YARN-1254. Fixed NodeManager to not pollute container's credentials. Contributed by Omkar Vinit Joshi.
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1529382 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
fc23fd3121
commit
0a887a0910
|
@ -171,6 +171,9 @@ Release 2.1.2 - UNRELEASED
|
|||
YARN-1167. Fixed Distributed Shell to not incorrectly show empty hostname
|
||||
on RM UI. (Xuan Gong via vinodkv)
|
||||
|
||||
YARN-1254. Fixed NodeManager to not pollute container's credentials. (Omkar
|
||||
Vinit Joshi via vinodkv)
|
||||
|
||||
Release 2.1.1-beta - 2013-09-23
|
||||
|
||||
INCOMPATIBLE CHANGES
|
||||
|
|
|
@ -65,7 +65,6 @@ import org.apache.hadoop.yarn.server.nodemanager.api.protocolrecords.LocalizerHe
|
|||
import org.apache.hadoop.yarn.server.nodemanager.api.protocolrecords.LocalizerStatus;
|
||||
import org.apache.hadoop.yarn.server.nodemanager.api.protocolrecords.ResourceStatusType;
|
||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.security.LocalizerTokenIdentifier;
|
||||
import org.apache.hadoop.yarn.server.utils.YarnServerBuilderUtils;
|
||||
import org.apache.hadoop.yarn.util.ConverterUtils;
|
||||
import org.apache.hadoop.yarn.util.FSDownload;
|
||||
|
||||
|
@ -130,9 +129,12 @@ public class ContainerLocalizer {
|
|||
try {
|
||||
// assume credentials in cwd
|
||||
// TODO: Fix
|
||||
credFile = lfs.open(
|
||||
new Path(String.format(TOKEN_FILE_NAME_FMT, localizerId)));
|
||||
Path tokenPath =
|
||||
new Path(String.format(TOKEN_FILE_NAME_FMT, localizerId));
|
||||
credFile = lfs.open(tokenPath);
|
||||
creds.readTokenStorageStream(credFile);
|
||||
// Explicitly deleting token file.
|
||||
lfs.delete(tokenPath, false);
|
||||
} finally {
|
||||
if (credFile != null) {
|
||||
credFile.close();
|
||||
|
|
|
@ -1017,6 +1017,7 @@ public class ResourceLocalizationService extends CompositeService
|
|||
}
|
||||
}
|
||||
if (UserGroupInformation.isSecurityEnabled()) {
|
||||
credentials = new Credentials(credentials);
|
||||
LocalizerTokenIdentifier id = secretManager.createIdentifier();
|
||||
Token<LocalizerTokenIdentifier> localizerToken =
|
||||
new Token<LocalizerTokenIdentifier>(id, secretManager);
|
||||
|
|
|
@ -32,6 +32,7 @@ import static org.mockito.Mockito.doThrow;
|
|||
import static org.mockito.Mockito.mock;
|
||||
import static org.mockito.Mockito.never;
|
||||
import static org.mockito.Mockito.spy;
|
||||
import static org.mockito.Mockito.times;
|
||||
import static org.mockito.Mockito.verify;
|
||||
import static org.mockito.Mockito.when;
|
||||
|
||||
|
@ -46,6 +47,8 @@ import java.util.concurrent.CompletionService;
|
|||
import java.util.concurrent.ExecutorService;
|
||||
import java.util.concurrent.Future;
|
||||
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
import org.apache.hadoop.conf.Configuration;
|
||||
import org.apache.hadoop.fs.AbstractFileSystem;
|
||||
import org.apache.hadoop.fs.FSDataInputStream;
|
||||
|
@ -77,6 +80,7 @@ import org.mockito.stubbing.Answer;
|
|||
|
||||
public class TestContainerLocalizer {
|
||||
|
||||
static final Log LOG = LogFactory.getLog(TestContainerLocalizer.class);
|
||||
static final Path basedir =
|
||||
new Path("target", TestContainerLocalizer.class.getName());
|
||||
|
||||
|
@ -94,7 +98,10 @@ public class TestContainerLocalizer {
|
|||
|
||||
@Test
|
||||
public void testContainerLocalizerMain() throws Exception {
|
||||
ContainerLocalizer localizer = setupContainerLocalizerForTest();
|
||||
FileContext fs = FileContext.getLocalFSFileContext();
|
||||
spylfs = spy(fs.getDefaultFileSystem());
|
||||
ContainerLocalizer localizer =
|
||||
setupContainerLocalizerForTest();
|
||||
|
||||
// verify created cache
|
||||
List<Path> privCacheList = new ArrayList<Path>();
|
||||
|
@ -190,11 +197,25 @@ public class TestContainerLocalizer {
|
|||
}
|
||||
}));
|
||||
}
|
||||
|
||||
@Test
|
||||
@SuppressWarnings("unchecked")
|
||||
public void testLocalizerTokenIsGettingRemoved() throws Exception {
|
||||
FileContext fs = FileContext.getLocalFSFileContext();
|
||||
spylfs = spy(fs.getDefaultFileSystem());
|
||||
ContainerLocalizer localizer = setupContainerLocalizerForTest();
|
||||
doNothing().when(localizer).localizeFiles(any(LocalizationProtocol.class),
|
||||
any(CompletionService.class), any(UserGroupInformation.class));
|
||||
localizer.runLocalization(nmAddr);
|
||||
verify(spylfs, times(1)).delete(tokenPath, false);
|
||||
}
|
||||
|
||||
@Test
|
||||
@SuppressWarnings("unchecked") // mocked generics
|
||||
public void testContainerLocalizerClosesFilesystems() throws Exception {
|
||||
// verify filesystems are closed when localizer doesn't fail
|
||||
FileContext fs = FileContext.getLocalFSFileContext();
|
||||
spylfs = spy(fs.getDefaultFileSystem());
|
||||
ContainerLocalizer localizer = setupContainerLocalizerForTest();
|
||||
doNothing().when(localizer).localizeFiles(any(LocalizationProtocol.class),
|
||||
any(CompletionService.class), any(UserGroupInformation.class));
|
||||
|
@ -203,6 +224,7 @@ public class TestContainerLocalizer {
|
|||
localizer.runLocalization(nmAddr);
|
||||
verify(localizer).closeFileSystems(any(UserGroupInformation.class));
|
||||
|
||||
spylfs = spy(fs.getDefaultFileSystem());
|
||||
// verify filesystems are closed when localizer fails
|
||||
localizer = setupContainerLocalizerForTest();
|
||||
doThrow(new YarnRuntimeException("Forced Failure")).when(localizer).localizeFiles(
|
||||
|
@ -217,7 +239,6 @@ public class TestContainerLocalizer {
|
|||
@SuppressWarnings("unchecked") // mocked generics
|
||||
private ContainerLocalizer setupContainerLocalizerForTest()
|
||||
throws Exception {
|
||||
spylfs = spy(FileContext.getLocalFSFileContext().getDefaultFileSystem());
|
||||
// don't actually create dirs
|
||||
doNothing().when(spylfs).mkdir(
|
||||
isA(Path.class), isA(FsPermission.class), anyBoolean());
|
||||
|
@ -245,10 +266,10 @@ public class TestContainerLocalizer {
|
|||
containerId)));
|
||||
doReturn(new FSDataInputStream(new FakeFSDataInputStream(appTokens))
|
||||
).when(spylfs).open(tokenPath);
|
||||
|
||||
nmProxy = mock(LocalizationProtocol.class);
|
||||
doReturn(nmProxy).when(localizer).getProxy(nmAddr);
|
||||
doNothing().when(localizer).sleep(anyInt());
|
||||
|
||||
|
||||
// return result instantly for deterministic test
|
||||
ExecutorService syncExec = mock(ExecutorService.class);
|
||||
|
|
Loading…
Reference in New Issue