Skip to content

Commit 785bbde

Browse files
committed
Cleanup
1 parent 79973cb commit 785bbde

File tree

5 files changed

+7
-8
lines changed

5 files changed

+7
-8
lines changed

network/shuffle/src/main/java/org/apache/spark/network/sasl/SaslBootstrap.java

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,12 +55,10 @@ public void doBootstrap(TransportClient client) {
5555

5656
while (!saslClient.isComplete()) {
5757
SaslMessage msg = new SaslMessage(appId, payload);
58-
logger.info("Sending msg {} {}", appId, payload.length);
5958
ByteBuf buf = Unpooled.buffer(msg.encodedLength());
6059
msg.encode(buf);
6160

6261
byte[] response = client.sendRpcSync(buf.array(), conf.saslRTTimeout());
63-
logger.info("Got response {} {}", appId, response.length);
6462
payload = saslClient.response(response);
6563
}
6664
} finally {

network/shuffle/src/main/java/org/apache/spark/network/sasl/SaslMessage.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
/**
2626
* Encodes a Sasl-related message which is attempting to authenticate using some credentials tagged
2727
* with the given appId. This appId allows a single SaslRpcHandler to multiplex different
28-
* applications who may be using different sets of credentials.
28+
* applications which may be using different sets of credentials.
2929
*/
3030
class SaslMessage implements Encodable {
3131

@@ -51,7 +51,7 @@ public void encode(ByteBuf buf) {
5151
buf.writeByte(TAG_BYTE);
5252
byte[] idBytes = appId.getBytes(Charsets.UTF_8);
5353
buf.writeInt(idBytes.length);
54-
buf.writeBytes(appId.getBytes(Charsets.UTF_8));
54+
buf.writeBytes(idBytes);
5555
buf.writeInt(payload.length);
5656
buf.writeBytes(payload);
5757
}

network/shuffle/src/main/java/org/apache/spark/network/sasl/SaslRpcHandler.java

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,13 @@
4343
public class SaslRpcHandler extends RpcHandler {
4444
private final Logger logger = LoggerFactory.getLogger(SaslRpcHandler.class);
4545

46+
/** RpcHandler we will delegate for authenticated connections. */
4647
private final RpcHandler delegate;
48+
49+
/** Class which provides secret keys which are shared by server and client on a per-app basis. */
4750
private final SecretKeyHolder secretKeyHolder;
4851

49-
// TODO: Invalidate channels that have closed!
52+
/** Maps each channel to its SASL authentication state. */
5053
private final ConcurrentMap<TransportClient, SparkSaslServer> channelAuthenticationMap;
5154

5255
public SaslRpcHandler(RpcHandler delegate, SecretKeyHolder secretKeyHolder) {
@@ -92,4 +95,3 @@ public void connectionTerminated(TransportClient client) {
9295
}
9396
}
9497
}
95-

network/shuffle/src/main/java/org/apache/spark/network/sasl/SecretKeyHolder.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
package org.apache.spark.network.sasl;
1919

2020
/**
21-
* Interface for getting a secret key associated with some appId.
21+
* Interface for getting a secret key associated with some application.
2222
*/
2323
public interface SecretKeyHolder {
2424
/**

network/shuffle/src/main/java/org/apache/spark/network/sasl/SparkSaslServer.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,6 @@ public SparkSaslServer(String secretKeyId, SecretKeyHolder secretKeyHolder) {
8080
this.saslServer = Sasl.createSaslServer(DIGEST, null, DEFAULT_REALM, SASL_PROPS,
8181
new DigestCallbackHandler());
8282
} catch (SaslException e) {
83-
System.exit(0);
8483
throw Throwables.propagate(e);
8584
}
8685
}

0 commit comments

Comments
 (0)