MAPREDUCE-6994. Uploader tool for Distributed Cache Deploy code changes (miklos.szegedi@cloudera.com via rkanter)
This commit is contained in:
parent
21d3627355
commit
3b78607a02
|
@ -32,6 +32,7 @@ function hadoop_usage
|
|||
hadoop_add_subcommand "pipes" client "run a Pipes job"
|
||||
hadoop_add_subcommand "queue" client "get information regarding JobQueues"
|
||||
hadoop_add_subcommand "sampler" client "sampler"
|
||||
hadoop_add_subcommand "frameworkuploader" admin "mapreduce framework upload"
|
||||
hadoop_add_subcommand "version" client "print the version"
|
||||
hadoop_generate_usage "${HADOOP_SHELL_EXECNAME}" true
|
||||
}
|
||||
|
@ -92,6 +93,9 @@ function mapredcmd_case
|
|||
sampler)
|
||||
HADOOP_CLASSNAME=org.apache.hadoop.mapred.lib.InputSampler
|
||||
;;
|
||||
frameworkuploader)
|
||||
HADOOP_CLASSNAME=org.apache.hadoop.mapred.uploader.FrameworkUploader
|
||||
;;
|
||||
version)
|
||||
HADOOP_CLASSNAME=org.apache.hadoop.util.VersionInfo
|
||||
;;
|
||||
|
|
|
@ -0,0 +1,67 @@
|
|||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!--
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License. See accompanying LICENSE file.
|
||||
-->
|
||||
<project xmlns="http://maven.apache.org/POM/4.0.0"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
|
||||
<parent>
|
||||
<artifactId>hadoop-mapreduce-client</artifactId>
|
||||
<groupId>org.apache.hadoop</groupId>
|
||||
<version>3.1.0-SNAPSHOT</version>
|
||||
</parent>
|
||||
<modelVersion>4.0.0</modelVersion>
|
||||
<artifactId>hadoop-mapreduce-client-uploader</artifactId>
|
||||
<version>3.1.0-SNAPSHOT</version>
|
||||
<name>Apache Hadoop MapReduce Uploader</name>
|
||||
|
||||
<dependencies>
|
||||
<dependency>
|
||||
<groupId>commons-cli</groupId>
|
||||
<artifactId>commons-cli</artifactId>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.apache.commons</groupId>
|
||||
<artifactId>commons-compress</artifactId>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.apache.hadoop</groupId>
|
||||
<artifactId>hadoop-common</artifactId>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.apache.hadoop</groupId>
|
||||
<artifactId>hadoop-hdfs-client</artifactId>
|
||||
</dependency>
|
||||
</dependencies>
|
||||
<properties>
|
||||
<!-- Needed for generating FindBugs warnings using parent pom -->
|
||||
<mr.basedir>${project.parent.basedir}/../</mr.basedir>
|
||||
</properties>
|
||||
|
||||
<build>
|
||||
<plugins>
|
||||
<plugin>
|
||||
<groupId>org.apache.maven.plugins</groupId>
|
||||
<artifactId>maven-jar-plugin</artifactId>
|
||||
<configuration>
|
||||
<archive>
|
||||
<manifest>
|
||||
<mainClass>org.apache.hadoop.mapred.uploader.FrameworkUploader</mainClass>
|
||||
</manifest>
|
||||
</archive>
|
||||
</configuration>
|
||||
</plugin>
|
||||
</plugins>
|
||||
</build>
|
||||
|
||||
</project>
|
|
@ -0,0 +1,46 @@
|
|||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.apache.hadoop.mapred.uploader;
|
||||
|
||||
/**
|
||||
* Default white list and black list implementations.
|
||||
*/
|
||||
final class DefaultJars {
|
||||
static final String DEFAULT_EXCLUDED_MR_JARS =
|
||||
".*hadoop-yarn-server-applicationhistoryservice.*\\.jar," +
|
||||
".*hadoop-yarn-server-nodemanager.*\\.jar," +
|
||||
".*hadoop-yarn-server-resourcemanager.*\\.jar," +
|
||||
".*hadoop-yarn-server-router.*\\.jar," +
|
||||
".*hadoop-yarn-server-sharedcachemanager.*\\.jar," +
|
||||
".*hadoop-yarn-server-timeline-pluginstorage.*\\.jar," +
|
||||
".*hadoop-yarn-server-timelineservice.*\\.jar," +
|
||||
".*hadoop-yarn-server-timelineservice-hbase.*\\.jar,";
|
||||
|
||||
static final String DEFAULT_MR_JARS =
|
||||
"$HADOOP_HOME/share/hadoop/common/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/common/lib/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/hdfs/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/hdfs/lib/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/mapreduce/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/mapreduce/lib/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/yarn/.*\\.jar," +
|
||||
"$HADOOP_HOME/share/hadoop/yarn/lib/.*\\.jar,";
|
||||
|
||||
private DefaultJars() {}
|
||||
}
|
|
@ -0,0 +1,384 @@
|
|||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.apache.hadoop.mapred.uploader;
|
||||
|
||||
import com.google.common.annotations.VisibleForTesting;
|
||||
import org.apache.commons.cli.HelpFormatter;
|
||||
import org.apache.commons.cli.OptionBuilder;
|
||||
import org.apache.commons.cli.Options;
|
||||
import org.apache.commons.compress.archivers.ArchiveEntry;
|
||||
import org.apache.commons.compress.archivers.tar.TarArchiveOutputStream;
|
||||
import org.apache.hadoop.conf.Configuration;
|
||||
import org.apache.hadoop.fs.FileSystem;
|
||||
import org.apache.hadoop.fs.Path;
|
||||
import org.apache.hadoop.hdfs.DistributedFileSystem;
|
||||
import org.apache.hadoop.hdfs.protocol.SystemErasureCodingPolicies;
|
||||
import org.apache.hadoop.io.IOUtils;
|
||||
import org.apache.hadoop.util.GenericOptionsParser;
|
||||
import org.apache.hadoop.util.Shell;
|
||||
import org.apache.hadoop.util.StringUtils;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.FileInputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.OutputStream;
|
||||
import java.util.HashSet;
|
||||
import java.util.LinkedList;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
import java.util.Set;
|
||||
import java.util.regex.Matcher;
|
||||
import java.util.regex.Pattern;
|
||||
import java.util.zip.GZIPOutputStream;
|
||||
|
||||
/**
|
||||
* Upload a MapReduce framework tarball to HDFS.
|
||||
* Usage:
|
||||
* sudo -u mapred mapred frameworkuploader -fs hdfs://`hostname`:8020 -target
|
||||
* /tmp/upload.tar.gz#mr-framework
|
||||
*/
|
||||
public class FrameworkUploader implements Runnable {
|
||||
private static final Pattern VAR_SUBBER =
|
||||
Pattern.compile(Shell.getEnvironmentVariableRegex());
|
||||
private static final Logger LOG =
|
||||
LoggerFactory.getLogger(FrameworkUploader.class);
|
||||
|
||||
@VisibleForTesting
|
||||
String input = null;
|
||||
@VisibleForTesting
|
||||
String whitelist = null;
|
||||
@VisibleForTesting
|
||||
String blacklist = null;
|
||||
@VisibleForTesting
|
||||
String target = null;
|
||||
@VisibleForTesting
|
||||
short replication = 10;
|
||||
|
||||
@VisibleForTesting
|
||||
Set<String> filteredInputFiles = new HashSet<>();
|
||||
@VisibleForTesting
|
||||
List<Pattern> whitelistedFiles = new LinkedList<>();
|
||||
@VisibleForTesting
|
||||
List<Pattern> blacklistedFiles = new LinkedList<>();
|
||||
|
||||
@VisibleForTesting
|
||||
OutputStream targetStream = null;
|
||||
private Path targetPath = null;
|
||||
private String alias = null;
|
||||
|
||||
private void printHelp(Options options) {
|
||||
HelpFormatter formatter = new HelpFormatter();
|
||||
formatter.printHelp("mapred frameworkuploader", options);
|
||||
}
|
||||
|
||||
public void run() {
|
||||
try {
|
||||
collectPackages();
|
||||
buildPackage();
|
||||
LOG.info("Uploaded " + target);
|
||||
System.out.println("Suggested mapreduce.application.framework.path " +
|
||||
target);
|
||||
LOG.info(
|
||||
"Suggested mapreduce.application.classpath $PWD/" + alias + "/*");
|
||||
System.out.println("Suggested classpath $PWD/" + alias + "/*");
|
||||
} catch (UploaderException|IOException e) {
|
||||
LOG.error("Error in execution " + e.getMessage());
|
||||
e.printStackTrace();
|
||||
}
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
void collectPackages() throws UploaderException {
|
||||
parseLists();
|
||||
String[] list = StringUtils.split(input, File.pathSeparatorChar);
|
||||
for (String item : list) {
|
||||
LOG.info("Original source " + item);
|
||||
String expanded = expandEnvironmentVariables(item, System.getenv());
|
||||
LOG.info("Expanded source " + expanded);
|
||||
if (expanded.endsWith("*")) {
|
||||
File path = new File(expanded.substring(0, expanded.length() - 1));
|
||||
if (path.isDirectory()) {
|
||||
File[] files = path.listFiles();
|
||||
if (files != null) {
|
||||
for (File jar : files) {
|
||||
if (!jar.isDirectory()) {
|
||||
addJar(jar);
|
||||
} else {
|
||||
LOG.info("Ignored " + jar + " because it is a directory");
|
||||
}
|
||||
}
|
||||
} else {
|
||||
LOG.warn("Could not list directory " + path);
|
||||
}
|
||||
} else {
|
||||
LOG.warn("Ignored " + expanded + ". It is not a directory");
|
||||
}
|
||||
} else if (expanded.endsWith(".jar")) {
|
||||
File jarFile = new File(expanded);
|
||||
addJar(jarFile);
|
||||
} else if (!expanded.isEmpty()) {
|
||||
LOG.warn("Ignored " + expanded + " only jars are supported");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private void beginUpload() throws IOException, UploaderException {
|
||||
if (targetStream == null) {
|
||||
validateTargetPath();
|
||||
int lastIndex = target.indexOf('#');
|
||||
targetPath =
|
||||
new Path(
|
||||
target.substring(
|
||||
0, lastIndex == -1 ? target.length() : lastIndex));
|
||||
alias = lastIndex != -1 ?
|
||||
target.substring(lastIndex + 1) :
|
||||
targetPath.getName();
|
||||
LOG.info("Target " + targetPath);
|
||||
FileSystem fileSystem = targetPath.getFileSystem(new Configuration());
|
||||
targetStream = fileSystem.create(targetPath, true);
|
||||
}
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
void buildPackage() throws IOException, UploaderException {
|
||||
beginUpload();
|
||||
LOG.info("Compressing tarball");
|
||||
try (TarArchiveOutputStream out = new TarArchiveOutputStream(
|
||||
new GZIPOutputStream(targetStream))) {
|
||||
for (String fullPath : filteredInputFiles) {
|
||||
LOG.info("Adding " + fullPath);
|
||||
File file = new File(fullPath);
|
||||
try (FileInputStream inputStream = new FileInputStream(file)) {
|
||||
ArchiveEntry entry = out.createArchiveEntry(file, file.getName());
|
||||
out.putArchiveEntry(entry);
|
||||
IOUtils.copyBytes(inputStream, out, 1024 * 1024);
|
||||
out.closeArchiveEntry();
|
||||
}
|
||||
}
|
||||
} finally {
|
||||
if (targetStream != null) {
|
||||
targetStream.close();
|
||||
}
|
||||
}
|
||||
|
||||
if (targetPath == null) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Set file attributes
|
||||
FileSystem fileSystem = targetPath.getFileSystem(new Configuration());
|
||||
if (fileSystem instanceof DistributedFileSystem) {
|
||||
LOG.info("Disabling Erasure Coding for path: " + targetPath);
|
||||
DistributedFileSystem dfs = (DistributedFileSystem) fileSystem;
|
||||
dfs.setErasureCodingPolicy(targetPath,
|
||||
SystemErasureCodingPolicies.getReplicationPolicy().getName());
|
||||
}
|
||||
|
||||
if (replication > 0) {
|
||||
LOG.info("Set replication to " +
|
||||
replication + " for path: " + targetPath);
|
||||
fileSystem.setReplication(targetPath, replication);
|
||||
}
|
||||
}
|
||||
|
||||
private void parseLists() throws UploaderException {
|
||||
Map<String, String> env = System.getenv();
|
||||
for(Map.Entry<String, String> item : env.entrySet()) {
|
||||
LOG.info("Environment " + item.getKey() + " " + item.getValue());
|
||||
}
|
||||
String[] whiteListItems = StringUtils.split(whitelist);
|
||||
for (String pattern : whiteListItems) {
|
||||
String expandedPattern =
|
||||
expandEnvironmentVariables(pattern, env);
|
||||
Pattern compiledPattern =
|
||||
Pattern.compile("^" + expandedPattern + "$");
|
||||
LOG.info("Whitelisted " + compiledPattern.toString());
|
||||
whitelistedFiles.add(compiledPattern);
|
||||
}
|
||||
String[] blacklistItems = StringUtils.split(blacklist);
|
||||
for (String pattern : blacklistItems) {
|
||||
String expandedPattern =
|
||||
expandEnvironmentVariables(pattern, env);
|
||||
Pattern compiledPattern =
|
||||
Pattern.compile("^" + expandedPattern + "$");
|
||||
LOG.info("Blacklisted " + compiledPattern.toString());
|
||||
blacklistedFiles.add(compiledPattern);
|
||||
}
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
String expandEnvironmentVariables(String innerInput, Map<String, String> env)
|
||||
throws UploaderException {
|
||||
boolean found;
|
||||
do {
|
||||
found = false;
|
||||
Matcher matcher = VAR_SUBBER.matcher(innerInput);
|
||||
StringBuffer stringBuffer = new StringBuffer();
|
||||
while (matcher.find()) {
|
||||
found = true;
|
||||
String var = matcher.group(1);
|
||||
// replace $env with the child's env constructed by tt's
|
||||
String replace = env.get(var);
|
||||
// the env key is not present anywhere .. simply set it
|
||||
if (replace == null) {
|
||||
throw new UploaderException("Environment variable does not exist " +
|
||||
var);
|
||||
}
|
||||
matcher.appendReplacement(
|
||||
stringBuffer, Matcher.quoteReplacement(replace));
|
||||
}
|
||||
matcher.appendTail(stringBuffer);
|
||||
innerInput = stringBuffer.toString();
|
||||
} while (found);
|
||||
return innerInput;
|
||||
}
|
||||
|
||||
private void addJar(File jar) throws UploaderException{
|
||||
boolean found = false;
|
||||
if (!jar.getName().endsWith(".jar")) {
|
||||
LOG.info("Ignored non-jar " + jar.getAbsolutePath());
|
||||
}
|
||||
for (Pattern pattern : whitelistedFiles) {
|
||||
Matcher matcher = pattern.matcher(jar.getAbsolutePath());
|
||||
if (matcher.matches()) {
|
||||
LOG.info("Whitelisted " + jar.getAbsolutePath());
|
||||
found = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
boolean excluded = false;
|
||||
for (Pattern pattern : blacklistedFiles) {
|
||||
Matcher matcher = pattern.matcher(jar.getAbsolutePath());
|
||||
if (matcher.matches()) {
|
||||
LOG.info("Blacklisted " + jar.getAbsolutePath());
|
||||
excluded = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (found && !excluded) {
|
||||
LOG.info("Whitelisted " + jar.getAbsolutePath());
|
||||
if (!filteredInputFiles.add(jar.getAbsolutePath())) {
|
||||
throw new UploaderException("Duplicate jar" + jar.getAbsolutePath());
|
||||
}
|
||||
}
|
||||
if (!found) {
|
||||
LOG.info("Ignored " + jar.getAbsolutePath() + " because it is missing " +
|
||||
"from the whitelist");
|
||||
} else if (excluded) {
|
||||
LOG.info("Ignored " + jar.getAbsolutePath() + " because it is on " +
|
||||
"the the blacklist");
|
||||
}
|
||||
}
|
||||
|
||||
private void validateTargetPath() throws UploaderException {
|
||||
if (!target.startsWith("hdfs:/") &&
|
||||
!target.startsWith("file:/")) {
|
||||
throw new UploaderException("Target path is not hdfs or local " + target);
|
||||
}
|
||||
}
|
||||
|
||||
@VisibleForTesting
|
||||
boolean parseArguments(String[] args) throws IOException {
|
||||
Options opts = new Options();
|
||||
opts.addOption(OptionBuilder.create("h"));
|
||||
opts.addOption(OptionBuilder.create("help"));
|
||||
opts.addOption(OptionBuilder
|
||||
.withDescription("Input class path")
|
||||
.hasArg().create("input"));
|
||||
opts.addOption(OptionBuilder
|
||||
.withDescription(
|
||||
"Regex specifying the full path of jars to include in the" +
|
||||
" framework tarball. Default is a hardcoded set of jars" +
|
||||
" considered necessary to include")
|
||||
.hasArg().create("whitelist"));
|
||||
opts.addOption(OptionBuilder
|
||||
.withDescription(
|
||||
"Regex specifying the full path of jars to exclude in the" +
|
||||
" framework tarball. Default is a hardcoded set of jars" +
|
||||
" considered unnecessary to include")
|
||||
.hasArg().create("blacklist"));
|
||||
opts.addOption(OptionBuilder
|
||||
.withDescription(
|
||||
"Target file system to upload to." +
|
||||
" Example: hdfs://foo.com:8020")
|
||||
.hasArg().create("fs"));
|
||||
opts.addOption(OptionBuilder
|
||||
.withDescription(
|
||||
"Target file to upload to with a reference name." +
|
||||
" Example: /usr/mr-framework.tar.gz#mr-framework")
|
||||
.hasArg().create("target"));
|
||||
opts.addOption(OptionBuilder
|
||||
.withDescription(
|
||||
"Desired replication count")
|
||||
.hasArg().create("replication"));
|
||||
GenericOptionsParser parser = new GenericOptionsParser(opts, args);
|
||||
if (parser.getCommandLine().hasOption("help") ||
|
||||
parser.getCommandLine().hasOption("h")) {
|
||||
printHelp(opts);
|
||||
return false;
|
||||
}
|
||||
input = parser.getCommandLine().getOptionValue(
|
||||
"input", System.getProperty("java.class.path"));
|
||||
whitelist = parser.getCommandLine().getOptionValue(
|
||||
"whitelist", DefaultJars.DEFAULT_MR_JARS);
|
||||
blacklist = parser.getCommandLine().getOptionValue(
|
||||
"blacklist", DefaultJars.DEFAULT_EXCLUDED_MR_JARS);
|
||||
replication = Short.parseShort(parser.getCommandLine().getOptionValue(
|
||||
"replication", "10"));
|
||||
String fs = parser.getCommandLine()
|
||||
.getOptionValue("fs", null);
|
||||
if (fs == null) {
|
||||
LOG.error("Target file system not specified");
|
||||
printHelp(opts);
|
||||
return false;
|
||||
}
|
||||
String path = parser.getCommandLine().getOptionValue("target",
|
||||
"mr-framework.tar.gz#mr-framework");
|
||||
if (path == null) {
|
||||
LOG.error("Target directory not specified");
|
||||
printHelp(opts);
|
||||
return false;
|
||||
}
|
||||
StringBuilder absolutePath = new StringBuilder(fs);
|
||||
absolutePath = absolutePath.append(path.startsWith("/") ? "" : "/");
|
||||
absolutePath.append(path);
|
||||
target = absolutePath.toString();
|
||||
|
||||
if (parser.getRemainingArgs().length > 0) {
|
||||
LOG.warn("Unexpected parameters");
|
||||
printHelp(opts);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Tool entry point.
|
||||
* @param args arguments
|
||||
* @throws IOException thrown on configuration errors
|
||||
*/
|
||||
public static void main(String[] args) throws IOException {
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
if(uploader.parseArguments(args)) {
|
||||
uploader.run();
|
||||
}
|
||||
}
|
||||
}
|
|
@ -0,0 +1,36 @@
|
|||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.apache.hadoop.mapred.uploader;
|
||||
|
||||
import org.apache.hadoop.classification.InterfaceAudience;
|
||||
import org.apache.hadoop.classification.InterfaceStability;
|
||||
|
||||
/**
|
||||
* Framework uploaded exception type.
|
||||
*/
|
||||
@InterfaceAudience.Private
|
||||
@InterfaceStability.Stable
|
||||
class UploaderException extends Exception {
|
||||
|
||||
private static final long serialVersionUID = 1L;
|
||||
|
||||
UploaderException(String message) {
|
||||
super(message);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,28 @@
|
|||
/*
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
/**
|
||||
* Package org.apache.hadoop.mapred.uploader contains classes related to the
|
||||
* MapReduce framework upload tool.
|
||||
*/
|
||||
@InterfaceAudience.Public
|
||||
@InterfaceStability.Unstable
|
||||
package org.apache.hadoop.mapred.uploader;
|
||||
|
||||
import org.apache.hadoop.classification.InterfaceAudience;
|
||||
import org.apache.hadoop.classification.InterfaceStability;
|
|
@ -0,0 +1,315 @@
|
|||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.apache.hadoop.mapred.uploader;
|
||||
|
||||
import org.apache.commons.compress.archivers.tar.TarArchiveEntry;
|
||||
import org.apache.commons.compress.archivers.tar.TarArchiveInputStream;
|
||||
import org.apache.commons.io.FileUtils;
|
||||
import org.junit.Assert;
|
||||
import org.junit.Before;
|
||||
import org.junit.Test;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.FileInputStream;
|
||||
import java.io.FileNotFoundException;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.PrintStream;
|
||||
import java.util.HashMap;
|
||||
import java.util.HashSet;
|
||||
import java.util.Map;
|
||||
import java.util.Random;
|
||||
import java.util.Set;
|
||||
import java.util.zip.GZIPInputStream;
|
||||
|
||||
/**
|
||||
* Unit test class for FrameworkUploader.
|
||||
*/
|
||||
public class TestFrameworkUploader {
|
||||
private static String testDir;
|
||||
|
||||
@Before
|
||||
public void setUp() {
|
||||
String testRootDir =
|
||||
new File(System.getProperty("test.build.data", "/tmp"))
|
||||
.getAbsolutePath()
|
||||
.replace(' ', '+');
|
||||
Random random = new Random(System.currentTimeMillis());
|
||||
testDir = testRootDir + File.separatorChar +
|
||||
Long.toString(random.nextLong());
|
||||
}
|
||||
|
||||
/**
|
||||
* Test requesting command line help.
|
||||
* @throws IOException test failure
|
||||
*/
|
||||
@Test
|
||||
public void testHelp() throws IOException {
|
||||
String[] args = new String[]{"-help"};
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
boolean success = uploader.parseArguments(args);
|
||||
Assert.assertFalse("Expected to print help", success);
|
||||
Assert.assertEquals("Expected ignore run", null,
|
||||
uploader.input);
|
||||
Assert.assertEquals("Expected ignore run", null,
|
||||
uploader.whitelist);
|
||||
Assert.assertEquals("Expected ignore run", null,
|
||||
uploader.target);
|
||||
}
|
||||
|
||||
/**
|
||||
* Test invalid argument parsing.
|
||||
* @throws IOException test failure
|
||||
*/
|
||||
@Test
|
||||
public void testWrongArgument() throws IOException {
|
||||
String[] args = new String[]{"-unexpected"};
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
boolean success = uploader.parseArguments(args);
|
||||
Assert.assertFalse("Expected to print help", success);
|
||||
}
|
||||
|
||||
/**
|
||||
* Test normal argument passing.
|
||||
* @throws IOException test failure
|
||||
*/
|
||||
@Test
|
||||
public void testArguments() throws IOException {
|
||||
String[] args =
|
||||
new String[]{
|
||||
"-input", "A",
|
||||
"-whitelist", "B",
|
||||
"-blacklist", "C",
|
||||
"-fs", "hdfs://C:8020",
|
||||
"-target", "D",
|
||||
"-replication", "100"};
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
boolean success = uploader.parseArguments(args);
|
||||
Assert.assertTrue("Expected to print help", success);
|
||||
Assert.assertEquals("Input mismatch", "A",
|
||||
uploader.input);
|
||||
Assert.assertEquals("Whitelist mismatch", "B",
|
||||
uploader.whitelist);
|
||||
Assert.assertEquals("Blacklist mismatch", "C",
|
||||
uploader.blacklist);
|
||||
Assert.assertEquals("Target mismatch", "hdfs://C:8020/D",
|
||||
uploader.target);
|
||||
Assert.assertEquals("Replication mismatch", 100,
|
||||
uploader.replication);
|
||||
}
|
||||
|
||||
/**
|
||||
* Test whether we can filter a class path properly.
|
||||
* @throws IOException test failure
|
||||
*/
|
||||
@Test
|
||||
public void testCollectPackages() throws IOException, UploaderException {
|
||||
File parent = new File(testDir);
|
||||
try {
|
||||
parent.deleteOnExit();
|
||||
Assert.assertTrue("Directory creation failed", parent.mkdirs());
|
||||
File dirA = new File(parent, "A");
|
||||
Assert.assertTrue(dirA.mkdirs());
|
||||
File dirB = new File(parent, "B");
|
||||
Assert.assertTrue(dirB.mkdirs());
|
||||
File jarA = new File(dirA, "a.jar");
|
||||
Assert.assertTrue(jarA.createNewFile());
|
||||
File jarB = new File(dirA, "b.jar");
|
||||
Assert.assertTrue(jarB.createNewFile());
|
||||
File jarC = new File(dirA, "c.jar");
|
||||
Assert.assertTrue(jarC.createNewFile());
|
||||
File txtD = new File(dirA, "d.txt");
|
||||
Assert.assertTrue(txtD.createNewFile());
|
||||
File jarD = new File(dirB, "d.jar");
|
||||
Assert.assertTrue(jarD.createNewFile());
|
||||
File txtE = new File(dirB, "e.txt");
|
||||
Assert.assertTrue(txtE.createNewFile());
|
||||
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
uploader.whitelist = ".*a\\.jar,.*b\\.jar,.*d\\.jar";
|
||||
uploader.blacklist = ".*b\\.jar";
|
||||
uploader.input = dirA.getAbsolutePath() + File.separatorChar + "*" +
|
||||
File.pathSeparatorChar +
|
||||
dirB.getAbsolutePath() + File.separatorChar + "*";
|
||||
uploader.collectPackages();
|
||||
Assert.assertEquals("Whitelist count error", 3,
|
||||
uploader.whitelistedFiles.size());
|
||||
Assert.assertEquals("Blacklist count error", 1,
|
||||
uploader.blacklistedFiles.size());
|
||||
|
||||
Assert.assertTrue("File not collected",
|
||||
uploader.filteredInputFiles.contains(jarA.getAbsolutePath()));
|
||||
Assert.assertFalse("File collected",
|
||||
uploader.filteredInputFiles.contains(jarB.getAbsolutePath()));
|
||||
Assert.assertTrue("File not collected",
|
||||
uploader.filteredInputFiles.contains(jarD.getAbsolutePath()));
|
||||
Assert.assertEquals("Too many whitelists", 2,
|
||||
uploader.filteredInputFiles.size());
|
||||
} finally {
|
||||
FileUtils.deleteDirectory(parent);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Test building a tarball from source jars.
|
||||
*/
|
||||
@Test
|
||||
public void testBuildTarBall() throws IOException, UploaderException {
|
||||
File parent = new File(testDir);
|
||||
try {
|
||||
parent.deleteOnExit();
|
||||
FrameworkUploader uploader = prepareTree(parent);
|
||||
|
||||
File gzipFile = new File("upload.tar.gz");
|
||||
gzipFile.deleteOnExit();
|
||||
Assert.assertTrue("Creating output", gzipFile.createNewFile());
|
||||
uploader.targetStream = new FileOutputStream(gzipFile);
|
||||
|
||||
uploader.buildPackage();
|
||||
|
||||
TarArchiveInputStream result = null;
|
||||
try {
|
||||
result =
|
||||
new TarArchiveInputStream(
|
||||
new GZIPInputStream(new FileInputStream(gzipFile)));
|
||||
Set<String> fileNames = new HashSet<>();
|
||||
Set<Long> sizes = new HashSet<>();
|
||||
TarArchiveEntry entry1 = result.getNextTarEntry();
|
||||
fileNames.add(entry1.getName());
|
||||
sizes.add(entry1.getSize());
|
||||
TarArchiveEntry entry2 = result.getNextTarEntry();
|
||||
fileNames.add(entry2.getName());
|
||||
sizes.add(entry2.getSize());
|
||||
Assert.assertTrue(
|
||||
"File name error", fileNames.contains("a.jar"));
|
||||
Assert.assertTrue(
|
||||
"File size error", sizes.contains((long) 13));
|
||||
Assert.assertTrue(
|
||||
"File name error", fileNames.contains("b.jar"));
|
||||
Assert.assertTrue(
|
||||
"File size error", sizes.contains((long) 14));
|
||||
} finally {
|
||||
if (result != null) {
|
||||
result.close();
|
||||
}
|
||||
}
|
||||
} finally {
|
||||
FileUtils.deleteDirectory(parent);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Test upload to HDFS.
|
||||
*/
|
||||
@Test
|
||||
public void testUpload() throws IOException, UploaderException {
|
||||
final String fileName = "/upload.tar.gz";
|
||||
File parent = new File(testDir);
|
||||
try {
|
||||
parent.deleteOnExit();
|
||||
|
||||
FrameworkUploader uploader = prepareTree(parent);
|
||||
|
||||
uploader.target = "file://" + parent.getAbsolutePath() + fileName;
|
||||
|
||||
uploader.buildPackage();
|
||||
try (TarArchiveInputStream archiveInputStream = new TarArchiveInputStream(
|
||||
new GZIPInputStream(
|
||||
new FileInputStream(
|
||||
parent.getAbsolutePath() + fileName)))) {
|
||||
Set<String> fileNames = new HashSet<>();
|
||||
Set<Long> sizes = new HashSet<>();
|
||||
TarArchiveEntry entry1 = archiveInputStream.getNextTarEntry();
|
||||
fileNames.add(entry1.getName());
|
||||
sizes.add(entry1.getSize());
|
||||
TarArchiveEntry entry2 = archiveInputStream.getNextTarEntry();
|
||||
fileNames.add(entry2.getName());
|
||||
sizes.add(entry2.getSize());
|
||||
Assert.assertTrue(
|
||||
"File name error", fileNames.contains("a.jar"));
|
||||
Assert.assertTrue(
|
||||
"File size error", sizes.contains((long) 13));
|
||||
Assert.assertTrue(
|
||||
"File name error", fileNames.contains("b.jar"));
|
||||
Assert.assertTrue(
|
||||
"File size error", sizes.contains((long) 14));
|
||||
}
|
||||
} finally {
|
||||
FileUtils.deleteDirectory(parent);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Prepare a mock directory tree to compress and upload.
|
||||
*/
|
||||
private FrameworkUploader prepareTree(File parent)
|
||||
throws FileNotFoundException {
|
||||
Assert.assertTrue(parent.mkdirs());
|
||||
File dirA = new File(parent, "A");
|
||||
Assert.assertTrue(dirA.mkdirs());
|
||||
File jarA = new File(parent, "a.jar");
|
||||
PrintStream printStream = new PrintStream(new FileOutputStream(jarA));
|
||||
printStream.println("Hello World!");
|
||||
printStream.close();
|
||||
File jarB = new File(dirA, "b.jar");
|
||||
printStream = new PrintStream(new FileOutputStream(jarB));
|
||||
printStream.println("Hello Galaxy!");
|
||||
printStream.close();
|
||||
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
uploader.filteredInputFiles.add(jarA.getAbsolutePath());
|
||||
uploader.filteredInputFiles.add(jarB.getAbsolutePath());
|
||||
|
||||
return uploader;
|
||||
}
|
||||
|
||||
/**
|
||||
* Test regex pattern matching and environment variable replacement.
|
||||
*/
|
||||
@Test
|
||||
public void testEnvironmentReplacement() throws UploaderException {
|
||||
String input = "C/$A/B,$B,D";
|
||||
Map<String, String> map = new HashMap<>();
|
||||
map.put("A", "X");
|
||||
map.put("B", "Y");
|
||||
map.put("C", "Z");
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
String output = uploader.expandEnvironmentVariables(input, map);
|
||||
Assert.assertEquals("Environment not expanded", "C/X/B,Y,D", output);
|
||||
|
||||
}
|
||||
|
||||
/**
|
||||
* Test regex pattern matching and environment variable replacement.
|
||||
*/
|
||||
@Test
|
||||
public void testRecursiveEnvironmentReplacement()
|
||||
throws UploaderException {
|
||||
String input = "C/$A/B,$B,D";
|
||||
Map<String, String> map = new HashMap<>();
|
||||
map.put("A", "X");
|
||||
map.put("B", "$C");
|
||||
map.put("C", "Y");
|
||||
FrameworkUploader uploader = new FrameworkUploader();
|
||||
String output = uploader.expandEnvironmentVariables(input, map);
|
||||
Assert.assertEquals("Environment not expanded", "C/X/B,Y,D", output);
|
||||
|
||||
}
|
||||
|
||||
}
|
|
@ -326,5 +326,6 @@
|
|||
<module>hadoop-mapreduce-client-hs</module>
|
||||
<module>hadoop-mapreduce-client-hs-plugins</module>
|
||||
<module>hadoop-mapreduce-client-nativetask</module>
|
||||
<module>hadoop-mapreduce-client-uploader</module>
|
||||
</modules>
|
||||
</project>
|
||||
|
|
Loading…
Reference in New Issue