HADOOP-17392. Remote exception messages should not include the exception class (#2486). Contributed by Daryn Sharp and Ahmed Hussein
This commit is contained in:
parent
c5b9c5dfe5
commit
5bfb97bc7d
@ -18,6 +18,7 @@
|
|||||||
|
|
||||||
package org.apache.hadoop.ipc;
|
package org.apache.hadoop.ipc;
|
||||||
|
|
||||||
|
import org.apache.hadoop.security.AccessControlException;
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
import com.google.common.base.Preconditions;
|
import com.google.common.base.Preconditions;
|
||||||
import com.google.common.util.concurrent.ThreadFactoryBuilder;
|
import com.google.common.util.concurrent.ThreadFactoryBuilder;
|
||||||
@ -848,7 +849,8 @@ public AuthMethod run()
|
|||||||
}
|
}
|
||||||
} else if (UserGroupInformation.isSecurityEnabled()) {
|
} else if (UserGroupInformation.isSecurityEnabled()) {
|
||||||
if (!fallbackAllowed) {
|
if (!fallbackAllowed) {
|
||||||
throw new IOException("Server asks us to fall back to SIMPLE " +
|
throw new AccessControlException(
|
||||||
|
"Server asks us to fall back to SIMPLE " +
|
||||||
"auth, but this client is configured to only allow secure " +
|
"auth, but this client is configured to only allow secure " +
|
||||||
"connections.");
|
"connections.");
|
||||||
}
|
}
|
||||||
|
@ -2202,7 +2202,7 @@ private void doSaslReply(Message message) throws IOException {
|
|||||||
private void doSaslReply(Exception ioe) throws IOException {
|
private void doSaslReply(Exception ioe) throws IOException {
|
||||||
setupResponse(authFailedCall,
|
setupResponse(authFailedCall,
|
||||||
RpcStatusProto.FATAL, RpcErrorCodeProto.FATAL_UNAUTHORIZED,
|
RpcStatusProto.FATAL, RpcErrorCodeProto.FATAL_UNAUTHORIZED,
|
||||||
null, ioe.getClass().getName(), ioe.toString());
|
null, ioe.getClass().getName(), ioe.getMessage());
|
||||||
sendResponse(authFailedCall);
|
sendResponse(authFailedCall);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2597,8 +2597,7 @@ private void processOneRpc(ByteBuffer bb)
|
|||||||
final RpcCall call = new RpcCall(this, callId, retry);
|
final RpcCall call = new RpcCall(this, callId, retry);
|
||||||
setupResponse(call,
|
setupResponse(call,
|
||||||
rse.getRpcStatusProto(), rse.getRpcErrorCodeProto(), null,
|
rse.getRpcStatusProto(), rse.getRpcErrorCodeProto(), null,
|
||||||
t.getClass().getName(),
|
t.getClass().getName(), t.getMessage());
|
||||||
t.getMessage() != null ? t.getMessage() : t.toString());
|
|
||||||
sendResponse(call);
|
sendResponse(call);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -45,6 +45,7 @@
|
|||||||
|
|
||||||
import javax.net.SocketFactory;
|
import javax.net.SocketFactory;
|
||||||
|
|
||||||
|
import org.apache.hadoop.security.AccessControlException;
|
||||||
import org.apache.commons.net.util.SubnetUtils;
|
import org.apache.commons.net.util.SubnetUtils;
|
||||||
import org.apache.commons.net.util.SubnetUtils.SubnetInfo;
|
import org.apache.commons.net.util.SubnetUtils.SubnetInfo;
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
@ -806,6 +807,11 @@ public static IOException wrapException(final String destHost,
|
|||||||
+ " failed on socket exception: " + exception
|
+ " failed on socket exception: " + exception
|
||||||
+ ";"
|
+ ";"
|
||||||
+ see("SocketException"));
|
+ see("SocketException"));
|
||||||
|
} else if (exception instanceof AccessControlException) {
|
||||||
|
return wrapWithMessage(exception,
|
||||||
|
"Call From "
|
||||||
|
+ localHost + " to " + destHost + ":" + destPort
|
||||||
|
+ " failed: " + exception.getMessage());
|
||||||
} else {
|
} else {
|
||||||
// 1. Return instance of same type with exception msg if Exception has a
|
// 1. Return instance of same type with exception msg if Exception has a
|
||||||
// String constructor.
|
// String constructor.
|
||||||
|
@ -533,13 +533,16 @@ public void handle(Callback[] callbacks)
|
|||||||
}
|
}
|
||||||
|
|
||||||
private static Pattern BadToken =
|
private static Pattern BadToken =
|
||||||
Pattern.compile(".*DIGEST-MD5: digest response format violation.*");
|
Pattern.compile("^" + RemoteException.class.getName() +
|
||||||
|
"\\("+ SaslException.class.getName() + "\\): " +
|
||||||
|
"DIGEST-MD5: digest response format violation.*");
|
||||||
private static Pattern KrbFailed =
|
private static Pattern KrbFailed =
|
||||||
Pattern.compile(".*Failed on local exception:.* " +
|
Pattern.compile(".*Failed on local exception:.* " +
|
||||||
"Failed to specify server's Kerberos principal name.*");
|
"Failed to specify server's Kerberos principal name.*");
|
||||||
private static Pattern Denied(AuthMethod method) {
|
private static Pattern Denied(AuthMethod method) {
|
||||||
return Pattern.compile(".*RemoteException.*AccessControlException.*: "
|
return Pattern.compile("^" + RemoteException.class.getName() +
|
||||||
+ method + " authentication is not enabled.*");
|
"\\(" + AccessControlException.class.getName() + "\\): "
|
||||||
|
+ method + " authentication is not enabled.*");
|
||||||
}
|
}
|
||||||
private static Pattern No(AuthMethod ... method) {
|
private static Pattern No(AuthMethod ... method) {
|
||||||
String methods = StringUtils.join(method, ",\\s*");
|
String methods = StringUtils.join(method, ",\\s*");
|
||||||
@ -547,10 +550,10 @@ private static Pattern No(AuthMethod ... method) {
|
|||||||
"Client cannot authenticate via:\\[" + methods + "\\].*");
|
"Client cannot authenticate via:\\[" + methods + "\\].*");
|
||||||
}
|
}
|
||||||
private static Pattern NoTokenAuth =
|
private static Pattern NoTokenAuth =
|
||||||
Pattern.compile(".*IllegalArgumentException: " +
|
Pattern.compile("^" + IllegalArgumentException.class.getName() + ": " +
|
||||||
"TOKEN authentication requires a secret manager");
|
"TOKEN authentication requires a secret manager");
|
||||||
private static Pattern NoFallback =
|
private static Pattern NoFallback =
|
||||||
Pattern.compile(".*Failed on local exception:.* " +
|
Pattern.compile("^" + AccessControlException.class.getName() + ":.* " +
|
||||||
"Server asks us to fall back to SIMPLE auth, " +
|
"Server asks us to fall back to SIMPLE auth, " +
|
||||||
"but this client is configured to only allow secure connections.*");
|
"but this client is configured to only allow secure connections.*");
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user