/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.yarn.server.security; import java.net.InetSocketAddress; import java.security.SecureRandom; import java.util.concurrent.locks.Lock; import java.util.concurrent.locks.ReadWriteLock; import java.util.concurrent.locks.ReentrantReadWriteLock; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.hadoop.classification.InterfaceAudience.Private; import org.apache.hadoop.net.NetUtils; import org.apache.hadoop.security.SecurityUtil; import org.apache.hadoop.security.token.SecretManager; import org.apache.hadoop.yarn.api.records.ApplicationAttemptId; import org.apache.hadoop.yarn.api.records.NodeId; import org.apache.hadoop.yarn.api.records.Token; import org.apache.hadoop.yarn.security.NMTokenIdentifier; import org.apache.hadoop.yarn.server.api.records.MasterKey; public class BaseNMTokenSecretManager extends SecretManager<NMTokenIdentifier> { private static Log LOG = LogFactory .getLog(BaseNMTokenSecretManager.class); private int serialNo = new SecureRandom().nextInt(); protected final ReadWriteLock readWriteLock = new ReentrantReadWriteLock(); protected final Lock readLock = readWriteLock.readLock(); protected final Lock writeLock = readWriteLock.writeLock(); protected MasterKeyData currentMasterKey; protected MasterKeyData createNewMasterKey() { this.writeLock.lock(); try { return new MasterKeyData(serialNo++, generateSecret()); } finally { this.writeLock.unlock(); } } @Private public MasterKey getCurrentKey() { this.readLock.lock(); try { return this.currentMasterKey.getMasterKey(); } finally { this.readLock.unlock(); } } @Override protected byte[] createPassword(NMTokenIdentifier identifier) { if (LOG.isDebugEnabled()) { LOG.debug("creating password for " + identifier.getApplicationAttemptId() + " for user " + identifier.getApplicationSubmitter() + " to run on NM " + identifier.getNodeId()); } readLock.lock(); try { return createPassword(identifier.getBytes(), currentMasterKey.getSecretKey()); } finally { readLock.unlock(); } } @Override public byte[] retrievePassword(NMTokenIdentifier identifier) throws org.apache.hadoop.security.token.SecretManager.InvalidToken { readLock.lock(); try { return retrivePasswordInternal(identifier, currentMasterKey); } finally { readLock.unlock(); } } protected byte[] retrivePasswordInternal(NMTokenIdentifier identifier, MasterKeyData masterKey) { if (LOG.isDebugEnabled()) { LOG.debug("creating password for " + identifier.getApplicationAttemptId() + " for user " + identifier.getApplicationSubmitter() + " to run on NM " + identifier.getNodeId()); } return createPassword(identifier.getBytes(), masterKey.getSecretKey()); } /** * It is required for RPC */ @Override public NMTokenIdentifier createIdentifier() { return new NMTokenIdentifier(); } /** * Helper function for creating NMTokens. */ public Token createNMToken(ApplicationAttemptId applicationAttemptId, NodeId nodeId, String applicationSubmitter) { byte[] password; NMTokenIdentifier identifier; this.readLock.lock(); try { identifier = new NMTokenIdentifier(applicationAttemptId, nodeId, applicationSubmitter, this.currentMasterKey.getMasterKey() .getKeyId()); password = this.createPassword(identifier); } finally { this.readLock.unlock(); } return newInstance(password, identifier); } public static Token newInstance(byte[] password, NMTokenIdentifier identifier) { NodeId nodeId = identifier.getNodeId(); // RPC layer client expects ip:port as service for tokens InetSocketAddress addr = NetUtils.createSocketAddrForHost(nodeId.getHost(), nodeId.getPort()); Token nmToken = Token.newInstance(identifier.getBytes(), NMTokenIdentifier.KIND.toString(), password, SecurityUtil .buildTokenService(addr).toString()); return nmToken; } }