/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.yarn.client.api.impl; import java.net.InetSocketAddress; import java.security.PrivilegedAction; import java.util.ArrayList; import java.util.LinkedHashMap; import java.util.List; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.hadoop.classification.InterfaceAudience.LimitedPrivate; import org.apache.hadoop.classification.InterfaceAudience.Private; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.net.NetUtils; import org.apache.hadoop.security.UserGroupInformation; import org.apache.hadoop.security.token.SecretManager.InvalidToken; import org.apache.hadoop.yarn.api.ContainerManagementProtocol; import org.apache.hadoop.yarn.api.records.ContainerId; import org.apache.hadoop.yarn.api.records.Token; import org.apache.hadoop.yarn.client.api.NMTokenCache; import org.apache.hadoop.yarn.conf.YarnConfiguration; import org.apache.hadoop.yarn.exceptions.YarnRuntimeException; import org.apache.hadoop.yarn.ipc.YarnRPC; import org.apache.hadoop.yarn.security.NMTokenIdentifier; import org.apache.hadoop.yarn.util.ConverterUtils; import com.google.common.annotations.VisibleForTesting; /** * Helper class to manage container manager proxies */ @LimitedPrivate({ "MapReduce", "YARN" }) public class ContainerManagementProtocolProxy { static final Log LOG = LogFactory.getLog(ContainerManagementProtocolProxy.class); private final int maxConnectedNMs; private final LinkedHashMap<String, ContainerManagementProtocolProxyData> cmProxy; private final Configuration conf; private final YarnRPC rpc; public ContainerManagementProtocolProxy(Configuration conf) { this.conf = conf; maxConnectedNMs = conf.getInt(YarnConfiguration.NM_CLIENT_MAX_NM_PROXIES, YarnConfiguration.DEFAULT_NM_CLIENT_MAX_NM_PROXIES); if (maxConnectedNMs < 1) { throw new YarnRuntimeException( YarnConfiguration.NM_CLIENT_MAX_NM_PROXIES + " (" + maxConnectedNMs + ") can not be less than 1."); } LOG.info(YarnConfiguration.NM_CLIENT_MAX_NM_PROXIES + " : " + maxConnectedNMs); cmProxy = new LinkedHashMap<String, ContainerManagementProtocolProxyData>(); rpc = YarnRPC.create(conf); } public synchronized ContainerManagementProtocolProxyData getProxy( String containerManagerBindAddr, ContainerId containerId) throws InvalidToken { // This get call will update the map which is working as LRU cache. ContainerManagementProtocolProxyData proxy = cmProxy.get(containerManagerBindAddr); while (proxy != null && !proxy.token.getIdentifier().equals( NMTokenCache.getNMToken(containerManagerBindAddr).getIdentifier())) { LOG.info("Refreshing proxy as NMToken got updated for node : " + containerManagerBindAddr); // Token is updated. check if anyone has already tried closing it. if (!proxy.scheduledForClose) { // try closing the proxy. Here if someone is already using it // then we might not close it. In which case we will wait. removeProxy(proxy); } else { try { this.wait(); } catch (InterruptedException e) { e.printStackTrace(); } } if (proxy.activeCallers < 0) { proxy = cmProxy.get(containerManagerBindAddr); } } if (proxy == null) { proxy = new ContainerManagementProtocolProxyData(rpc, containerManagerBindAddr, containerId, NMTokenCache.getNMToken(containerManagerBindAddr)); if (cmProxy.size() > maxConnectedNMs) { // Number of existing proxy exceed the limit. String cmAddr = cmProxy.keySet().iterator().next(); removeProxy(cmProxy.get(cmAddr)); } cmProxy.put(containerManagerBindAddr, proxy); } // This is to track active users of this proxy. proxy.activeCallers++; updateLRUCache(containerManagerBindAddr); return proxy; } private void updateLRUCache(String containerManagerBindAddr) { ContainerManagementProtocolProxyData proxy = cmProxy.remove(containerManagerBindAddr); cmProxy.put(containerManagerBindAddr, proxy); } public synchronized void mayBeCloseProxy( ContainerManagementProtocolProxyData proxy) { proxy.activeCallers--; if (proxy.scheduledForClose && proxy.activeCallers < 0) { LOG.info("Closing proxy : " + proxy.containerManagerBindAddr); cmProxy.remove(proxy.containerManagerBindAddr); try { rpc.stopProxy(proxy.getContainerManagementProtocol(), conf); } finally { this.notifyAll(); } } } private synchronized void removeProxy( ContainerManagementProtocolProxyData proxy) { if (!proxy.scheduledForClose) { proxy.scheduledForClose = true; mayBeCloseProxy(proxy); } } public synchronized void stopAllProxies() { List<String> nodeIds = new ArrayList<String>(); nodeIds.addAll(this.cmProxy.keySet()); for (String nodeId : nodeIds) { ContainerManagementProtocolProxyData proxy = cmProxy.get(nodeId); // Explicitly reducing the proxy count to allow stopping proxy. proxy.activeCallers = 0; try { removeProxy(proxy); } catch (Throwable t) { LOG.error("Error closing connection", t); } } cmProxy.clear(); } public class ContainerManagementProtocolProxyData { private final String containerManagerBindAddr; private final ContainerManagementProtocol proxy; private int activeCallers; private boolean scheduledForClose; private final Token token; @Private @VisibleForTesting public ContainerManagementProtocolProxyData(YarnRPC rpc, String containerManagerBindAddr, ContainerId containerId, Token token) throws InvalidToken { this.containerManagerBindAddr = containerManagerBindAddr; ; this.activeCallers = 0; this.scheduledForClose = false; this.token = token; this.proxy = newProxy(rpc, containerManagerBindAddr, containerId, token); } @Private @VisibleForTesting protected ContainerManagementProtocol newProxy(final YarnRPC rpc, String containerManagerBindAddr, ContainerId containerId, Token token) throws InvalidToken { if (token == null) { throw new InvalidToken("No NMToken sent for " + containerManagerBindAddr); } final InetSocketAddress cmAddr = NetUtils.createSocketAddr(containerManagerBindAddr); LOG.info("Opening proxy : " + containerManagerBindAddr); // the user in createRemoteUser in this context has to be ContainerID UserGroupInformation user = UserGroupInformation.createRemoteUser(containerId .getApplicationAttemptId().toString()); org.apache.hadoop.security.token.Token<NMTokenIdentifier> nmToken = ConverterUtils.convertFromYarn(token, cmAddr); user.addToken(nmToken); ContainerManagementProtocol proxy = user .doAs(new PrivilegedAction<ContainerManagementProtocol>() { @Override public ContainerManagementProtocol run() { return (ContainerManagementProtocol) rpc.getProxy( ContainerManagementProtocol.class, cmAddr, conf); } }); return proxy; } public ContainerManagementProtocol getContainerManagementProtocol() { return proxy; } } }