/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.yarn.server.security; import java.util.Map; import java.util.concurrent.ConcurrentHashMap; import javax.crypto.SecretKey; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.hadoop.security.token.SecretManager; import org.apache.hadoop.yarn.security.ContainerTokenIdentifier; public class ContainerTokenSecretManager extends SecretManager<ContainerTokenIdentifier> { private static Log LOG = LogFactory .getLog(ContainerTokenSecretManager.class); Map<String, SecretKey> secretkeys = new ConcurrentHashMap<String, SecretKey>(); // Used by master for generation of secretyKey per host public SecretKey createAndGetSecretKey(CharSequence hostName) { String hostNameStr = hostName.toString(); if (!this.secretkeys.containsKey(hostNameStr)) { LOG.debug("Creating secretKey for NM " + hostNameStr); this.secretkeys.put(hostNameStr, createSecretKey("mySecretKey".getBytes())); } return this.secretkeys.get(hostNameStr); } // Used by slave for using secretKey sent by the master. public void setSecretKey(CharSequence hostName, byte[] secretKeyBytes) { this.secretkeys.put(hostName.toString(), createSecretKey(secretKeyBytes)); } @Override public byte[] createPassword(ContainerTokenIdentifier identifier) { LOG.debug("Creating password for " + identifier.getContainerID() + " to be run on NM " + identifier.getNmHostAddress() + " " + this.secretkeys.get(identifier.getNmHostAddress())); return createPassword(identifier.getBytes(), this.secretkeys.get(identifier.getNmHostAddress())); } @Override public byte[] retrievePassword(ContainerTokenIdentifier identifier) throws org.apache.hadoop.security.token.SecretManager.InvalidToken { LOG.debug("Retrieving password for " + identifier.getContainerID() + " to be run on NM " + identifier.getNmHostAddress()); return createPassword(identifier.getBytes(), this.secretkeys.get(identifier.getNmHostAddress())); } @Override public ContainerTokenIdentifier createIdentifier() { return new ContainerTokenIdentifier(); } }