hadoop-common-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From x...@apache.org
Subject [24/50] [abbrv] hadoop git commit: HADOOP-15861. Move DelegationTokenIssuer to the right path. Contributed by Wei-Chiu Chuang.
Date Thu, 18 Oct 2018 17:44:49 GMT
HADOOP-15861. Move DelegationTokenIssuer to the right path.
Contributed by Wei-Chiu Chuang.


Project: http://git-wip-us.apache.org/repos/asf/hadoop/repo
Commit: http://git-wip-us.apache.org/repos/asf/hadoop/commit/41b3603b
Tree: http://git-wip-us.apache.org/repos/asf/hadoop/tree/41b3603b
Diff: http://git-wip-us.apache.org/repos/asf/hadoop/diff/41b3603b

Branch: refs/heads/HDDS-4
Commit: 41b3603b5bcb74a7d78a314a4a5c177d941af27f
Parents: b738cb1
Author: Steve Loughran <stevel@apache.org>
Authored: Wed Oct 17 11:01:53 2018 +0100
Committer: Steve Loughran <stevel@apache.org>
Committed: Wed Oct 17 11:01:53 2018 +0100

----------------------------------------------------------------------
 .../security/token/DelegationTokenIssuer.java   | 111 +++++++++++++++++++
 .../security/token/DelegationTokenIssuer.java   | 111 -------------------
 2 files changed, 111 insertions(+), 111 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/hadoop/blob/41b3603b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/DelegationTokenIssuer.java
----------------------------------------------------------------------
diff --git a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/DelegationTokenIssuer.java
b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/DelegationTokenIssuer.java
new file mode 100644
index 0000000..70a53b7
--- /dev/null
+++ b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/DelegationTokenIssuer.java
@@ -0,0 +1,111 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.hadoop.security.token;
+
+import org.apache.hadoop.classification.InterfaceAudience;
+import org.apache.hadoop.classification.InterfaceStability;
+import org.apache.hadoop.io.Text;
+import org.apache.hadoop.security.Credentials;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+/**
+ * Class for issuing delegation tokens.
+ */
+@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce", "Yarn"})
+@InterfaceStability.Unstable
+public interface DelegationTokenIssuer {
+
+  /**
+   * The service name used as the alias for the  token in the credential
+   * token map.  addDelegationTokens will use this to determine if
+   * a token exists, and if not, add a new token with this alias.
+   */
+  String getCanonicalServiceName();
+
+  /**
+   * Unconditionally get a new token with the optional renewer.  Returning
+   * null indicates the service does not issue tokens.
+   */
+  Token<?> getDelegationToken(String renewer) throws IOException;
+
+  /**
+   * Issuers may need tokens from additional services.
+   */
+  default DelegationTokenIssuer[] getAdditionalTokenIssuers()
+      throws IOException {
+    return null;
+  }
+
+  /**
+   * Given a renewer, add delegation tokens for issuer and it's child issuers
+   * to the <code>Credentials</code> object if it is not already present.
+   *<p>
+   * Note: This method is not intended to be overridden.  Issuers should
+   * implement getCanonicalService and getDelegationToken to ensure
+   * consistent token acquisition behavior.
+   *
+   * @param renewer the user allowed to renew the delegation tokens
+   * @param credentials cache in which to add new delegation tokens
+   * @return list of new delegation tokens
+   * @throws IOException thrown if IOException if an IO error occurs.
+   */
+  default Token<?>[] addDelegationTokens(
+      final String renewer, Credentials credentials) throws IOException {
+    if (credentials == null) {
+      credentials = new Credentials();
+    }
+    final List<Token<?>> tokens = new ArrayList<>();
+    collectDelegationTokens(this, renewer, credentials, tokens);
+    return tokens.toArray(new Token<?>[tokens.size()]);
+  }
+
+  /**
+   * NEVER call this method directly.
+   */
+  @InterfaceAudience.Private
+  static void collectDelegationTokens(
+      final DelegationTokenIssuer issuer,
+      final String renewer,
+      final Credentials credentials,
+      final List<Token<?>> tokens) throws IOException {
+    final String serviceName = issuer.getCanonicalServiceName();
+    // Collect token of the this issuer and then of its embedded children
+    if (serviceName != null) {
+      final Text service = new Text(serviceName);
+      Token<?> token = credentials.getToken(service);
+      if (token == null) {
+        token = issuer.getDelegationToken(renewer);
+        if (token != null) {
+          tokens.add(token);
+          credentials.addToken(service, token);
+        }
+      }
+    }
+    // Now collect the tokens from the children.
+    final DelegationTokenIssuer[] ancillary =
+        issuer.getAdditionalTokenIssuers();
+    if (ancillary != null) {
+      for (DelegationTokenIssuer subIssuer : ancillary) {
+        collectDelegationTokens(subIssuer, renewer, credentials, tokens);
+      }
+    }
+  }
+}
\ No newline at end of file

http://git-wip-us.apache.org/repos/asf/hadoop/blob/41b3603b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/org/apache/hadoop/security/token/DelegationTokenIssuer.java
----------------------------------------------------------------------
diff --git a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/org/apache/hadoop/security/token/DelegationTokenIssuer.java
b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/org/apache/hadoop/security/token/DelegationTokenIssuer.java
deleted file mode 100644
index 70a53b7..0000000
--- a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/token/org/apache/hadoop/security/token/DelegationTokenIssuer.java
+++ /dev/null
@@ -1,111 +0,0 @@
-/**
- * Licensed to the Apache Software Foundation (ASF) under one
- * or more contributor license agreements.  See the NOTICE file
- * distributed with this work for additional information
- * regarding copyright ownership.  The ASF licenses this file
- * to you under the Apache License, Version 2.0 (the
- * "License"); you may not use this file except in compliance
- * with the License.  You may obtain a copy of the License at
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- */
-package org.apache.hadoop.security.token;
-
-import org.apache.hadoop.classification.InterfaceAudience;
-import org.apache.hadoop.classification.InterfaceStability;
-import org.apache.hadoop.io.Text;
-import org.apache.hadoop.security.Credentials;
-
-import java.io.IOException;
-import java.util.ArrayList;
-import java.util.List;
-
-/**
- * Class for issuing delegation tokens.
- */
-@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce", "Yarn"})
-@InterfaceStability.Unstable
-public interface DelegationTokenIssuer {
-
-  /**
-   * The service name used as the alias for the  token in the credential
-   * token map.  addDelegationTokens will use this to determine if
-   * a token exists, and if not, add a new token with this alias.
-   */
-  String getCanonicalServiceName();
-
-  /**
-   * Unconditionally get a new token with the optional renewer.  Returning
-   * null indicates the service does not issue tokens.
-   */
-  Token<?> getDelegationToken(String renewer) throws IOException;
-
-  /**
-   * Issuers may need tokens from additional services.
-   */
-  default DelegationTokenIssuer[] getAdditionalTokenIssuers()
-      throws IOException {
-    return null;
-  }
-
-  /**
-   * Given a renewer, add delegation tokens for issuer and it's child issuers
-   * to the <code>Credentials</code> object if it is not already present.
-   *<p>
-   * Note: This method is not intended to be overridden.  Issuers should
-   * implement getCanonicalService and getDelegationToken to ensure
-   * consistent token acquisition behavior.
-   *
-   * @param renewer the user allowed to renew the delegation tokens
-   * @param credentials cache in which to add new delegation tokens
-   * @return list of new delegation tokens
-   * @throws IOException thrown if IOException if an IO error occurs.
-   */
-  default Token<?>[] addDelegationTokens(
-      final String renewer, Credentials credentials) throws IOException {
-    if (credentials == null) {
-      credentials = new Credentials();
-    }
-    final List<Token<?>> tokens = new ArrayList<>();
-    collectDelegationTokens(this, renewer, credentials, tokens);
-    return tokens.toArray(new Token<?>[tokens.size()]);
-  }
-
-  /**
-   * NEVER call this method directly.
-   */
-  @InterfaceAudience.Private
-  static void collectDelegationTokens(
-      final DelegationTokenIssuer issuer,
-      final String renewer,
-      final Credentials credentials,
-      final List<Token<?>> tokens) throws IOException {
-    final String serviceName = issuer.getCanonicalServiceName();
-    // Collect token of the this issuer and then of its embedded children
-    if (serviceName != null) {
-      final Text service = new Text(serviceName);
-      Token<?> token = credentials.getToken(service);
-      if (token == null) {
-        token = issuer.getDelegationToken(renewer);
-        if (token != null) {
-          tokens.add(token);
-          credentials.addToken(service, token);
-        }
-      }
-    }
-    // Now collect the tokens from the children.
-    final DelegationTokenIssuer[] ancillary =
-        issuer.getAdditionalTokenIssuers();
-    if (ancillary != null) {
-      for (DelegationTokenIssuer subIssuer : ancillary) {
-        collectDelegationTokens(subIssuer, renewer, credentials, tokens);
-      }
-    }
-  }
-}
\ No newline at end of file


---------------------------------------------------------------------
To unsubscribe, e-mail: common-commits-unsubscribe@hadoop.apache.org
For additional commands, e-mail: common-commits-help@hadoop.apache.org


Mime
View raw message