HADOOP-8681. add support for HTTPS to the web UIs. (tucu)
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1371525 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
9d0f8792a9
commit
4bca22005f
|
@ -213,6 +213,8 @@ Branch-2 ( Unreleased changes )
|
||||||
|
|
||||||
HADOOP-8644. AuthenticatedURL should be able to use SSLFactory. (tucu)
|
HADOOP-8644. AuthenticatedURL should be able to use SSLFactory. (tucu)
|
||||||
|
|
||||||
|
HADOOP-8681. add support for HTTPS to the web UIs. (tucu)
|
||||||
|
|
||||||
IMPROVEMENTS
|
IMPROVEMENTS
|
||||||
|
|
||||||
HADOOP-8340. SNAPSHOT build versions should compare as less than their eventual
|
HADOOP-8340. SNAPSHOT build versions should compare as less than their eventual
|
||||||
|
|
|
@ -239,5 +239,8 @@ public class CommonConfigurationKeysPublic {
|
||||||
public static final String HADOOP_SECURITY_AUTH_TO_LOCAL =
|
public static final String HADOOP_SECURITY_AUTH_TO_LOCAL =
|
||||||
"hadoop.security.auth_to_local";
|
"hadoop.security.auth_to_local";
|
||||||
|
|
||||||
|
public static final String HADOOP_SSL_ENABLED_KEY = "hadoop.ssl.enabled";
|
||||||
|
public static final boolean HADOOP_SSL_ENABLED_DEFAULT = false;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,48 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.http;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Singleton to get access to Http related configuration.
|
||||||
|
*/
|
||||||
|
@InterfaceAudience.Private
|
||||||
|
@InterfaceStability.Unstable
|
||||||
|
public class HttpConfig {
|
||||||
|
private static boolean sslEnabled;
|
||||||
|
|
||||||
|
static {
|
||||||
|
Configuration conf = new Configuration();
|
||||||
|
sslEnabled = conf.getBoolean(
|
||||||
|
CommonConfigurationKeysPublic.HADOOP_SSL_ENABLED_KEY,
|
||||||
|
CommonConfigurationKeysPublic.HADOOP_SSL_ENABLED_DEFAULT);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static boolean isSecure() {
|
||||||
|
return sslEnabled;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static String getSchemePrefix() {
|
||||||
|
return (isSecure()) ? "https://" : "http://";
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -24,12 +24,14 @@ import java.io.InterruptedIOException;
|
||||||
import java.net.BindException;
|
import java.net.BindException;
|
||||||
import java.net.InetSocketAddress;
|
import java.net.InetSocketAddress;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
|
import java.security.GeneralSecurityException;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Enumeration;
|
import java.util.Enumeration;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
|
import javax.net.ssl.SSLServerSocketFactory;
|
||||||
import javax.servlet.Filter;
|
import javax.servlet.Filter;
|
||||||
import javax.servlet.FilterChain;
|
import javax.servlet.FilterChain;
|
||||||
import javax.servlet.FilterConfig;
|
import javax.servlet.FilterConfig;
|
||||||
|
@ -56,6 +58,7 @@ import org.apache.hadoop.security.SecurityUtil;
|
||||||
import org.apache.hadoop.security.UserGroupInformation;
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
import org.apache.hadoop.security.authentication.server.AuthenticationFilter;
|
import org.apache.hadoop.security.authentication.server.AuthenticationFilter;
|
||||||
import org.apache.hadoop.security.authorize.AccessControlList;
|
import org.apache.hadoop.security.authorize.AccessControlList;
|
||||||
|
import org.apache.hadoop.security.ssl.SSLFactory;
|
||||||
import org.apache.hadoop.util.ReflectionUtils;
|
import org.apache.hadoop.util.ReflectionUtils;
|
||||||
import org.mortbay.io.Buffer;
|
import org.mortbay.io.Buffer;
|
||||||
import org.mortbay.jetty.Connector;
|
import org.mortbay.jetty.Connector;
|
||||||
|
@ -105,6 +108,7 @@ public class HttpServer implements FilterContainer {
|
||||||
|
|
||||||
private AccessControlList adminsAcl;
|
private AccessControlList adminsAcl;
|
||||||
|
|
||||||
|
private SSLFactory sslFactory;
|
||||||
protected final Server webServer;
|
protected final Server webServer;
|
||||||
protected final Connector listener;
|
protected final Connector listener;
|
||||||
protected final WebAppContext webAppContext;
|
protected final WebAppContext webAppContext;
|
||||||
|
@ -208,7 +212,23 @@ public class HttpServer implements FilterContainer {
|
||||||
|
|
||||||
if(connector == null) {
|
if(connector == null) {
|
||||||
listenerStartedExternally = false;
|
listenerStartedExternally = false;
|
||||||
listener = createBaseListener(conf);
|
if (HttpConfig.isSecure()) {
|
||||||
|
sslFactory = new SSLFactory(SSLFactory.Mode.SERVER, conf);
|
||||||
|
try {
|
||||||
|
sslFactory.init();
|
||||||
|
} catch (GeneralSecurityException ex) {
|
||||||
|
throw new IOException(ex);
|
||||||
|
}
|
||||||
|
SslSocketConnector sslListener = new SslSocketConnector() {
|
||||||
|
@Override
|
||||||
|
protected SSLServerSocketFactory createFactory() throws Exception {
|
||||||
|
return sslFactory.createSSLServerSocketFactory();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
listener = sslListener;
|
||||||
|
} else {
|
||||||
|
listener = createBaseListener(conf);
|
||||||
|
}
|
||||||
listener.setHost(bindAddress);
|
listener.setHost(bindAddress);
|
||||||
listener.setPort(port);
|
listener.setPort(port);
|
||||||
} else {
|
} else {
|
||||||
|
@ -720,6 +740,16 @@ public class HttpServer implements FilterContainer {
|
||||||
exception = addMultiException(exception, e);
|
exception = addMultiException(exception, e);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (sslFactory != null) {
|
||||||
|
sslFactory.destroy();
|
||||||
|
}
|
||||||
|
} catch (Exception e) {
|
||||||
|
LOG.error("Error while destroying the SSLFactory"
|
||||||
|
+ webAppContext.getDisplayName(), e);
|
||||||
|
exception = addMultiException(exception, e);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
// clear & stop webAppContext attributes to avoid memory leaks.
|
// clear & stop webAppContext attributes to avoid memory leaks.
|
||||||
webAppContext.clearAttributes();
|
webAppContext.clearAttributes();
|
||||||
|
|
|
@ -40,10 +40,12 @@ import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.classification.InterfaceStability;
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.fs.CommonConfigurationKeys;
|
import org.apache.hadoop.fs.CommonConfigurationKeys;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.io.Text;
|
import org.apache.hadoop.io.Text;
|
||||||
import org.apache.hadoop.net.NetUtils;
|
import org.apache.hadoop.net.NetUtils;
|
||||||
import org.apache.hadoop.security.authentication.client.AuthenticatedURL;
|
import org.apache.hadoop.security.authentication.client.AuthenticatedURL;
|
||||||
import org.apache.hadoop.security.authentication.client.AuthenticationException;
|
import org.apache.hadoop.security.authentication.client.AuthenticationException;
|
||||||
|
import org.apache.hadoop.security.ssl.SSLFactory;
|
||||||
import org.apache.hadoop.security.token.Token;
|
import org.apache.hadoop.security.token.Token;
|
||||||
import org.apache.hadoop.security.token.TokenInfo;
|
import org.apache.hadoop.security.token.TokenInfo;
|
||||||
|
|
||||||
|
@ -65,12 +67,23 @@ public class SecurityUtil {
|
||||||
static boolean useIpForTokenService;
|
static boolean useIpForTokenService;
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
static HostResolver hostResolver;
|
static HostResolver hostResolver;
|
||||||
|
|
||||||
|
private static SSLFactory sslFactory;
|
||||||
|
|
||||||
static {
|
static {
|
||||||
boolean useIp = new Configuration().getBoolean(
|
Configuration conf = new Configuration();
|
||||||
|
boolean useIp = conf.getBoolean(
|
||||||
CommonConfigurationKeys.HADOOP_SECURITY_TOKEN_SERVICE_USE_IP,
|
CommonConfigurationKeys.HADOOP_SECURITY_TOKEN_SERVICE_USE_IP,
|
||||||
CommonConfigurationKeys.HADOOP_SECURITY_TOKEN_SERVICE_USE_IP_DEFAULT);
|
CommonConfigurationKeys.HADOOP_SECURITY_TOKEN_SERVICE_USE_IP_DEFAULT);
|
||||||
setTokenServiceUseIp(useIp);
|
setTokenServiceUseIp(useIp);
|
||||||
|
if (HttpConfig.isSecure()) {
|
||||||
|
sslFactory = new SSLFactory(SSLFactory.Mode.CLIENT, conf);
|
||||||
|
try {
|
||||||
|
sslFactory.init();
|
||||||
|
} catch (Exception ex) {
|
||||||
|
throw new RuntimeException(ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -456,7 +469,7 @@ public class SecurityUtil {
|
||||||
|
|
||||||
AuthenticatedURL.Token token = new AuthenticatedURL.Token();
|
AuthenticatedURL.Token token = new AuthenticatedURL.Token();
|
||||||
try {
|
try {
|
||||||
return new AuthenticatedURL().openConnection(url, token);
|
return new AuthenticatedURL(null, sslFactory).openConnection(url, token);
|
||||||
} catch (AuthenticationException e) {
|
} catch (AuthenticationException e) {
|
||||||
throw new IOException("Exception trying to open authenticated connection to "
|
throw new IOException("Exception trying to open authenticated connection to "
|
||||||
+ url, e);
|
+ url, e);
|
||||||
|
|
|
@ -1073,4 +1073,14 @@
|
||||||
</description>
|
</description>
|
||||||
</property>
|
</property>
|
||||||
|
|
||||||
|
<property>
|
||||||
|
<name>hadoop.ssl.enabled</name>
|
||||||
|
<value>false</value>
|
||||||
|
<description>
|
||||||
|
Whether to use SSL for the HTTP endpoints. If set to true, the
|
||||||
|
NameNode, DataNode, ResourceManager, NodeManager, HistoryServer and
|
||||||
|
MapReduceAppMaster web UIs will be served over HTTPS instead HTTP.
|
||||||
|
</description>
|
||||||
|
</property>
|
||||||
|
|
||||||
</configuration>
|
</configuration>
|
||||||
|
|
|
@ -0,0 +1,114 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.http;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
|
import org.apache.hadoop.fs.FileUtil;
|
||||||
|
import org.apache.hadoop.security.ssl.KeyStoreTestUtil;
|
||||||
|
import org.apache.hadoop.security.ssl.SSLFactory;
|
||||||
|
import org.junit.After;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
import javax.net.ssl.HttpsURLConnection;
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileWriter;
|
||||||
|
import java.io.InputStream;
|
||||||
|
import java.io.Writer;
|
||||||
|
import java.net.URL;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This testcase issues SSL certificates configures the HttpServer to serve
|
||||||
|
* HTTPS using the created certficates and calls an echo servlet using the
|
||||||
|
* corresponding HTTPS URL.
|
||||||
|
*/
|
||||||
|
public class TestSSLHttpServer extends HttpServerFunctionalTest {
|
||||||
|
private static final String BASEDIR =
|
||||||
|
System.getProperty("test.build.dir", "target/test-dir") + "/" +
|
||||||
|
TestSSLHttpServer.class.getSimpleName();
|
||||||
|
|
||||||
|
static final Log LOG = LogFactory.getLog(TestSSLHttpServer.class);
|
||||||
|
private static HttpServer server;
|
||||||
|
private static URL baseUrl;
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void setup() throws Exception {
|
||||||
|
File base = new File(BASEDIR);
|
||||||
|
FileUtil.fullyDelete(base);
|
||||||
|
base.mkdirs();
|
||||||
|
String classpathDir =
|
||||||
|
KeyStoreTestUtil.getClasspathDir(TestSSLHttpServer.class);
|
||||||
|
Configuration conf = new Configuration();
|
||||||
|
String keystoresDir = new File(BASEDIR).getAbsolutePath();
|
||||||
|
String sslConfsDir =
|
||||||
|
KeyStoreTestUtil.getClasspathDir(TestSSLHttpServer.class);
|
||||||
|
KeyStoreTestUtil.setupSSLConfig(keystoresDir, sslConfsDir, conf, false);
|
||||||
|
conf.setBoolean(CommonConfigurationKeysPublic.HADOOP_SSL_ENABLED_KEY, true);
|
||||||
|
|
||||||
|
//we do this trick because the MR AppMaster is started in another VM and
|
||||||
|
//the HttpServer configuration is not loaded from the job.xml but from the
|
||||||
|
//site.xml files in the classpath
|
||||||
|
Writer writer = new FileWriter(classpathDir + "/core-site.xml");
|
||||||
|
conf.writeXml(writer);
|
||||||
|
writer.close();
|
||||||
|
|
||||||
|
conf.setInt(HttpServer.HTTP_MAX_THREADS, 10);
|
||||||
|
server = createServer("test", conf);
|
||||||
|
server.addServlet("echo", "/echo", TestHttpServer.EchoServlet.class);
|
||||||
|
server.start();
|
||||||
|
baseUrl = new URL("https://localhost:" + server.getPort() + "/");
|
||||||
|
LOG.info("HTTP server started: "+ baseUrl);
|
||||||
|
}
|
||||||
|
|
||||||
|
@After
|
||||||
|
public void cleanup() throws Exception {
|
||||||
|
server.stop();
|
||||||
|
String classpathDir =
|
||||||
|
KeyStoreTestUtil.getClasspathDir(TestSSLHttpServer.class);
|
||||||
|
new File(classpathDir + "/core-site.xml").delete();
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testEcho() throws Exception {
|
||||||
|
assertEquals("a:b\nc:d\n",
|
||||||
|
readOut(new URL(baseUrl, "/echo?a=b&c=d")));
|
||||||
|
assertEquals("a:b\nc<:d\ne:>\n",
|
||||||
|
readOut(new URL(baseUrl, "/echo?a=b&c<=d&e=>")));
|
||||||
|
}
|
||||||
|
|
||||||
|
private static String readOut(URL url) throws Exception {
|
||||||
|
StringBuilder out = new StringBuilder();
|
||||||
|
HttpsURLConnection conn = (HttpsURLConnection) url.openConnection();
|
||||||
|
SSLFactory sslf = new SSLFactory(SSLFactory.Mode.CLIENT, new Configuration());
|
||||||
|
sslf.init();
|
||||||
|
conn.setSSLSocketFactory(sslf.createSSLSocketFactory());
|
||||||
|
InputStream in = conn.getInputStream();
|
||||||
|
byte[] buffer = new byte[64 * 1024];
|
||||||
|
int len = in.read(buffer);
|
||||||
|
while (len > 0) {
|
||||||
|
out.append(new String(buffer, 0, len));
|
||||||
|
len = in.read(buffer);
|
||||||
|
}
|
||||||
|
return out.toString();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -19,7 +19,6 @@ package org.apache.hadoop.hdfs.server.datanode;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.net.InetAddress;
|
|
||||||
import java.net.InetSocketAddress;
|
import java.net.InetSocketAddress;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
import java.net.URLEncoder;
|
import java.net.URLEncoder;
|
||||||
|
@ -37,7 +36,6 @@ import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hdfs.DFSClient;
|
import org.apache.hadoop.hdfs.DFSClient;
|
||||||
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
||||||
import org.apache.hadoop.hdfs.DFSUtil;
|
|
||||||
import org.apache.hadoop.hdfs.protocol.DatanodeInfo;
|
import org.apache.hadoop.hdfs.protocol.DatanodeInfo;
|
||||||
import org.apache.hadoop.hdfs.protocol.DirectoryListing;
|
import org.apache.hadoop.hdfs.protocol.DirectoryListing;
|
||||||
import org.apache.hadoop.hdfs.protocol.HdfsFileStatus;
|
import org.apache.hadoop.hdfs.protocol.HdfsFileStatus;
|
||||||
|
@ -45,6 +43,7 @@ import org.apache.hadoop.hdfs.protocol.LocatedBlock;
|
||||||
import org.apache.hadoop.hdfs.security.token.block.BlockTokenIdentifier;
|
import org.apache.hadoop.hdfs.security.token.block.BlockTokenIdentifier;
|
||||||
import org.apache.hadoop.hdfs.security.token.block.BlockTokenSecretManager;
|
import org.apache.hadoop.hdfs.security.token.block.BlockTokenSecretManager;
|
||||||
import org.apache.hadoop.hdfs.server.common.JspHelper;
|
import org.apache.hadoop.hdfs.server.common.JspHelper;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.net.NetUtils;
|
import org.apache.hadoop.net.NetUtils;
|
||||||
import org.apache.hadoop.security.UserGroupInformation;
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
import org.apache.hadoop.security.token.Token;
|
import org.apache.hadoop.security.token.Token;
|
||||||
|
@ -140,7 +139,7 @@ public class DatanodeJspHelper {
|
||||||
DatanodeInfo chosenNode = JspHelper.bestNode(firstBlock, conf);
|
DatanodeInfo chosenNode = JspHelper.bestNode(firstBlock, conf);
|
||||||
String fqdn = canonicalize(chosenNode.getIpAddr());
|
String fqdn = canonicalize(chosenNode.getIpAddr());
|
||||||
int datanodePort = chosenNode.getXferPort();
|
int datanodePort = chosenNode.getXferPort();
|
||||||
String redirectLocation = "http://" + fqdn + ":"
|
String redirectLocation = HttpConfig.getSchemePrefix() + fqdn + ":"
|
||||||
+ chosenNode.getInfoPort() + "/browseBlock.jsp?blockId="
|
+ chosenNode.getInfoPort() + "/browseBlock.jsp?blockId="
|
||||||
+ firstBlock.getBlock().getBlockId() + "&blockSize="
|
+ firstBlock.getBlock().getBlockId() + "&blockSize="
|
||||||
+ firstBlock.getBlock().getNumBytes() + "&genstamp="
|
+ firstBlock.getBlock().getNumBytes() + "&genstamp="
|
||||||
|
@ -220,7 +219,7 @@ public class DatanodeJspHelper {
|
||||||
JspHelper.addTableFooter(out);
|
JspHelper.addTableFooter(out);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
out.print("<br><a href=\"http://"
|
out.print("<br><a href=\"" + HttpConfig.getSchemePrefix()
|
||||||
+ canonicalize(nnAddr) + ":"
|
+ canonicalize(nnAddr) + ":"
|
||||||
+ namenodeInfoPort + "/dfshealth.jsp\">Go back to DFS home</a>");
|
+ namenodeInfoPort + "/dfshealth.jsp\">Go back to DFS home</a>");
|
||||||
dfs.close();
|
dfs.close();
|
||||||
|
@ -296,7 +295,7 @@ public class DatanodeJspHelper {
|
||||||
Long.MAX_VALUE).getLocatedBlocks();
|
Long.MAX_VALUE).getLocatedBlocks();
|
||||||
// Add the various links for looking at the file contents
|
// Add the various links for looking at the file contents
|
||||||
// URL for downloading the full file
|
// URL for downloading the full file
|
||||||
String downloadUrl = "http://" + req.getServerName() + ":"
|
String downloadUrl = HttpConfig.getSchemePrefix() + req.getServerName() + ":"
|
||||||
+ req.getServerPort() + "/streamFile" + ServletUtil.encodePath(filename)
|
+ req.getServerPort() + "/streamFile" + ServletUtil.encodePath(filename)
|
||||||
+ JspHelper.getUrlParam(JspHelper.NAMENODE_ADDRESS, nnAddr, true)
|
+ JspHelper.getUrlParam(JspHelper.NAMENODE_ADDRESS, nnAddr, true)
|
||||||
+ JspHelper.getDelegationTokenUrlParam(tokenString);
|
+ JspHelper.getDelegationTokenUrlParam(tokenString);
|
||||||
|
@ -314,7 +313,7 @@ public class DatanodeJspHelper {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
String fqdn = canonicalize(chosenNode.getIpAddr());
|
String fqdn = canonicalize(chosenNode.getIpAddr());
|
||||||
String tailUrl = "http://" + fqdn + ":" + chosenNode.getInfoPort()
|
String tailUrl = HttpConfig.getSchemePrefix() + fqdn + ":" + chosenNode.getInfoPort()
|
||||||
+ "/tail.jsp?filename=" + URLEncoder.encode(filename, "UTF-8")
|
+ "/tail.jsp?filename=" + URLEncoder.encode(filename, "UTF-8")
|
||||||
+ "&namenodeInfoPort=" + namenodeInfoPort
|
+ "&namenodeInfoPort=" + namenodeInfoPort
|
||||||
+ "&chunkSizeToView=" + chunkSizeToView
|
+ "&chunkSizeToView=" + chunkSizeToView
|
||||||
|
@ -363,7 +362,7 @@ public class DatanodeJspHelper {
|
||||||
String datanodeAddr = locs[j].getXferAddr();
|
String datanodeAddr = locs[j].getXferAddr();
|
||||||
datanodePort = locs[j].getXferPort();
|
datanodePort = locs[j].getXferPort();
|
||||||
fqdn = canonicalize(locs[j].getIpAddr());
|
fqdn = canonicalize(locs[j].getIpAddr());
|
||||||
String blockUrl = "http://" + fqdn + ":" + locs[j].getInfoPort()
|
String blockUrl = HttpConfig.getSchemePrefix() + fqdn + ":" + locs[j].getInfoPort()
|
||||||
+ "/browseBlock.jsp?blockId=" + blockidstring
|
+ "/browseBlock.jsp?blockId=" + blockidstring
|
||||||
+ "&blockSize=" + blockSize
|
+ "&blockSize=" + blockSize
|
||||||
+ "&filename=" + URLEncoder.encode(filename, "UTF-8")
|
+ "&filename=" + URLEncoder.encode(filename, "UTF-8")
|
||||||
|
@ -374,7 +373,7 @@ public class DatanodeJspHelper {
|
||||||
+ JspHelper.getDelegationTokenUrlParam(tokenString)
|
+ JspHelper.getDelegationTokenUrlParam(tokenString)
|
||||||
+ JspHelper.getUrlParam(JspHelper.NAMENODE_ADDRESS, nnAddr);
|
+ JspHelper.getUrlParam(JspHelper.NAMENODE_ADDRESS, nnAddr);
|
||||||
|
|
||||||
String blockInfoUrl = "http://" + nnCanonicalName + ":"
|
String blockInfoUrl = HttpConfig.getSchemePrefix() + nnCanonicalName + ":"
|
||||||
+ namenodeInfoPort
|
+ namenodeInfoPort
|
||||||
+ "/block_info_xml.jsp?blockId=" + blockidstring;
|
+ "/block_info_xml.jsp?blockId=" + blockidstring;
|
||||||
out.print("<td> </td><td><a href=\"" + blockUrl + "\">"
|
out.print("<td> </td><td><a href=\"" + blockUrl + "\">"
|
||||||
|
@ -385,7 +384,7 @@ public class DatanodeJspHelper {
|
||||||
}
|
}
|
||||||
out.println("</table>");
|
out.println("</table>");
|
||||||
out.print("<hr>");
|
out.print("<hr>");
|
||||||
out.print("<br><a href=\"http://"
|
out.print("<br><a href=\"" + HttpConfig.getSchemePrefix()
|
||||||
+ nnCanonicalName + ":"
|
+ nnCanonicalName + ":"
|
||||||
+ namenodeInfoPort + "/dfshealth.jsp\">Go back to DFS home</a>");
|
+ namenodeInfoPort + "/dfshealth.jsp\">Go back to DFS home</a>");
|
||||||
dfs.close();
|
dfs.close();
|
||||||
|
@ -485,7 +484,7 @@ public class DatanodeJspHelper {
|
||||||
String parent = new File(filename).getParent();
|
String parent = new File(filename).getParent();
|
||||||
JspHelper.printGotoForm(out, namenodeInfoPort, tokenString, parent, nnAddr);
|
JspHelper.printGotoForm(out, namenodeInfoPort, tokenString, parent, nnAddr);
|
||||||
out.print("<hr>");
|
out.print("<hr>");
|
||||||
out.print("<a href=\"http://"
|
out.print("<a href=\"" + HttpConfig.getSchemePrefix()
|
||||||
+ req.getServerName() + ":" + req.getServerPort()
|
+ req.getServerName() + ":" + req.getServerPort()
|
||||||
+ "/browseDirectory.jsp?dir=" + URLEncoder.encode(parent, "UTF-8")
|
+ "/browseDirectory.jsp?dir=" + URLEncoder.encode(parent, "UTF-8")
|
||||||
+ "&namenodeInfoPort=" + namenodeInfoPort
|
+ "&namenodeInfoPort=" + namenodeInfoPort
|
||||||
|
@ -533,7 +532,7 @@ public class DatanodeJspHelper {
|
||||||
}
|
}
|
||||||
String nextUrl = null;
|
String nextUrl = null;
|
||||||
if (nextBlockIdStr != null) {
|
if (nextBlockIdStr != null) {
|
||||||
nextUrl = "http://" + canonicalize(nextHost) + ":" + nextPort
|
nextUrl = HttpConfig.getSchemePrefix() + canonicalize(nextHost) + ":" + nextPort
|
||||||
+ "/browseBlock.jsp?blockId=" + nextBlockIdStr
|
+ "/browseBlock.jsp?blockId=" + nextBlockIdStr
|
||||||
+ "&blockSize=" + nextBlockSize
|
+ "&blockSize=" + nextBlockSize
|
||||||
+ "&startOffset=" + nextStartOffset
|
+ "&startOffset=" + nextStartOffset
|
||||||
|
@ -588,7 +587,7 @@ public class DatanodeJspHelper {
|
||||||
|
|
||||||
String prevUrl = null;
|
String prevUrl = null;
|
||||||
if (prevBlockIdStr != null) {
|
if (prevBlockIdStr != null) {
|
||||||
prevUrl = "http://" + canonicalize(prevHost) + ":" + prevPort
|
prevUrl = HttpConfig.getSchemePrefix() + canonicalize(prevHost) + ":" + prevPort
|
||||||
+ "/browseBlock.jsp?blockId=" + prevBlockIdStr
|
+ "/browseBlock.jsp?blockId=" + prevBlockIdStr
|
||||||
+ "&blockSize=" + prevBlockSize
|
+ "&blockSize=" + prevBlockSize
|
||||||
+ "&startOffset=" + prevStartOffset
|
+ "&startOffset=" + prevStartOffset
|
||||||
|
|
|
@ -41,6 +41,7 @@ import org.apache.hadoop.hdfs.DFSConfigKeys;
|
||||||
import org.apache.hadoop.hdfs.DFSUtil;
|
import org.apache.hadoop.hdfs.DFSUtil;
|
||||||
import org.apache.hadoop.hdfs.DFSUtil.ConfiguredNNAddress;
|
import org.apache.hadoop.hdfs.DFSUtil.ConfiguredNNAddress;
|
||||||
import org.apache.hadoop.hdfs.protocol.DatanodeInfo.AdminStates;
|
import org.apache.hadoop.hdfs.protocol.DatanodeInfo.AdminStates;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
import org.codehaus.jackson.JsonNode;
|
import org.codehaus.jackson.JsonNode;
|
||||||
import org.codehaus.jackson.map.ObjectMapper;
|
import org.codehaus.jackson.map.ObjectMapper;
|
||||||
|
@ -823,7 +824,7 @@ class ClusterJspHelper {
|
||||||
doc.startTag("item");
|
doc.startTag("item");
|
||||||
doc.attribute("label", label);
|
doc.attribute("label", label);
|
||||||
doc.attribute("value", value);
|
doc.attribute("value", value);
|
||||||
doc.attribute("link", "http://" + url);
|
doc.attribute("link", HttpConfig.getSchemePrefix() + url);
|
||||||
doc.endTag(); // item
|
doc.endTag(); // item
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -883,7 +884,7 @@ class ClusterJspHelper {
|
||||||
|
|
||||||
private static String queryMbean(String httpAddress, Configuration conf)
|
private static String queryMbean(String httpAddress, Configuration conf)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
URL url = new URL("http://"+httpAddress+JMX_QRY);
|
URL url = new URL(HttpConfig.getSchemePrefix() + httpAddress+JMX_QRY);
|
||||||
return readOutput(url);
|
return readOutput(url);
|
||||||
}
|
}
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -51,6 +51,7 @@ import org.apache.hadoop.hdfs.server.common.Storage;
|
||||||
import org.apache.hadoop.hdfs.server.common.Storage.StorageDirectory;
|
import org.apache.hadoop.hdfs.server.common.Storage.StorageDirectory;
|
||||||
import org.apache.hadoop.hdfs.server.common.UpgradeStatusReport;
|
import org.apache.hadoop.hdfs.server.common.UpgradeStatusReport;
|
||||||
import org.apache.hadoop.hdfs.server.protocol.NamenodeProtocols;
|
import org.apache.hadoop.hdfs.server.protocol.NamenodeProtocols;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.io.Text;
|
import org.apache.hadoop.io.Text;
|
||||||
import org.apache.hadoop.net.NetUtils;
|
import org.apache.hadoop.net.NetUtils;
|
||||||
import org.apache.hadoop.net.NodeBase;
|
import org.apache.hadoop.net.NodeBase;
|
||||||
|
@ -413,7 +414,7 @@ class NamenodeJspHelper {
|
||||||
}
|
}
|
||||||
String addr = NetUtils.getHostPortString(nn.getNameNodeAddress());
|
String addr = NetUtils.getHostPortString(nn.getNameNodeAddress());
|
||||||
String fqdn = InetAddress.getByName(nodeToRedirect).getCanonicalHostName();
|
String fqdn = InetAddress.getByName(nodeToRedirect).getCanonicalHostName();
|
||||||
redirectLocation = "http://" + fqdn + ":" + redirectPort
|
redirectLocation = HttpConfig.getSchemePrefix() + fqdn + ":" + redirectPort
|
||||||
+ "/browseDirectory.jsp?namenodeInfoPort="
|
+ "/browseDirectory.jsp?namenodeInfoPort="
|
||||||
+ nn.getHttpAddress().getPort() + "&dir=/"
|
+ nn.getHttpAddress().getPort() + "&dir=/"
|
||||||
+ (tokenString == null ? "" :
|
+ (tokenString == null ? "" :
|
||||||
|
@ -462,7 +463,8 @@ class NamenodeJspHelper {
|
||||||
String suffix, boolean alive, int nnHttpPort, String nnaddr)
|
String suffix, boolean alive, int nnHttpPort, String nnaddr)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
// from nn_browsedfscontent.jsp:
|
// from nn_browsedfscontent.jsp:
|
||||||
String url = "http://" + d.getHostName() + ":" + d.getInfoPort()
|
String url = HttpConfig.getSchemePrefix() + d.getHostName() + ":"
|
||||||
|
+ d.getInfoPort()
|
||||||
+ "/browseDirectory.jsp?namenodeInfoPort=" + nnHttpPort + "&dir="
|
+ "/browseDirectory.jsp?namenodeInfoPort=" + nnHttpPort + "&dir="
|
||||||
+ URLEncoder.encode("/", "UTF-8")
|
+ URLEncoder.encode("/", "UTF-8")
|
||||||
+ JspHelper.getUrlParam(JspHelper.NAMENODE_ADDRESS, nnaddr);
|
+ JspHelper.getUrlParam(JspHelper.NAMENODE_ADDRESS, nnaddr);
|
||||||
|
|
|
@ -32,12 +32,12 @@ import javax.servlet.http.HttpServletResponse;
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.security.SecurityUtil;
|
import org.apache.hadoop.security.SecurityUtil;
|
||||||
import org.apache.hadoop.util.Time;
|
import org.apache.hadoop.util.Time;
|
||||||
import org.apache.hadoop.hdfs.protocol.HdfsConstants;
|
import org.apache.hadoop.hdfs.protocol.HdfsConstants;
|
||||||
import org.apache.hadoop.hdfs.server.common.StorageErrorReporter;
|
import org.apache.hadoop.hdfs.server.common.StorageErrorReporter;
|
||||||
import org.apache.hadoop.hdfs.server.common.Storage;
|
import org.apache.hadoop.hdfs.server.common.Storage;
|
||||||
import org.apache.hadoop.hdfs.server.common.Util;
|
|
||||||
import org.apache.hadoop.hdfs.server.namenode.NNStorage.NameNodeDirType;
|
import org.apache.hadoop.hdfs.server.namenode.NNStorage.NameNodeDirType;
|
||||||
import org.apache.hadoop.hdfs.server.protocol.RemoteEditLog;
|
import org.apache.hadoop.hdfs.server.protocol.RemoteEditLog;
|
||||||
import org.apache.hadoop.hdfs.util.DataTransferThrottler;
|
import org.apache.hadoop.hdfs.util.DataTransferThrottler;
|
||||||
|
@ -206,7 +206,8 @@ public class TransferFsImage {
|
||||||
String queryString, List<File> localPaths,
|
String queryString, List<File> localPaths,
|
||||||
Storage dstStorage, boolean getChecksum) throws IOException {
|
Storage dstStorage, boolean getChecksum) throws IOException {
|
||||||
|
|
||||||
String str = "http://" + nnHostPort + "/getimage?" + queryString;
|
String str = HttpConfig.getSchemePrefix() + nnHostPort + "/getimage?" +
|
||||||
|
queryString;
|
||||||
LOG.info("Opening connection to " + str);
|
LOG.info("Opening connection to " + str);
|
||||||
//
|
//
|
||||||
// open connection to remote server
|
// open connection to remote server
|
||||||
|
|
|
@ -36,6 +36,7 @@ import org.apache.hadoop.hdfs.DistributedFileSystem;
|
||||||
import org.apache.hadoop.hdfs.HAUtil;
|
import org.apache.hadoop.hdfs.HAUtil;
|
||||||
import org.apache.hadoop.hdfs.HdfsConfiguration;
|
import org.apache.hadoop.hdfs.HdfsConfiguration;
|
||||||
import org.apache.hadoop.hdfs.server.namenode.NamenodeFsck;
|
import org.apache.hadoop.hdfs.server.namenode.NamenodeFsck;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.security.SecurityUtil;
|
import org.apache.hadoop.security.SecurityUtil;
|
||||||
import org.apache.hadoop.security.UserGroupInformation;
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
|
@ -226,7 +227,7 @@ public class DFSck extends Configured implements Tool {
|
||||||
}
|
}
|
||||||
|
|
||||||
private int doWork(final String[] args) throws IOException {
|
private int doWork(final String[] args) throws IOException {
|
||||||
final StringBuilder url = new StringBuilder("http://");
|
final StringBuilder url = new StringBuilder(HttpConfig.getSchemePrefix());
|
||||||
|
|
||||||
String namenodeAddress = getCurrentNamenodeAddress();
|
String namenodeAddress = getCurrentNamenodeAddress();
|
||||||
if (namenodeAddress == null) {
|
if (namenodeAddress == null) {
|
||||||
|
|
|
@ -20,7 +20,6 @@ package org.apache.hadoop.mapreduce.v2.app.webapp;
|
||||||
|
|
||||||
import static org.apache.hadoop.mapreduce.v2.app.webapp.AMParams.JOB_ID;
|
import static org.apache.hadoop.mapreduce.v2.app.webapp.AMParams.JOB_ID;
|
||||||
import static org.apache.hadoop.yarn.util.StringHelper.join;
|
import static org.apache.hadoop.yarn.util.StringHelper.join;
|
||||||
import static org.apache.hadoop.yarn.util.StringHelper.ujoin;
|
|
||||||
import static org.apache.hadoop.yarn.webapp.view.JQueryUI._EVEN;
|
import static org.apache.hadoop.yarn.webapp.view.JQueryUI._EVEN;
|
||||||
import static org.apache.hadoop.yarn.webapp.view.JQueryUI._INFO_WRAP;
|
import static org.apache.hadoop.yarn.webapp.view.JQueryUI._INFO_WRAP;
|
||||||
import static org.apache.hadoop.yarn.webapp.view.JQueryUI._ODD;
|
import static org.apache.hadoop.yarn.webapp.view.JQueryUI._ODD;
|
||||||
|
@ -31,6 +30,7 @@ import static org.apache.hadoop.yarn.webapp.view.JQueryUI._TH;
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.JobId;
|
import org.apache.hadoop.mapreduce.v2.api.records.JobId;
|
||||||
import org.apache.hadoop.mapreduce.v2.app.AppContext;
|
import org.apache.hadoop.mapreduce.v2.app.AppContext;
|
||||||
|
@ -40,8 +40,6 @@ import org.apache.hadoop.mapreduce.v2.app.webapp.dao.JobInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.util.MRApps;
|
import org.apache.hadoop.mapreduce.v2.util.MRApps;
|
||||||
import org.apache.hadoop.mapreduce.v2.util.MRApps.TaskAttemptStateUI;
|
import org.apache.hadoop.mapreduce.v2.util.MRApps.TaskAttemptStateUI;
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
import org.apache.hadoop.yarn.api.records.NodeId;
|
|
||||||
import org.apache.hadoop.yarn.util.BuilderUtils;
|
|
||||||
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet;
|
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet;
|
||||||
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet.DIV;
|
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet.DIV;
|
||||||
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet.TABLE;
|
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet.TABLE;
|
||||||
|
@ -106,7 +104,8 @@ public class JobBlock extends HtmlBlock {
|
||||||
table.tr().
|
table.tr().
|
||||||
td(String.valueOf(attempt.getAttemptId())).
|
td(String.valueOf(attempt.getAttemptId())).
|
||||||
td(new Date(attempt.getStartTime()).toString()).
|
td(new Date(attempt.getStartTime()).toString()).
|
||||||
td().a(".nodelink", url("http://", attempt.getNodeHttpAddress()),
|
td().a(".nodelink", url(HttpConfig.getSchemePrefix(),
|
||||||
|
attempt.getNodeHttpAddress()),
|
||||||
attempt.getNodeHttpAddress())._().
|
attempt.getNodeHttpAddress())._().
|
||||||
td().a(".logslink", url(attempt.getLogsLink()),
|
td().a(".logslink", url(attempt.getLogsLink()),
|
||||||
"logs")._().
|
"logs")._().
|
||||||
|
|
|
@ -24,6 +24,7 @@ import com.google.inject.Inject;
|
||||||
|
|
||||||
import static org.apache.hadoop.mapreduce.v2.app.webapp.AMWebApp.*;
|
import static org.apache.hadoop.mapreduce.v2.app.webapp.AMWebApp.*;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.util.MRApps;
|
import org.apache.hadoop.mapreduce.v2.util.MRApps;
|
||||||
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet;
|
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet;
|
||||||
|
@ -62,7 +63,8 @@ public class NavBlock extends HtmlBlock {
|
||||||
li().a(url("conf", jobid), "Configuration")._().
|
li().a(url("conf", jobid), "Configuration")._().
|
||||||
li().a(url("tasks", jobid, "m"), "Map tasks")._().
|
li().a(url("tasks", jobid, "m"), "Map tasks")._().
|
||||||
li().a(url("tasks", jobid, "r"), "Reduce tasks")._().
|
li().a(url("tasks", jobid, "r"), "Reduce tasks")._().
|
||||||
li().a(".logslink", url("http://", nodeHttpAddress, "node",
|
li().a(".logslink", url(HttpConfig.getSchemePrefix(),
|
||||||
|
nodeHttpAddress, "node",
|
||||||
"containerlogs", thisAmInfo.getContainerId().toString(),
|
"containerlogs", thisAmInfo.getContainerId().toString(),
|
||||||
app.getJob().getUserName()),
|
app.getJob().getUserName()),
|
||||||
"AM Logs")._()._();
|
"AM Logs")._()._();
|
||||||
|
|
|
@ -27,6 +27,7 @@ import static org.apache.hadoop.yarn.webapp.view.JQueryUI.tableInit;
|
||||||
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.v2.app.job.TaskAttempt;
|
import org.apache.hadoop.mapreduce.v2.app.job.TaskAttempt;
|
||||||
import org.apache.hadoop.mapreduce.v2.app.webapp.dao.TaskAttemptInfo;
|
import org.apache.hadoop.mapreduce.v2.app.webapp.dao.TaskAttemptInfo;
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
|
@ -93,13 +94,15 @@ public class TaskPage extends AppView {
|
||||||
nodeTd._("N/A");
|
nodeTd._("N/A");
|
||||||
} else {
|
} else {
|
||||||
nodeTd.
|
nodeTd.
|
||||||
a(".nodelink", url("http://", nodeHttpAddr), nodeHttpAddr);
|
a(".nodelink", url(HttpConfig.getSchemePrefix(),
|
||||||
|
nodeHttpAddr), nodeHttpAddr);
|
||||||
}
|
}
|
||||||
nodeTd._();
|
nodeTd._();
|
||||||
if (containerId != null) {
|
if (containerId != null) {
|
||||||
String containerIdStr = ta.getAssignedContainerIdStr();
|
String containerIdStr = ta.getAssignedContainerIdStr();
|
||||||
row.td().
|
row.td().
|
||||||
a(".logslink", url("http://", nodeHttpAddr, "node", "containerlogs",
|
a(".logslink", url(HttpConfig.getSchemePrefix(),
|
||||||
|
nodeHttpAddr, "node", "containerlogs",
|
||||||
containerIdStr, app.getJob().getUserName()), "logs")._();
|
containerIdStr, app.getJob().getUserName()), "logs")._();
|
||||||
} else {
|
} else {
|
||||||
row.td()._("N/A")._();
|
row.td()._("N/A")._();
|
||||||
|
|
|
@ -24,6 +24,7 @@ import javax.xml.bind.annotation.XmlAccessType;
|
||||||
import javax.xml.bind.annotation.XmlAccessorType;
|
import javax.xml.bind.annotation.XmlAccessorType;
|
||||||
import javax.xml.bind.annotation.XmlRootElement;
|
import javax.xml.bind.annotation.XmlRootElement;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
||||||
import org.apache.hadoop.yarn.api.records.ContainerId;
|
import org.apache.hadoop.yarn.api.records.ContainerId;
|
||||||
import org.apache.hadoop.yarn.api.records.NodeId;
|
import org.apache.hadoop.yarn.api.records.NodeId;
|
||||||
|
@ -63,7 +64,7 @@ public class AMAttemptInfo {
|
||||||
ContainerId containerId = amInfo.getContainerId();
|
ContainerId containerId = amInfo.getContainerId();
|
||||||
if (containerId != null) {
|
if (containerId != null) {
|
||||||
this.containerId = containerId.toString();
|
this.containerId = containerId.toString();
|
||||||
this.logsLink = join("http://" + nodeHttpAddress,
|
this.logsLink = join(HttpConfig.getSchemePrefix() + nodeHttpAddress,
|
||||||
ujoin("node", "containerlogs", this.containerId, user));
|
ujoin("node", "containerlogs", this.containerId, user));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,6 +20,7 @@ package org.apache.hadoop.mapreduce.util;
|
||||||
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience.Private;
|
import org.apache.hadoop.classification.InterfaceAudience.Private;
|
||||||
import org.apache.hadoop.classification.InterfaceStability.Unstable;
|
import org.apache.hadoop.classification.InterfaceStability.Unstable;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
|
|
||||||
@Private
|
@Private
|
||||||
@Unstable
|
@Unstable
|
||||||
|
@ -33,9 +34,9 @@ public class HostUtil {
|
||||||
* @return the taskLogUrl
|
* @return the taskLogUrl
|
||||||
*/
|
*/
|
||||||
public static String getTaskLogUrl(String taskTrackerHostName,
|
public static String getTaskLogUrl(String taskTrackerHostName,
|
||||||
String httpPort, String taskAttemptID) {
|
String httpPort, String taskAttemptID) {
|
||||||
return ("http://" + taskTrackerHostName + ":" + httpPort
|
return (HttpConfig.getSchemePrefix() + taskTrackerHostName + ":" +
|
||||||
+ "/tasklog?attemptid=" + taskAttemptID);
|
httpPort + "/tasklog?attemptid=" + taskAttemptID);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static String convertTrackerNameToHostName(String trackerName) {
|
public static String convertTrackerNameToHostName(String trackerName) {
|
||||||
|
|
|
@ -21,28 +21,18 @@ package org.apache.hadoop.mapreduce.v2.hs.webapp;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import org.apache.hadoop.mapreduce.JobACL;
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
import org.apache.hadoop.mapreduce.v2.api.records.AMInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.JobId;
|
import org.apache.hadoop.mapreduce.v2.api.records.JobId;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.JobReport;
|
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.TaskAttemptId;
|
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.TaskAttemptState;
|
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.TaskId;
|
|
||||||
import org.apache.hadoop.mapreduce.v2.app.AppContext;
|
import org.apache.hadoop.mapreduce.v2.app.AppContext;
|
||||||
import org.apache.hadoop.mapreduce.v2.app.job.Job;
|
import org.apache.hadoop.mapreduce.v2.app.job.Job;
|
||||||
import org.apache.hadoop.mapreduce.v2.app.job.Task;
|
|
||||||
import org.apache.hadoop.mapreduce.v2.app.job.TaskAttempt;
|
|
||||||
import org.apache.hadoop.mapreduce.v2.app.webapp.dao.ConfEntryInfo;
|
import org.apache.hadoop.mapreduce.v2.app.webapp.dao.ConfEntryInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.hs.webapp.dao.AMAttemptInfo;
|
import org.apache.hadoop.mapreduce.v2.hs.webapp.dao.AMAttemptInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.hs.webapp.dao.JobInfo;
|
import org.apache.hadoop.mapreduce.v2.hs.webapp.dao.JobInfo;
|
||||||
import org.apache.hadoop.mapreduce.v2.util.MRApps;
|
import org.apache.hadoop.mapreduce.v2.util.MRApps;
|
||||||
import org.apache.hadoop.mapreduce.v2.util.MRApps.TaskAttemptStateUI;
|
import org.apache.hadoop.mapreduce.v2.util.MRApps.TaskAttemptStateUI;
|
||||||
import org.apache.hadoop.security.authorize.AccessControlList;
|
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
import org.apache.hadoop.yarn.api.records.NodeId;
|
|
||||||
import org.apache.hadoop.yarn.util.BuilderUtils;
|
|
||||||
import org.apache.hadoop.yarn.util.Times;
|
import org.apache.hadoop.yarn.util.Times;
|
||||||
import org.apache.hadoop.yarn.webapp.ResponseInfo;
|
import org.apache.hadoop.yarn.webapp.ResponseInfo;
|
||||||
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet;
|
import org.apache.hadoop.yarn.webapp.hamlet.Hamlet;
|
||||||
|
@ -142,7 +132,8 @@ public class HsJobBlock extends HtmlBlock {
|
||||||
table.tr((odd = !odd) ? _ODD : _EVEN).
|
table.tr((odd = !odd) ? _ODD : _EVEN).
|
||||||
td(String.valueOf(attempt.getAttemptId())).
|
td(String.valueOf(attempt.getAttemptId())).
|
||||||
td(new Date(attempt.getStartTime()).toString()).
|
td(new Date(attempt.getStartTime()).toString()).
|
||||||
td().a(".nodelink", url("http://", attempt.getNodeHttpAddress()),
|
td().a(".nodelink", url(HttpConfig.getSchemePrefix(),
|
||||||
|
attempt.getNodeHttpAddress()),
|
||||||
attempt.getNodeHttpAddress())._().
|
attempt.getNodeHttpAddress())._().
|
||||||
td().a(".logslink", url(attempt.getShortLogsLink()),
|
td().a(".logslink", url(attempt.getShortLogsLink()),
|
||||||
"logs")._().
|
"logs")._().
|
||||||
|
|
|
@ -29,6 +29,7 @@ import static org.apache.hadoop.yarn.webapp.view.JQueryUI.tableInit;
|
||||||
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.TaskId;
|
import org.apache.hadoop.mapreduce.v2.api.records.TaskId;
|
||||||
import org.apache.hadoop.mapreduce.v2.api.records.TaskType;
|
import org.apache.hadoop.mapreduce.v2.api.records.TaskType;
|
||||||
import org.apache.hadoop.mapreduce.v2.app.job.TaskAttempt;
|
import org.apache.hadoop.mapreduce.v2.app.job.TaskAttempt;
|
||||||
|
@ -143,7 +144,7 @@ public class HsTaskPage extends HsView {
|
||||||
|
|
||||||
td.br().$title(String.valueOf(sortId))._(). // sorting
|
td.br().$title(String.valueOf(sortId))._(). // sorting
|
||||||
_(taid)._().td(ta.getState().toString()).td().a(".nodelink",
|
_(taid)._().td(ta.getState().toString()).td().a(".nodelink",
|
||||||
"http://"+ nodeHttpAddr,
|
HttpConfig.getSchemePrefix()+ nodeHttpAddr,
|
||||||
nodeRackName + "/" + nodeHttpAddr);
|
nodeRackName + "/" + nodeHttpAddr);
|
||||||
td._();
|
td._();
|
||||||
row.td().
|
row.td().
|
||||||
|
|
|
@ -32,6 +32,7 @@ import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.mapreduce.JobID;
|
import org.apache.hadoop.mapreduce.JobID;
|
||||||
import org.apache.hadoop.mapreduce.JobStatus;
|
import org.apache.hadoop.mapreduce.JobStatus;
|
||||||
import org.apache.hadoop.mapreduce.MRJobConfig;
|
import org.apache.hadoop.mapreduce.MRJobConfig;
|
||||||
|
@ -393,7 +394,7 @@ public class ClientServiceDelegate {
|
||||||
String url = StringUtils.isNotEmpty(historyTrackingUrl)
|
String url = StringUtils.isNotEmpty(historyTrackingUrl)
|
||||||
? historyTrackingUrl : trackingUrl;
|
? historyTrackingUrl : trackingUrl;
|
||||||
if (!UNAVAILABLE.equals(url)) {
|
if (!UNAVAILABLE.equals(url)) {
|
||||||
url = "http://" + url;
|
url = HttpConfig.getSchemePrefix() + url;
|
||||||
}
|
}
|
||||||
jobStatus = TypeConverter.fromYarn(report, url);
|
jobStatus = TypeConverter.fromYarn(report, url);
|
||||||
}
|
}
|
||||||
|
|
|
@ -33,6 +33,7 @@ import java.util.concurrent.locks.ReentrantReadWriteLock.WriteLock;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.yarn.api.records.ApplicationAttemptId;
|
import org.apache.hadoop.yarn.api.records.ApplicationAttemptId;
|
||||||
import org.apache.hadoop.yarn.api.records.ApplicationResourceUsageReport;
|
import org.apache.hadoop.yarn.api.records.ApplicationResourceUsageReport;
|
||||||
import org.apache.hadoop.yarn.api.records.FinalApplicationStatus;
|
import org.apache.hadoop.yarn.api.records.FinalApplicationStatus;
|
||||||
|
@ -393,13 +394,13 @@ public class RMAppAttemptImpl implements RMAppAttempt {
|
||||||
final String trackingUriWithoutScheme) {
|
final String trackingUriWithoutScheme) {
|
||||||
this.readLock.lock();
|
this.readLock.lock();
|
||||||
try {
|
try {
|
||||||
URI trackingUri = trackingUriWithoutScheme == null ? null :
|
URI trackingUri = trackingUriWithoutScheme == null ? null :
|
||||||
ProxyUriUtils.getUriFromAMUrl(trackingUriWithoutScheme);
|
ProxyUriUtils.getUriFromAMUrl(trackingUriWithoutScheme);
|
||||||
URI proxyUri = ProxyUriUtils.getUriFromAMUrl(proxy);
|
URI proxyUri = ProxyUriUtils.getUriFromAMUrl(proxy);
|
||||||
URI result = ProxyUriUtils.getProxyUri(trackingUri, proxyUri,
|
URI result = ProxyUriUtils.getProxyUri(trackingUri, proxyUri,
|
||||||
applicationAttemptId.getApplicationId());
|
applicationAttemptId.getApplicationId());
|
||||||
//We need to strip off the scheme to have it match what was there before
|
//We need to strip off the scheme to have it match what was there before
|
||||||
return result.toASCIIString().substring(7);
|
return result.toASCIIString().substring(HttpConfig.getSchemePrefix().length());
|
||||||
} catch (URISyntaxException e) {
|
} catch (URISyntaxException e) {
|
||||||
LOG.warn("Could not proxify "+trackingUriWithoutScheme,e);
|
LOG.warn("Could not proxify "+trackingUriWithoutScheme,e);
|
||||||
return trackingUriWithoutScheme;
|
return trackingUriWithoutScheme;
|
||||||
|
|
|
@ -30,6 +30,7 @@ import java.util.Collection;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.security.UserGroupInformation;
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
import org.apache.hadoop.yarn.api.records.ApplicationAccessType;
|
import org.apache.hadoop.yarn.api.records.ApplicationAccessType;
|
||||||
|
@ -137,7 +138,8 @@ public class AppBlock extends HtmlBlock {
|
||||||
table.tr((odd = !odd) ? _ODD : _EVEN).
|
table.tr((odd = !odd) ? _ODD : _EVEN).
|
||||||
td(String.valueOf(attemptInfo.getAttemptId())).
|
td(String.valueOf(attemptInfo.getAttemptId())).
|
||||||
td(Times.format(attemptInfo.getStartTime())).
|
td(Times.format(attemptInfo.getStartTime())).
|
||||||
td().a(".nodelink", url("http://", attemptInfo.getNodeHttpAddress()),
|
td().a(".nodelink", url(HttpConfig.getSchemePrefix(),
|
||||||
|
attemptInfo.getNodeHttpAddress()),
|
||||||
attemptInfo.getNodeHttpAddress())._().
|
attemptInfo.getNodeHttpAddress())._().
|
||||||
td().a(".logslink", url(attemptInfo.getLogsLink()), "logs")._().
|
td().a(".logslink", url(attemptInfo.getLogsLink()), "logs")._().
|
||||||
_();
|
_();
|
||||||
|
|
|
@ -26,6 +26,7 @@ import static org.apache.hadoop.yarn.webapp.view.JQueryUI.tableInit;
|
||||||
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.util.StringUtils;
|
import org.apache.hadoop.util.StringUtils;
|
||||||
import org.apache.hadoop.yarn.api.records.NodeState;
|
import org.apache.hadoop.yarn.api.records.NodeState;
|
||||||
import org.apache.hadoop.yarn.server.resourcemanager.RMContext;
|
import org.apache.hadoop.yarn.server.resourcemanager.RMContext;
|
||||||
|
@ -118,7 +119,8 @@ class NodesPage extends RmView {
|
||||||
row.td()._("N/A")._();
|
row.td()._("N/A")._();
|
||||||
} else {
|
} else {
|
||||||
String httpAddress = info.getNodeHTTPAddress();
|
String httpAddress = info.getNodeHTTPAddress();
|
||||||
row.td().a("http://" + httpAddress, httpAddress)._();
|
row.td().a(HttpConfig.getSchemePrefix() + httpAddress,
|
||||||
|
httpAddress)._();
|
||||||
}
|
}
|
||||||
row.td(info.getHealthStatus()).
|
row.td(info.getHealthStatus()).
|
||||||
td().br().$title(String.valueOf(info.getLastHealthUpdate()))._().
|
td().br().$title(String.valueOf(info.getLastHealthUpdate()))._().
|
||||||
|
|
|
@ -23,6 +23,7 @@ import javax.xml.bind.annotation.XmlAccessType;
|
||||||
import javax.xml.bind.annotation.XmlAccessorType;
|
import javax.xml.bind.annotation.XmlAccessorType;
|
||||||
import javax.xml.bind.annotation.XmlRootElement;
|
import javax.xml.bind.annotation.XmlRootElement;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.yarn.api.records.Container;
|
import org.apache.hadoop.yarn.api.records.Container;
|
||||||
import org.apache.hadoop.yarn.server.resourcemanager.rmapp.attempt.RMAppAttempt;
|
import org.apache.hadoop.yarn.server.resourcemanager.rmapp.attempt.RMAppAttempt;
|
||||||
import org.apache.hadoop.yarn.util.ConverterUtils;
|
import org.apache.hadoop.yarn.util.ConverterUtils;
|
||||||
|
@ -55,7 +56,8 @@ public class AppAttemptInfo {
|
||||||
this.containerId = masterContainer.getId().toString();
|
this.containerId = masterContainer.getId().toString();
|
||||||
this.nodeHttpAddress = masterContainer.getNodeHttpAddress();
|
this.nodeHttpAddress = masterContainer.getNodeHttpAddress();
|
||||||
this.nodeId = masterContainer.getNodeId().toString();
|
this.nodeId = masterContainer.getNodeId().toString();
|
||||||
this.logsLink = join("http://", masterContainer.getNodeHttpAddress(),
|
this.logsLink = join(HttpConfig.getSchemePrefix(),
|
||||||
|
masterContainer.getNodeHttpAddress(),
|
||||||
"/node", "/containerlogs/",
|
"/node", "/containerlogs/",
|
||||||
ConverterUtils.toString(masterContainer.getId()),
|
ConverterUtils.toString(masterContainer.getId()),
|
||||||
"/", attempt.getSubmissionContext().getUser());
|
"/", attempt.getSubmissionContext().getUser());
|
||||||
|
|
|
@ -24,6 +24,7 @@ import javax.xml.bind.annotation.XmlAccessorType;
|
||||||
import javax.xml.bind.annotation.XmlRootElement;
|
import javax.xml.bind.annotation.XmlRootElement;
|
||||||
import javax.xml.bind.annotation.XmlTransient;
|
import javax.xml.bind.annotation.XmlTransient;
|
||||||
|
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.yarn.api.records.ApplicationId;
|
import org.apache.hadoop.yarn.api.records.ApplicationId;
|
||||||
import org.apache.hadoop.yarn.api.records.Container;
|
import org.apache.hadoop.yarn.api.records.Container;
|
||||||
import org.apache.hadoop.yarn.api.records.FinalApplicationStatus;
|
import org.apache.hadoop.yarn.api.records.FinalApplicationStatus;
|
||||||
|
@ -87,10 +88,10 @@ public class AppInfo {
|
||||||
this.trackingUI = this.trackingUrlIsNotReady ? "UNASSIGNED" : (app
|
this.trackingUI = this.trackingUrlIsNotReady ? "UNASSIGNED" : (app
|
||||||
.getFinishTime() == 0 ? "ApplicationMaster" : "History");
|
.getFinishTime() == 0 ? "ApplicationMaster" : "History");
|
||||||
if (!trackingUrlIsNotReady) {
|
if (!trackingUrlIsNotReady) {
|
||||||
this.trackingUrl = join("http://", trackingUrl);
|
this.trackingUrl = join(HttpConfig.getSchemePrefix(), trackingUrl);
|
||||||
}
|
}
|
||||||
this.trackingUrlPretty = trackingUrlIsNotReady ? "UNASSIGNED" : join(
|
this.trackingUrlPretty = trackingUrlIsNotReady ? "UNASSIGNED" : join(
|
||||||
"http://", trackingUrl);
|
HttpConfig.getSchemePrefix(), trackingUrl);
|
||||||
this.applicationId = app.getApplicationId();
|
this.applicationId = app.getApplicationId();
|
||||||
this.appIdNum = String.valueOf(app.getApplicationId().getId());
|
this.appIdNum = String.valueOf(app.getApplicationId().getId());
|
||||||
this.id = app.getApplicationId().toString();
|
this.id = app.getApplicationId().toString();
|
||||||
|
@ -104,7 +105,6 @@ public class AppInfo {
|
||||||
}
|
}
|
||||||
this.finalStatus = app.getFinalApplicationStatus();
|
this.finalStatus = app.getFinalApplicationStatus();
|
||||||
this.clusterId = ResourceManager.clusterTimeStamp;
|
this.clusterId = ResourceManager.clusterTimeStamp;
|
||||||
|
|
||||||
if (hasAccess) {
|
if (hasAccess) {
|
||||||
this.startedTime = app.getStartTime();
|
this.startedTime = app.getStartTime();
|
||||||
this.finishedTime = app.getFinishTime();
|
this.finishedTime = app.getFinishTime();
|
||||||
|
@ -116,7 +116,8 @@ public class AppInfo {
|
||||||
Container masterContainer = attempt.getMasterContainer();
|
Container masterContainer = attempt.getMasterContainer();
|
||||||
if (masterContainer != null) {
|
if (masterContainer != null) {
|
||||||
this.amContainerLogsExist = true;
|
this.amContainerLogsExist = true;
|
||||||
String url = join("http://", masterContainer.getNodeHttpAddress(),
|
String url = join(HttpConfig.getSchemePrefix(),
|
||||||
|
masterContainer.getNodeHttpAddress(),
|
||||||
"/node", "/containerlogs/",
|
"/node", "/containerlogs/",
|
||||||
ConverterUtils.toString(masterContainer.getId()),
|
ConverterUtils.toString(masterContainer.getId()),
|
||||||
"/", app.getUser());
|
"/", app.getUser());
|
||||||
|
|
|
@ -27,6 +27,7 @@ import java.net.URLEncoder;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.yarn.api.records.ApplicationId;
|
import org.apache.hadoop.yarn.api.records.ApplicationId;
|
||||||
|
|
||||||
public class ProxyUriUtils {
|
public class ProxyUriUtils {
|
||||||
|
@ -138,8 +139,8 @@ public class ProxyUriUtils {
|
||||||
* @return a URI with an http scheme
|
* @return a URI with an http scheme
|
||||||
* @throws URISyntaxException if the url is not formatted correctly.
|
* @throws URISyntaxException if the url is not formatted correctly.
|
||||||
*/
|
*/
|
||||||
public static URI getUriFromAMUrl(String noSchemeUrl)
|
public static URI getUriFromAMUrl(String noSchemeUrl)
|
||||||
throws URISyntaxException {
|
throws URISyntaxException {
|
||||||
return new URI("http://"+noSchemeUrl);
|
return new URI(HttpConfig.getSchemePrefix() + noSchemeUrl);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,6 +24,7 @@ import java.util.Map;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.http.FilterContainer;
|
import org.apache.hadoop.http.FilterContainer;
|
||||||
import org.apache.hadoop.http.FilterInitializer;
|
import org.apache.hadoop.http.FilterInitializer;
|
||||||
|
import org.apache.hadoop.http.HttpConfig;
|
||||||
import org.apache.hadoop.yarn.api.ApplicationConstants;
|
import org.apache.hadoop.yarn.api.ApplicationConstants;
|
||||||
import org.apache.hadoop.yarn.conf.YarnConfiguration;
|
import org.apache.hadoop.yarn.conf.YarnConfiguration;
|
||||||
|
|
||||||
|
@ -37,7 +38,8 @@ public class AmFilterInitializer extends FilterInitializer {
|
||||||
String proxy = YarnConfiguration.getProxyHostAndPort(conf);
|
String proxy = YarnConfiguration.getProxyHostAndPort(conf);
|
||||||
String[] parts = proxy.split(":");
|
String[] parts = proxy.split(":");
|
||||||
params.put(AmIpFilter.PROXY_HOST, parts[0]);
|
params.put(AmIpFilter.PROXY_HOST, parts[0]);
|
||||||
params.put(AmIpFilter.PROXY_URI_BASE, "http://"+proxy+
|
params.put(AmIpFilter.PROXY_URI_BASE,
|
||||||
|
HttpConfig.getSchemePrefix() + proxy +
|
||||||
System.getenv(ApplicationConstants.APPLICATION_WEB_PROXY_BASE_ENV));
|
System.getenv(ApplicationConstants.APPLICATION_WEB_PROXY_BASE_ENV));
|
||||||
container.addFilter(FILTER_NAME, FILTER_CLASS, params);
|
container.addFilter(FILTER_NAME, FILTER_CLASS, params);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue