HBASE-12366 Add login code to HBase Canary tool (Srikanth Srungarapu)
This commit is contained in:
parent
210f5a3b01
commit
a376c8da9d
|
@ -0,0 +1,98 @@
|
|||
/*
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.apache.hadoop.hbase;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.net.UnknownHostException;
|
||||
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
import org.apache.hadoop.conf.Configuration;
|
||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||
import org.apache.hadoop.hbase.classification.InterfaceStability;
|
||||
import org.apache.hadoop.hbase.security.UserProvider;
|
||||
import org.apache.hadoop.hbase.util.Strings;
|
||||
import org.apache.hadoop.hbase.util.Threads;
|
||||
import org.apache.hadoop.net.DNS;
|
||||
import org.apache.hadoop.security.UserGroupInformation;
|
||||
|
||||
/**
|
||||
* Utility methods for helping with security tasks.
|
||||
*/
|
||||
@InterfaceAudience.Public
|
||||
@InterfaceStability.Evolving
|
||||
public class AuthUtil {
|
||||
private static final Log LOG = LogFactory.getLog(AuthUtil.class);
|
||||
/**
|
||||
* Checks if security is enabled and if so, launches chore for refreshing kerberos ticket.
|
||||
*/
|
||||
public static void launchAuthChore(Configuration conf) throws IOException {
|
||||
UserProvider userProvider = UserProvider.instantiate(conf);
|
||||
// login the principal (if using secure Hadoop)
|
||||
boolean securityEnabled =
|
||||
userProvider.isHadoopSecurityEnabled() && userProvider.isHBaseSecurityEnabled();
|
||||
if (!securityEnabled) return;
|
||||
String host = null;
|
||||
try {
|
||||
host = Strings.domainNamePointerToHostName(DNS.getDefaultHost(
|
||||
conf.get("hbase.client.dns.interface", "default"),
|
||||
conf.get("hbase.client.dns.nameserver", "default")));
|
||||
userProvider.login("hbase.client.keytab.file", "hbase.client.kerberos.principal", host);
|
||||
} catch (UnknownHostException e) {
|
||||
LOG.error("Error resolving host name");
|
||||
throw e;
|
||||
} catch (IOException e) {
|
||||
LOG.error("Error while trying to perform the initial login");
|
||||
throw e;
|
||||
}
|
||||
|
||||
final UserGroupInformation ugi = userProvider.getCurrent().getUGI();
|
||||
Stoppable stoppable = new Stoppable() {
|
||||
private volatile boolean isStopped = false;
|
||||
|
||||
@Override
|
||||
public void stop(String why) {
|
||||
isStopped = true;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isStopped() {
|
||||
return isStopped;
|
||||
}
|
||||
};
|
||||
|
||||
// if you're in debug mode this is useful to avoid getting spammed by the getTGT()
|
||||
// you can increase this, keeping in mind that the default refresh window is 0.8
|
||||
// e.g. 5min tgt * 0.8 = 4min refresh so interval is better be way less than 1min
|
||||
final int CHECK_TGT_INTERVAL = 30 * 1000; // 30sec
|
||||
|
||||
Chore refreshCredentials = new Chore("RefreshCredentials", CHECK_TGT_INTERVAL, stoppable) {
|
||||
@Override
|
||||
protected void chore() {
|
||||
try {
|
||||
ugi.checkTGTAndReloginFromKeytab();
|
||||
} catch (IOException e) {
|
||||
LOG.info("Got exception while trying to refresh credentials ");
|
||||
}
|
||||
}
|
||||
};
|
||||
// Start the chore for refreshing credentials
|
||||
Threads.setDaemonThreadRunning(refreshCredentials.getThread());
|
||||
}
|
||||
}
|
|
@ -34,6 +34,7 @@ import org.apache.commons.lang.time.StopWatch;
|
|||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
import org.apache.hadoop.conf.Configuration;
|
||||
import org.apache.hadoop.hbase.AuthUtil;
|
||||
import org.apache.hadoop.hbase.DoNotRetryIOException;
|
||||
import org.apache.hadoop.hbase.HBaseConfiguration;
|
||||
import org.apache.hadoop.hbase.HColumnDescriptor;
|
||||
|
@ -755,7 +756,9 @@ public final class Canary implements Tool {
|
|||
}
|
||||
|
||||
public static void main(String[] args) throws Exception {
|
||||
int exitCode = ToolRunner.run(HBaseConfiguration.create(), new Canary(), args);
|
||||
final Configuration conf = HBaseConfiguration.create();
|
||||
AuthUtil.launchAuthChore(conf);
|
||||
int exitCode = ToolRunner.run(conf, new Canary(), args);
|
||||
System.exit(exitCode);
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue