diff --git a/hadoop-maven-plugins/src/main/java/org/apache/hadoop/maven/plugin/cmakebuilder/TestMojo.java b/hadoop-maven-plugins/src/main/java/org/apache/hadoop/maven/plugin/cmakebuilder/TestMojo.java
index 6b441983999..95b6264ba60 100644
--- a/hadoop-maven-plugins/src/main/java/org/apache/hadoop/maven/plugin/cmakebuilder/TestMojo.java
+++ b/hadoop-maven-plugins/src/main/java/org/apache/hadoop/maven/plugin/cmakebuilder/TestMojo.java
@@ -78,6 +78,12 @@ public class TestMojo extends AbstractMojo {
@Parameter(defaultValue="600")
private int timeout;
+ /**
+ * The working directory to use.
+ */
+ @Parameter
+ private File workingDirectory;
+
/**
* Path to results directory.
*/
@@ -309,6 +315,9 @@ public class TestMojo extends AbstractMojo {
getLog().info(bld.toString());
ProcessBuilder pb = new ProcessBuilder(cmd);
Exec.addEnvironment(pb, env);
+ if (workingDirectory != null) {
+ pb.directory(workingDirectory);
+ }
pb.redirectError(new File(results, testName + ".stderr"));
pb.redirectOutput(new File(results, testName + ".stdout"));
getLog().info("with extra environment variables " + Exec.envToString(env));
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/pom.xml b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/pom.xml
index a1be7dc2bd2..b6148e709ca 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/pom.xml
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/pom.xml
@@ -216,6 +216,44 @@
${project.build.directory}/native-results
+
+ cetest
+ cmake-test
+ test
+
+
+ cetest
+ ${project.build.directory}/native/test
+
+ ${project.build.directory}/native/test/cetest
+
+ --gtest_filter=-Perf.
+ --gtest_output=xml:${project.build.directory}/surefire-reports/TEST-cetest.xml
+
+ ${project.build.directory}/surefire-reports
+
+
+
+
+
+ org.apache.maven.plugins
+ maven-antrun-plugin
+
+
+ make
+ compile
+
+ run
+
+
+
+
+
+
+
+
+
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/CMakeLists.txt b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/CMakeLists.txt
index 5b525360800..100d7ca7e09 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/CMakeLists.txt
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/CMakeLists.txt
@@ -19,6 +19,9 @@ cmake_minimum_required(VERSION 2.6 FATAL_ERROR)
list(APPEND CMAKE_MODULE_PATH ${CMAKE_SOURCE_DIR}/../../../../../hadoop-common-project/hadoop-common)
include(HadoopCommon)
+# Set gtest path
+set(GTEST_SRC_DIR ${CMAKE_SOURCE_DIR}/../../../../../hadoop-common-project/hadoop-common/src/main/native/gtest)
+
# determine if container-executor.conf.dir is an absolute
# path in case the OS we're compiling on doesn't have
# a hook in get_executable. We'll use this define
@@ -80,12 +83,20 @@ endfunction()
include_directories(
${CMAKE_CURRENT_SOURCE_DIR}
${CMAKE_BINARY_DIR}
+ ${GTEST_SRC_DIR}/include
main/native/container-executor
main/native/container-executor/impl
)
+# add gtest as system library to suppress gcc warnings
+include_directories(SYSTEM ${GTEST_SRC_DIR}/include)
+
configure_file(${CMAKE_SOURCE_DIR}/config.h.cmake ${CMAKE_BINARY_DIR}/config.h)
+add_library(gtest ${GTEST_SRC_DIR}/gtest-all.cc)
+set_target_properties(gtest PROPERTIES COMPILE_FLAGS "-w")
+
add_library(container
+ main/native/container-executor/impl/util.c
main/native/container-executor/impl/configuration.c
main/native/container-executor/impl/container-executor.c
main/native/container-executor/impl/get_executable.c
@@ -95,9 +106,11 @@ add_library(container
add_executable(container-executor
main/native/container-executor/impl/main.c
)
+
target_link_libraries(container-executor
container
)
+
output_directory(container-executor target/usr/local/bin)
add_executable(test-container-executor
@@ -107,3 +120,12 @@ target_link_libraries(test-container-executor
container ${EXTRA_LIBS}
)
output_directory(test-container-executor target/usr/local/bin)
+
+# unit tests for container executor
+add_executable(cetest
+ main/native/container-executor/impl/util.c
+ main/native/container-executor/test/test_configuration.cc
+ main/native/container-executor/test/test_main.cc
+ main/native/container-executor/test/test_util.cc)
+target_link_libraries(cetest gtest)
+output_directory(cetest test)
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.c b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.c
index 69ceaf6d4c0..12dbc4c5e4a 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.c
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.c
@@ -20,34 +20,55 @@
#include
#include "configuration.h"
-#include "container-executor.h"
+#include "util.h"
+#define __STDC_FORMAT_MACROS
#include
#include
#include
-#include
#include
#include
#include
-#include
-#include
#define MAX_SIZE 10
+static const char COMMENT_BEGIN_CHAR = '#';
+static const char SECTION_LINE_BEGIN_CHAR = '[';
+static const char SECTION_LINE_END_CHAR = ']';
+
+//clean up method for freeing section
+void free_section(struct section *section) {
+ int i = 0;
+ for (i = 0; i < section->size; i++) {
+ if (section->kv_pairs[i]->key != NULL) {
+ free((void *) section->kv_pairs[i]->key);
+ }
+ if (section->kv_pairs[i]->value != NULL) {
+ free((void *) section->kv_pairs[i]->value);
+ }
+ free(section->kv_pairs[i]);
+ }
+ if (section->kv_pairs) {
+ free(section->kv_pairs);
+ section->kv_pairs = NULL;
+ }
+ if (section->name) {
+ free(section->name);
+ section->name = NULL;
+ }
+ section->size = 0;
+}
+
//clean up method for freeing configuration
-void free_configurations(struct configuration *cfg) {
+void free_configuration(struct configuration *cfg) {
int i = 0;
for (i = 0; i < cfg->size; i++) {
- if (cfg->confdetails[i]->key != NULL) {
- free((void *)cfg->confdetails[i]->key);
+ if (cfg->sections[i] != NULL) {
+ free_section(cfg->sections[i]);
}
- if (cfg->confdetails[i]->value != NULL) {
- free((void *)cfg->confdetails[i]->value);
- }
- free(cfg->confdetails[i]);
}
- if (cfg->size > 0) {
- free(cfg->confdetails);
+ if (cfg->sections) {
+ free(cfg->sections);
}
cfg->size = 0;
}
@@ -64,13 +85,13 @@ static int is_only_root_writable(const char *file) {
}
if (file_stat.st_uid != 0) {
fprintf(ERRORFILE, "File %s must be owned by root, but is owned by %" PRId64 "\n",
- file, (int64_t)file_stat.st_uid);
+ file, (int64_t) file_stat.st_uid);
return 0;
}
if ((file_stat.st_mode & (S_IWGRP | S_IWOTH)) != 0) {
fprintf(ERRORFILE,
- "File %s must not be world or group writable, but is %03lo\n",
- file, (unsigned long)file_stat.st_mode & (~S_IFMT));
+ "File %s must not be world or group writable, but is %03lo\n",
+ file, (unsigned long) file_stat.st_mode & (~S_IFMT));
return 0;
}
return 1;
@@ -81,9 +102,9 @@ static int is_only_root_writable(const char *file) {
*
* NOTE: relative path names are resolved relative to the second argument not getwd(3)
*/
-char *resolve_config_path(const char* file_name, const char *root) {
+char *resolve_config_path(const char *file_name, const char *root) {
const char *real_fname = NULL;
- char buffer[EXECUTOR_PATH_MAX*2 + 1];
+ char buffer[EXECUTOR_PATH_MAX * 2 + 1];
if (file_name[0] == '/') {
real_fname = file_name;
@@ -95,7 +116,7 @@ char *resolve_config_path(const char* file_name, const char *root) {
#ifdef HAVE_CANONICALIZE_FILE_NAME
char * ret = (real_fname == NULL) ? NULL : canonicalize_file_name(real_fname);
#else
- char * ret = (real_fname == NULL) ? NULL : realpath(real_fname, NULL);
+ char *ret = (real_fname == NULL) ? NULL : realpath(real_fname, NULL);
#endif
#ifdef DEBUG
fprintf(stderr,"ret = %s\n", ret);
@@ -111,10 +132,19 @@ char *resolve_config_path(const char* file_name, const char *root) {
* configuration and potentially cause damage.
* returns 0 if permissions are ok
*/
-int check_configuration_permissions(const char* file_name) {
+int check_configuration_permissions(const char *file_name) {
+ if (!file_name) {
+ return -1;
+ }
+
// copy the input so that we can modify it with dirname
- char* dir = strdup(file_name);
- char* buffer = dir;
+ char *dir = strdup(file_name);
+ if (!dir) {
+ fprintf(stderr, "Failed to make a copy of filename in %s.\n", __func__);
+ return -1;
+ }
+
+ char *buffer = dir;
do {
if (!is_only_root_writable(dir)) {
free(buffer);
@@ -126,139 +156,397 @@ int check_configuration_permissions(const char* file_name) {
return 0;
}
+/**
+ * Read a line from the the config file and return it without the newline.
+ * The caller must free the memory allocated.
+ */
+static char *read_config_line(FILE *conf_file) {
+ char *line = NULL;
+ size_t linesize = 100000;
+ ssize_t size_read = 0;
+ size_t eol = 0;
-void read_config(const char* file_name, struct configuration *cfg) {
- FILE *conf_file;
- char *line;
- char *equaltok;
- char *temp_equaltok;
- size_t linesize = 1000;
- int size_read = 0;
-
- if (file_name == NULL) {
- fprintf(ERRORFILE, "Null configuration filename passed in\n");
- exit(INVALID_CONFIG_FILE);
+ line = (char *) malloc(linesize);
+ if (line == NULL) {
+ fprintf(ERRORFILE, "malloc failed while reading configuration file.\n");
+ exit(OUT_OF_MEMORY);
}
+ size_read = getline(&line, &linesize, conf_file);
- #ifdef DEBUG
- fprintf(LOGFILE, "read_config :Conf file name is : %s \n", file_name);
- #endif
-
- //allocate space for ten configuration items.
- cfg->confdetails = (struct confentry **) malloc(sizeof(struct confentry *)
- * MAX_SIZE);
- cfg->size = 0;
- conf_file = fopen(file_name, "r");
- if (conf_file == NULL) {
- fprintf(ERRORFILE, "Invalid conf file provided : %s \n", file_name);
- exit(INVALID_CONFIG_FILE);
+ //feof returns true only after we read past EOF.
+ //so a file with no new line, at last can reach this place
+ //if size_read returns negative check for eof condition
+ if (size_read == -1) {
+ free(line);
+ line = NULL;
+ if (!feof(conf_file)) {
+ fprintf(ERRORFILE, "Line read returned -1 without eof\n");
+ exit(INVALID_CONFIG_FILE);
+ }
+ } else {
+ eol = strlen(line) - 1;
+ if (line[eol] == '\n') {
+ //trim the ending new line
+ line[eol] = '\0';
+ }
}
- while(!feof(conf_file)) {
- line = (char *) malloc(linesize);
- if(line == NULL) {
- fprintf(ERRORFILE, "malloc failed while reading configuration file.\n");
+ return line;
+}
+
+/**
+ * Return if the given line is a comment line.
+ *
+ * @param line the line to check
+ *
+ * @return 1 if the line is a comment line, 0 otherwise
+ */
+static int is_comment_line(const char *line) {
+ if (line != NULL) {
+ return (line[0] == COMMENT_BEGIN_CHAR);
+ }
+ return 0;
+}
+
+/**
+ * Return if the given line is a section start line.
+ *
+ * @param line the line to check
+ *
+ * @return 1 if the line is a section start line, 0 otherwise
+ */
+static int is_section_start_line(const char *line) {
+ size_t len = 0;
+ if (line != NULL) {
+ len = strlen(line) - 1;
+ return (line[0] == SECTION_LINE_BEGIN_CHAR
+ && line[len] == SECTION_LINE_END_CHAR);
+ }
+ return 0;
+}
+
+/**
+ * Return the name of the section from the given section start line. The
+ * caller must free the memory used.
+ *
+ * @param line the line to extract the section name from
+ *
+ * @return string with the name of the section, NULL otherwise
+ */
+static char *get_section_name(const char *line) {
+ char *name = NULL;
+ size_t len;
+
+ if (is_section_start_line(line)) {
+ // length of the name is the line - 2(to account for '[' and ']')
+ len = strlen(line) - 2;
+ name = (char *) malloc(len + 1);
+ if (name == NULL) {
+ fprintf(ERRORFILE, "malloc failed while reading section name.\n");
exit(OUT_OF_MEMORY);
}
- size_read = getline(&line,&linesize,conf_file);
+ strncpy(name, line + sizeof(char), len);
+ name[len] = '\0';
+ }
+ return name;
+}
- //feof returns true only after we read past EOF.
- //so a file with no new line, at last can reach this place
- //if size_read returns negative check for eof condition
- if (size_read == -1) {
- free(line);
- if(!feof(conf_file)){
- exit(INVALID_CONFIG_FILE);
- } else {
- break;
- }
+/**
+ * Read an entry for the section from the line. Function returns 0 if an entry
+ * was found, non-zero otherwise. Return values less than 0 indicate an error
+ * with the config file.
+ *
+ * @param line the line to read the entry from
+ * @param section the struct to read the entry into
+ *
+ * @return 0 if an entry was found
+ * <0 for config file errors
+ * >0 for issues such as empty line
+ *
+ */
+static int read_section_entry(const char *line, struct section *section) {
+ char *equaltok;
+ char *temp_equaltok;
+ const char *splitter = "=";
+ char *buffer;
+ size_t len = 0;
+ if (line == NULL || section == NULL) {
+ fprintf(ERRORFILE, "NULL params passed to read_section_entry");
+ return -1;
+ }
+ len = strlen(line);
+ if (len == 0) {
+ return 1;
+ }
+ if ((section->size) % MAX_SIZE == 0) {
+ section->kv_pairs = (struct kv_pair **) realloc(
+ section->kv_pairs,
+ sizeof(struct kv_pair *) * (MAX_SIZE + section->size));
+ if (section->kv_pairs == NULL) {
+ fprintf(ERRORFILE,
+ "Failed re-allocating memory for configuration items\n");
+ exit(OUT_OF_MEMORY);
+ }
+ }
+
+ buffer = strdup(line);
+ if (!buffer) {
+ fprintf(ERRORFILE, "Failed to allocating memory for line, %s\n", __func__);
+ exit(OUT_OF_MEMORY);
+ }
+
+ //tokenize first to get key and list of values.
+ //if no equals is found ignore this line, can be an empty line also
+ equaltok = strtok_r(buffer, splitter, &temp_equaltok);
+ if (equaltok == NULL) {
+ fprintf(ERRORFILE, "Error with line '%s', no '=' found\n", buffer);
+ exit(INVALID_CONFIG_FILE);
+ }
+ section->kv_pairs[section->size] = (struct kv_pair *) malloc(
+ sizeof(struct kv_pair));
+ if (section->kv_pairs[section->size] == NULL) {
+ fprintf(ERRORFILE, "Failed allocating memory for single section item\n");
+ exit(OUT_OF_MEMORY);
+ }
+ memset(section->kv_pairs[section->size], 0,
+ sizeof(struct kv_pair));
+ section->kv_pairs[section->size]->key = trim(equaltok);
+
+ equaltok = strtok_r(NULL, splitter, &temp_equaltok);
+ if (equaltok == NULL) {
+ // this can happen because no value was set
+ // e.g. banned.users=#this is a comment
+ int has_values = 1;
+ if (strstr(line, splitter) == NULL) {
+ fprintf(ERRORFILE, "configuration tokenization failed, error with line %s\n", line);
+ has_values = 0;
+ }
+
+ // It is not a valid line, free memory.
+ free((void *) section->kv_pairs[section->size]->key);
+ free((void *) section->kv_pairs[section->size]);
+ section->kv_pairs[section->size] = NULL;
+ free(buffer);
+
+ // Return -1 when no values
+ if (!has_values) {
+ return -1;
+ }
+
+ // Return 2 for comments
+ return 2;
+ }
+
+#ifdef DEBUG
+ fprintf(LOGFILE, "read_config : Adding conf value : %s \n", equaltok);
+#endif
+
+ section->kv_pairs[section->size]->value = trim(equaltok);
+ section->size++;
+ free(buffer);
+ return 0;
+}
+
+/**
+ * Remove any trailing comment from the supplied line. Function modifies the
+ * argument provided.
+ *
+ * @param line the line from which to remove the comment
+ */
+static void trim_comment(char *line) {
+ char *begin_comment = NULL;
+ if (line != NULL) {
+ begin_comment = strchr(line, COMMENT_BEGIN_CHAR);
+ if (begin_comment != NULL) {
+ *begin_comment = '\0';
+ }
+ }
+}
+
+/**
+ * Allocate a section struct and initialize it. The memory must be freed by
+ * the caller. Function calls exit if any error occurs.
+ *
+ * @return pointer to the allocated section struct
+ *
+ */
+static struct section *allocate_section() {
+ struct section *section = (struct section *) malloc(sizeof(struct section));
+ if (section == NULL) {
+ fprintf(ERRORFILE, "malloc failed while allocating section.\n");
+ exit(OUT_OF_MEMORY);
+ }
+ section->name = NULL;
+ section->kv_pairs = NULL;
+ section->size = 0;
+ return section;
+}
+
+/**
+ * Populate the given section struct with fields from the config file.
+ *
+ * @param conf_file the file to read from
+ * @param section pointer to the section struct to populate
+ *
+ */
+static void populate_section_fields(FILE *conf_file, struct section *section) {
+ char *line;
+ long int offset = 0;
+ while (!feof(conf_file)) {
+ offset = ftell(conf_file);
+ line = read_config_line(conf_file);
+ if (line != NULL) {
+ if (!is_comment_line(line)) {
+ trim_comment(line);
+ if (!is_section_start_line(line)) {
+ if (section->name != NULL) {
+ if (read_section_entry(line, section) < 0) {
+ fprintf(ERRORFILE, "Error parsing line %s", line);
+ exit(INVALID_CONFIG_FILE);
+ }
+ } else {
+ fprintf(ERRORFILE, "Line '%s' doesn't belong to a section\n",
+ line);
+ exit(INVALID_CONFIG_FILE);
+ }
+ } else {
+ if (section->name == NULL) {
+ section->name = get_section_name(line);
+ if (strlen(section->name) == 0) {
+ fprintf(ERRORFILE, "Empty section name");
+ exit(INVALID_CONFIG_FILE);
+ }
+ } else {
+ // we've reached the next section
+ fseek(conf_file, offset, SEEK_SET);
+ free(line);
+ return;
+ }
+ }
+ }
+ free(line);
+ }
+ }
+}
+
+/**
+ * Read the section current section from the conf file. Section start is
+ * marked by lines of the form '[section-name]' and continue till the next
+ * section.
+ */
+static struct section *read_section(FILE *conf_file) {
+ struct section *section = allocate_section();
+ populate_section_fields(conf_file, section);
+ if (section->name == NULL) {
+ free_section(section);
+ section = NULL;
+ }
+ return section;
+}
+
+/**
+ * Merge two sections and free the second one after the merge, if desired.
+ * @param section1 the first section
+ * @param section2 the second section
+ * @param free_second_section free the second section if set
+ */
+static void merge_sections(struct section *section1, struct section *section2, const int free_second_section) {
+ int i = 0;
+ section1->kv_pairs = (struct kv_pair **) realloc(
+ section1->kv_pairs,
+ sizeof(struct kv_pair *) * (section1->size + section2->size));
+ if (section1->kv_pairs == NULL) {
+ fprintf(ERRORFILE,
+ "Failed re-allocating memory for configuration items\n");
+ exit(OUT_OF_MEMORY);
+ }
+ for (i = 0; i < section2->size; ++i) {
+ section1->kv_pairs[section1->size + i] = section2->kv_pairs[i];
+ }
+ section1->size += section2->size;
+ if (free_second_section) {
+ free(section2->name);
+ memset(section2, 0, sizeof(*section2));
+ free(section2);
+ }
+}
+
+int read_config(const char *file_path, struct configuration *cfg) {
+ FILE *conf_file;
+
+ if (file_path == NULL) {
+ fprintf(ERRORFILE, "Null configuration filename passed in\n");
+ return INVALID_CONFIG_FILE;
+ }
+
+#ifdef DEBUG
+ fprintf(LOGFILE, "read_config :Conf file name is : %s \n", file_path);
+#endif
+
+ cfg->size = 0;
+ conf_file = fopen(file_path, "r");
+ if (conf_file == NULL) {
+ fprintf(ERRORFILE, "Invalid conf file provided, unable to open file"
+ " : %s \n", file_path);
+ return (INVALID_CONFIG_FILE);
+ }
+
+ cfg->sections = (struct section **) malloc(
+ sizeof(struct section *) * MAX_SIZE);
+ if (!cfg->sections) {
+ fprintf(ERRORFILE,
+ "Failed to allocate memory for configuration sections\n");
+ exit(OUT_OF_MEMORY);
+ }
+
+ // populate any entries in the older format(no sections)
+ cfg->sections[cfg->size] = allocate_section();
+ cfg->sections[cfg->size]->name = strdup("");
+ populate_section_fields(conf_file, cfg->sections[cfg->size]);
+ if (cfg->sections[cfg->size]) {
+ if (cfg->sections[cfg->size]->size) {
+ cfg->size++;
+ } else {
+ free_section(cfg->sections[cfg->size]);
+ }
+ }
+
+ // populate entries in the sections format
+ while (!feof(conf_file)) {
+ cfg->sections[cfg->size] = NULL;
+ struct section *new_section = read_section(conf_file);
+ if (new_section != NULL) {
+ struct section *existing_section =
+ get_configuration_section(new_section->name, cfg);
+ if (existing_section != NULL) {
+ merge_sections((struct section *) existing_section, new_section, 1);
+ } else {
+ cfg->sections[cfg->size] = new_section;
+ }
+ }
+
+ // Check if we need to expand memory for sections.
+ if (cfg->sections[cfg->size]) {
+ if ((cfg->size + 1) % MAX_SIZE == 0) {
+ cfg->sections = (struct section **) realloc(cfg->sections,
+ sizeof(struct sections *) * (MAX_SIZE + cfg->size));
+ if (cfg->sections == NULL) {
+ fprintf(ERRORFILE,
+ "Failed re-allocating memory for configuration items\n");
+ exit(OUT_OF_MEMORY);
+ }
+ }
+ cfg->size++;
}
- int eol = strlen(line) - 1;
- if(line[eol] == '\n') {
- //trim the ending new line
- line[eol] = '\0';
- }
- //comment line
- if(line[0] == '#') {
- free(line);
- continue;
- }
- //tokenize first to get key and list of values.
- //if no equals is found ignore this line, can be an empty line also
- equaltok = strtok_r(line, "=", &temp_equaltok);
- if(equaltok == NULL) {
- free(line);
- continue;
- }
- cfg->confdetails[cfg->size] = (struct confentry *) malloc(
- sizeof(struct confentry));
- if(cfg->confdetails[cfg->size] == NULL) {
- fprintf(LOGFILE,
- "Failed allocating memory for single configuration item\n");
- goto cleanup;
- }
-
- #ifdef DEBUG
- fprintf(LOGFILE, "read_config : Adding conf key : %s \n", equaltok);
- #endif
-
- memset(cfg->confdetails[cfg->size], 0, sizeof(struct confentry));
- cfg->confdetails[cfg->size]->key = (char *) malloc(
- sizeof(char) * (strlen(equaltok)+1));
- strcpy((char *)cfg->confdetails[cfg->size]->key, equaltok);
- equaltok = strtok_r(NULL, "=", &temp_equaltok);
- if (equaltok == NULL) {
- fprintf(LOGFILE, "configuration tokenization failed \n");
- goto cleanup;
- }
- //means value is commented so don't store the key
- if(equaltok[0] == '#') {
- free(line);
- free((void *)cfg->confdetails[cfg->size]->key);
- free(cfg->confdetails[cfg->size]);
- continue;
- }
-
- #ifdef DEBUG
- fprintf(LOGFILE, "read_config : Adding conf value : %s \n", equaltok);
- #endif
-
- cfg->confdetails[cfg->size]->value = (char *) malloc(
- sizeof(char) * (strlen(equaltok)+1));
- strcpy((char *)cfg->confdetails[cfg->size]->value, equaltok);
- if((cfg->size + 1) % MAX_SIZE == 0) {
- cfg->confdetails = (struct confentry **) realloc(cfg->confdetails,
- sizeof(struct confentry **) * (MAX_SIZE + cfg->size));
- if (cfg->confdetails == NULL) {
- fprintf(LOGFILE,
- "Failed re-allocating memory for configuration items\n");
- goto cleanup;
- }
- }
- if(cfg->confdetails[cfg->size]) {
- cfg->size++;
- }
-
- free(line);
}
- //close the file
fclose(conf_file);
if (cfg->size == 0) {
- fprintf(ERRORFILE, "Invalid configuration provided in %s\n", file_name);
- exit(INVALID_CONFIG_FILE);
+ free_configuration(cfg);
+ fprintf(ERRORFILE, "Invalid configuration provided in %s\n", file_path);
+ return INVALID_CONFIG_FILE;
}
-
- //clean up allocated file name
- return;
- //free spaces alloced.
- cleanup:
- if (line != NULL) {
- free(line);
- }
- fclose(conf_file);
- free_configurations(cfg);
- return;
+ return 0;
}
/*
@@ -267,11 +555,14 @@ void read_config(const char* file_name, struct configuration *cfg) {
* array, next time onwards used the populated array.
*
*/
-char * get_value(const char* key, struct configuration *cfg) {
+char *get_section_value(const char *key, const struct section *section) {
int count;
- for (count = 0; count < cfg->size; count++) {
- if (strcmp(cfg->confdetails[count]->key, key) == 0) {
- return strdup(cfg->confdetails[count]->value);
+ if (key == NULL || section == NULL) {
+ return NULL;
+ }
+ for (count = 0; count < section->size; count++) {
+ if (strcmp(section->kv_pairs[count]->key, key) == 0) {
+ return strdup(section->kv_pairs[count]->value);
}
}
return NULL;
@@ -281,61 +572,80 @@ char * get_value(const char* key, struct configuration *cfg) {
* Function to return an array of values for a key.
* Value delimiter is assumed to be a ','.
*/
-char ** get_values(const char * key, struct configuration *cfg) {
- char *value = get_value(key, cfg);
- return extract_values_delim(value, ",");
+char **get_section_values(const char *key, const struct section *cfg) {
+ return get_section_values_delimiter(key, cfg, ",");
}
/**
* Function to return an array of values for a key, using the specified
delimiter.
*/
-char ** get_values_delim(const char * key, struct configuration *cfg,
- const char *delim) {
- char *value = get_value(key, cfg);
- return extract_values_delim(value, delim);
+char **get_section_values_delimiter(const char *key, const struct section *cfg,
+ const char *delim) {
+ if (key == NULL || cfg == NULL || delim == NULL) {
+ return NULL;
+ }
+ char *value = get_section_value(key, cfg);
+ char **split_values = split_delimiter(value, delim);
+
+ if (value) {
+ free(value);
+ }
+
+ return split_values;
}
-char ** extract_values_delim(char *value, const char *delim) {
- char ** toPass = NULL;
- char *tempTok = NULL;
- char *tempstr = NULL;
- int size = 0;
- int toPassSize = MAX_SIZE;
- //first allocate any array of 10
- if(value != NULL) {
- toPass = (char **) malloc(sizeof(char *) * toPassSize);
- tempTok = strtok_r((char *)value, delim, &tempstr);
- while (tempTok != NULL) {
- toPass[size++] = tempTok;
- if(size == toPassSize) {
- toPassSize += MAX_SIZE;
- toPass = (char **) realloc(toPass,(sizeof(char *) * toPassSize));
- }
- tempTok = strtok_r(NULL, delim, &tempstr);
+char *get_configuration_value(const char *key, const char *section,
+ const struct configuration *cfg) {
+ const struct section *section_ptr;
+ if (key == NULL || section == NULL || cfg == NULL) {
+ return NULL;
+ }
+ section_ptr = get_configuration_section(section, cfg);
+ if (section_ptr != NULL) {
+ return get_section_value(key, section_ptr);
+ }
+ return NULL;
+}
+
+char **get_configuration_values(const char *key, const char *section,
+ const struct configuration *cfg) {
+ const struct section *section_ptr;
+ if (key == NULL || section == NULL || cfg == NULL) {
+ return NULL;
+ }
+ section_ptr = get_configuration_section(section, cfg);
+ if (section_ptr != NULL) {
+ return get_section_values(key, section_ptr);
+ }
+ return NULL;
+}
+
+char **get_configuration_values_delimiter(const char *key, const char *section,
+ const struct configuration *cfg, const char *delim) {
+ const struct section *section_ptr;
+ if (key == NULL || section == NULL || cfg == NULL || delim == NULL) {
+ return NULL;
+ }
+ section_ptr = get_configuration_section(section, cfg);
+ if (section_ptr != NULL) {
+ return get_section_values_delimiter(key, section_ptr, delim);
+ }
+ return NULL;
+}
+
+struct section *get_configuration_section(const char *section,
+ const struct configuration *cfg) {
+ int i = 0;
+ if (cfg == NULL || section == NULL) {
+ return NULL;
+ }
+ for (i = 0; i < cfg->size; ++i) {
+ if (strcmp(cfg->sections[i]->name, section) == 0) {
+ return cfg->sections[i];
}
}
- if (toPass != NULL) {
- toPass[size] = NULL;
- }
- return toPass;
-}
-
-/**
- * Extracts array of values from the '%' separated list of values.
- */
-char ** extract_values(char *value) {
- return extract_values_delim(value, "%");
-}
-
-// free an entry set of values
-void free_values(char** values) {
- if (*values != NULL) {
- free(*values);
- }
- if (values != NULL) {
- free(values);
- }
+ return NULL;
}
/**
@@ -346,12 +656,12 @@ int get_kv_key(const char *input, char *out, size_t out_len) {
if (input == NULL)
return -EINVAL;
- char *split = strchr(input, '=');
+ const char *split = strchr(input, '=');
if (split == NULL)
return -EINVAL;
- int key_len = split - input;
+ unsigned long key_len = split - input;
if (out_len < (key_len + 1) || out == NULL)
return -ENAMETOOLONG;
@@ -370,13 +680,13 @@ int get_kv_value(const char *input, char *out, size_t out_len) {
if (input == NULL)
return -EINVAL;
- char *split = strchr(input, '=');
+ const char *split = strchr(input, '=');
if (split == NULL)
return -EINVAL;
split++; // advance past '=' to the value
- int val_len = (input + strlen(input)) - split;
+ unsigned long val_len = (input + strlen(input)) - split;
if (out_len < (val_len + 1) || out == NULL)
return -ENAMETOOLONG;
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.h b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.h
index eced13b0b47..1ea5561bc7f 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.h
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/configuration.h
@@ -16,6 +16,9 @@
* limitations under the License.
*/
+#ifndef __YARN_CONTAINER_EXECUTOR_CONFIG_H__
+#define __YARN_CONTAINER_EXECUTOR_CONFIG_H__
+
#ifdef __FreeBSD__
#define _WITH_GETLINE
#endif
@@ -23,62 +26,160 @@
#include
/** Define a platform-independent constant instead of using PATH_MAX */
-
#define EXECUTOR_PATH_MAX 4096
-/**
- * Ensure that the configuration file and all of the containing directories
- * are only writable by root. Otherwise, an attacker can change the
- * configuration and potentially cause damage.
- * returns 0 if permissions are ok
- */
-int check_configuration_permissions(const char* file_name);
-
-/**
- * Return a string with the configuration file path name resolved via realpath(3)
- *
- * NOTE: relative path names are resolved relative to the second argument not getwd(3)
- */
-char *resolve_config_path(const char* file_name, const char *root);
-
-// Config data structures.
-struct confentry {
+// Configuration data structures.
+struct kv_pair {
const char *key;
const char *value;
};
-struct configuration {
+struct section {
int size;
- struct confentry **confdetails;
+ char *name;
+ struct kv_pair **kv_pairs;
};
-// read the given configuration file into the specified config struct.
-void read_config(const char* config_file, struct configuration *cfg);
-
-//method exposed to get the configurations
-char *get_value(const char* key, struct configuration *cfg);
-
-//function to return array of values pointing to the key. Values are
-//comma seperated strings.
-char ** get_values(const char* key, struct configuration *cfg);
+struct configuration {
+ int size;
+ struct section **sections;
+};
/**
- * Function to return an array of values for a key, using the specified
- delimiter.
+ * Function to ensure that the configuration file and all of the containing
+ * directories are only writable by root. Otherwise, an attacker can change
+ * the configuration and potentially cause damage.
+ *
+ * @param file_name name of the config file
+ *
+ * @returns 0 if permissions are correct, non-zero on error
*/
-char ** get_values_delim(const char * key, struct configuration *cfg,
+int check_configuration_permissions(const char *file_name);
+
+/**
+ * Return a string with the configuration file path name resolved via
+ * realpath(3). Relative path names are resolved relative to the second
+ * argument and not getwd(3). It's up to the caller to free the returned
+ * value.
+ *
+ * @param file_name name of the config file
+ * @param root the path against which relative path names are to be resolved
+ *
+ * @returns the resolved configuration file path
+ */
+char* resolve_config_path(const char *file_name, const char *root);
+
+/**
+ * Read the given configuration file into the specified configuration struct.
+ * It's the responsibility of the caller to call free_configurations to free
+ * the allocated memory. The function will check to ensure that the
+ * configuration file has the appropriate owner and permissions.
+ *
+ * @param file_path name of the configuration file to be read
+ * @param cfg the configuration structure to be filled.
+ *
+ * @return 0 on success, non-zero if there was an error
+ */
+int read_config(const char *file_path, struct configuration *cfg);
+
+/**
+ * Get the value for a key in the specified section. It's up to the caller to
+ * free the memory used for storing the return value.
+ *
+ * @param key key the name of the key
+ * @param section the section to be looked up
+ *
+ * @return pointer to the value if the key was found, null otherwise
+ */
+char* get_section_value(const char *key, const struct section *section);
+
+/**
+ * Function to get the values for a given key in the specified section.
+ * The value is split by ",". It's up to the caller to free the memory used
+ * for storing the return values.
+ *
+ * @param key the key to be looked up
+ * @param section the section to be looked up
+ *
+ * @return array of values, null if the key was not found
+ */
+char** get_section_values(const char *key, const struct section *section);
+
+/**
+ * Function to get the values for a given key in the specified section.
+ * The value is split by the specified delimiter. It's up to the caller to
+ * free the memory used for storing the return values.
+ *
+ * @param key the key to be looked up
+ * @param section the section to be looked up
+ * @param delimiter the delimiter to be used to split the value
+ *
+ * @return array of values, null if the key was not found
+ */
+char** get_section_values_delimiter(const char *key, const struct section *section,
const char *delim);
-// Extracts array of values from the comma separated list of values.
-char ** extract_values(char *value);
+/**
+ * Get the value for a key in the specified section in the specified
+ * configuration. It's up to the caller to free the memory used for storing
+ * the return value.
+ *
+ * @param key key the name of the key
+ * @param section the name section to be looked up
+ * @param cfg the configuration to be used
+ *
+ * @return pointer to the value if the key was found, null otherwise
+ */
+char* get_configuration_value(const char *key, const char* section,
+ const struct configuration *cfg);
-char ** extract_values_delim(char *value, const char *delim);
+/**
+ * Function to get the values for a given key in the specified section in the
+ * specified configuration. The value is split by ",". It's up to the caller to
+ * free the memory used for storing the return values.
+ *
+ * @param key the key to be looked up
+ * @param section the name of the section to be looked up
+ * @param cfg the configuration to be looked up
+ *
+ * @return array of values, null if the key was not found
+ */
+char** get_configuration_values(const char *key, const char* section,
+ const struct configuration *cfg);
-// free the memory returned by get_values
-void free_values(char** values);
+/**
+ * Function to get the values for a given key in the specified section in the
+ * specified configuration. The value is split by the specified delimiter.
+ * It's up to the caller to free the memory used for storing the return values.
+ *
+ * @param key the key to be looked up
+ * @param section the name of the section to be looked up
+ * @param cfg the section to be looked up
+ * @param delimiter the delimiter to be used to split the value
+ *
+ * @return array of values, null if the key was not found
+ */
+char** get_configuration_values_delimiter(const char *key, const char* section,
+ const struct configuration *cfg, const char *delimiter);
-//method to free allocated configuration
-void free_configurations(struct configuration *cfg);
+/**
+ * Function to retrieve the specified section from the configuration.
+ *
+ * @param section the name of the section to retrieve
+ * @param cfg the configuration structure to use
+ *
+ * @return pointer to section struct containing details of the section
+ * null on error
+ */
+struct section* get_configuration_section(const char *section,
+ const struct configuration *cfg);
+
+/**
+ * Method to free an allocated config struct.
+ *
+ * @param cfg pointer to the structure to free
+ */
+void free_configuration(struct configuration *cfg);
/**
* If str is a string of the form key=val, find 'key'
@@ -105,3 +206,5 @@ int get_kv_key(const char *input, char *out, size_t out_len);
* 0 on success
*/
int get_kv_value(const char *input, char *out, size_t out_len);
+
+#endif
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.c b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.c
index 9aea2a44abd..36b1648180f 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.c
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.c
@@ -19,6 +19,8 @@
#include "configuration.h"
#include "container-executor.h"
#include "utils/string-utils.h"
+#include "util.h"
+#include "config.h"
#include
#include
@@ -43,8 +45,6 @@
#include
#include
-#include "config.h"
-
#ifndef HAVE_FCHMODAT
#include "compat/fchmodat.h"
#endif
@@ -92,7 +92,8 @@ FILE* ERRORFILE = NULL;
static uid_t nm_uid = -1;
static gid_t nm_gid = -1;
-struct configuration executor_cfg = {.size=0, .confdetails=NULL};
+struct configuration CFG = {.size=0, .sections=NULL};
+struct section executor_cfg = {.size=0, .kv_pairs=NULL};
char *concatenate(char *concat_pattern, char *return_path_name,
int numArgs, ...);
@@ -103,18 +104,25 @@ void set_nm_uid(uid_t user, gid_t group) {
}
//function used to load the configurations present in the secure config
-void read_executor_config(const char* file_name) {
- read_config(file_name, &executor_cfg);
+void read_executor_config(const char *file_name) {
+ const struct section *tmp = NULL;
+ int ret = read_config(file_name, &CFG);
+ if (ret == 0) {
+ tmp = get_configuration_section("", &CFG);
+ if (tmp != NULL) {
+ executor_cfg = *tmp;
+ }
+ }
}
//function used to free executor configuration data
void free_executor_configurations() {
- free_configurations(&executor_cfg);
+ free_configuration(&CFG);
}
//Lookup nodemanager group from container executor configuration.
char *get_nodemanager_group() {
- return get_value(NM_GROUP_KEY, &executor_cfg);
+ return get_section_value(NM_GROUP_KEY, &executor_cfg);
}
int check_executor_permissions(char *executable_file) {
@@ -431,8 +439,8 @@ int change_user(uid_t user, gid_t group) {
}
int is_feature_enabled(const char* feature_key, int default_value,
- struct configuration *cfg) {
- char *enabled_str = get_value(feature_key, cfg);
+ struct section *cfg) {
+ char *enabled_str = get_section_value(feature_key, cfg);
int enabled = default_value;
if (enabled_str != NULL) {
@@ -753,7 +761,7 @@ static struct passwd* get_user_info(const char* user) {
}
int is_whitelisted(const char *user) {
- char **whitelist = get_values(ALLOWED_SYSTEM_USERS_KEY, &executor_cfg);
+ char **whitelist = get_section_values(ALLOWED_SYSTEM_USERS_KEY, &executor_cfg);
char **users = whitelist;
if (whitelist != NULL) {
for(; *users; ++users) {
@@ -781,7 +789,7 @@ struct passwd* check_user(const char *user) {
fflush(LOGFILE);
return NULL;
}
- char *min_uid_str = get_value(MIN_USERID_KEY, &executor_cfg);
+ char *min_uid_str = get_section_value(MIN_USERID_KEY, &executor_cfg);
int min_uid = DEFAULT_MIN_USERID;
if (min_uid_str != NULL) {
char *end_ptr = NULL;
@@ -808,7 +816,7 @@ struct passwd* check_user(const char *user) {
free(user_info);
return NULL;
}
- char **banned_users = get_values(BANNED_USERS_KEY, &executor_cfg);
+ char **banned_users = get_section_values(BANNED_USERS_KEY, &executor_cfg);
banned_users = banned_users == NULL ?
(char**) DEFAULT_BANNED_USERS : banned_users;
char **banned_user = banned_users;
@@ -1194,7 +1202,6 @@ char** tokenize_docker_command(const char *input, int *split_counter) {
char *line = (char *)calloc(strlen(input) + 1, sizeof(char));
char **linesplit = (char **) malloc(sizeof(char *));
char *p = NULL;
- int c = 0;
*split_counter = 0;
strncpy(line, input, strlen(input));
@@ -1412,13 +1419,13 @@ char* parse_docker_command_file(const char* command_file) {
int run_docker(const char *command_file) {
char* docker_command = parse_docker_command_file(command_file);
- char* docker_binary = get_value(DOCKER_BINARY_KEY, &executor_cfg);
+ char* docker_binary = get_section_value(DOCKER_BINARY_KEY, &executor_cfg);
docker_binary = check_docker_binary(docker_binary);
size_t command_size = MIN(sysconf(_SC_ARG_MAX), 128*1024);
char* docker_command_with_binary = calloc(sizeof(char), command_size);
snprintf(docker_command_with_binary, command_size, "%s %s", docker_binary, docker_command);
- char **args = extract_values_delim(docker_command_with_binary, " ");
+ char **args = split_delimiter(docker_command_with_binary, " ");
int exit_code = -1;
if (execvp(docker_binary, args) != 0) {
@@ -1587,7 +1594,7 @@ int launch_docker_container_as_user(const char * user, const char *app_id,
uid_t prev_uid = geteuid();
char *docker_command = parse_docker_command_file(command_file);
- char *docker_binary = get_value(DOCKER_BINARY_KEY, &executor_cfg);
+ char *docker_binary = get_section_value(DOCKER_BINARY_KEY, &executor_cfg);
docker_binary = check_docker_binary(docker_binary);
fprintf(LOGFILE, "Creating script paths...\n");
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.h b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.h
index 7478056d645..76a832f5581 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.h
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/container-executor.h
@@ -35,51 +35,6 @@ enum command {
LIST_AS_USER = 5
};
-enum errorcodes {
- INVALID_ARGUMENT_NUMBER = 1,
- //INVALID_USER_NAME 2
- INVALID_COMMAND_PROVIDED = 3,
- // SUPER_USER_NOT_ALLOWED_TO_RUN_TASKS (NOT USED) 4
- INVALID_NM_ROOT_DIRS = 5,
- SETUID_OPER_FAILED, //6
- UNABLE_TO_EXECUTE_CONTAINER_SCRIPT, //7
- UNABLE_TO_SIGNAL_CONTAINER, //8
- INVALID_CONTAINER_PID, //9
- // ERROR_RESOLVING_FILE_PATH (NOT_USED) 10
- // RELATIVE_PATH_COMPONENTS_IN_FILE_PATH (NOT USED) 11
- // UNABLE_TO_STAT_FILE (NOT USED) 12
- // FILE_NOT_OWNED_BY_ROOT (NOT USED) 13
- // PREPARE_CONTAINER_DIRECTORIES_FAILED (NOT USED) 14
- // INITIALIZE_CONTAINER_FAILED (NOT USED) 15
- // PREPARE_CONTAINER_LOGS_FAILED (NOT USED) 16
- // INVALID_LOG_DIR (NOT USED) 17
- OUT_OF_MEMORY = 18,
- // INITIALIZE_DISTCACHEFILE_FAILED (NOT USED) 19
- INITIALIZE_USER_FAILED = 20,
- PATH_TO_DELETE_IS_NULL, //21
- INVALID_CONTAINER_EXEC_PERMISSIONS, //22
- // PREPARE_JOB_LOGS_FAILED (NOT USED) 23
- INVALID_CONFIG_FILE = 24,
- SETSID_OPER_FAILED = 25,
- WRITE_PIDFILE_FAILED = 26,
- WRITE_CGROUP_FAILED = 27,
- TRAFFIC_CONTROL_EXECUTION_FAILED = 28,
- DOCKER_RUN_FAILED = 29,
- ERROR_OPENING_DOCKER_FILE = 30,
- ERROR_READING_DOCKER_FILE = 31,
- FEATURE_DISABLED = 32,
- COULD_NOT_CREATE_SCRIPT_COPY = 33,
- COULD_NOT_CREATE_CREDENTIALS_FILE = 34,
- COULD_NOT_CREATE_WORK_DIRECTORIES = 35,
- COULD_NOT_CREATE_APP_LOG_DIRECTORIES = 36,
- COULD_NOT_CREATE_TMP_DIRECTORIES = 37,
- ERROR_CREATE_CONTAINER_DIRECTORIES_ARGUMENTS = 38,
- ERROR_SANITIZING_DOCKER_COMMAND = 39,
- DOCKER_IMAGE_INVALID = 40,
- DOCKER_CONTAINER_NAME_INVALID = 41,
- ERROR_COMPILING_REGEX = 42
-};
-
enum operations {
CHECK_SETUP = 1,
MOUNT_CGROUPS = 2,
@@ -119,11 +74,6 @@ enum operations {
extern struct passwd *user_detail;
-// the log file for messages
-extern FILE *LOGFILE;
-// the log file for error messages
-extern FILE *ERRORFILE;
-
// get the executable's filename
char* get_executable(char *argv0);
@@ -284,7 +234,7 @@ int create_validate_dir(const char* npath, mode_t perm, const char* path,
/** Check if a feature is enabled in the specified configuration. */
int is_feature_enabled(const char* feature_key, int default_value,
- struct configuration *cfg);
+ struct section *cfg);
/** Check if tc (traffic control) support is enabled in configuration. */
int is_tc_support_enabled();
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/get_executable.c b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/get_executable.c
index ce46b776fd8..55973a2db57 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/get_executable.c
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/get_executable.c
@@ -31,6 +31,7 @@
#include "config.h"
#include "configuration.h"
#include "container-executor.h"
+#include "util.h"
#include
#include
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/main.c b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/main.c
index 47bb3b9a243..239eb128e22 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/main.c
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/main.c
@@ -19,6 +19,7 @@
#include "config.h"
#include "configuration.h"
#include "container-executor.h"
+#include "util.h"
#include
#include
@@ -419,7 +420,7 @@ static int validate_run_as_user_commands(int argc, char **argv, int *operation)
cmd_input.resources_key = resources_key;
cmd_input.resources_value = resources_value;
- cmd_input.resources_values = extract_values(resources_value);
+ cmd_input.resources_values = split(resources_value);
*operation = RUN_AS_USER_LAUNCH_DOCKER_CONTAINER;
return 0;
} else {
@@ -470,7 +471,7 @@ static int validate_run_as_user_commands(int argc, char **argv, int *operation)
cmd_input.resources_key = resources_key;
cmd_input.resources_value = resources_value;
- cmd_input.resources_values = extract_values(resources_value);
+ cmd_input.resources_values = split(resources_value);
*operation = RUN_AS_USER_LAUNCH_CONTAINER;
return 0;
@@ -564,8 +565,8 @@ int main(int argc, char **argv) {
exit_code = initialize_app(cmd_input.yarn_user_name,
cmd_input.app_id,
cmd_input.cred_file,
- extract_values(cmd_input.local_dirs),
- extract_values(cmd_input.log_dirs),
+ split(cmd_input.local_dirs),
+ split(cmd_input.log_dirs),
argv + optind);
break;
case RUN_AS_USER_LAUNCH_DOCKER_CONTAINER:
@@ -590,8 +591,8 @@ int main(int argc, char **argv) {
cmd_input.script_file,
cmd_input.cred_file,
cmd_input.pid_file,
- extract_values(cmd_input.local_dirs),
- extract_values(cmd_input.log_dirs),
+ split(cmd_input.local_dirs),
+ split(cmd_input.log_dirs),
cmd_input.docker_command_file,
cmd_input.resources_key,
cmd_input.resources_values);
@@ -618,8 +619,8 @@ int main(int argc, char **argv) {
cmd_input.script_file,
cmd_input.cred_file,
cmd_input.pid_file,
- extract_values(cmd_input.local_dirs),
- extract_values(cmd_input.log_dirs),
+ split(cmd_input.local_dirs),
+ split(cmd_input.log_dirs),
cmd_input.resources_key,
cmd_input.resources_values);
free(cmd_input.resources_key);
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/util.c b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/util.c
new file mode 100644
index 00000000000..8e39ca85760
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/util.c
@@ -0,0 +1,134 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include "util.h"
+#include
+#include
+#include
+#include
+
+char** split_delimiter(char *value, const char *delim) {
+ char **return_values = NULL;
+ char *temp_tok = NULL;
+ char *tempstr = NULL;
+ int size = 0;
+ int per_alloc_size = 10;
+ int return_values_size = per_alloc_size;
+ int failed = 0;
+
+ //first allocate any array of 10
+ if(value != NULL) {
+ return_values = (char **) malloc(sizeof(char *) * return_values_size);
+ if (!return_values) {
+ fprintf(ERRORFILE, "Allocation error for return_values in %s.\n",
+ __func__);
+ failed = 1;
+ goto cleanup;
+ }
+ memset(return_values, 0, sizeof(char *) * return_values_size);
+
+ temp_tok = strtok_r(value, delim, &tempstr);
+ while (temp_tok != NULL) {
+ temp_tok = strdup(temp_tok);
+ if (NULL == temp_tok) {
+ fprintf(ERRORFILE, "Allocation error in %s.\n", __func__);
+ failed = 1;
+ goto cleanup;
+ }
+
+ return_values[size++] = temp_tok;
+
+ // Make sure returned values has enough space for the trailing NULL.
+ if (size >= return_values_size - 1) {
+ return_values_size += per_alloc_size;
+ return_values = (char **) realloc(return_values,(sizeof(char *) *
+ return_values_size));
+
+ // Make sure new added memory are filled with NULL
+ for (int i = size; i < return_values_size; i++) {
+ return_values[i] = NULL;
+ }
+ }
+ temp_tok = strtok_r(NULL, delim, &tempstr);
+ }
+ }
+
+ // Put trailing NULL to indicate values terminates.
+ if (return_values != NULL) {
+ return_values[size] = NULL;
+ }
+
+cleanup:
+ if (failed) {
+ free_values(return_values);
+ return NULL;
+ }
+
+ return return_values;
+}
+
+/**
+ * Extracts array of values from the '%' separated list of values.
+ */
+char** split(char *value) {
+ return split_delimiter(value, "%");
+}
+
+// free an entry set of values
+void free_values(char** values) {
+ if (values != NULL) {
+ int idx = 0;
+ while (values[idx]) {
+ free(values[idx]);
+ idx++;
+ }
+ free(values);
+ }
+}
+
+/**
+ * Trim whitespace from beginning and end.
+*/
+char* trim(const char* input) {
+ const char *val_begin;
+ const char *val_end;
+ char *ret;
+
+ if (input == NULL) {
+ return NULL;
+ }
+
+ val_begin = input;
+ val_end = input + strlen(input);
+
+ while (val_begin < val_end && isspace(*val_begin))
+ val_begin++;
+ while (val_end > val_begin && isspace(*(val_end - 1)))
+ val_end--;
+
+ ret = (char *) malloc(
+ sizeof(char) * (val_end - val_begin + 1));
+ if (ret == NULL) {
+ fprintf(ERRORFILE, "Allocation error\n");
+ exit(OUT_OF_MEMORY);
+ }
+
+ strncpy(ret, val_begin, val_end - val_begin);
+ ret[val_end - val_begin] = '\0';
+ return ret;
+}
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/util.h b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/util.h
new file mode 100644
index 00000000000..a8a12a937bb
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/impl/util.h
@@ -0,0 +1,115 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#ifndef __YARN_POSIX_CONTAINER_EXECUTOR_UTIL_H__
+#define __YARN_POSIX_CONTAINER_EXECUTOR_UTIL_H__
+
+#include
+
+enum errorcodes {
+ INVALID_ARGUMENT_NUMBER = 1,
+ //INVALID_USER_NAME 2
+ INVALID_COMMAND_PROVIDED = 3,
+ // SUPER_USER_NOT_ALLOWED_TO_RUN_TASKS (NOT USED) 4
+ INVALID_NM_ROOT_DIRS = 5,
+ SETUID_OPER_FAILED, //6
+ UNABLE_TO_EXECUTE_CONTAINER_SCRIPT, //7
+ UNABLE_TO_SIGNAL_CONTAINER, //8
+ INVALID_CONTAINER_PID, //9
+ // ERROR_RESOLVING_FILE_PATH (NOT_USED) 10
+ // RELATIVE_PATH_COMPONENTS_IN_FILE_PATH (NOT USED) 11
+ // UNABLE_TO_STAT_FILE (NOT USED) 12
+ // FILE_NOT_OWNED_BY_ROOT (NOT USED) 13
+ // PREPARE_CONTAINER_DIRECTORIES_FAILED (NOT USED) 14
+ // INITIALIZE_CONTAINER_FAILED (NOT USED) 15
+ // PREPARE_CONTAINER_LOGS_FAILED (NOT USED) 16
+ // INVALID_LOG_DIR (NOT USED) 17
+ OUT_OF_MEMORY = 18,
+ // INITIALIZE_DISTCACHEFILE_FAILED (NOT USED) 19
+ INITIALIZE_USER_FAILED = 20,
+ PATH_TO_DELETE_IS_NULL, //21
+ INVALID_CONTAINER_EXEC_PERMISSIONS, //22
+ // PREPARE_JOB_LOGS_FAILED (NOT USED) 23
+ INVALID_CONFIG_FILE = 24,
+ SETSID_OPER_FAILED = 25,
+ WRITE_PIDFILE_FAILED = 26,
+ WRITE_CGROUP_FAILED = 27,
+ TRAFFIC_CONTROL_EXECUTION_FAILED = 28,
+ DOCKER_RUN_FAILED = 29,
+ ERROR_OPENING_DOCKER_FILE = 30,
+ ERROR_READING_DOCKER_FILE = 31,
+ FEATURE_DISABLED = 32,
+ COULD_NOT_CREATE_SCRIPT_COPY = 33,
+ COULD_NOT_CREATE_CREDENTIALS_FILE = 34,
+ COULD_NOT_CREATE_WORK_DIRECTORIES = 35,
+ COULD_NOT_CREATE_APP_LOG_DIRECTORIES = 36,
+ COULD_NOT_CREATE_TMP_DIRECTORIES = 37,
+ ERROR_CREATE_CONTAINER_DIRECTORIES_ARGUMENTS = 38,
+ ERROR_SANITIZING_DOCKER_COMMAND = 39,
+ DOCKER_IMAGE_INVALID = 40,
+ DOCKER_CONTAINER_NAME_INVALID = 41,
+ ERROR_COMPILING_REGEX = 42
+};
+
+
+// the log file for messages
+extern FILE *LOGFILE;
+// the log file for error messages
+extern FILE *ERRORFILE;
+/**
+ * Function to split the given string using '%' as the separator. It's
+ * up to the caller to free the memory for the returned array. Use the
+ * free_values function to free the allocated memory.
+ *
+ * @param str the string to split
+ *
+ * @return an array of strings
+ */
+char** split(char *str);
+
+/**
+ * Function to split the given string using the delimiter specified. It's
+ * up to the caller to free the memory for the returned array. Use the
+ * free_values function to free the allocated memory.
+ *
+ * @param str the string to split
+ * @param delimiter the delimiter to use
+ *
+ * @return an array of strings
+ */
+char** split_delimiter(char *value, const char *delimiter);
+
+/**
+ * Function to free an array of strings.
+ *
+ * @param values the array to free
+ *
+ */
+void free_values(char **values);
+
+/**
+ * Trim whitespace from beginning and end. The returned string has to be freed
+ * by the caller.
+ *
+ * @param input Input string that needs to be trimmed
+ *
+ * @return the trimmed string allocated with malloc
+*/
+char* trim(const char *input);
+
+#endif
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/configuration-1.cfg b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/configuration-1.cfg
new file mode 100644
index 00000000000..4d0b90d0cec
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/configuration-1.cfg
@@ -0,0 +1,31 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+[section-1]
+key1=value1
+split-key=val1,val2,val3
+perc-key=perc-val1%perc-val2
+# some comment
+
+[split-section]
+key3=value3
+
+[section-2]
+key1=value2
+
+key2=value2
+
+[split-section]
+key4=value4
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/configuration-2.cfg b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/configuration-2.cfg
new file mode 100644
index 00000000000..aa02db84a44
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/configuration-2.cfg
@@ -0,0 +1,28 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+
+# Test mixed mode config file
+# Initial few lines are in the key=value format
+# and then the sections start
+
+key1=value1
+key2=value2
+
+
+[section-1]
+key3=value3
+key1=value4
+
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/old-config.cfg b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/old-config.cfg
new file mode 100644
index 00000000000..947a3fae605
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/resources/test/test-configurations/old-config.cfg
@@ -0,0 +1,25 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+yarn.nodemanager.linux-container-executor.group=yarn
+banned.users=root,testuser1,testuser2#comma separated list of users who can not run applications
+min.user.id=1000
+allowed.system.users=nobody,daemon
+feature.docker.enabled=1
+feature.tc.enabled=0
+docker.binary=/usr/bin/docker
+yarn.local.dirs=/var/run/yarn%/tmp/mydir
+test.key=#no value for this key
+# test.key2=0
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test-container-executor.c b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test-container-executor.c
index 221c1cd2c27..1f9bc2574ab 100644
--- a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test-container-executor.c
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test-container-executor.c
@@ -18,6 +18,7 @@
#include "configuration.h"
#include "container-executor.h"
#include "utils/string-utils.h"
+#include "util.h"
#include
#include
@@ -404,7 +405,7 @@ void test_delete_app() {
}
void validate_feature_enabled_value(int expected_value, const char* key,
- int default_value, struct configuration *cfg) {
+ int default_value, struct section *cfg) {
int value = is_feature_enabled(key, default_value, cfg);
if (value != expected_value) {
@@ -419,7 +420,8 @@ void test_is_feature_enabled() {
FILE *file = fopen(filename, "w");
int disabled = 0;
int enabled = 1;
- struct configuration cfg = {.size=0, .confdetails=NULL};
+ struct configuration exec_cfg = {.size=0, .sections=NULL};
+ struct section cfg = {.size=0, .kv_pairs=NULL};
if (file == NULL) {
printf("FAIL: Could not open configuration file: %s\n", filename);
@@ -433,7 +435,8 @@ void test_is_feature_enabled() {
fprintf(file, "feature.name5.enabled=-1\n");
fprintf(file, "feature.name6.enabled=2\n");
fclose(file);
- read_config(filename, &cfg);
+ read_config(filename, &exec_cfg);
+ cfg = *(get_configuration_section("", &exec_cfg));
validate_feature_enabled_value(disabled, "feature.name1.enabled",
disabled, &cfg);
@@ -449,7 +452,7 @@ void test_is_feature_enabled() {
disabled, &cfg);
- free_configurations(&cfg);
+ free_configuration(&exec_cfg);
}
void test_delete_user() {
@@ -1273,8 +1276,8 @@ int main(int argc, char **argv) {
read_executor_config(TEST_ROOT "/test.cfg");
- local_dirs = extract_values(strdup(NM_LOCAL_DIRS));
- log_dirs = extract_values(strdup(NM_LOG_DIRS));
+ local_dirs = split(strdup(NM_LOCAL_DIRS));
+ log_dirs = split(strdup(NM_LOG_DIRS));
create_nm_roots(local_dirs);
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_configuration.cc b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_configuration.cc
new file mode 100644
index 00000000000..6ee0ab2be1c
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_configuration.cc
@@ -0,0 +1,432 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include
+#include
+
+extern "C" {
+#include "util.h"
+#include "configuration.h"
+#include "configuration.c"
+}
+
+
+namespace ContainerExecutor {
+ class TestConfiguration : public ::testing::Test {
+ protected:
+ virtual void SetUp() {
+ new_config_format_file = "test-configurations/configuration-1.cfg";
+ old_config_format_file = "test-configurations/old-config.cfg";
+ mixed_config_format_file = "test-configurations/configuration-2.cfg";
+ loadConfigurations();
+ return;
+ }
+
+ void loadConfigurations() {
+ int ret = 0;
+ ret = read_config(new_config_format_file.c_str(), &new_config_format);
+ ASSERT_EQ(0, ret);
+ ret = read_config(old_config_format_file.c_str(), &old_config_format);
+ ASSERT_EQ(0, ret);
+ ret = read_config(mixed_config_format_file.c_str(),
+ &mixed_config_format);
+ ASSERT_EQ(0, ret);
+ }
+
+ virtual void TearDown() {
+ free_configuration(&new_config_format);
+ free_configuration(&old_config_format);
+ return;
+ }
+
+ std::string new_config_format_file;
+ std::string old_config_format_file;
+ std::string mixed_config_format_file;
+ struct configuration new_config_format;
+ struct configuration old_config_format;
+ struct configuration mixed_config_format;
+ };
+
+
+ TEST_F(TestConfiguration, test_get_configuration_values_delimiter) {
+ char **split_values;
+ split_values = get_configuration_values_delimiter(NULL, "", &old_config_format, "%");
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values_delimiter("yarn.local.dirs", NULL,
+ &old_config_format, "%");
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values_delimiter("yarn.local.dirs", "",
+ NULL, "%");
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values_delimiter("yarn.local.dirs", "",
+ &old_config_format, NULL);
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values_delimiter("yarn.local.dirs", "abcd",
+ &old_config_format, "%");
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values_delimiter("yarn.local.dirs", "",
+ &old_config_format, "%");
+ ASSERT_STREQ("/var/run/yarn", split_values[0]);
+ ASSERT_STREQ("/tmp/mydir", split_values[1]);
+ ASSERT_EQ(NULL, split_values[2]);
+ free(split_values);
+ split_values = get_configuration_values_delimiter("allowed.system.users",
+ "", &old_config_format, "%");
+ ASSERT_STREQ("nobody,daemon", split_values[0]);
+ ASSERT_EQ(NULL, split_values[1]);
+ free(split_values);
+ }
+
+ TEST_F(TestConfiguration, test_get_configuration_values) {
+ char **split_values;
+ split_values = get_configuration_values(NULL, "", &old_config_format);
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values("yarn.local.dirs", NULL, &old_config_format);
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values("yarn.local.dirs", "", NULL);
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values("yarn.local.dirs", "abcd", &old_config_format);
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_configuration_values("yarn.local.dirs", "", &old_config_format);
+ ASSERT_STREQ("/var/run/yarn%/tmp/mydir", split_values[0]);
+ ASSERT_EQ(NULL, split_values[1]);
+ free(split_values);
+ split_values = get_configuration_values("allowed.system.users", "",
+ &old_config_format);
+ ASSERT_STREQ("nobody", split_values[0]);
+ ASSERT_STREQ("daemon", split_values[1]);
+ ASSERT_EQ(NULL, split_values[2]);
+ free(split_values);
+ }
+
+ TEST_F(TestConfiguration, test_get_configuration_value) {
+ std::string key_value_array[5][2] = {
+ {"yarn.nodemanager.linux-container-executor.group", "yarn"},
+ {"min.user.id", "1000"},
+ {"allowed.system.users", "nobody,daemon"},
+ {"feature.docker.enabled", "1"},
+ {"yarn.local.dirs", "/var/run/yarn%/tmp/mydir"}
+ };
+ char *value;
+ value = get_configuration_value(NULL, "", &old_config_format);
+ ASSERT_EQ(NULL, value);
+ value = get_configuration_value("yarn.local.dirs", NULL, &old_config_format);
+ ASSERT_EQ(NULL, value);
+ value = get_configuration_value("yarn.local.dirs", "", NULL);
+ ASSERT_EQ(NULL, value);
+
+ for (int i = 0; i < 5; ++i) {
+ value = get_configuration_value(key_value_array[i][0].c_str(),
+ "", &old_config_format);
+ ASSERT_STREQ(key_value_array[i][1].c_str(), value);
+ free(value);
+ }
+ value = get_configuration_value("test.key", "", &old_config_format);
+ ASSERT_EQ(NULL, value);
+ value = get_configuration_value("test.key2", "", &old_config_format);
+ ASSERT_EQ(NULL, value);
+ value = get_configuration_value("feature.tc.enabled", "abcd", &old_config_format);
+ ASSERT_EQ(NULL, value);
+ }
+
+ TEST_F(TestConfiguration, test_no_sections_format) {
+ const struct section *executor_cfg = get_configuration_section("", &old_config_format);
+ char *value = NULL;
+ value = get_section_value("yarn.nodemanager.linux-container-executor.group", executor_cfg);
+ ASSERT_STREQ("yarn", value);
+ value = get_section_value("feature.docker.enabled", executor_cfg);
+ ASSERT_STREQ("1", value);
+ value = get_section_value("feature.tc.enabled", executor_cfg);
+ ASSERT_STREQ("0", value);
+ value = get_section_value("min.user.id", executor_cfg);
+ ASSERT_STREQ("1000", value);
+ value = get_section_value("docker.binary", executor_cfg);
+ ASSERT_STREQ("/usr/bin/docker", value);
+ char **list = get_section_values("allowed.system.users", executor_cfg);
+ ASSERT_STREQ("nobody", list[0]);
+ ASSERT_STREQ("daemon", list[1]);
+ list = get_section_values("banned.users", executor_cfg);
+ ASSERT_STREQ("root", list[0]);
+ ASSERT_STREQ("testuser1", list[1]);
+ ASSERT_STREQ("testuser2", list[2]);
+ }
+
+ TEST_F(TestConfiguration, test_get_section_values_delimiter) {
+ const struct section *section;
+ char *value;
+ char **split_values;
+ section = get_configuration_section("section-1", &new_config_format);
+ value = get_section_value("key1", section);
+ ASSERT_STREQ("value1", value);
+ free(value);
+ value = get_section_value("key2", section);
+ ASSERT_EQ(NULL, value);
+ split_values = get_section_values_delimiter(NULL, section, "%");
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_section_values_delimiter("split-key", NULL, "%");
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_section_values_delimiter("split-key", section, NULL);
+ ASSERT_EQ(NULL, split_values);
+ split_values = get_section_values_delimiter("split-key", section, "%");
+ ASSERT_FALSE(split_values == NULL);
+ ASSERT_STREQ("val1,val2,val3", split_values[0]);
+ ASSERT_TRUE(split_values[1] == NULL);
+ free_values(split_values);
+ split_values = get_section_values_delimiter("perc-key", section, "%");
+ ASSERT_FALSE(split_values == NULL);
+ ASSERT_STREQ("perc-val1", split_values[0]);
+ ASSERT_STREQ("perc-val2", split_values[1]);
+ ASSERT_TRUE(split_values[2] == NULL);
+ }
+
+ TEST_F(TestConfiguration, test_get_section_values) {
+ const struct section *section;
+ char *value;
+ char **split_values;
+ section = get_configuration_section("section-1", &new_config_format);
+ value = get_section_value(NULL, section);
+ ASSERT_EQ(NULL, value);
+ value = get_section_value("key1", NULL);
+ ASSERT_EQ(NULL, value);
+ value = get_section_value("key1", section);
+ ASSERT_STREQ("value1", value);
+ free(value);
+ value = get_section_value("key2", section);
+ ASSERT_EQ(NULL, value);
+ split_values = get_section_values("split-key", section);
+ ASSERT_FALSE(split_values == NULL);
+ ASSERT_STREQ("val1", split_values[0]);
+ ASSERT_STREQ("val2", split_values[1]);
+ ASSERT_STREQ("val3", split_values[2]);
+ ASSERT_TRUE(split_values[3] == NULL);
+ free_values(split_values);
+ split_values = get_section_values("perc-key", section);
+ ASSERT_FALSE(split_values == NULL);
+ ASSERT_STREQ("perc-val1%perc-val2", split_values[0]);
+ ASSERT_TRUE(split_values[1] == NULL);
+ free_values(split_values);
+ section = get_configuration_section("section-2", &new_config_format);
+ value = get_section_value("key1", section);
+ ASSERT_STREQ("value2", value);
+ free(value);
+ value = get_section_value("key2", section);
+ ASSERT_STREQ("value2", value);
+ free(value);
+ }
+
+ TEST_F(TestConfiguration, test_split_section) {
+ const struct section *section;
+ char *value;
+ section = get_configuration_section("split-section", &new_config_format);
+ value = get_section_value(NULL, section);
+ ASSERT_EQ(NULL, value);
+ value = get_section_value("key3", NULL);
+ ASSERT_EQ(NULL, value);
+ value = get_section_value("key3", section);
+ ASSERT_STREQ("value3", value);
+ free(value);
+ value = get_section_value("key4", section);
+ ASSERT_STREQ("value4", value);
+
+ }
+
+ TEST_F(TestConfiguration, test_get_configuration_section) {
+ const struct section *section;
+ ASSERT_EQ(3, new_config_format.size);
+ section = get_configuration_section(NULL, &new_config_format);
+ ASSERT_EQ(NULL, section);
+ section = get_configuration_section("section-1", NULL);
+ ASSERT_EQ(NULL, section);
+ section = get_configuration_section("section-1", &new_config_format);
+ ASSERT_FALSE(section == NULL);
+ ASSERT_STREQ("section-1", section->name);
+ ASSERT_EQ(3, section->size);
+ ASSERT_FALSE(NULL == section->kv_pairs);
+ section = get_configuration_section("section-2", &new_config_format);
+ ASSERT_FALSE(section == NULL);
+ ASSERT_STREQ("section-2", section->name);
+ ASSERT_EQ(2, section->size);
+ ASSERT_FALSE(NULL == section->kv_pairs);
+ section = get_configuration_section("section-3", &new_config_format);
+ ASSERT_TRUE(section == NULL);
+ }
+
+ TEST_F(TestConfiguration, test_read_config) {
+ struct configuration config;
+ int ret = 0;
+
+ ret = read_config(NULL, &config);
+ ASSERT_EQ(INVALID_CONFIG_FILE, ret);
+ ret = read_config("bad-config-file", &config);
+ ASSERT_EQ(INVALID_CONFIG_FILE, ret);
+ ret = read_config(new_config_format_file.c_str(), &config);
+ ASSERT_EQ(0, ret);
+ ASSERT_EQ(3, config.size);
+ ASSERT_STREQ("section-1", config.sections[0]->name);
+ ASSERT_STREQ("split-section", config.sections[1]->name);
+ ASSERT_STREQ("section-2", config.sections[2]->name);
+ free_configuration(&config);
+ ret = read_config(old_config_format_file.c_str(), &config);
+ ASSERT_EQ(0, ret);
+ ASSERT_EQ(1, config.size);
+ ASSERT_STREQ("", config.sections[0]->name);
+ free_configuration(&config);
+ }
+
+ TEST_F(TestConfiguration, test_get_kv_key) {
+ int ret = 0;
+ char buff[1024];
+ ret = get_kv_key(NULL, buff, 1024);
+ ASSERT_EQ(-EINVAL, ret);
+ ret = get_kv_key("key1234", buff, 1024);
+ ASSERT_EQ(-EINVAL, ret);
+ ret = get_kv_key("key=abcd", NULL, 1024);
+ ASSERT_EQ(-ENAMETOOLONG, ret);
+ ret = get_kv_key("key=abcd", buff, 1);
+ ASSERT_EQ(-ENAMETOOLONG, ret);
+ ret = get_kv_key("key=abcd", buff, 1024);
+ ASSERT_EQ(0, ret);
+ ASSERT_STREQ("key", buff);
+ }
+
+ TEST_F(TestConfiguration, test_get_kv_value) {
+ int ret = 0;
+ char buff[1024];
+ ret = get_kv_value(NULL, buff, 1024);
+ ASSERT_EQ(-EINVAL, ret);
+ ret = get_kv_value("key1234", buff, 1024);
+ ASSERT_EQ(-EINVAL, ret);
+ ret = get_kv_value("key=abcd", NULL, 1024);
+ ASSERT_EQ(-ENAMETOOLONG, ret);
+ ret = get_kv_value("key=abcd", buff, 1);
+ ASSERT_EQ(-ENAMETOOLONG, ret);
+ ret = get_kv_value("key=abcd", buff, 1024);
+ ASSERT_EQ(0, ret);
+ ASSERT_STREQ("abcd", buff);
+ }
+
+ TEST_F(TestConfiguration, test_single_section_high_key_count) {
+ std::string section_name = "section-1";
+ std::string sample_file_name = "large-section.cfg";
+ std::ofstream sample_file;
+ sample_file.open(sample_file_name.c_str());
+ sample_file << "[" << section_name << "]" << std::endl;
+ for(int i = 0; i < MAX_SIZE + 2; ++i) {
+ sample_file << "key" << i << "=" << "value" << i << std::endl;
+ }
+ struct configuration cfg;
+ int ret = read_config(sample_file_name.c_str(), &cfg);
+ ASSERT_EQ(0, ret);
+ ASSERT_EQ(1, cfg.size);
+ const struct section *section1 = get_configuration_section(section_name.c_str(), &cfg);
+ ASSERT_EQ(MAX_SIZE + 2, section1->size);
+ ASSERT_STREQ(section_name.c_str(), section1->name);
+ for(int i = 0; i < MAX_SIZE + 2; ++i) {
+ std::ostringstream oss;
+ oss << "key" << i;
+ const char *value = get_section_value(oss.str().c_str(), section1);
+ oss.str("");
+ oss << "value" << i;
+ ASSERT_STREQ(oss.str().c_str(), value);
+ }
+ remove(sample_file_name.c_str());
+ free_configuration(&cfg);
+ }
+
+ TEST_F(TestConfiguration, test_multiple_sections) {
+ std::string sample_file_name = "multiple-sections.cfg";
+ std::ofstream sample_file;
+ sample_file.open(sample_file_name.c_str());
+ for(int i = 0; i < MAX_SIZE + 2; ++i) {
+ sample_file << "[section-" << i << "]" << std::endl;
+ sample_file << "key" << i << "=" << "value" << i << std::endl;
+ }
+ struct configuration cfg;
+ int ret = read_config(sample_file_name.c_str(), &cfg);
+ ASSERT_EQ(0, ret);
+ ASSERT_EQ(MAX_SIZE + 2, cfg.size);
+ for(int i = 0; i < MAX_SIZE + 2; ++i) {
+ std::ostringstream oss;
+ oss << "section-" << i;
+ const struct section *section = get_configuration_section(oss.str().c_str(), &cfg);
+ ASSERT_EQ(1, section->size);
+ ASSERT_STREQ(oss.str().c_str(), section->name);
+ oss.str("");
+ oss << "key" << i;
+ const char *value = get_section_value(oss.str().c_str(), section);
+ oss.str("");
+ oss << "value" << i;
+ ASSERT_STREQ(oss.str().c_str(), value);
+ }
+ remove(sample_file_name.c_str());
+ free_configuration(&cfg);
+ }
+
+ TEST_F(TestConfiguration, test_section_start_line) {
+ const char *section_start_line = "[abcd]";
+ const char *non_section_lines[] = {
+ "[abcd", "abcd]", "key=value", "#abcd"
+ };
+ int ret = is_section_start_line(section_start_line);
+ ASSERT_EQ(1, ret);
+ int length = sizeof(non_section_lines) / sizeof(*non_section_lines);
+ for( int i = 0; i < length; ++i) {
+ ret = is_section_start_line(non_section_lines[i]);
+ ASSERT_EQ(0, ret);
+ }
+ ret = is_section_start_line(NULL);
+ ASSERT_EQ(0, ret);
+ }
+
+ TEST_F(TestConfiguration, test_comment_line) {
+ const char *comment_line = "#[abcd]";
+ const char *non_comment_lines[] = {
+ "[abcd", "abcd]", "key=value", "[abcd]"
+ };
+ int ret = is_comment_line(comment_line);
+ ASSERT_EQ(1, ret);
+ int length = sizeof(non_comment_lines) / sizeof(*non_comment_lines);
+ for( int i = 0; i < length; ++i) {
+ ret = is_comment_line(non_comment_lines[i]);
+ ASSERT_EQ(0, ret);
+ }
+ ret = is_comment_line(NULL);
+ ASSERT_EQ(0, ret);
+ }
+
+ TEST_F(TestConfiguration, test_mixed_config_format) {
+ const struct section *executor_cfg =
+ get_configuration_section("", &mixed_config_format);
+ char *value = NULL;
+ value = get_section_value("key1", executor_cfg);
+ ASSERT_STREQ("value1", value);
+ value = get_section_value("key2", executor_cfg);
+ ASSERT_STREQ("value2", value);
+ ASSERT_EQ(2, executor_cfg->size);
+ executor_cfg = get_configuration_section("section-1",
+ &mixed_config_format);
+ value = get_section_value("key3", executor_cfg);
+ ASSERT_STREQ("value3", value);
+ value = get_section_value("key1", executor_cfg);
+ ASSERT_STREQ("value4", value);
+ ASSERT_EQ(2, executor_cfg->size);
+ ASSERT_EQ(2, mixed_config_format.size);
+ ASSERT_STREQ("", mixed_config_format.sections[0]->name);
+ ASSERT_STREQ("section-1", mixed_config_format.sections[1]->name);
+ }
+}
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_main.cc b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_main.cc
new file mode 100644
index 00000000000..d59a3f22a13
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_main.cc
@@ -0,0 +1,29 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include
+#include
+#include
+
+FILE* ERRORFILE = stderr;
+FILE* LOGFILE = stdout;
+
+int main(int argc, char **argv) {
+ testing::InitGoogleTest(&argc, argv);
+ return RUN_ALL_TESTS();
+}
diff --git a/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_util.cc b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_util.cc
new file mode 100644
index 00000000000..2ec7b2a09c7
--- /dev/null
+++ b/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/main/native/container-executor/test/test_util.cc
@@ -0,0 +1,138 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include
+#include
+
+extern "C" {
+#include "util.h"
+}
+
+namespace ContainerExecutor {
+
+ class TestUtil : public ::testing::Test {
+ protected:
+ virtual void SetUp() {
+ }
+
+ virtual void TearDown() {
+ }
+ };
+
+ TEST_F(TestUtil, test_split_delimiter) {
+ std::string str = "1,2,3,4,5,6,7,8,9,10,11";
+ char *split_string = (char *) calloc(str.length() + 1, sizeof(char));
+ strncpy(split_string, str.c_str(), str.length());
+ char **splits = split_delimiter(split_string, ",");
+ ASSERT_TRUE(splits != NULL);
+ int count = 0;
+ while(splits[count] != NULL) {
+ ++count;
+ }
+ ASSERT_EQ(11, count);
+ for(int i = 1; i < count; ++i) {
+ std::ostringstream oss;
+ oss << i;
+ ASSERT_STREQ(oss.str().c_str(), splits[i-1]);
+ }
+ ASSERT_EQ(NULL, splits[count]);
+ free_values(splits);
+
+ split_string = (char *) calloc(str.length() + 1, sizeof(char));
+ strncpy(split_string, str.c_str(), str.length());
+ splits = split_delimiter(split_string, "%");
+ ASSERT_TRUE(splits != NULL);
+ ASSERT_TRUE(splits[1] == NULL);
+ ASSERT_STREQ(str.c_str(), splits[0]);
+ free_values(splits);
+
+ splits = split_delimiter(NULL, ",");
+ ASSERT_EQ(NULL, splits);
+ return;
+ }
+
+ TEST_F(TestUtil, test_split) {
+ std::string str = "1%2%3%4%5%6%7%8%9%10%11";
+ char *split_string = (char *) calloc(str.length() + 1, sizeof(char));
+ strncpy(split_string, str.c_str(), str.length());
+ char **splits = split(split_string);
+ int count = 0;
+ while(splits[count] != NULL) {
+ ++count;
+ }
+ ASSERT_EQ(11, count);
+ for(int i = 1; i < count; ++i) {
+ std::ostringstream oss;
+ oss << i;
+ ASSERT_STREQ(oss.str().c_str(), splits[i-1]);
+ }
+ ASSERT_EQ(NULL, splits[count]);
+ free_values(splits);
+
+ str = "1,2,3,4,5,6,7,8,9,10,11";
+ split_string = (char *) calloc(str.length() + 1, sizeof(char));
+ strncpy(split_string, str.c_str(), str.length());
+ splits = split(split_string);
+ ASSERT_TRUE(splits != NULL);
+ ASSERT_TRUE(splits[1] == NULL);
+ ASSERT_STREQ(str.c_str(), splits[0]);
+ return;
+ }
+
+ TEST_F(TestUtil, test_trim) {
+ char* trimmed = NULL;
+
+ // Check NULL input
+ ASSERT_EQ(NULL, trim(NULL));
+
+ // Check empty input
+ trimmed = trim("");
+ ASSERT_STREQ("", trimmed);
+ free(trimmed);
+
+ // Check single space input
+ trimmed = trim(" ");
+ ASSERT_STREQ("", trimmed);
+ free(trimmed);
+
+ // Check multi space input
+ trimmed = trim(" ");
+ ASSERT_STREQ("", trimmed);
+ free(trimmed);
+
+ // Check both side trim input
+ trimmed = trim(" foo ");
+ ASSERT_STREQ("foo", trimmed);
+ free(trimmed);
+
+ // Check left side trim input
+ trimmed = trim("foo ");
+ ASSERT_STREQ("foo", trimmed);
+ free(trimmed);
+
+ // Check right side trim input
+ trimmed = trim(" foo");
+ ASSERT_STREQ("foo", trimmed);
+ free(trimmed);
+
+ // Check no trim input
+ trimmed = trim("foo");
+ ASSERT_STREQ("foo", trimmed);
+ free(trimmed);
+ }
+}