/** * Creates a {@link Credentials} that contains delegation tokens of the current user for all services that CDAP uses. */ public Credentials createCredentials() { try { Credentials refreshedCredentials = new Credentials(); if (User.isSecurityEnabled()) { YarnTokenUtils.obtainToken(yarnConf, refreshedCredentials); } if (User.isHBaseSecurityEnabled(yarnConf)) { HBaseTokenUtils.obtainToken(yarnConf, refreshedCredentials); } if (secureExplore) { HiveTokenUtils.obtainTokens(cConf, refreshedCredentials); JobHistoryServerTokenUtils.obtainToken(yarnConf, refreshedCredentials); } if (secureStore instanceof DelegationTokensUpdater) { String renewer = UserGroupInformation.getCurrentUser().getShortUserName(); ((DelegationTokensUpdater) secureStore).addDelegationTokens(renewer, refreshedCredentials); } YarnUtils.addDelegationTokens(yarnConf, locationFactory, refreshedCredentials); return refreshedCredentials; } catch (IOException ioe) { throw Throwables.propagate(ioe); } }
/** * Creates a {@link Credentials} that contains delegation tokens of the current user for all services that CDAP uses. */ public Credentials createCredentials() { try { Credentials refreshedCredentials = new Credentials(); if (User.isSecurityEnabled()) { YarnTokenUtils.obtainToken(yarnConf, refreshedCredentials); } if (User.isHBaseSecurityEnabled(yarnConf)) { HBaseTokenUtils.obtainToken(yarnConf, refreshedCredentials); } if (secureExplore) { HiveTokenUtils.obtainTokens(cConf, refreshedCredentials); JobHistoryServerTokenUtils.obtainToken(yarnConf, refreshedCredentials); } if (secureStore instanceof DelegationTokensUpdater) { String renewer = UserGroupInformation.getCurrentUser().getShortUserName(); ((DelegationTokensUpdater) secureStore).addDelegationTokens(renewer, refreshedCredentials); } YarnUtils.addDelegationTokens(yarnConf, locationFactory, refreshedCredentials); return refreshedCredentials; } catch (IOException ioe) { throw Throwables.propagate(ioe); } }