|
@@ -28,6 +28,7 @@ import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension.CryptoExtension;
|
|
|
import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension.EncryptedKeyVersion;
|
|
|
import org.apache.hadoop.crypto.key.KeyProviderDelegationTokenExtension;
|
|
|
import org.apache.hadoop.crypto.key.kms.KMSClientProvider;
|
|
|
+import org.apache.hadoop.crypto.key.kms.KMSDelegationToken;
|
|
|
import org.apache.hadoop.crypto.key.kms.LoadBalancingKMSClientProvider;
|
|
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
|
|
import org.apache.hadoop.fs.Path;
|
|
@@ -1804,13 +1805,13 @@ public class TestKMS {
|
|
|
InetSocketAddress kmsAddr =
|
|
|
new InetSocketAddress(getKMSUrl().getHost(),
|
|
|
getKMSUrl().getPort());
|
|
|
- Assert.assertEquals(KMSClientProvider.TOKEN_KIND,
|
|
|
+ Assert.assertEquals(KMSDelegationToken.TOKEN_KIND,
|
|
|
credentials.getToken(SecurityUtil.buildTokenService(kmsAddr)).
|
|
|
getKind());
|
|
|
|
|
|
// Test non-renewer user cannot renew.
|
|
|
for (Token<?> token : tokens) {
|
|
|
- if (!(token.getKind().equals(KMSClientProvider.TOKEN_KIND))) {
|
|
|
+ if (!(token.getKind().equals(KMSDelegationToken.TOKEN_KIND))) {
|
|
|
LOG.info("Skipping token {}", token);
|
|
|
continue;
|
|
|
}
|
|
@@ -1843,7 +1844,7 @@ public class TestKMS {
|
|
|
boolean renewed = false;
|
|
|
for (Token<?> token : tokens) {
|
|
|
if (!(token.getKind()
|
|
|
- .equals(KMSClientProvider.TOKEN_KIND))) {
|
|
|
+ .equals(KMSDelegationToken.TOKEN_KIND))) {
|
|
|
LOG.info("Skipping token {}", token);
|
|
|
continue;
|
|
|
}
|
|
@@ -1863,7 +1864,7 @@ public class TestKMS {
|
|
|
// test delegation token cancellation
|
|
|
for (Token<?> token : tokens) {
|
|
|
if (!(token.getKind()
|
|
|
- .equals(KMSClientProvider.TOKEN_KIND))) {
|
|
|
+ .equals(KMSDelegationToken.TOKEN_KIND))) {
|
|
|
LOG.info("Skipping token {}", token);
|
|
|
continue;
|
|
|
}
|
|
@@ -1927,7 +1928,7 @@ public class TestKMS {
|
|
|
final Credentials credentials = new Credentials();
|
|
|
kpdte.addDelegationTokens("client", credentials);
|
|
|
Assert.assertEquals(1, credentials.getAllTokens().size());
|
|
|
- Assert.assertEquals(KMSClientProvider.TOKEN_KIND, credentials.
|
|
|
+ Assert.assertEquals(KMSDelegationToken.TOKEN_KIND, credentials.
|
|
|
getToken(SecurityUtil.buildTokenService(kmsAddr)).getKind());
|
|
|
UserGroupInformation.getCurrentUser().addCredentials(credentials);
|
|
|
LOG.info("Added kms dt to credentials: {}", UserGroupInformation.
|
|
@@ -1971,14 +1972,14 @@ public class TestKMS {
|
|
|
final Credentials newCreds = new Credentials();
|
|
|
kpdte.addDelegationTokens("client", newCreds);
|
|
|
Assert.assertEquals(1, newCreds.getAllTokens().size());
|
|
|
- Assert.assertEquals(KMSClientProvider.TOKEN_KIND,
|
|
|
+ Assert.assertEquals(KMSDelegationToken.TOKEN_KIND,
|
|
|
newCreds.getToken(SecurityUtil.buildTokenService(kmsAddr)).
|
|
|
getKind());
|
|
|
|
|
|
// Using job 1's DT should fail.
|
|
|
final Credentials oldCreds = new Credentials();
|
|
|
for (Token<?> token : job1Token) {
|
|
|
- if (token.getKind().equals(KMSClientProvider.TOKEN_KIND)) {
|
|
|
+ if (token.getKind().equals(KMSDelegationToken.TOKEN_KIND)) {
|
|
|
oldCreds
|
|
|
.addToken(SecurityUtil.buildTokenService(kmsAddr), token);
|
|
|
}
|
|
@@ -1995,7 +1996,7 @@ public class TestKMS {
|
|
|
|
|
|
// Using the new DT should succeed.
|
|
|
Assert.assertEquals(1, newCreds.getAllTokens().size());
|
|
|
- Assert.assertEquals(KMSClientProvider.TOKEN_KIND,
|
|
|
+ Assert.assertEquals(KMSDelegationToken.TOKEN_KIND,
|
|
|
newCreds.getToken(SecurityUtil.buildTokenService(kmsAddr)).
|
|
|
getKind());
|
|
|
UserGroupInformation.getCurrentUser().addCredentials(newCreds);
|