azkaban-aplcache

Details

diff --git a/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/commons/HadoopSecurityManager.java b/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/commons/HadoopSecurityManager.java
index 68b7475..aec2f78 100644
--- a/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/commons/HadoopSecurityManager.java
+++ b/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/commons/HadoopSecurityManager.java
@@ -72,9 +72,6 @@ public abstract class HadoopSecurityManager {
   public abstract FileSystem getFSAsUser(String user)
       throws HadoopSecurityManagerException;
 
-  public abstract void prefetchToken(File tokenFile, String userToProxy,
-      Logger logger) throws HadoopSecurityManagerException;
-
   public abstract void cancelTokens(File tokenFile, String userToProxy,
       Logger logger) throws HadoopSecurityManagerException;
 
diff --git a/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/HadoopSecurityManager_H_2_0.java b/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/HadoopSecurityManager_H_2_0.java
index 9ca327f..dca294f 100644
--- a/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/HadoopSecurityManager_H_2_0.java
+++ b/azkaban-hadoop-security-plugin/src/main/java/azkaban/security/HadoopSecurityManager_H_2_0.java
@@ -129,6 +129,7 @@ public class HadoopSecurityManager_H_2_0 extends HadoopSecurityManager {
       .getLogger(HadoopSecurityManager_H_2_0.class);
   private static volatile HadoopSecurityManager hsmInstance = null;
   private static URLClassLoader ucl;
+
   private final RecordFactory recordFactory = RecordFactoryProvider.getRecordFactory(null);
   private final ExecuteAsUser executeAsUser;
   private final Configuration conf;
@@ -367,69 +368,6 @@ public class HadoopSecurityManager_H_2_0 extends HadoopSecurityManager {
     return this.securityEnabled;
   }
 
-  /*
-   * Gets hadoop tokens for a user to run mapred/pig jobs on a secured cluster
-   */
-  @Override
-  public synchronized void prefetchToken(final File tokenFile,
-      final String userToProxy, final Logger logger)
-      throws HadoopSecurityManagerException {
-    logger.info("Getting hadoop tokens for " + userToProxy);
-
-    final UserGroupInformation proxiedUser = getProxiedUser(userToProxy);
-    try {
-      proxiedUser.doAs(new PrivilegedExceptionAction<Void>() {
-        @Override
-        public Void run() throws Exception {
-          getToken(userToProxy);
-          return null;
-        }
-
-        private void getToken(final String userToProxy) throws InterruptedException,
-            IOException, HadoopSecurityManagerException {
-
-          final FileSystem fs = FileSystem.get(HadoopSecurityManager_H_2_0.this.conf);
-          // check if we get the correct FS, and most importantly, the conf
-          logger.info("Getting DFS token from " + fs.getCanonicalServiceName()
-              + fs.getUri());
-          final Token<?> fsToken = fs.getDelegationToken(userToProxy);
-          if (fsToken == null) {
-            logger.error("Failed to fetch DFS token for ");
-            throw new HadoopSecurityManagerException(
-                "Failed to fetch DFS token for " + userToProxy);
-          }
-          logger.info("Created DFS token.");
-          logger.info("Token kind: " + fsToken.getKind());
-          logger.info("Token service: " + fsToken.getService());
-
-          final JobConf jc = new JobConf(HadoopSecurityManager_H_2_0.this.conf);
-          final JobClient jobClient = new JobClient(jc);
-          logger.info("Pre-fetching JT token: Got new JobClient: " + jc);
-
-          final Token<DelegationTokenIdentifier> mrdt =
-              jobClient.getDelegationToken(new Text("mr token"));
-          if (mrdt == null) {
-            logger.error("Failed to fetch JT token for ");
-            throw new HadoopSecurityManagerException(
-                "Failed to fetch JT token for " + userToProxy);
-          }
-          logger.info("Created JT token.");
-          logger.info("Token kind: " + mrdt.getKind());
-          logger.info("Token service: " + mrdt.getService());
-
-          jc.getCredentials().addToken(mrdt.getService(), mrdt);
-          jc.getCredentials().addToken(fsToken.getService(), fsToken);
-
-          prepareTokenFile(userToProxy, jc.getCredentials(), tokenFile, logger);
-          // stash them to cancel after use.
-          logger.info("Tokens loaded in " + tokenFile.getAbsolutePath());
-        }
-      });
-    } catch (final Exception e) {
-      throw new HadoopSecurityManagerException(
-          "Failed to get hadoop tokens! " + e.getMessage() + e.getCause());
-    }
-  }
 
   private void cancelHiveToken(final Token<? extends TokenIdentifier> t,
       final String userToProxy) throws HadoopSecurityManagerException {