drill-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "ASF GitHub Bot (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (DRILL-4280) Kerberos Authentication
Date Tue, 07 Feb 2017 18:49:41 GMT

    [ https://issues.apache.org/jira/browse/DRILL-4280?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15856529#comment-15856529
] 

ASF GitHub Bot commented on DRILL-4280:
---------------------------------------

Github user sudheeshkatkam commented on a diff in the pull request:

    https://github.com/apache/drill/pull/578#discussion_r99897718
  
    --- Diff: contrib/native/client/src/clientlib/saslAuthenticatorImpl.cpp ---
    @@ -0,0 +1,206 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one
    + * or more contributor license agreements.  See the NOTICE file
    + * distributed with this work for additional information
    + * regarding copyright ownership.  The ASF licenses this file
    + * to you under the Apache License, Version 2.0 (the
    + * "License"); you may not use this file except in compliance
    + * with the License.  You may obtain a copy of the License at
    + *
    + * http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +
    +#include <vector>
    +#include <boost/algorithm/string.hpp>
    +#include <boost/assign.hpp>
    +#include "saslAuthenticatorImpl.hpp"
    +
    +#include "drillClientImpl.hpp"
    +#include "logger.hpp"
    +
    +namespace Drill {
    +
    +#define DEFAULT_SERVICE_NAME "drill"
    +
    +#define KERBEROS_SIMPLE_NAME "kerberos"
    +#define KERBEROS_SASL_NAME "gssapi"
    +#define PLAIN_NAME "plain"
    +
    +const std::map<std::string, std::string> SaslAuthenticatorImpl::MECHANISM_MAPPING
= boost::assign::map_list_of
    +    (KERBEROS_SIMPLE_NAME, KERBEROS_SASL_NAME)
    +    (PLAIN_NAME, PLAIN_NAME)
    +;
    +
    +boost::mutex SaslAuthenticatorImpl::s_mutex;
    +bool SaslAuthenticatorImpl::s_initialized = false;
    +
    +SaslAuthenticatorImpl::SaslAuthenticatorImpl(const DrillUserProperties* const properties)
:
    +    m_properties(properties), m_pConnection(NULL), m_secret(NULL) {
    +
    +    if (!s_initialized) {
    +        boost::lock_guard<boost::mutex> lock(SaslAuthenticatorImpl::s_mutex);
    +        if (!s_initialized) {
    +            // set plugin path if provided
    +            if (DrillClientConfig::getSaslPluginPath()) {
    +                char *saslPluginPath = const_cast<char *>(DrillClientConfig::getSaslPluginPath());
    +                sasl_set_path(0, saslPluginPath);
    +            }
    +
    +            sasl_client_init(NULL);
    +            { // for debugging purposes
    +                const char **mechanisms = sasl_global_listmech();
    +                int i = 0;
    +                DRILL_MT_LOG(DRILL_LOG(LOG_TRACE) << "SASL mechanisms available
on client: " << std::endl;)
    +                while (mechanisms[i] != NULL) {
    +                    DRILL_MT_LOG(DRILL_LOG(LOG_TRACE) << i << " : " <<
mechanisms[i] << std::endl;)
    +                    i++;
    +                }
    +            }
    +            s_initialized = true;
    +        }
    +    }
    +}
    +
    +SaslAuthenticatorImpl::~SaslAuthenticatorImpl() {
    +    if (m_secret) {
    +        free(m_secret);
    +    }
    +    // may be used to negotiated security layers before disposing in the future
    +    if (m_pConnection) {
    +        sasl_dispose(&m_pConnection);
    +    }
    +    m_pConnection = NULL;
    +}
    +
    +typedef int (*sasl_callback_proc_t)(void); // see sasl_callback_ft
    +
    +int SaslAuthenticatorImpl::userNameCallback(void *context, int id, const char **result,
unsigned *len) {
    +    const std::string* const username = static_cast<const std::string* const>(context);
    +
    +    if ((SASL_CB_USER == id || SASL_CB_AUTHNAME == id)
    +        && username != NULL) {
    +        *result = username->c_str();
    +        // *len = (unsigned int) username->length();
    +    }
    +    return SASL_OK;
    +}
    +
    +int SaslAuthenticatorImpl::passwordCallback(sasl_conn_t *conn, void *context, int id,
sasl_secret_t **psecret) {
    +    const SaslAuthenticatorImpl* const authenticator = static_cast<const SaslAuthenticatorImpl*
const>(context);
    +
    +    if (SASL_CB_PASS == id) {
    +        const std::string password = authenticator->m_password;
    +        const size_t length = password.length();
    +        authenticator->m_secret->len = length;
    +        std::memcpy(authenticator->m_secret->data, password.c_str(), length);
    +        *psecret = authenticator->m_secret;
    +    }
    +    return SASL_OK;
    +}
    +
    +int SaslAuthenticatorImpl::init(const std::vector<std::string>& mechanisms,
exec::shared::SaslMessage& response) {
    +    // find and set parameters
    +    std::string authMechanismToUse;
    +    std::string serviceName;
    +    std::string serviceHost;
    +    for (size_t i = 0; i < m_properties->size(); i++) {
    +        const std::string key = m_properties->keyAt(i);
    +        const std::string value = m_properties->valueAt(i);
    +
    +        if (USERPROP_SERVICE_HOST == key) {
    +            serviceHost = value;
    +        } else if (USERPROP_SERVICE_NAME == key) {
    +            serviceName = value;
    +        } else if (USERPROP_PASSWORD == key) {
    +            m_password = value;
    +            m_secret = (sasl_secret_t *) malloc(sizeof(sasl_secret_t) + m_password.length());
    +            authMechanismToUse = PLAIN_NAME;
    +        } else if (USERPROP_USERNAME == key) {
    +            m_username = value;
    +        } else if (USERPROP_AUTH_MECHANISM == key) {
    +            authMechanismToUse = value;
    +        }
    +    }
    +    if (authMechanismToUse.empty()) return SASL_NOMECH;
    --- End diff --
    
    Same logic available for Plain here as well, but not for Kerberos. The C++ client library
is primarily used through ODBC which typically provides parts of the principal (service_name,
service_host).


> Kerberos Authentication
> -----------------------
>
>                 Key: DRILL-4280
>                 URL: https://issues.apache.org/jira/browse/DRILL-4280
>             Project: Apache Drill
>          Issue Type: Improvement
>            Reporter: Keys Botzum
>            Assignee: Sudheesh Katkam
>              Labels: security
>
> Drill should support Kerberos based authentication from clients. This means that both
the ODBC and JDBC drivers as well as the web/REST interfaces should support inbound Kerberos.
For Web this would most likely be SPNEGO while for ODBC and JDBC this will be more generic
Kerberos.
> Since Hive and much of Hadoop supports Kerberos there is a potential for a lot of reuse
of ideas if not implementation.
> Note that this is related to but not the same as https://issues.apache.org/jira/browse/DRILL-3584




--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Mime
View raw message