Github user vanzin commented on a diff in the pull request:

    https://github.com/apache/spark/pull/21669#discussion_r223525785
  
    --- Diff: 
resource-managers/kubernetes/core/src/main/scala/org/apache/spark/deploy/k8s/features/hadooputils/HadoopKerberosLogin.scala
 ---
    @@ -0,0 +1,75 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one or more
    + * contributor license agreements.  See the NOTICE file distributed with
    + * this work for additional information regarding copyright ownership.
    + * The ASF licenses this file to You under the Apache License, Version 2.0
    + * (the "License"); you may not use this file except in compliance with
    + * the License.  You may obtain a copy of the License at
    + *
    + *    http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.spark.deploy.k8s.features.hadooputils
    +
    +import scala.collection.JavaConverters._
    +
    +import io.fabric8.kubernetes.api.model.SecretBuilder
    +import org.apache.commons.codec.binary.Base64
    +
    +import org.apache.spark.{SparkConf, SparkException}
    +import org.apache.spark.deploy.SparkHadoopUtil
    +import org.apache.spark.deploy.k8s.Constants._
    +import 
org.apache.spark.deploy.k8s.security.KubernetesHadoopDelegationTokenManager
    +
    + /**
    +  * This logic does all the heavy lifting for Delegation Token creation. 
This step
    +  * assumes that the job user has either specified a principal and keytab 
or ran
    +  * $kinit before running spark-submit. By running UGI.getCurrentUser we 
are able
    +  * to obtain the current user, either signed in via $kinit or keytab. 
With the
    +  * Job User principal you then retrieve the delegation token from the 
NameNode
    +  * and store values in DelegationToken. Lastly, the class puts the data 
into
    +  * a secret. All this is defined in a KerberosConfigSpec.
    +  */
    +private[spark] object HadoopKerberosLogin {
    +   def buildSpec(
    +     submissionSparkConf: SparkConf,
    +     kubernetesResourceNamePrefix : String,
    +     tokenManager: KubernetesHadoopDelegationTokenManager): 
KerberosConfigSpec = {
    +     val hadoopConf = 
SparkHadoopUtil.get.newConfiguration(submissionSparkConf)
    +     if (!tokenManager.isSecurityEnabled) {
    +       throw new SparkException("Hadoop not configured with Kerberos")
    +     }
    +     // The JobUserUGI will be taken fom the Local Ticket Cache or via 
keytab+principal
    +     // The login happens in the SparkSubmit so login logic is not 
necessary to include
    +     val jobUserUGI = tokenManager.getCurrentUser
    +     val originalCredentials = jobUserUGI.getCredentials
    +     val (tokenData, renewalInterval) = tokenManager.getDelegationTokens(
    +       originalCredentials,
    +       submissionSparkConf,
    +       hadoopConf)
    +     require(tokenData.nonEmpty, "Did not obtain any delegation tokens")
    +     val currentTime = tokenManager.getCurrentTime
    +     val initialTokenDataKeyName = 
s"$KERBEROS_SECRET_LABEL_PREFIX-$currentTime-$renewalInterval"
    --- End diff --
    
    > will always need to know the renewal interval
    
    Since the renewal service *does not exist*, why do those values need to be 
in the config name? That is my question.
    
    If the answer is "because the renewal service needs it", it means it should 
be added when the renewal service exists, and should be removed from here. And 
at that time we'll discuss the best way to do it.


---

---------------------------------------------------------------------
To unsubscribe, e-mail: reviews-unsubscr...@spark.apache.org
For additional commands, e-mail: reviews-h...@spark.apache.org

Reply via email to