/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.mapreduce.security.token; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertTrue; import static org.junit.Assert.fail; import java.io.IOException; import java.net.InetAddress; import java.net.URI; import java.net.URISyntaxException; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.fs.FileSystem; import org.apache.hadoop.hdfs.DFSConfigKeys; import org.apache.hadoop.hdfs.DistributedFileSystem; import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier; import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenSecretManager; import org.apache.hadoop.security.token.delegation.DelegationKey; import org.apache.hadoop.hdfs.server.namenode.FSNamesystem; import org.apache.hadoop.io.Text; import org.apache.hadoop.mapreduce.JobID; import org.apache.hadoop.security.Credentials; import org.apache.hadoop.security.UserGroupInformation; import org.apache.hadoop.security.token.Token; import org.apache.hadoop.security.token.SecretManager.InvalidToken; import org.apache.hadoop.security.token.TokenRenewer; import org.apache.hadoop.util.StringUtils; import org.junit.BeforeClass; import org.junit.Test; /** * unit test - * tests addition/deletion/cancelation of renewals of delegation tokens * */ public class TestDelegationTokenRenewal { private static final Log LOG = LogFactory.getLog(TestDelegationTokenRenewal.class); private static final Text KIND = new Text("TestDelegationTokenRenewal.Token"); public static class Renewer extends TokenRenewer { private static int counter = 0; private static Token<?> lastRenewed = null; private static Token<?> tokenToRenewIn2Sec = null; @Override public boolean handleKind(Text kind) { return KIND.equals(kind); } @Override public boolean isManaged(Token<?> token) throws IOException { return true; } @Override public long renew(Token<?> t, Configuration conf) throws IOException { MyToken token = (MyToken)t; if(token.isCanceled()) { throw new InvalidToken("token has been canceled"); } lastRenewed = token; counter ++; LOG.info("Called MYDFS.renewdelegationtoken " + token + ";this dfs=" + this.hashCode() + ";c=" + counter); if(tokenToRenewIn2Sec == token) { // this token first renewal in 2 seconds LOG.info("RENEW in 2 seconds"); tokenToRenewIn2Sec=null; return 2*1000 + System.currentTimeMillis(); } else { return 86400*1000 + System.currentTimeMillis(); } } @Override public void cancel(Token<?> t, Configuration conf) { MyToken token = (MyToken)t; LOG.info("Cancel token " + token); token.cancelToken(); } } private static Configuration conf; private static String trackerService = "localhost:0"; @BeforeClass public static void setUp() throws Exception { conf = new Configuration(); conf.set("mapred.job.tracker", trackerService); // create a fake FileSystem (MyFS) and assosiate it // with "hdfs" schema. InetAddress iaddr = InetAddress.getByName("localhost"); String dnsName = iaddr.getCanonicalHostName(); final URI uri = new URI (DelegationTokenRenewal.SCHEME + "://" + dnsName+":"+"0"); conf.setClass("fs." + uri.getScheme() + ".impl", MyFS.class, DistributedFileSystem.class); FileSystem.setDefaultUri(conf, uri); LOG.info("filesystem uri = " + FileSystem.getDefaultUri(conf).toString()); } private static class MyDelegationTokenSecretManager extends DelegationTokenSecretManager { public MyDelegationTokenSecretManager(long delegationKeyUpdateInterval, long delegationTokenMaxLifetime, long delegationTokenRenewInterval, long delegationTokenRemoverScanInterval, FSNamesystem namesystem) { super(delegationKeyUpdateInterval, delegationTokenMaxLifetime, delegationTokenRenewInterval, delegationTokenRemoverScanInterval, namesystem); } @Override //DelegationTokenSecretManager public void logUpdateMasterKey(DelegationKey key) throws IOException { return; } } /** * add some extra functionality for testing * 1. toString(); * 2. cancel() and isCanceled() */ private static class MyToken extends Token<DelegationTokenIdentifier> { public String status = "GOOD"; public static final String CANCELED = "CANCELED"; public MyToken(DelegationTokenIdentifier dtId1, MyDelegationTokenSecretManager sm) { super(dtId1, sm); setKind(KIND); status = "GOOD"; } public boolean isCanceled() {return status.equals(CANCELED);} public void cancelToken() {this.status=CANCELED;} public String toString() { StringBuilder sb = new StringBuilder(1024); sb.append("id="); String id = StringUtils.byteToHexString(this.getIdentifier()); int idLen = id.length(); sb.append(id.substring(idLen-6)); sb.append(";k="); sb.append(this.getKind()); sb.append(";s="); sb.append(this.getService()); return sb.toString(); } } /** * fake FileSystem * overwrites three methods * 1. getDelegationToken() - generates a token * 2. renewDelegataionToken - counts number of calls, and remembers * most recently renewed token. * 3. cancelToken -cancels token (subsequent renew will cause IllegalToken * exception */ static class MyFS extends DistributedFileSystem { public MyFS() {} public void close() {} @Override public void initialize(URI uri, Configuration conf) throws IOException {} @Override public MyToken getDelegationToken(Text renewer) throws IOException { MyToken result = createTokens(renewer); LOG.info("Called MYDFS.getdelegationtoken " + result); return result; } } /** * Auxiliary - create token * @param renewer * @return * @throws IOException */ static MyToken createTokens(Text renewer) throws IOException { Text user1= new Text("user1"); MyDelegationTokenSecretManager sm = new MyDelegationTokenSecretManager( DFSConfigKeys.DFS_NAMENODE_DELEGATION_KEY_UPDATE_INTERVAL_DEFAULT, DFSConfigKeys.DFS_NAMENODE_DELEGATION_KEY_UPDATE_INTERVAL_DEFAULT, DFSConfigKeys.DFS_NAMENODE_DELEGATION_TOKEN_MAX_LIFETIME_DEFAULT, 3600000, null); sm.startThreads(); DelegationTokenIdentifier dtId1 = new DelegationTokenIdentifier(user1, renewer, user1); MyToken token1 = new MyToken(dtId1, sm); token1.setService(new Text("localhost:0")); return token1; } @Test public void testLocalMRTokenRenewal() throws IOException { String user = UserGroupInformation.getLoginUser().getUserName(); DelegationTokenIdentifier ident = new DelegationTokenIdentifier( new Text(user), new Text(user), null); Token<?> t = new Token<DelegationTokenIdentifier>( ident.getBytes(), new byte[]{}, org.apache.hadoop.mapreduce.security.token.delegation.DelegationTokenIdentifier.MAPREDUCE_DELEGATION_KIND, new Text("service")); assertTrue(t.isManaged()); ident = new DelegationTokenIdentifier( new Text(user), new Text(user+"-is-not-me"), null); t = new Token<DelegationTokenIdentifier>( ident.getBytes(), new byte[]{}, org.apache.hadoop.mapreduce.security.token.delegation.DelegationTokenIdentifier.MAPREDUCE_DELEGATION_KIND, new Text("service")); assertFalse(t.isManaged()); } /** * Basic idea of the test: * 1. create tokens. * 2. Mark one of them to be renewed in 2 seconds (istead of * 24 hourse) * 3. register them for renewal * 4. sleep for 3 seconds * 5. count number of renewals (should 3 initial ones + one extra) * 6. register another token for 2 seconds * 7. cancel it immediately * 8. Sleep and check that the 2 seconds renew didn't happen * (totally 5 reneals) * 9. check cancelation * @throws IOException * @throws URISyntaxException */ @Test public void testDTRenewal () throws Exception { MyFS dfs = (MyFS)FileSystem.get(conf); LOG.info("dfs="+(Object)dfs.hashCode() + ";conf="+conf.hashCode()); // Test 1. - add three tokens - make sure exactly one get's renewed // get the delegation tokens MyToken token1, token2, token3; token1 = dfs.getDelegationToken(new Text("user1")); token2 = dfs.getDelegationToken(new Text("user2")); token3 = dfs.getDelegationToken(new Text("user3")); //to cause this one to be set for renew in 2 secs Renewer.tokenToRenewIn2Sec = token1; LOG.info("token="+token1+" should be renewed for 2 secs"); // three distinct Namenodes String nn1 = DelegationTokenRenewal.SCHEME + "://host1:0"; String nn2 = DelegationTokenRenewal.SCHEME + "://host2:0"; String nn3 = DelegationTokenRenewal.SCHEME + "://host3:0"; Credentials ts = new Credentials(); // register the token for renewal ts.addToken(new Text(nn1), token1); ts.addToken(new Text(nn2), token2); ts.addToken(new Text(nn3), token3); // register the tokens for renewal DelegationTokenRenewal.registerDelegationTokensForRenewal( new JobID("job1", 1), ts, conf); // first 3 initial renewals + 1 real int numberOfExpectedRenewals = 3+1; int attempts = 10; while(attempts-- > 0) { try { Thread.sleep(3*1000); // sleep 3 seconds, so it has time to renew } catch (InterruptedException e) {} // since we cannot guarantee timely execution - let's give few chances if(Renewer.counter==numberOfExpectedRenewals) break; } LOG.info("dfs=" + dfs.hashCode() + ";Counter = " + Renewer.counter + ";t="+ Renewer.lastRenewed); assertEquals("renew wasn't called as many times as expected(4):", numberOfExpectedRenewals, Renewer.counter); assertEquals("most recently renewed token mismatch", Renewer.lastRenewed, token1); // Test 2. // add another token ( that expires in 2 secs). Then remove it, before // time is up. // Wait for 3 secs , and make sure no renews were called ts = new Credentials(); MyToken token4 = dfs.getDelegationToken(new Text("user4")); //to cause this one to be set for renew in 2 secs Renewer.tokenToRenewIn2Sec = token4; LOG.info("token="+token4+" should be renewed for 2 secs"); String nn4 = DelegationTokenRenewal.SCHEME + "://host4:0"; ts.addToken(new Text(nn4), token4); JobID jid2 = new JobID("job2",1); DelegationTokenRenewal.registerDelegationTokensForRenewal(jid2, ts, conf); DelegationTokenRenewal.removeDelegationTokenRenewalForJob(jid2); numberOfExpectedRenewals = Renewer.counter; // number of renewals so far try { Thread.sleep(6*1000); // sleep 6 seconds, so it has time to renew } catch (InterruptedException e) {} LOG.info("Counter = " + Renewer.counter + ";t="+ Renewer.lastRenewed); // counter and the token should stil be the old ones assertEquals("renew wasn't called as many times as expected", numberOfExpectedRenewals, Renewer.counter); // also renewing of the cancelled token should fail try { token4.renew(conf); assertTrue("Renewal of canceled token didn't fail", false); } catch (InvalidToken ite) { //expected } } /** * Run the testDTRenewal(), close the DelegationTokenRenewal, and run the * testDTRenewal() test again to make sure that DelegationTokenRenewal can be * re-used after its been closed * @throws Exception */ @Test public void testDTRenewalAfterClose() throws Exception { Renewer.counter = 0; testDTRenewal(); DelegationTokenRenewal.close(); Renewer.counter = 0; testDTRenewal(); } }