YARN-5836. Malicious AM can kill containers of other apps running in any node its containers are running. Contributed by Botong Huang
(cherry picked from commit 59bfcbf3579e45ddf96db3aafccf669c8e03648f) Conflicts: hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/test/java/org/apache/hadoop/yarn/server/nodemanager/containermanager/BaseContainerManagerTest.java hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-nodemanager/src/test/java/org/apache/hadoop/yarn/server/nodemanager/containermanager/TestContainerManager.java
This commit is contained in:
parent
a8dadd8c53
commit
cb0fccad19
@ -1250,18 +1250,21 @@ protected void authorizeGetAndStopContainerRequest(ContainerId containerId,
|
|||||||
if ((!nmTokenAppId.equals(containerId.getApplicationAttemptId().getApplicationId()))
|
if ((!nmTokenAppId.equals(containerId.getApplicationAttemptId().getApplicationId()))
|
||||||
|| (container != null && !nmTokenAppId.equals(container
|
|| (container != null && !nmTokenAppId.equals(container
|
||||||
.getContainerId().getApplicationAttemptId().getApplicationId()))) {
|
.getContainerId().getApplicationAttemptId().getApplicationId()))) {
|
||||||
|
String msg;
|
||||||
if (stopRequest) {
|
if (stopRequest) {
|
||||||
LOG.warn(identifier.getApplicationAttemptId()
|
msg = identifier.getApplicationAttemptId()
|
||||||
+ " attempted to stop non-application container : "
|
+ " attempted to stop non-application container : "
|
||||||
+ container.getContainerId());
|
+ containerId;
|
||||||
NMAuditLogger.logFailure("UnknownUser", AuditConstants.STOP_CONTAINER,
|
NMAuditLogger.logFailure("UnknownUser", AuditConstants.STOP_CONTAINER,
|
||||||
"ContainerManagerImpl", "Trying to stop unknown container!",
|
"ContainerManagerImpl", "Trying to stop unknown container!",
|
||||||
nmTokenAppId, container.getContainerId());
|
nmTokenAppId, containerId);
|
||||||
} else {
|
} else {
|
||||||
LOG.warn(identifier.getApplicationAttemptId()
|
msg = identifier.getApplicationAttemptId()
|
||||||
+ " attempted to get status for non-application container : "
|
+ " attempted to get status for non-application container : "
|
||||||
+ container.getContainerId());
|
+ containerId;
|
||||||
}
|
}
|
||||||
|
LOG.warn(msg);
|
||||||
|
throw RPCUtil.getRemoteException(msg);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -178,6 +178,17 @@ public void testMultipleContainersStopAndGetStatus() throws Exception {
|
|||||||
super.testMultipleContainersStopAndGetStatus();
|
super.testMultipleContainersStopAndGetStatus();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void testUnauthorizedRequests() throws IOException, YarnException {
|
||||||
|
// Don't run the test if the binary is not available.
|
||||||
|
if (!shouldRunTest()) {
|
||||||
|
LOG.info("LCE binary path is not passed. Not running the test");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
LOG.info("Running testUnauthorizedRequests");
|
||||||
|
super.testUnauthorizedRequests();
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void testStartContainerFailureWithUnknownAuxService() throws Exception {
|
public void testStartContainerFailureWithUnknownAuxService() throws Exception {
|
||||||
// Don't run the test if the binary is not available.
|
// Don't run the test if the binary is not available.
|
||||||
|
@ -40,6 +40,7 @@
|
|||||||
import org.apache.hadoop.security.token.SecretManager.InvalidToken;
|
import org.apache.hadoop.security.token.SecretManager.InvalidToken;
|
||||||
import org.apache.hadoop.yarn.api.ContainerManagementProtocol;
|
import org.apache.hadoop.yarn.api.ContainerManagementProtocol;
|
||||||
import org.apache.hadoop.yarn.api.protocolrecords.GetContainerStatusesRequest;
|
import org.apache.hadoop.yarn.api.protocolrecords.GetContainerStatusesRequest;
|
||||||
|
import org.apache.hadoop.yarn.api.records.ApplicationAttemptId;
|
||||||
import org.apache.hadoop.yarn.api.records.ApplicationId;
|
import org.apache.hadoop.yarn.api.records.ApplicationId;
|
||||||
import org.apache.hadoop.yarn.api.records.ContainerId;
|
import org.apache.hadoop.yarn.api.records.ContainerId;
|
||||||
import org.apache.hadoop.yarn.api.records.ContainerState;
|
import org.apache.hadoop.yarn.api.records.ContainerState;
|
||||||
@ -345,4 +346,18 @@ public static void waitForNMContainerState(ContainerManagerImpl
|
|||||||
Assert.assertEquals("ContainerState is not correct (timedout)",
|
Assert.assertEquals("ContainerState is not correct (timedout)",
|
||||||
finalState, currentState);
|
finalState, currentState);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static ContainerId createContainerId(int id) {
|
||||||
|
// Use default appId = 0
|
||||||
|
return createContainerId(id, 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static ContainerId createContainerId(int cId, int aId) {
|
||||||
|
ApplicationId appId = ApplicationId.newInstance(0, aId);
|
||||||
|
ApplicationAttemptId appAttemptId =
|
||||||
|
ApplicationAttemptId.newInstance(appId, 1);
|
||||||
|
ContainerId containerId =
|
||||||
|
ContainerId.newContainerId(appAttemptId, cId);
|
||||||
|
return containerId;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -84,6 +84,7 @@
|
|||||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.TestAuxServices.ServiceA;
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.TestAuxServices.ServiceA;
|
||||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.application.ApplicationState;
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.application.ApplicationState;
|
||||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.container.Container;
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.container.Container;
|
||||||
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.container.ContainerImpl;
|
||||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.launcher.ContainerLaunch;
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.launcher.ContainerLaunch;
|
||||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ContainerLocalizer;
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ContainerLocalizer;
|
||||||
import org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ResourceLocalizationService;
|
import org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ResourceLocalizationService;
|
||||||
@ -149,17 +150,9 @@ protected UserGroupInformation getRemoteUgi() throws YarnException {
|
|||||||
.getKeyId()));
|
.getKeyId()));
|
||||||
return ugi;
|
return ugi;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
protected void authorizeGetAndStopContainerRequest(ContainerId containerId,
|
|
||||||
Container container, boolean stopRequest, NMTokenIdentifier identifier) throws YarnException {
|
|
||||||
if(container == null || container.getUser().equals("Fail")){
|
|
||||||
throw new YarnException("Reject this container");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testContainerManagerInitialization() throws IOException {
|
public void testContainerManagerInitialization() throws IOException {
|
||||||
|
|
||||||
@ -706,13 +699,12 @@ public void testMultipleContainersStopAndGetStatus() throws Exception {
|
|||||||
|
|
||||||
List<ContainerId> containerIds = new ArrayList<ContainerId>();
|
List<ContainerId> containerIds = new ArrayList<ContainerId>();
|
||||||
for (int i = 0; i < 10; i++) {
|
for (int i = 0; i < 10; i++) {
|
||||||
ContainerId cId = createContainerId(i);
|
ContainerId cId;
|
||||||
String user = null;
|
|
||||||
if ((i & 1) == 0) {
|
if ((i & 1) == 0) {
|
||||||
// container with even id fail
|
// Containers with even id belong to an unauthorized app
|
||||||
user = "Fail";
|
cId = createContainerId(i, 1);
|
||||||
} else {
|
} else {
|
||||||
user = "Pass";
|
cId = createContainerId(i, 0);
|
||||||
}
|
}
|
||||||
Token containerToken =
|
Token containerToken =
|
||||||
createContainerToken(cId, DUMMY_RM_IDENTIFIER, context.getNodeId(),
|
createContainerToken(cId, DUMMY_RM_IDENTIFIER, context.getNodeId(),
|
||||||
@ -744,7 +736,7 @@ public void testMultipleContainersStopAndGetStatus() throws Exception {
|
|||||||
// Containers with even id should fail.
|
// Containers with even id should fail.
|
||||||
Assert.assertEquals(0, entry.getKey().getContainerId() & 1);
|
Assert.assertEquals(0, entry.getKey().getContainerId() & 1);
|
||||||
Assert.assertTrue(entry.getValue().getMessage()
|
Assert.assertTrue(entry.getValue().getMessage()
|
||||||
.contains("Reject this container"));
|
.contains("attempted to get status for non-application container"));
|
||||||
}
|
}
|
||||||
|
|
||||||
// stop containers
|
// stop containers
|
||||||
@ -764,10 +756,70 @@ public void testMultipleContainersStopAndGetStatus() throws Exception {
|
|||||||
// Containers with even id should fail.
|
// Containers with even id should fail.
|
||||||
Assert.assertEquals(0, entry.getKey().getContainerId() & 1);
|
Assert.assertEquals(0, entry.getKey().getContainerId() & 1);
|
||||||
Assert.assertTrue(entry.getValue().getMessage()
|
Assert.assertTrue(entry.getValue().getMessage()
|
||||||
.contains("Reject this container"));
|
.contains("attempted to stop non-application container"));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testUnauthorizedRequests() throws IOException, YarnException {
|
||||||
|
containerManager.start();
|
||||||
|
|
||||||
|
// Create a containerId that belongs to an unauthorized appId
|
||||||
|
ContainerId cId = createContainerId(0, 1);
|
||||||
|
|
||||||
|
// startContainers()
|
||||||
|
ContainerLaunchContext containerLaunchContext =
|
||||||
|
recordFactory.newRecordInstance(ContainerLaunchContext.class);
|
||||||
|
StartContainerRequest scRequest =
|
||||||
|
StartContainerRequest.newInstance(containerLaunchContext,
|
||||||
|
createContainerToken(cId, DUMMY_RM_IDENTIFIER, context.getNodeId(),
|
||||||
|
user, context.getContainerTokenSecretManager()));
|
||||||
|
List<StartContainerRequest> list = new ArrayList<>();
|
||||||
|
list.add(scRequest);
|
||||||
|
StartContainersRequest allRequests =
|
||||||
|
StartContainersRequest.newInstance(list);
|
||||||
|
StartContainersResponse startResponse =
|
||||||
|
containerManager.startContainers(allRequests);
|
||||||
|
|
||||||
|
Assert.assertFalse("Should not be authorized to start container",
|
||||||
|
startResponse.getSuccessfullyStartedContainers().contains(cId));
|
||||||
|
Assert.assertTrue("Start container request should fail",
|
||||||
|
startResponse.getFailedRequests().containsKey(cId));
|
||||||
|
|
||||||
|
// Insert the containerId into context, make it as if it is running
|
||||||
|
ContainerTokenIdentifier containerTokenIdentifier =
|
||||||
|
BuilderUtils.newContainerTokenIdentifier(scRequest.getContainerToken());
|
||||||
|
Container container = new ContainerImpl(conf, null, containerLaunchContext,
|
||||||
|
null, metrics, containerTokenIdentifier, context);
|
||||||
|
context.getContainers().put(cId, container);
|
||||||
|
|
||||||
|
// stopContainers()
|
||||||
|
List<ContainerId> containerIds = new ArrayList<>();
|
||||||
|
containerIds.add(cId);
|
||||||
|
StopContainersRequest stopRequest =
|
||||||
|
StopContainersRequest.newInstance(containerIds);
|
||||||
|
StopContainersResponse stopResponse =
|
||||||
|
containerManager.stopContainers(stopRequest);
|
||||||
|
|
||||||
|
Assert.assertFalse("Should not be authorized to stop container",
|
||||||
|
stopResponse.getSuccessfullyStoppedContainers().contains(cId));
|
||||||
|
Assert.assertTrue("Stop container request should fail",
|
||||||
|
stopResponse.getFailedRequests().containsKey(cId));
|
||||||
|
|
||||||
|
// getContainerStatuses()
|
||||||
|
containerIds = new ArrayList<>();
|
||||||
|
containerIds.add(cId);
|
||||||
|
GetContainerStatusesRequest request =
|
||||||
|
GetContainerStatusesRequest.newInstance(containerIds);
|
||||||
|
GetContainerStatusesResponse response =
|
||||||
|
containerManager.getContainerStatuses(request);
|
||||||
|
|
||||||
|
Assert.assertEquals("Should not be authorized to get container status",
|
||||||
|
response.getContainerStatuses().size(), 0);
|
||||||
|
Assert.assertTrue("Get status request should fail",
|
||||||
|
response.getFailedRequests().containsKey(cId));
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testStartContainerFailureWithUnknownAuxService() throws Exception {
|
public void testStartContainerFailureWithUnknownAuxService() throws Exception {
|
||||||
conf.setStrings(YarnConfiguration.NM_AUX_SERVICES,
|
conf.setStrings(YarnConfiguration.NM_AUX_SERVICES,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user