@Override protected Authenticator getFallBackAuthenticator() { return new PseudoDelegationTokenAuthenticator(); } });
@Override protected Authenticator getFallBackAuthenticator() { return new PseudoDelegationTokenAuthenticator(); } });
@Override protected Authenticator getFallBackAuthenticator() { return new PseudoDelegationTokenAuthenticator(); } });
@Override protected Authenticator getFallBackAuthenticator() { return new PseudoDelegationTokenAuthenticator(); } });
@Override protected Authenticator getFallBackAuthenticator() { return new PseudoDelegationTokenAuthenticator(); } });
authenticator = new KerberosDelegationTokenAuthenticator(); } else { authenticator = new PseudoDelegationTokenAuthenticator();
authenticator = new KerberosDelegationTokenAuthenticator(); } else { authenticator = new PseudoDelegationTokenAuthenticator();
@Override protected void serviceInit(Configuration conf) throws Exception { super.serviceInit(conf); ClientConfig cc = new DefaultClientConfig(); cc.getClasses().add(YarnJacksonJaxbJsonProvider.class); if (YarnConfiguration.useHttps(conf)) { // If https is chosen, configures SSL client. sslFactory = getSSLFactory(conf); connConfigurator = getConnConfigurator(sslFactory); } else { connConfigurator = DEFAULT_TIMEOUT_CONN_CONFIGURATOR; } if (UserGroupInformation.isSecurityEnabled()) { authenticator = new KerberosDelegationTokenAuthenticator(); } else { authenticator = new PseudoDelegationTokenAuthenticator(); } authenticator.setConnectionConfigurator(connConfigurator); connectionRetry = new TimelineClientConnectionRetry(conf); client = new Client( new URLConnectionClientHandler(new TimelineURLConnectionFactory( authUgi, authenticator, connConfigurator, token, doAsUser)), cc); if (requireConnectionRetry) { TimelineJerseyRetryFilter retryFilter = new TimelineJerseyRetryFilter(connectionRetry); client.addFilter(retryFilter); } }