| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.hadoop.hdfs.security; |
| |
| import static org.apache.hadoop.fs.CommonConfigurationKeysPublic.HADOOP_SECURITY_AUTHENTICATION; |
| import static org.mockito.Mockito.mock; |
| |
| import java.net.InetSocketAddress; |
| import java.security.PrivilegedExceptionAction; |
| |
| import org.apache.commons.logging.Log; |
| import org.apache.commons.logging.LogFactory; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.hdfs.DFSConfigKeys; |
| import org.apache.hadoop.hdfs.protocol.ClientProtocol; |
| import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier; |
| import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenSecretManager; |
| import org.apache.hadoop.hdfs.server.namenode.FSNamesystem; |
| import org.apache.hadoop.io.Text; |
| import org.apache.hadoop.ipc.Client; |
| import org.apache.hadoop.ipc.RPC; |
| import org.apache.hadoop.ipc.Server; |
| import org.apache.hadoop.net.NetUtils; |
| import org.apache.hadoop.security.SaslInputStream; |
| import org.apache.hadoop.security.SaslRpcClient; |
| import org.apache.hadoop.security.SaslRpcServer; |
| import org.apache.hadoop.security.SecurityUtil; |
| import org.apache.hadoop.security.UserGroupInformation; |
| import org.apache.hadoop.security.token.Token; |
| import org.apache.hadoop.test.GenericTestUtils; |
| import org.apache.log4j.Level; |
| import org.junit.Test; |
| |
| /** Unit tests for using Delegation Token over RPC. */ |
| public class TestClientProtocolWithDelegationToken { |
| private static final String ADDRESS = "0.0.0.0"; |
| |
| public static final Log LOG = LogFactory |
| .getLog(TestClientProtocolWithDelegationToken.class); |
| |
| private static final Configuration conf; |
| static { |
| conf = new Configuration(); |
| conf.set(HADOOP_SECURITY_AUTHENTICATION, "kerberos"); |
| UserGroupInformation.setConfiguration(conf); |
| } |
| |
| static { |
| GenericTestUtils.setLogLevel(Client.LOG, Level.ALL); |
| GenericTestUtils.setLogLevel(Server.LOG, Level.ALL); |
| GenericTestUtils.setLogLevel(SaslRpcClient.LOG, Level.ALL); |
| GenericTestUtils.setLogLevel(SaslRpcServer.LOG, Level.ALL); |
| GenericTestUtils.setLogLevel(SaslInputStream.LOG, Level.ALL); |
| } |
| |
| @Test |
| public void testDelegationTokenRpc() throws Exception { |
| ClientProtocol mockNN = mock(ClientProtocol.class); |
| FSNamesystem mockNameSys = mock(FSNamesystem.class); |
| |
| DelegationTokenSecretManager sm = new DelegationTokenSecretManager( |
| DFSConfigKeys.DFS_NAMENODE_DELEGATION_KEY_UPDATE_INTERVAL_DEFAULT, |
| DFSConfigKeys.DFS_NAMENODE_DELEGATION_KEY_UPDATE_INTERVAL_DEFAULT, |
| DFSConfigKeys.DFS_NAMENODE_DELEGATION_TOKEN_MAX_LIFETIME_DEFAULT, |
| 3600000, mockNameSys); |
| sm.startThreads(); |
| final Server server = new RPC.Builder(conf) |
| .setProtocol(ClientProtocol.class).setInstance(mockNN) |
| .setBindAddress(ADDRESS).setPort(0).setNumHandlers(5).setVerbose(true) |
| .setSecretManager(sm).build(); |
| |
| server.start(); |
| |
| final UserGroupInformation current = UserGroupInformation.getCurrentUser(); |
| final InetSocketAddress addr = NetUtils.getConnectAddress(server); |
| String user = current.getUserName(); |
| Text owner = new Text(user); |
| DelegationTokenIdentifier dtId = new DelegationTokenIdentifier(owner, owner, null); |
| Token<DelegationTokenIdentifier> token = new Token<DelegationTokenIdentifier>( |
| dtId, sm); |
| SecurityUtil.setTokenService(token, addr); |
| LOG.info("Service for token is " + token.getService()); |
| current.addToken(token); |
| current.doAs(new PrivilegedExceptionAction<Object>() { |
| @Override |
| public Object run() throws Exception { |
| ClientProtocol proxy = null; |
| try { |
| proxy = RPC.getProxy(ClientProtocol.class, |
| ClientProtocol.versionID, addr, conf); |
| proxy.getServerDefaults(); |
| } finally { |
| server.stop(); |
| if (proxy != null) { |
| RPC.stopProxy(proxy); |
| } |
| } |
| return null; |
| } |
| }); |
| } |
| |
| } |