Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id CAD25200D31 for ; Sat, 4 Nov 2017 16:23:03 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id C97F8160C00; Sat, 4 Nov 2017 15:23:03 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id D16CC160BFE for ; Sat, 4 Nov 2017 16:23:02 +0100 (CET) Received: (qmail 75905 invoked by uid 500); 4 Nov 2017 15:22:52 -0000 Mailing-List: contact common-commits-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Delivered-To: mailing list common-commits@hadoop.apache.org Received: (qmail 75186 invoked by uid 99); 4 Nov 2017 15:22:51 -0000 Received: from git1-us-west.apache.org (HELO git1-us-west.apache.org) (140.211.11.23) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 04 Nov 2017 15:22:51 +0000 Received: by git1-us-west.apache.org (ASF Mail Server at git1-us-west.apache.org, from userid 33) id 591A6F5DC2; Sat, 4 Nov 2017 15:22:48 +0000 (UTC) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: asuresh@apache.org To: common-commits@hadoop.apache.org Date: Sat, 04 Nov 2017 15:23:33 -0000 Message-Id: In-Reply-To: References: X-Mailer: ASF-Git Admin Mailer Subject: [47/51] [abbrv] hadoop git commit: HADOOP-14987. Improve KMSClientProvider log around delegation token checking. Contributed by Xiaoyu Yao and Xiao Chen. archived-at: Sat, 04 Nov 2017 15:23:04 -0000 HADOOP-14987. Improve KMSClientProvider log around delegation token checking. Contributed by Xiaoyu Yao and Xiao Chen. Project: http://git-wip-us.apache.org/repos/asf/hadoop/repo Commit: http://git-wip-us.apache.org/repos/asf/hadoop/commit/59d78a50 Tree: http://git-wip-us.apache.org/repos/asf/hadoop/tree/59d78a50 Diff: http://git-wip-us.apache.org/repos/asf/hadoop/diff/59d78a50 Branch: refs/heads/YARN-6592 Commit: 59d78a5088700350a5122c3a3ba5e76cd26d6a80 Parents: b85603e Author: Xiaoyu Yao Authored: Fri Nov 3 15:58:24 2017 -0700 Committer: Xiaoyu Yao Committed: Fri Nov 3 16:10:37 2017 -0700 ---------------------------------------------------------------------- .../crypto/key/kms/KMSClientProvider.java | 46 +++++++++++-------- .../hadoop/security/UserGroupInformation.java | 47 ++++++++++++++++---- .../kms/TestLoadBalancingKMSClientProvider.java | 15 +++++++ 3 files changed, 81 insertions(+), 27 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/hadoop/blob/59d78a50/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java ---------------------------------------------------------------------- diff --git a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java index c324cd7..2eb2e21 100644 --- a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java +++ b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java @@ -133,6 +133,13 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, private static final ObjectWriter WRITER = new ObjectMapper().writerWithDefaultPrettyPrinter(); + private final Text dtService; + + // Allow fallback to default kms server port 9600 for certain tests that do + // not specify the port explicitly in the kms provider url. + @VisibleForTesting + public static volatile boolean fallbackDefaultPortForTesting = false; + private class EncryptedQueueRefiller implements ValueQueue.QueueRefiller { @@ -297,7 +304,7 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, } } - private String kmsUrl; + private URL kmsUrl; private SSLFactory sslFactory; private ConnectionConfigurator configurator; private DelegationTokenAuthenticatedURL.Token authToken; @@ -349,7 +356,15 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, public KMSClientProvider(URI uri, Configuration conf) throws IOException { super(conf); kmsUrl = createServiceURL(extractKMSPath(uri)); - if ("https".equalsIgnoreCase(new URL(kmsUrl).getProtocol())) { + int kmsPort = kmsUrl.getPort(); + if ((kmsPort == -1) && fallbackDefaultPortForTesting) { + kmsPort = 9600; + } + + InetSocketAddress addr = new InetSocketAddress(kmsUrl.getHost(), kmsPort); + dtService = SecurityUtil.buildTokenService(addr); + + if ("https".equalsIgnoreCase(kmsUrl.getProtocol())) { sslFactory = new SSLFactory(SSLFactory.Mode.CLIENT, conf); try { sslFactory.init(); @@ -385,19 +400,20 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, KMS_CLIENT_ENC_KEY_CACHE_NUM_REFILL_THREADS_DEFAULT), new EncryptedQueueRefiller()); authToken = new DelegationTokenAuthenticatedURL.Token(); + LOG.info("KMSClientProvider for KMS url: {} delegation token service: {}" + + " created.", kmsUrl, dtService); } private static Path extractKMSPath(URI uri) throws MalformedURLException, IOException { return ProviderUtils.unnestUri(uri); } - private static String createServiceURL(Path path) throws IOException { + private static URL createServiceURL(Path path) throws IOException { String str = new URL(path.toString()).toExternalForm(); if (str.endsWith("/")) { str = str.substring(0, str.length() - 1); } - return new URL(str + KMSRESTConstants.SERVICE_VERSION + "/"). - toExternalForm(); + return new URL(str + KMSRESTConstants.SERVICE_VERSION + "/"); } private URL createURL(String collection, String resource, String subResource, @@ -996,7 +1012,6 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, public Token[] addDelegationTokens(final String renewer, Credentials credentials) throws IOException { Token[] tokens = null; - Text dtService = getDelegationTokenService(); Token token = credentials.getToken(dtService); if (token == null) { final URL url = createURL(null, null, null, null); @@ -1033,21 +1048,14 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, } return tokens; } - - private Text getDelegationTokenService() throws IOException { - URL url = new URL(kmsUrl); - InetSocketAddress addr = new InetSocketAddress(url.getHost(), - url.getPort()); - Text dtService = SecurityUtil.buildTokenService(addr); - return dtService; - } private boolean containsKmsDt(UserGroupInformation ugi) throws IOException { // Add existing credentials from the UGI, since provider is cached. Credentials creds = ugi.getCredentials(); if (!creds.getAllTokens().isEmpty()) { + LOG.debug("Searching for token that matches service: {}", dtService); org.apache.hadoop.security.token.Token - dToken = creds.getToken(getDelegationTokenService()); + dToken = creds.getToken(dtService); if (dToken != null) { return true; } @@ -1058,9 +1066,9 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, private UserGroupInformation getActualUgi() throws IOException { final UserGroupInformation currentUgi = UserGroupInformation .getCurrentUser(); - if (LOG.isDebugEnabled()) { - UserGroupInformation.logAllUserInfo(currentUgi); - } + + UserGroupInformation.logAllUserInfo(LOG, currentUgi); + // Use current user by default UserGroupInformation actualUgi = currentUgi; if (currentUgi.getRealUser() != null) { @@ -1099,6 +1107,6 @@ public class KMSClientProvider extends KeyProvider implements CryptoExtension, @VisibleForTesting String getKMSUrl() { - return kmsUrl; + return kmsUrl.toString(); } } http://git-wip-us.apache.org/repos/asf/hadoop/blob/59d78a50/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/UserGroupInformation.java ---------------------------------------------------------------------- diff --git a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/UserGroupInformation.java b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/UserGroupInformation.java index e4d01a1..f7aea31 100644 --- a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/UserGroupInformation.java +++ b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/security/UserGroupInformation.java @@ -1990,20 +1990,51 @@ public class UserGroupInformation { } } - public static void logAllUserInfo(UserGroupInformation ugi) throws + /** + * Log current UGI and token information into specified log. + * @param ugi - UGI + * @throws IOException + */ + @InterfaceAudience.LimitedPrivate({"HDFS", "KMS"}) + @InterfaceStability.Unstable + public static void logUserInfo(Logger log, String caption, + UserGroupInformation ugi) throws IOException { + if (log.isDebugEnabled()) { + log.debug(caption + " UGI: " + ugi); + for (Token token : ugi.getTokens()) { + log.debug("+token:" + token); + } + } + } + + /** + * Log all (current, real, login) UGI and token info into specified log. + * @param ugi - UGI + * @throws IOException + */ + @InterfaceAudience.LimitedPrivate({"HDFS", "KMS"}) + @InterfaceStability.Unstable + public static void logAllUserInfo(Logger log, UserGroupInformation ugi) throws IOException { - if (LOG.isDebugEnabled()) { - LOG.debug("UGI: " + ugi); + if (log.isDebugEnabled()) { + logUserInfo(log, "Current", ugi.getCurrentUser()); if (ugi.getRealUser() != null) { - LOG.debug("+RealUGI: " + ugi.getRealUser()); - } - LOG.debug("+LoginUGI: " + ugi.getLoginUser()); - for (Token token : ugi.getTokens()) { - LOG.debug("+UGI token:" + token); + logUserInfo(log, "Real", ugi.getRealUser()); } + logUserInfo(log, "Login", ugi.getLoginUser()); } } + /** + * Log all (current, real, login) UGI and token info into UGI debug log. + * @param ugi - UGI + * @throws IOException + */ + public static void logAllUserInfo(UserGroupInformation ugi) throws + IOException { + logAllUserInfo(LOG, ugi); + } + private void print() throws IOException { System.out.println("User: " + getUserName()); System.out.print("Group Ids: "); http://git-wip-us.apache.org/repos/asf/hadoop/blob/59d78a50/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/crypto/key/kms/TestLoadBalancingKMSClientProvider.java ---------------------------------------------------------------------- diff --git a/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/crypto/key/kms/TestLoadBalancingKMSClientProvider.java b/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/crypto/key/kms/TestLoadBalancingKMSClientProvider.java index 7a70e18..bd68dca 100644 --- a/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/crypto/key/kms/TestLoadBalancingKMSClientProvider.java +++ b/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/crypto/key/kms/TestLoadBalancingKMSClientProvider.java @@ -39,8 +39,11 @@ import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension; import org.apache.hadoop.fs.CommonConfigurationKeysPublic; import org.apache.hadoop.net.ConnectTimeoutException; import org.apache.hadoop.security.AccessControlException; +import org.apache.hadoop.security.SecurityUtil; import org.apache.hadoop.security.authentication.client.AuthenticationException; import org.apache.hadoop.security.authorize.AuthorizationException; +import org.junit.After; +import org.junit.BeforeClass; import org.junit.Test; import org.mockito.Mockito; @@ -48,9 +51,20 @@ import com.google.common.collect.Sets; public class TestLoadBalancingKMSClientProvider { + @BeforeClass + public static void setup() throws IOException { + SecurityUtil.setTokenServiceUseIp(false); + } + + @After + public void teardown() throws IOException { + KMSClientProvider.fallbackDefaultPortForTesting = false; + } + @Test public void testCreation() throws Exception { Configuration conf = new Configuration(); + KMSClientProvider.fallbackDefaultPortForTesting = true; KeyProvider kp = new KMSClientProvider.Factory().createProvider(new URI( "kms://http@host1/kms/foo"), conf); assertTrue(kp instanceof LoadBalancingKMSClientProvider); @@ -231,6 +245,7 @@ public class TestLoadBalancingKMSClientProvider { @Test public void testClassCastException() throws Exception { Configuration conf = new Configuration(); + KMSClientProvider.fallbackDefaultPortForTesting = true; KMSClientProvider p1 = new MyKMSClientProvider( new URI("kms://http@host1/kms/foo"), conf); LoadBalancingKMSClientProvider kp = new LoadBalancingKMSClientProvider( --------------------------------------------------------------------- To unsubscribe, e-mail: common-commits-unsubscribe@hadoop.apache.org For additional commands, e-mail: common-commits-help@hadoop.apache.org