarn.api.records.ApplicationAccessType; |
| import org.apache.hadoop.yarn.api.records.ContainerId; |
| import org.apache.hadoop.yarn.api.records.ContainerLaunchContext; |
| import org.apache.hadoop.yarn.api.records.LocalResource; |
| import org.apache.hadoop.yarn.api.records.LocalResourceType; |
| import org.apache.hadoop.yarn.api.records.LocalResourceVisibility; |
| import org.apache.hadoop.yarn.api.records.Resource; |
| import org.apache.hadoop.yarn.api.records.URL; |
| import org.apache.hadoop.yarn.util.ConverterUtils; |
| import org.apache.tez.dag.api.TezConfiguration; |
| import org.apache.tez.dag.app.AppContext; |
| import org.apache.tez.dag.app.TaskAttemptListener; |
| import org.apache.tez.dag.records.TezVertexID; |
| import org.apache.tez.dag.utils.TezEngineChildJVM; |
| import org.apache.tez.engine.common.security.JobTokenIdentifier; |
| import org.apache.tez.engine.common.security.TokenCache; |
| import org.apache.tez.engine.common.shuffle.server.ShuffleHandler; |
| |
| import com.google.common.annotations.VisibleForTesting; |
| |
| public class AMContainerHelpers { |
| |
| private static final Log LOG = LogFactory.getLog(AMContainerHelpers.class); |
| |
| private static Object commonContainerSpecLock = new Object(); |
| private static ContainerLaunchContext commonContainerSpec = null; |
| |
| /** |
| * Create a {@link LocalResource} record with all the given parameters. |
| */ |
| public static LocalResource createLocalResource(FileSystem fc, Path file, |
| LocalResourceType type, LocalResourceVisibility visibility) |
| throws IOException { |
| FileStatus fstat = fc.getFileStatus(file); |
| URL resourceURL = ConverterUtils.getYarnUrlFromPath(fc.resolvePath(fstat |
| .getPath())); |
| long resourceSize = fstat.getLen(); |
| long resourceModificationTime = fstat.getModificationTime(); |
| |
| return LocalResource.newInstance(resourceURL, type, visibility, |
| resourceSize, resourceModificationTime); |
| } |
| |
| /** |
| * Create the common {@link ContainerLaunchContext} for all attempts. |
| * |
| * @param applicationACLs |
| */ |
| private static ContainerLaunchContext createCommonContainerLaunchContext( |
| Map<ApplicationAccessType, String> applicationACLs, TezConfiguration conf, |
| Token<JobTokenIdentifier> jobToken, |
| TezVertexID vertexId, Credentials credentials, AppContext appContext) { |
| |
| // Application resources |
| Map<String, LocalResource> localResources = |
| new HashMap<String, LocalResource>(); |
| |
| // Application environment |
| Map<String, String> environment = new HashMap<String, String>(); |
| |
| // Service data |
| Map<String, ByteBuffer> serviceData = new HashMap<String, ByteBuffer>(); |
| |
| // Tokens |
| ByteBuffer taskCredentialsBuffer = ByteBuffer.wrap(new byte[] {}); |
| try { |
| // Setup up task credentials buffer |
| Credentials taskCredentials = new Credentials(); |
| |
| if (UserGroupInformation.isSecurityEnabled()) { |
| LOG.info("Adding #" + credentials.numberOfTokens() + " tokens and #" |
| + credentials.numberOfSecretKeys() |
| + " secret keys for NM use for launching container"); |
| taskCredentials.addAll(credentials); |
| } |
| |
| // LocalStorageToken is needed irrespective of whether security is enabled |
| // or not. |
| TokenCache.setJobToken(jobToken, taskCredentials); |
| |
| DataOutputBuffer containerTokens_dob = new DataOutputBuffer(); |
| LOG.info("Size of containertokens_dob is " |
| + taskCredentials.numberOfTokens()); |
| taskCredentials.writeTokenStorageToStream(containerTokens_dob); |
| taskCredentialsBuffer = ByteBuffer.wrap(containerTokens_dob.getData(), 0, |
| containerTokens_dob.getLength()); |
| |
| // Add shuffle token |
| LOG.info("Putting shuffle token in serviceData"); |
| serviceData.put(ShuffleHandler.MAPREDUCE_SHUFFLE_SERVICEID, |
| ShuffleHandler.serializeServiceData(jobToken)); |
| |
| } catch (IOException e) { |
| throw new YarnRuntimeException(e); |
| } |
| |
| // Construct the actual Container |
| // The null fields are per-container and will be constructed for each |
| // container separately. |
| ContainerLaunchContext container = |
| ContainerLaunchContext.newInstance(localResources, environment, null, |
| serviceData, taskCredentialsBuffer, applicationACLs); |
| return container; |
| } |
| |
| @VisibleForTesting |
| public static ContainerLaunchContext createContainerLaunchContext( |
| Map<ApplicationAccessType, String> acls, |
| ContainerId containerId, TezConfiguration conf, TezVertexID vertexId, |
| Token<JobTokenIdentifier> jobToken, |
| Resource assignedCapability, Map<String, LocalResource> localResources, |
| Map<String, String> vertexEnv, |
| String javaOpts, |
| TaskAttemptListener taskAttemptListener, Credentials credentials, |
| boolean shouldProfile, AppContext appContext) { |
| |
| synchronized (commonContainerSpecLock) { |
| if (commonContainerSpec == null) { |
| commonContainerSpec = createCommonContainerLaunchContext( |
| acls, conf, jobToken, vertexId, credentials, appContext); |
| } |
| } |
| |
| // Fill in the fields needed per-container that are missing in the common |
| // spec. |
| Map<String, LocalResource> lResources = |
| new TreeMap<String, LocalResource>(); |
| lResources.putAll(commonContainerSpec.getLocalResources()); |
| lResources.putAll(localResources); |
| |
| // Setup environment by cloning from common env. |
| Map<String, String> env = commonContainerSpec.getEnvironment(); |
| Map<String, String> myEnv = new HashMap<String, String>(env.size()); |
| myEnv.putAll(env); |
| myEnv.putAll(vertexEnv); |
| |
| // Set up the launch command |
| List<String> commands = TezEngineChildJVM.getVMCommand( |
| taskAttemptListener.getAddress(), conf, vertexId, containerId, |
| vertexId.getDAGId().getApplicationId(), shouldProfile, javaOpts); |
| |
| // Duplicate the ByteBuffers for access by multiple containers. |
| Map<String, ByteBuffer> myServiceData = new HashMap<String, ByteBuffer>(); |
| for (Entry<String, ByteBuffer> entry : commonContainerSpec.getServiceData() |
| .entrySet()) { |
| myServiceData.put(entry.getKey(), entry.getValue().duplicate()); |
| } |
| |
| // Construct the actual Container |
| ContainerLaunchContext container = |
| ContainerLaunchContext.newInstance(lResources, myEnv, commands, |
| myServiceData, commonContainerSpec.getTokens().duplicate(), acls); |
| |
| return container; |
| } |
| |
| } |