Package org.apache.hadoop.mapreduce.security.token

Source Code of org.apache.hadoop.mapreduce.security.token.DelegationTokenRenewal$RenewalTimerTask

/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements.  See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership.  The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License.  You may obtain a copy of the License at
*
*     http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/

package org.apache.hadoop.mapreduce.security.token;

import java.net.URI;
import java.security.AccessControlException;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
import java.util.Date;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import java.util.Timer;
import java.util.TimerTask;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.apache.hadoop.classification.InterfaceAudience;
import org.apache.hadoop.classification.InterfaceStability;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.FileSystem;
import org.apache.hadoop.hdfs.DistributedFileSystem;
import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier;
import org.apache.hadoop.io.Text;
import org.apache.hadoop.mapreduce.JobID;
import org.apache.hadoop.security.TokenStorage;
import org.apache.hadoop.security.token.Token;
import org.apache.hadoop.security.token.TokenIdentifier;
import org.apache.hadoop.security.token.SecretManager.InvalidToken;


@InterfaceAudience.Private
@InterfaceStability.Unstable
public class DelegationTokenRenewal {
  private static final Log LOG = LogFactory.getLog(DelegationTokenRenewal.class);
  public static final String SCHEME = "hdfs";
 
  /**
   * class that is used for keeping tracks of DT to renew
   *
   */
  private static class DelegationTokenToRenew {
    public final Token<DelegationTokenIdentifier> token;
    public final JobID jobId;
    public final Configuration conf;
    public long expirationDate;
    public TimerTask timerTask;
   
    public DelegationTokenToRenew(
        JobID jId, Token<DelegationTokenIdentifier> t,
        Configuration newConf, long newExpirationDate) {
      token = t;
      jobId = jId;
      conf = newConf;
      expirationDate = newExpirationDate;
      timerTask = null;
      if(token==null || jobId==null || conf==null) {
        throw new IllegalArgumentException("invalid params for Renew Token" +
            ";t="+token+";j="+jobId+";c="+conf);
      }
    }
    public void setTimerTask(TimerTask tTask) {
      timerTask = tTask;
    }
    public String toString() {
      return token + ";exp="+expirationDate;
    }
  }
 
  // global single timer (daemon)
  private static Timer renewalTimer = new Timer(true);
 
  //managing the list of tokens using Map
  // jobId=>List<tokens>
  private static Map<JobID, List<DelegationTokenToRenew>> delegationTokens =
    Collections.synchronizedMap(new HashMap<JobID,
                                       List<DelegationTokenToRenew>>());
  //adding token
  private static void addTokenToMap(DelegationTokenToRenew t) {
    // see if a list already exists
    JobID jobId = t.jobId;
    List<DelegationTokenToRenew> l = delegationTokens.get(jobId);
    if(l==null) {
      l = new ArrayList<DelegationTokenToRenew>();
      delegationTokens.put(jobId, l);
    }
    l.add(t);
  }
 
  // kind of tokens we currently renew
  private static final Text kindHdfs =
    DelegationTokenIdentifier.HDFS_DELEGATION_KIND;
 
  @SuppressWarnings("unchecked")
  public static synchronized void registerDelegationTokensForRenewal(
      JobID jobId, TokenStorage ts, Configuration conf) {
    if(ts==null)
      return; //nothing to add
   
    Collection <Token<? extends TokenIdentifier>> tokens = ts.getAllTokens();
    long now = System.currentTimeMillis();
   
    for(Token<? extends TokenIdentifier> t : tokens) {
      // currently we only check for HDFS delegation tokens
      // later we can add more different types.
      if(! t.getKind().equals(kindHdfs)) {
        continue;
      }
      Token<DelegationTokenIdentifier> dt =
        (Token<DelegationTokenIdentifier>)t;
     
      // first renew happens immediately
      DelegationTokenToRenew dtr =
        new DelegationTokenToRenew(jobId, dt, conf, now);

      addTokenToMap(dtr);
     
      setTimerForTokenRenewal(dtr, true);
      LOG.info("registering token for renewal for service =" + dt.getService()+
          " and jobID = " + jobId);
    }
  }
 
  private static long renewDelegationToken(DelegationTokenToRenew dttr)
  throws Exception {
    long newExpirationDate=System.currentTimeMillis()+3600*1000;
    Token<DelegationTokenIdentifier> token = dttr.token;
    Configuration conf = dttr.conf;
   
    if(token.getKind().equals(kindHdfs)) {
      try {
        DistributedFileSystem dfs = getDFSForToken(token, conf);
        newExpirationDate = dfs.renewDelegationToken(token);
      } catch (InvalidToken ite) {
        LOG.warn("token canceled - not scheduling for renew");
        removeFailedDelegationToken(dttr);
        throw new Exception("failed to renew token", ite);
      } catch (AccessControlException ace) {
        LOG.warn("token canceled - not scheduling for renew");
        removeFailedDelegationToken(dttr);
        throw new Exception("failed to renew token", ace);
      } catch (Exception ioe) {
        LOG.warn("failed to renew token:"+token, ioe);
        // returns default expiration date
      }
    } else {
      throw new Exception("unknown token type to renew+"+token.getKind());
    }
    return newExpirationDate;
  }

 
  /**
   * Task - to renew a token
   *
   */
  private static class RenewalTimerTask extends TimerTask {
    private DelegationTokenToRenew dttr;
   
    RenewalTimerTask(DelegationTokenToRenew t) {  dttr = t;  }
   
    @Override
    public void run() {
      Token<DelegationTokenIdentifier> token = dttr.token;
      long newExpirationDate=0;
      try {
        newExpirationDate = renewDelegationToken(dttr);
      } catch (Exception e) {
        return; // message logged in renewDT method
      }
      if (LOG.isDebugEnabled())
        LOG.debug("renewing for:"+token.getService()+";newED=" +
            newExpirationDate);
     
      // new expiration date
      dttr.expirationDate = newExpirationDate;
      setTimerForTokenRenewal(dttr, false);// set the next one
    }
  }
 
  private static DistributedFileSystem getDFSForToken(
      Token<DelegationTokenIdentifier> token, Configuration conf)
  throws Exception {
    DistributedFileSystem dfs = null;
    try {
      URI uri = new URI (SCHEME + "://" + token.getService().toString());
      dfs =  (DistributedFileSystem) FileSystem.get(uri, conf);
    } catch (Exception e) {
      LOG.warn("Failed to create a dfs to renew for:" + token.getService(), e);
      throw e;
    }
    return dfs;
  }
 
  /**
   * find the soonest expiring token and set it for renew
   */
  private static void setTimerForTokenRenewal(
      DelegationTokenToRenew token, boolean firstTime) {
     
    // calculate timer time
    long now = System.currentTimeMillis();
    long renewIn;
    if(firstTime) {
      renewIn = now;
    } else {
      long expiresIn = (token.expirationDate - now);
      renewIn = now + expiresIn - expiresIn/10; // little before expiration
    }
   
    try {
      // need to create new timer every time
      TimerTask tTask = new RenewalTimerTask(token);
      token.setTimerTask(tTask); // keep reference to the timer

      renewalTimer.schedule(token.timerTask, new Date(renewIn));
    } catch (Exception e) {
      LOG.warn("failed to schedule a task, token will not renew more", e);
    }
  }

  /**
   * removing all tokens renewals
   */
  static public void close() {
    renewalTimer.cancel();
    delegationTokens.clear();
  }
 
  // cancel a token
  private static void cancelToken(DelegationTokenToRenew t) {
    Token<DelegationTokenIdentifier> token = t.token;
    Configuration conf = t.conf;
   
    if(token.getKind().equals(kindHdfs)) {
      try {
        DistributedFileSystem dfs = getDFSForToken(token, conf);
        if (LOG.isDebugEnabled())
          LOG.debug("canceling token " + token.getService() + " for dfs=" +
              dfs);
        dfs.cancelDelegationToken(token);
      } catch (Exception e) {
        LOG.warn("Failed to cancel " + token, e);
      }
    }
  }
 
  /**
   * removing failed DT
   * @param jobId
   */
  private static void removeFailedDelegationToken(DelegationTokenToRenew t) {
    JobID jobId = t.jobId;
    List<DelegationTokenToRenew> l = delegationTokens.get(jobId);
    if(l==null) return;

    Iterator<DelegationTokenToRenew> it = l.iterator();
    while(it.hasNext()) {
      DelegationTokenToRenew dttr = it.next();
      if(dttr == t) {
        if (LOG.isDebugEnabled())
          LOG.debug("removing failed delegation token for jobid=" + jobId +
            ";t=" + dttr.token.getService());

        // cancel the timer
        if(dttr.timerTask!=null)
          dttr.timerTask.cancel();

        // no need to cancel the token - it is invalid
        it.remove();
        break; //should be only one
      }
    }
  }
 
  /**
   * removing DT for completed jobs
   * @param jobId
   */
  public static void removeDelegationTokenRenewalForJob(JobID jobId) {
    List<DelegationTokenToRenew> l = delegationTokens.remove(jobId);
    if(l==null) return;

    Iterator<DelegationTokenToRenew> it = l.iterator();
    while(it.hasNext()) {
      DelegationTokenToRenew dttr = it.next();
      if (LOG.isDebugEnabled())
        LOG.debug("removing delegation token for jobid=" + jobId +
          ";t=" + dttr.token.getService());

      // cancel the timer
      if(dttr.timerTask!=null)
        dttr.timerTask.cancel();

      // cancel the token
      cancelToken(dttr);

      it.remove();
    }
  }
}
TOP

Related Classes of org.apache.hadoop.mapreduce.security.token.DelegationTokenRenewal$RenewalTimerTask

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.