Merge trunk into HA branch.
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/branches/HDFS-1623@1202940 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
commit
61f77396fa
|
@ -114,6 +114,9 @@ Release 0.23.1 - Unreleased
|
||||||
|
|
||||||
BUG FIXES
|
BUG FIXES
|
||||||
|
|
||||||
|
HADOOP-7811. TestUserGroupInformation#testGetServerSideGroups test fails in chroot.
|
||||||
|
(Jonathan Eagles via mahadev)
|
||||||
|
|
||||||
Release 0.23.0 - 2011-11-01
|
Release 0.23.0 - 2011-11-01
|
||||||
|
|
||||||
INCOMPATIBLE CHANGES
|
INCOMPATIBLE CHANGES
|
||||||
|
|
|
@ -99,7 +99,7 @@ public class TestUserGroupInformation {
|
||||||
(new InputStreamReader(pp.getInputStream()));
|
(new InputStreamReader(pp.getInputStream()));
|
||||||
String userName = br.readLine().trim();
|
String userName = br.readLine().trim();
|
||||||
// get the groups
|
// get the groups
|
||||||
pp = Runtime.getRuntime().exec("id -Gn");
|
pp = Runtime.getRuntime().exec("id -Gn " + userName);
|
||||||
br = new BufferedReader(new InputStreamReader(pp.getInputStream()));
|
br = new BufferedReader(new InputStreamReader(pp.getInputStream()));
|
||||||
String line = br.readLine();
|
String line = br.readLine();
|
||||||
System.out.println(userName + ":" + line);
|
System.out.println(userName + ":" + line);
|
||||||
|
|
|
@ -91,6 +91,9 @@ Release 0.23.1 - Unreleased
|
||||||
MAPREDUCE-3331. Improvement to single node cluster setup documentation for
|
MAPREDUCE-3331. Improvement to single node cluster setup documentation for
|
||||||
0.23 (Anupam Seth via mahadev)
|
0.23 (Anupam Seth via mahadev)
|
||||||
|
|
||||||
|
MAPREDUCE-3102. Changed NodeManager to fail fast when LinuxContainerExecutor
|
||||||
|
has wrong configuration or permissions. (Hitesh Shah via vinodkv)
|
||||||
|
|
||||||
OPTIMIZATIONS
|
OPTIMIZATIONS
|
||||||
|
|
||||||
BUG FIXES
|
BUG FIXES
|
||||||
|
@ -132,6 +135,12 @@ Release 0.23.1 - Unreleased
|
||||||
MAPREDUCE-3324. Not All HttpServer tools links (stacks,logs,config,metrics) are
|
MAPREDUCE-3324. Not All HttpServer tools links (stacks,logs,config,metrics) are
|
||||||
accessible through all UI servers (Jonathan Eagles via mahadev)
|
accessible through all UI servers (Jonathan Eagles via mahadev)
|
||||||
|
|
||||||
|
MAPREDUCE-3355. Fixed MR AM's ContainerLauncher to handle node-command
|
||||||
|
timeouts correctly. (vinodkv)
|
||||||
|
|
||||||
|
MAPREDUCE-3407. Fixed pom files to refer to the correct MR app-jar needed
|
||||||
|
by the integration tests. (Hitesh Shah via vinodkv)
|
||||||
|
|
||||||
Release 0.23.0 - 2011-11-01
|
Release 0.23.0 - 2011-11-01
|
||||||
|
|
||||||
INCOMPATIBLE CHANGES
|
INCOMPATIBLE CHANGES
|
||||||
|
|
|
@ -82,6 +82,7 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
private Thread eventHandlingThread;
|
private Thread eventHandlingThread;
|
||||||
private BlockingQueue<ContainerLauncherEvent> eventQueue =
|
private BlockingQueue<ContainerLauncherEvent> eventQueue =
|
||||||
new LinkedBlockingQueue<ContainerLauncherEvent>();
|
new LinkedBlockingQueue<ContainerLauncherEvent>();
|
||||||
|
final Timer commandTimer = new Timer(true);
|
||||||
YarnRPC rpc;
|
YarnRPC rpc;
|
||||||
|
|
||||||
// To track numNodes.
|
// To track numNodes.
|
||||||
|
@ -201,14 +202,14 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
return proxy;
|
return proxy;
|
||||||
}
|
}
|
||||||
|
|
||||||
private static class CommandTimer extends TimerTask {
|
private static class CommandTimerTask extends TimerTask {
|
||||||
private final Thread commandThread;
|
private final Thread commandThread;
|
||||||
protected final ContainerLauncherEvent event;
|
|
||||||
protected final String message;
|
protected final String message;
|
||||||
|
private boolean cancelled = false;
|
||||||
|
|
||||||
public CommandTimer(Thread thread, ContainerLauncherEvent event) {
|
public CommandTimerTask(Thread thread, ContainerLauncherEvent event) {
|
||||||
|
super();
|
||||||
this.commandThread = thread;
|
this.commandThread = thread;
|
||||||
this.event = event;
|
|
||||||
this.message = "Couldn't complete " + event.getType() + " on "
|
this.message = "Couldn't complete " + event.getType() + " on "
|
||||||
+ event.getContainerID() + "/" + event.getTaskAttemptID()
|
+ event.getContainerID() + "/" + event.getTaskAttemptID()
|
||||||
+ ". Interrupting and returning";
|
+ ". Interrupting and returning";
|
||||||
|
@ -216,8 +217,27 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void run() {
|
public void run() {
|
||||||
LOG.warn(this.message);
|
synchronized (this) {
|
||||||
this.commandThread.interrupt();
|
if (this.cancelled) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
LOG.warn(this.message);
|
||||||
|
StackTraceElement[] trace = this.commandThread.getStackTrace();
|
||||||
|
StringBuilder logMsg = new StringBuilder();
|
||||||
|
for (int i = 0; i < trace.length; i++) {
|
||||||
|
logMsg.append("\n\tat " + trace[i]);
|
||||||
|
}
|
||||||
|
LOG.info("Stack trace of the command-thread: \n" + logMsg.toString());
|
||||||
|
this.commandThread.interrupt();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean cancel() {
|
||||||
|
synchronized (this) {
|
||||||
|
this.cancelled = true;
|
||||||
|
return super.cancel();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -243,10 +263,11 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
ContainerToken containerToken = event.getContainerToken();
|
ContainerToken containerToken = event.getContainerToken();
|
||||||
TaskAttemptId taskAttemptID = event.getTaskAttemptID();
|
TaskAttemptId taskAttemptID = event.getTaskAttemptID();
|
||||||
|
|
||||||
Timer timer = new Timer(true);
|
|
||||||
|
|
||||||
ContainerManager proxy = null;
|
ContainerManager proxy = null;
|
||||||
|
|
||||||
|
CommandTimerTask timerTask = new CommandTimerTask(Thread
|
||||||
|
.currentThread(), event);
|
||||||
|
|
||||||
switch(event.getType()) {
|
switch(event.getType()) {
|
||||||
|
|
||||||
case CONTAINER_REMOTE_LAUNCH:
|
case CONTAINER_REMOTE_LAUNCH:
|
||||||
|
@ -254,16 +275,16 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
= (ContainerRemoteLaunchEvent) event;
|
= (ContainerRemoteLaunchEvent) event;
|
||||||
|
|
||||||
try {
|
try {
|
||||||
timer.schedule(new CommandTimer(Thread.currentThread(), event),
|
commandTimer.schedule(timerTask, nmTimeOut);
|
||||||
nmTimeOut);
|
|
||||||
|
|
||||||
proxy = getCMProxy(containerID, containerManagerBindAddr,
|
proxy = getCMProxy(containerID, containerManagerBindAddr,
|
||||||
containerToken);
|
containerToken);
|
||||||
|
|
||||||
// Interruped during getProxy, but that didn't throw exception
|
// Interruped during getProxy, but that didn't throw exception
|
||||||
if (Thread.currentThread().isInterrupted()) {
|
if (Thread.interrupted()) {
|
||||||
// The timer cancelled the command in the mean while.
|
// The timer cancelled the command in the mean while.
|
||||||
String message = "Start-container for " + event.getContainerID()
|
String message = "Container launch failed for " + containerID
|
||||||
|
+ " : Start-container for " + event.getContainerID()
|
||||||
+ " got interrupted. Returning.";
|
+ " got interrupted. Returning.";
|
||||||
sendContainerLaunchFailedMsg(taskAttemptID, message);
|
sendContainerLaunchFailedMsg(taskAttemptID, message);
|
||||||
return;
|
return;
|
||||||
|
@ -280,11 +301,12 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
StartContainerResponse response = proxy.startContainer(startRequest);
|
StartContainerResponse response = proxy.startContainer(startRequest);
|
||||||
|
|
||||||
// container started properly. Stop the timer
|
// container started properly. Stop the timer
|
||||||
timer.cancel();
|
timerTask.cancel();
|
||||||
if (Thread.currentThread().isInterrupted()) {
|
if (Thread.interrupted()) {
|
||||||
// The timer cancelled the command in the mean while, but
|
// The timer cancelled the command in the mean while, but
|
||||||
// startContainer didn't throw exception
|
// startContainer didn't throw exception
|
||||||
String message = "Start-container for " + event.getContainerID()
|
String message = "Container launch failed for " + containerID
|
||||||
|
+ " : Start-container for " + event.getContainerID()
|
||||||
+ " got interrupted. Returning.";
|
+ " got interrupted. Returning.";
|
||||||
sendContainerLaunchFailedMsg(taskAttemptID, message);
|
sendContainerLaunchFailedMsg(taskAttemptID, message);
|
||||||
return;
|
return;
|
||||||
|
@ -309,12 +331,19 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
context.getEventHandler().handle(
|
context.getEventHandler().handle(
|
||||||
new TaskAttemptContainerLaunchedEvent(taskAttemptID, port));
|
new TaskAttemptContainerLaunchedEvent(taskAttemptID, port));
|
||||||
} catch (Throwable t) {
|
} catch (Throwable t) {
|
||||||
|
if (Thread.interrupted()) {
|
||||||
|
// The timer cancelled the command in the mean while.
|
||||||
|
LOG.info("Start-container for " + event.getContainerID()
|
||||||
|
+ " got interrupted.");
|
||||||
|
}
|
||||||
String message = "Container launch failed for " + containerID
|
String message = "Container launch failed for " + containerID
|
||||||
+ " : " + StringUtils.stringifyException(t);
|
+ " : " + StringUtils.stringifyException(t);
|
||||||
sendContainerLaunchFailedMsg(taskAttemptID, message);
|
sendContainerLaunchFailedMsg(taskAttemptID, message);
|
||||||
} finally {
|
} finally {
|
||||||
timer.cancel();
|
timerTask.cancel();
|
||||||
ContainerLauncherImpl.this.rpc.stopProxy(proxy, getConfig());
|
if (proxy != null) {
|
||||||
|
ContainerLauncherImpl.this.rpc.stopProxy(proxy, getConfig());
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
break;
|
break;
|
||||||
|
@ -331,13 +360,12 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
} else {
|
} else {
|
||||||
|
|
||||||
try {
|
try {
|
||||||
timer.schedule(new CommandTimer(Thread.currentThread(), event),
|
commandTimer.schedule(timerTask, nmTimeOut);
|
||||||
nmTimeOut);
|
|
||||||
|
|
||||||
proxy = getCMProxy(containerID, containerManagerBindAddr,
|
proxy = getCMProxy(containerID, containerManagerBindAddr,
|
||||||
containerToken);
|
containerToken);
|
||||||
|
|
||||||
if (Thread.currentThread().isInterrupted()) {
|
if (Thread.interrupted()) {
|
||||||
// The timer cancelled the command in the mean while. No need to
|
// The timer cancelled the command in the mean while. No need to
|
||||||
// return, send cleanedup event anyways.
|
// return, send cleanedup event anyways.
|
||||||
LOG.info("Stop-container for " + event.getContainerID()
|
LOG.info("Stop-container for " + event.getContainerID()
|
||||||
|
@ -353,6 +381,14 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
proxy.stopContainer(stopRequest);
|
proxy.stopContainer(stopRequest);
|
||||||
}
|
}
|
||||||
} catch (Throwable t) {
|
} catch (Throwable t) {
|
||||||
|
|
||||||
|
if (Thread.interrupted()) {
|
||||||
|
// The timer cancelled the command in the mean while, clear the
|
||||||
|
// interrupt flag
|
||||||
|
LOG.info("Stop-container for " + event.getContainerID()
|
||||||
|
+ " got interrupted.");
|
||||||
|
}
|
||||||
|
|
||||||
// ignore the cleanup failure
|
// ignore the cleanup failure
|
||||||
String message = "cleanup failed for container "
|
String message = "cleanup failed for container "
|
||||||
+ event.getContainerID() + " : "
|
+ event.getContainerID() + " : "
|
||||||
|
@ -363,8 +399,18 @@ public class ContainerLauncherImpl extends AbstractService implements
|
||||||
message));
|
message));
|
||||||
LOG.warn(message);
|
LOG.warn(message);
|
||||||
} finally {
|
} finally {
|
||||||
timer.cancel();
|
timerTask.cancel();
|
||||||
ContainerLauncherImpl.this.rpc.stopProxy(proxy, getConfig());
|
if (Thread.interrupted()) {
|
||||||
|
LOG.info("Stop-container for " + event.getContainerID()
|
||||||
|
+ " got interrupted.");
|
||||||
|
// ignore the cleanup failure
|
||||||
|
context.getEventHandler()
|
||||||
|
.handle(new TaskAttemptDiagnosticsUpdateEvent(taskAttemptID,
|
||||||
|
"cleanup failed for container " + event.getContainerID()));
|
||||||
|
}
|
||||||
|
if (proxy != null) {
|
||||||
|
ContainerLauncherImpl.this.rpc.stopProxy(proxy, getConfig());
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// after killing, send killed event to taskattempt
|
// after killing, send killed event to taskattempt
|
||||||
|
|
|
@ -88,11 +88,19 @@ public class TestContainerLauncher {
|
||||||
|
|
||||||
app.waitForState(job, JobState.FAILED);
|
app.waitForState(job, JobState.FAILED);
|
||||||
|
|
||||||
LOG.info("attempt.getDiagnostics: " + attempt.getDiagnostics());
|
String diagnostics = attempt.getDiagnostics().toString();
|
||||||
Assert.assertTrue(attempt.getDiagnostics().toString().contains(
|
LOG.info("attempt.getDiagnostics: " + diagnostics);
|
||||||
"Container launch failed for container_0_0000_01_000000 : "));
|
if (swallowInterrupts) {
|
||||||
Assert.assertTrue(attempt.getDiagnostics().toString().contains(
|
Assert.assertEquals("[Container launch failed for "
|
||||||
": java.lang.InterruptedException"));
|
+ "container_0_0000_01_000000 : Start-container for "
|
||||||
|
+ "container_0_0000_01_000000 got interrupted. Returning.]",
|
||||||
|
diagnostics);
|
||||||
|
} else {
|
||||||
|
Assert.assertTrue(diagnostics.contains("Container launch failed for "
|
||||||
|
+ "container_0_0000_01_000000 : "));
|
||||||
|
Assert.assertTrue(diagnostics
|
||||||
|
.contains(": java.lang.InterruptedException"));
|
||||||
|
}
|
||||||
|
|
||||||
app.stop();
|
app.stop();
|
||||||
}
|
}
|
||||||
|
@ -119,11 +127,10 @@ public class TestContainerLauncher {
|
||||||
}
|
}
|
||||||
} catch (InterruptedException e) {
|
} catch (InterruptedException e) {
|
||||||
LOG.info(e);
|
LOG.info(e);
|
||||||
if (!swallowInterrupts) {
|
if (!MRAppWithSlowNM.this.swallowInterrupts) {
|
||||||
throw new IOException(e);
|
throw new IOException(e);
|
||||||
} else {
|
|
||||||
Thread.currentThread().interrupt();
|
|
||||||
}
|
}
|
||||||
|
Thread.currentThread().interrupt();
|
||||||
}
|
}
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
|
@ -102,8 +102,11 @@
|
||||||
<artifactId>maven-surefire-plugin</artifactId>
|
<artifactId>maven-surefire-plugin</artifactId>
|
||||||
<configuration>
|
<configuration>
|
||||||
<systemPropertyVariables>
|
<systemPropertyVariables>
|
||||||
<yarn.mr.jar>${project.build.directory}/${project.artifactId}-${project.version}.jar</yarn.mr.jar>
|
<yarn.mr.jar>${project.parent.basedir}/hadoop-mapreduce-client-app/target/hadoop-mapreduce-client-app-${project.version}.jar</yarn.mr.jar>
|
||||||
</systemPropertyVariables>
|
</systemPropertyVariables>
|
||||||
|
<environmentVariables>
|
||||||
|
<JAVA_HOME>${java.home}</JAVA_HOME>
|
||||||
|
</environmentVariables>
|
||||||
<additionalClasspathElements>
|
<additionalClasspathElements>
|
||||||
<!-- workaround for JobConf#setJarByClass -->
|
<!-- workaround for JobConf#setJarByClass -->
|
||||||
<additionalClasspathElement>${project.build.directory}/${project.artifactId}-${project.version}-tests.jar</additionalClasspathElement>
|
<additionalClasspathElement>${project.build.directory}/${project.artifactId}-${project.version}-tests.jar</additionalClasspathElement>
|
||||||
|
|
|
@ -112,7 +112,10 @@
|
||||||
<systemPropertyVariables>
|
<systemPropertyVariables>
|
||||||
<yarn.ds.jar>${project.build.directory}/${project.artifactId}-${project.version}.jar</yarn.ds.jar>
|
<yarn.ds.jar>${project.build.directory}/${project.artifactId}-${project.version}.jar</yarn.ds.jar>
|
||||||
</systemPropertyVariables>
|
</systemPropertyVariables>
|
||||||
</configuration>
|
<environmentVariables>
|
||||||
|
<JAVA_HOME>${java.home}</JAVA_HOME>
|
||||||
|
</environmentVariables>
|
||||||
|
</configuration>
|
||||||
</plugin>
|
</plugin>
|
||||||
</plugins>
|
</plugins>
|
||||||
</build>
|
</build>
|
||||||
|
|
|
@ -62,6 +62,13 @@ public abstract class ContainerExecutor implements Configurable {
|
||||||
return conf;
|
return conf;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Run the executor initialization steps.
|
||||||
|
* Verify that the necessary configs, permissions are in place.
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
public abstract void init() throws IOException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Prepare the environment for containers in this application to execute.
|
* Prepare the environment for containers in this application to execute.
|
||||||
* For $x in local.dirs
|
* For $x in local.dirs
|
||||||
|
|
|
@ -69,6 +69,11 @@ public class DefaultContainerExecutor extends ContainerExecutor {
|
||||||
this.lfs = lfs;
|
this.lfs = lfs;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void init() throws IOException {
|
||||||
|
// nothing to do or verify here
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void startLocalizer(Path nmPrivateContainerTokensPath,
|
public void startLocalizer(Path nmPrivateContainerTokensPath,
|
||||||
InetSocketAddress nmAddr, String user, String appId, String locId,
|
InetSocketAddress nmAddr, String user, String appId, String locId,
|
||||||
|
|
|
@ -100,6 +100,29 @@ public class LinuxContainerExecutor extends ContainerExecutor {
|
||||||
: conf.get(YarnConfiguration.NM_LINUX_CONTAINER_EXECUTOR_PATH, defaultPath);
|
: conf.get(YarnConfiguration.NM_LINUX_CONTAINER_EXECUTOR_PATH, defaultPath);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void init() throws IOException {
|
||||||
|
// Send command to executor which will just start up,
|
||||||
|
// verify configuration/permissions and exit
|
||||||
|
List<String> command = new ArrayList<String>(
|
||||||
|
Arrays.asList(containerExecutorExe,
|
||||||
|
"--checksetup"));
|
||||||
|
String[] commandArray = command.toArray(new String[command.size()]);
|
||||||
|
ShellCommandExecutor shExec = new ShellCommandExecutor(commandArray);
|
||||||
|
if (LOG.isDebugEnabled()) {
|
||||||
|
LOG.debug("checkLinuxExecutorSetup: " + Arrays.toString(commandArray));
|
||||||
|
}
|
||||||
|
try {
|
||||||
|
shExec.execute();
|
||||||
|
} catch (ExitCodeException e) {
|
||||||
|
int exitCode = shExec.getExitCode();
|
||||||
|
LOG.warn("Exit code from container is : " + exitCode);
|
||||||
|
logOutput(shExec.getOutput());
|
||||||
|
throw new IOException("Linux container executor not configured properly"
|
||||||
|
+ " (error=" + exitCode + ")", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void startLocalizer(Path nmPrivateContainerTokensPath,
|
public void startLocalizer(Path nmPrivateContainerTokensPath,
|
||||||
InetSocketAddress nmAddr, String user, String appId, String locId,
|
InetSocketAddress nmAddr, String user, String appId, String locId,
|
||||||
|
|
|
@ -110,6 +110,11 @@ public class NodeManager extends CompositeService implements
|
||||||
ContainerExecutor exec = ReflectionUtils.newInstance(
|
ContainerExecutor exec = ReflectionUtils.newInstance(
|
||||||
conf.getClass(YarnConfiguration.NM_CONTAINER_EXECUTOR,
|
conf.getClass(YarnConfiguration.NM_CONTAINER_EXECUTOR,
|
||||||
DefaultContainerExecutor.class, ContainerExecutor.class), conf);
|
DefaultContainerExecutor.class, ContainerExecutor.class), conf);
|
||||||
|
try {
|
||||||
|
exec.init();
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new YarnException("Failed to initialize container executor", e);
|
||||||
|
}
|
||||||
DeletionService del = new DeletionService(exec);
|
DeletionService del = new DeletionService(exec);
|
||||||
addService(del);
|
addService(del);
|
||||||
|
|
||||||
|
|
|
@ -302,9 +302,11 @@ public class ContainerLaunch implements Callable<Integer> {
|
||||||
// by this time, it will never be launched
|
// by this time, it will never be launched
|
||||||
exec.deactivateContainer(containerId);
|
exec.deactivateContainer(containerId);
|
||||||
|
|
||||||
LOG.debug("Getting pid for container " + containerIdStr + " to kill"
|
if (LOG.isDebugEnabled()) {
|
||||||
+ " from pid file "
|
LOG.debug("Getting pid for container " + containerIdStr + " to kill"
|
||||||
+ (pidFilePath != null ? pidFilePath.toString() : "null"));
|
+ " from pid file "
|
||||||
|
+ (pidFilePath != null ? pidFilePath.toString() : "null"));
|
||||||
|
}
|
||||||
|
|
||||||
// however the container process may have already started
|
// however the container process may have already started
|
||||||
try {
|
try {
|
||||||
|
|
|
@ -38,12 +38,15 @@
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
void display_usage(FILE *stream) {
|
void display_usage(FILE *stream) {
|
||||||
|
fprintf(stream,
|
||||||
|
"Usage: container-executor --checksetup\n");
|
||||||
fprintf(stream,
|
fprintf(stream,
|
||||||
"Usage: container-executor user command command-args\n");
|
"Usage: container-executor user command command-args\n");
|
||||||
fprintf(stream, "Commands:\n");
|
fprintf(stream, "Commands:\n");
|
||||||
fprintf(stream, " initialize container: %2d appid tokens cmd app...\n",
|
fprintf(stream, " initialize container: %2d appid tokens cmd app...\n",
|
||||||
INITIALIZE_CONTAINER);
|
INITIALIZE_CONTAINER);
|
||||||
fprintf(stream, " launch container: %2d appid containerid workdir container-script tokens\n",
|
fprintf(stream,
|
||||||
|
" launch container: %2d appid containerid workdir container-script tokens pidfile\n",
|
||||||
LAUNCH_CONTAINER);
|
LAUNCH_CONTAINER);
|
||||||
fprintf(stream, " signal container: %2d container-pid signal\n",
|
fprintf(stream, " signal container: %2d container-pid signal\n",
|
||||||
SIGNAL_CONTAINER);
|
SIGNAL_CONTAINER);
|
||||||
|
@ -52,14 +55,31 @@ void display_usage(FILE *stream) {
|
||||||
}
|
}
|
||||||
|
|
||||||
int main(int argc, char **argv) {
|
int main(int argc, char **argv) {
|
||||||
//Minimum number of arguments required to run the container-executor
|
int invalid_args = 0;
|
||||||
|
int do_check_setup = 0;
|
||||||
|
|
||||||
|
LOGFILE = stdout;
|
||||||
|
ERRORFILE = stderr;
|
||||||
|
|
||||||
|
// Minimum number of arguments required to run
|
||||||
|
// the std. container-executor commands is 4
|
||||||
|
// 4 args not needed for checksetup option
|
||||||
if (argc < 4) {
|
if (argc < 4) {
|
||||||
|
invalid_args = 1;
|
||||||
|
if (argc == 2) {
|
||||||
|
const char *arg1 = argv[1];
|
||||||
|
if (strcmp("--checksetup", arg1) == 0) {
|
||||||
|
invalid_args = 0;
|
||||||
|
do_check_setup = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (invalid_args != 0) {
|
||||||
display_usage(stdout);
|
display_usage(stdout);
|
||||||
return INVALID_ARGUMENT_NUMBER;
|
return INVALID_ARGUMENT_NUMBER;
|
||||||
}
|
}
|
||||||
|
|
||||||
LOGFILE = stdout;
|
|
||||||
ERRORFILE = stderr;
|
|
||||||
int command;
|
int command;
|
||||||
const char * app_id = NULL;
|
const char * app_id = NULL;
|
||||||
const char * container_id = NULL;
|
const char * container_id = NULL;
|
||||||
|
@ -111,11 +131,19 @@ int main(int argc, char **argv) {
|
||||||
return INVALID_CONTAINER_EXEC_PERMISSIONS;
|
return INVALID_CONTAINER_EXEC_PERMISSIONS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (do_check_setup != 0) {
|
||||||
|
// basic setup checks done
|
||||||
|
// verified configs available and valid
|
||||||
|
// verified executor permissions
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
//checks done for user name
|
//checks done for user name
|
||||||
if (argv[optind] == NULL) {
|
if (argv[optind] == NULL) {
|
||||||
fprintf(ERRORFILE, "Invalid user name.\n");
|
fprintf(ERRORFILE, "Invalid user name.\n");
|
||||||
return INVALID_USER_NAME;
|
return INVALID_USER_NAME;
|
||||||
}
|
}
|
||||||
|
|
||||||
int ret = set_user(argv[optind]);
|
int ret = set_user(argv[optind]);
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
return ret;
|
return ret;
|
||||||
|
@ -143,7 +171,7 @@ int main(int argc, char **argv) {
|
||||||
break;
|
break;
|
||||||
case LAUNCH_CONTAINER:
|
case LAUNCH_CONTAINER:
|
||||||
if (argc < 9) {
|
if (argc < 9) {
|
||||||
fprintf(ERRORFILE, "Too few arguments (%d vs 8) for launch container\n",
|
fprintf(ERRORFILE, "Too few arguments (%d vs 9) for launch container\n",
|
||||||
argc);
|
argc);
|
||||||
fflush(ERRORFILE);
|
fflush(ERRORFILE);
|
||||||
return INVALID_ARGUMENT_NUMBER;
|
return INVALID_ARGUMENT_NUMBER;
|
||||||
|
|
|
@ -0,0 +1,55 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.hadoop.yarn.server.nodemanager;
|
||||||
|
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
import org.apache.hadoop.yarn.YarnException;
|
||||||
|
import org.apache.hadoop.yarn.conf.YarnConfiguration;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
public class TestNodeManager {
|
||||||
|
|
||||||
|
public static final class InvalidContainerExecutor extends
|
||||||
|
DefaultContainerExecutor {
|
||||||
|
@Override
|
||||||
|
public void init() throws IOException {
|
||||||
|
throw new IOException("dummy executor init called");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testContainerExecutorInitCall() {
|
||||||
|
NodeManager nm = new NodeManager();
|
||||||
|
YarnConfiguration conf = new YarnConfiguration();
|
||||||
|
conf.setClass(YarnConfiguration.NM_CONTAINER_EXECUTOR,
|
||||||
|
InvalidContainerExecutor.class,
|
||||||
|
ContainerExecutor.class);
|
||||||
|
try {
|
||||||
|
nm.init(conf);
|
||||||
|
fail("Init should fail");
|
||||||
|
} catch (YarnException e) {
|
||||||
|
//PASS
|
||||||
|
assert(e.getCause().getMessage().contains("dummy executor init called"));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in New Issue