com.hortonworks.minicluster.InJvmContainerExecutor.java Source code

Java tutorial

Introduction

Here is the source code for com.hortonworks.minicluster.InJvmContainerExecutor.java

Source

/*
 * Copyright 2014 the original author or authors.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package com.hortonworks.minicluster;

import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.lang.reflect.Field;
import java.lang.reflect.Method;
import java.net.URL;
import java.net.URLClassLoader;
import java.security.Permission;
import java.util.Arrays;
import java.util.HashSet;
import java.util.List;
import java.util.Map;
import java.util.Set;
import java.util.concurrent.locks.LockSupport;

import org.apache.commons.io.FileUtils;
import org.apache.commons.io.IOUtils;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.apache.hadoop.fs.Path;
import org.apache.hadoop.security.UserGroupInformation;
import org.apache.hadoop.yarn.api.ApplicationConstants.Environment;
import org.apache.hadoop.yarn.api.records.ContainerId;
import org.apache.hadoop.yarn.api.records.LocalResource;
import org.apache.hadoop.yarn.server.nodemanager.ContainerExecutor;
import org.apache.hadoop.yarn.server.nodemanager.DefaultContainerExecutor;
import org.apache.hadoop.yarn.server.nodemanager.containermanager.container.Container;
import org.apache.hadoop.yarn.server.nodemanager.containermanager.container.ContainerDiagnosticsUpdateEvent;

import com.hortonworks.minicluster.util.EnvironmentUtils;
import com.hortonworks.minicluster.util.ExecJavaCliParser;

/**
 * !!!!! FOR TESTING WITH MINI CLUSTER ONLY !!!!!
 *
 * Container executor which will launch Java containers in the same JVM.
 *
 * In order to use it you must override
 * 'yarn.nodemanager.container-executor.class' property in the server
 * configuration (e.g., mini cluster) and set it to the fully qualified name of
 * this class
 *
 * @author Oleg Zhurakousky
 *
 */
public class InJvmContainerExecutor extends DefaultContainerExecutor {

    private static final Log logger = LogFactory.getLog(InJvmContainerExecutor.class);

    /**
     * Will construct the instance of this {@link ContainerExecutor} and will
     * install a {@link SystemExitDisallowingSecurityManager} which will help with
     * managing the life-cycle of the containers that contain System.exit calls.
     */
    public InJvmContainerExecutor() {
        logger.info("Adding SystemExitDisallowingSecurityManager");
        System.setSecurityManager(new SystemExitDisallowingSecurityManager());
    }

    /**
     * Overrides the parent method while still invoking it. Since
     * {@link #isContainerActive(ContainerId)} method is also overridden here and
     * always returns 'false' the super.launchContainer(..) will only go through
     * the prep routine (e.g., creating temp dirs etc.) while never launching the
     * actual container via the launch script. This will ensure that all the
     * expectations of the container to be launched (e.g., symlinks etc.) are
     * satisfied. The actual launch will be performed by invoking
     * {@link #doLaunch(Container, Path)} method.
     */
    @Override
    public int launchContainer(Container container, Path nmPrivateContainerScriptPath, Path nmPrivateTokensPath,
            String userName, String appId, Path containerWorkDir, List<String> localDirs, List<String> logDirs)
            throws IOException {

        super.launchContainer(container, nmPrivateContainerScriptPath, nmPrivateTokensPath, userName, appId,
                containerWorkDir, localDirs, logDirs);
        logger.info("Launching container");
        int exitCode = this.doLaunch(container, containerWorkDir);
        if (logger.isInfoEnabled()) {
            logger.info(("Returned: " + exitCode));
        }
        return exitCode;
    }

    /**
     * This is to ensure that call to super.launchContainer(..) doesn't actually
     * execute anything other then prep work (e.g., sets up directories etc.)
     */
    @Override
    protected boolean isContainerActive(ContainerId containerId) {
        return false;
    }

    /**
     * Will launch containers within the same JVM as this Container Executor. It
     * will do so by: - extracting Container's class name and program arguments
     * from the launch script (e.g., launch_container.sh) - Creating an isolated
     * ClassLoader for each container - Calling doLaunchContainer(..) method to
     * launch Container
     */
    private int doLaunch(Container container, Path containerWorkDir) {
        Map<String, String> environment = container.getLaunchContext().getEnvironment();
        EnvironmentUtils.putAll(environment);

        Set<URL> additionalClassPathUrls = this.filterAndBuildUserClasspath(container);

        ExecJavaCliParser javaCliParser = this.createExecCommandParser(containerWorkDir.toString());

        UserGroupInformation.setLoginUser(null);
        try {
            // create Isolated Class Loader for each container and set it as context
            // class loader
            URLClassLoader containerCl = new URLClassLoader(
                    additionalClassPathUrls.toArray(additionalClassPathUrls.toArray(new URL[] {})), null);
            Thread.currentThread().setContextClassLoader(containerCl);
            String containerLauncher = javaCliParser.getMain();
            Class<?> containerClass = Class.forName(containerLauncher, true, containerCl);
            Method mainMethod = containerClass.getMethod("main", new Class[] { String[].class });
            mainMethod.setAccessible(true);
            String[] arguments = javaCliParser.getMainArguments();

            this.doLaunchContainer(containerClass, mainMethod, arguments);
        } catch (Exception e) {
            logger.error("Failed to launch container " + container, e);
            container.handle(new ContainerDiagnosticsUpdateEvent(container.getContainerId(), e.getMessage()));
            return -1;
        } finally {
            logger.info("Removing symlinks");
            this.cleanUp();
        }
        return 0;
    }

    /**
     * Will invoke Container's main method blocking if necessary. This method
     * contains a hack that I am not proud of it, but given the fact that some
     * containers rely on System.exit to manage its life-cycle instead of proper
     * exit this will ensure that together with the
     * SystemExitDisallowingSecurityManager (see constructor of this class) this
     * method will block until such container invokes System.exit
     *
     * ByteCodeUtils.hasSystemExit(..) will check if a container that was invoked
     * has calls to System.exit and if it does it will block this thread until
     * SystemExitException is thrown which will be caught allowing this method to
     * exit normally.
     *
     * Of course this doesn't guarantee anything since the underlying
     * implementation of the container may still be implemented in such way where
     * it exits gracefully while also has some shortcut method for some
     * exceptional conditions where System.exit is called and if that's the case
     * this process will block infinitely.
     *
     * The bottom line: DON'T USE System.exit when implementing application
     * containers!!!
     */
    private void doLaunchContainer(Class<?> containerClass, Method mainMethod, String[] arguments)
            throws Exception {
        if (logger.isInfoEnabled()) {
            logger.info("Launching container for " + containerClass.getName() + " with arguments: "
                    + Arrays.asList(arguments));
        }

        try {
            mainMethod.invoke(null, (Object) arguments);
            if (ByteCodeUtils.hasSystemExit(containerClass)) {
                logger.info("Keeping " + containerClass.getName() + " process alive");
                LockSupport.park();
            }
        } catch (SystemExitException e) {
            logger.warn("Ignoring System.exit(..) call in " + containerClass.getName());
        }
        if (logger.isInfoEnabled()) {
            logger.warn("Container " + containerClass.getName() + " is finished");
        }
    }

    /**
     * YARN provides ability to pass resources (e.g., classpath) through
     * {@link LocalResource}s which allows user to provision all the resources
     * required to run the app. This method will extract those resources as a
     * {@link Set} of {@link URL}s so they are used when {@link ClassLoader} for a
     * container is created.
     *
     * This is done primarily as a convenience for applications that rely on
     * automatic classpath propagation (e.g., pull everything from my dev
     * classpath) instead of manual.
     *
     * @param container
     * @return
     */
    private Set<URL> filterAndBuildUserClasspath(Container container) {
        if (logger.isDebugEnabled()) {
            logger.debug("Building additional classpath for the container: " + container);
        }
        Set<URL> additionalClassPathUrls = new HashSet<URL>();
        Set<Path> userClassPath = this.extractUserProvidedClassPathEntries(container);

        for (Path resourcePath : userClassPath) {
            String resourceName = resourcePath.getName();
            if (logger.isDebugEnabled()) {
                logger.debug("\t adding " + resourceName + " to the classpath");
            }
            try {
                additionalClassPathUrls.add(resourcePath.toUri().toURL());
            } catch (Exception e) {
                throw new IllegalArgumentException(e);
            }
        }
        return additionalClassPathUrls;
    }

    /**
     * Creates CLI parser which can be used to extract Container's class name and
     * its launch arguments.
     *
     * @param containerWorkDir
     * @return
     */
    private ExecJavaCliParser createExecCommandParser(String containerWorkDir) {
        String execLine = this.filterAndExecuteLaunchScriptAndReturnExecLine(containerWorkDir);
        String[] values = execLine.split("\"");
        String javaCli = values[1];
        String[] javaCliValues = javaCli.split(" ");
        StringBuffer buffer = new StringBuffer();
        for (int i = 0; i < javaCliValues.length; i++) {
            if (i > 0) {
                buffer.append(javaCliValues[i]);
                if (javaCliValues.length - i > 1) {
                    buffer.append(" ");
                }
            }
        }
        String extractedJavaCli = buffer.toString();
        ExecJavaCliParser execJavaCliParser = new ExecJavaCliParser(extractedJavaCli);
        return execJavaCliParser;
    }

    /**
     * This method does three things 1. It creates an updated version of the
     * initial launch script where it simply copies its contents less the 'exec'
     * line 2. It extract the 'exec' line and returns it so the Container's class
     * name and launch arguments could be retrieved. 3. It executes the
     * 'exec'-less launch script to ensure that all symlinks and other prepwork
     * expected by the underlying container is performed.
     *
     * @param containerWorkDir
     * @return
     */
    private String filterAndExecuteLaunchScriptAndReturnExecLine(String containerWorkDir) {
        BufferedReader reader = null;
        BufferedWriter writer = null;
        String execLine = null;
        File inJvmlaunchScript = null;
        try {
            File launchScript = new File(containerWorkDir, "launch_container.sh");
            inJvmlaunchScript = new File(containerWorkDir.toString(), "injvm_launch_container.sh");
            inJvmlaunchScript.setExecutable(true);
            reader = new BufferedReader(new FileReader(launchScript));
            writer = new BufferedWriter(new FileWriter(inJvmlaunchScript));

            String line;
            while ((line = reader.readLine()) != null) {
                if (!line.startsWith("exec")) {
                    writer.write(line);
                    writer.write("\n");
                } else {
                    execLine = line;
                }
            }
        } catch (Exception e) {
            throw new IllegalStateException("Failed to override default launch script", e);
        } finally {
            try {
                reader.close();
            } catch (IOException e) {
                // ignore
            }
            try {
                writer.close();
            } catch (IOException e) {
                // ignore
            }
        }
        if (inJvmlaunchScript != null) {
            try {
                inJvmlaunchScript.setExecutable(true);
                Process process = Runtime.getRuntime().exec(inJvmlaunchScript.getAbsolutePath());
                int exitCode = process.waitFor();
                if (exitCode != 0) {
                    throw new IllegalStateException("Failed to execute launch script.  Exit code: " + exitCode);
                }
            } catch (Exception e) {
                throw new IllegalStateException("Failed to execute " + inJvmlaunchScript.getAbsolutePath(), e);
            }
        }
        return execLine;
    }

    /**
     * Extracts {@link LocalResource}s from the {@link Container}.
     */
    @SuppressWarnings("unchecked")
    private Set<Path> extractUserProvidedClassPathEntries(Container container) {
        Map<Path, List<String>> localizedResources;
        try {
            Field lf = container.getClass().getDeclaredField("localizedResources");
            lf.setAccessible(true);
            localizedResources = (Map<Path, List<String>>) lf.get(container);
            Set<Path> paths = localizedResources.keySet();
            // Needed for Tez
            for (Path path : paths) {
                if (path.toString().endsWith("tez-conf.pb") || path.toString().endsWith("tez-dag.pb")) {
                    File sourceFile = new File(path.toUri());

                    File targetFile = new File(System.getenv(Environment.PWD.name()) + "/" + sourceFile.getName());
                    FileUtils.copyFile(sourceFile, targetFile);

                    //         System.out.println("######## Copied file: " + targetFile);
                    //         FileInputStream fis = new FileInputStream(new File(System.getenv(Environment.PWD.name()), targetFile.getName()));
                    //         System.out.println(fis.available());
                    //         fis.close();
                    //         break;
                }
            }
            return paths;
        } catch (Exception e) {
            throw new RuntimeException(e);
        }
    }

    /**
     * Will clean up symlinks that were created by a launch script
     */
    private void cleanUp() {
        try {
            File file = new File(System.getProperty("user.dir"));
            String[] links = file.list();
            for (String name : links) {
                File potentialSymLink = new File(file, name);
                if (FileUtils.isSymlink(potentialSymLink)) {
                    if (logger.isDebugEnabled()) {
                        logger.debug("DELETING: " + potentialSymLink);
                    }
                    potentialSymLink.delete();
                }
            }
        } catch (Exception e) {
            logger.warn("Failed to remove symlinks", e);
        }
    }

    /**
     * An implementation of the {@link SecurityManager} which can be used to
     * intercept System.exit. This implementation will simply throw an exception
     * when such call is made essentially making such call ineffective.
     *
     * It is used by this class to intercept System.exit calls made by some
     * implementations of YARN containers (e.g., Tez's DAGAppMaster). Since this
     * container executor will use the same JVM its running in to start those
     * containers any System.exit call will shut down the entire cluster. Using
     * such {@link SecurityManager} would allow such calls to be intercepted by
     * catching {@link SystemExitException}.
     */
    private static class SystemExitDisallowingSecurityManager extends SecurityManager {
        @Override
        public void checkPermission(Permission perm) {
            // allow anything.
        }

        @Override
        public void checkPermission(Permission perm, Object context) {
            // allow anything.
        }

        @Override
        public void checkExit(int status) {
            throw new SystemExitException();
        }
    }
}