MAPREDUCE-3896. Add user information to the delegation token issued by the history server. (Contributed by Vinod Kumar Vavilapalli)
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1296401 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
97d104767d
commit
99bf2902b2
@ -235,6 +235,9 @@ Release 0.23.2 - UNRELEASED
|
|||||||
MAPREDUCE-3706. Fix circular redirect error in job-attempts page. (bobby
|
MAPREDUCE-3706. Fix circular redirect error in job-attempts page. (bobby
|
||||||
via acmurthy)
|
via acmurthy)
|
||||||
|
|
||||||
|
MAPREDUCE-3896. Add user information to the delegation token issued by the
|
||||||
|
history server. (Vinod Kumar Vavilapalli via sseth)
|
||||||
|
|
||||||
Release 0.23.1 - 2012-02-17
|
Release 0.23.1 - 2012-02-17
|
||||||
|
|
||||||
INCOMPATIBLE CHANGES
|
INCOMPATIBLE CHANGES
|
||||||
|
@ -20,8 +20,6 @@
|
|||||||
|
|
||||||
import java.lang.annotation.Annotation;
|
import java.lang.annotation.Annotation;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
|
||||||
import org.apache.commons.logging.LogFactory;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.mapreduce.v2.jobhistory.JHAdminConfig;
|
import org.apache.hadoop.mapreduce.v2.jobhistory.JHAdminConfig;
|
||||||
import org.apache.hadoop.security.KerberosInfo;
|
import org.apache.hadoop.security.KerberosInfo;
|
||||||
|
@ -29,8 +29,10 @@
|
|||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience.Private;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
|
import org.apache.hadoop.io.Text;
|
||||||
import org.apache.hadoop.ipc.Server;
|
import org.apache.hadoop.ipc.Server;
|
||||||
import org.apache.hadoop.mapreduce.JobACL;
|
import org.apache.hadoop.mapreduce.JobACL;
|
||||||
import org.apache.hadoop.mapreduce.TypeConverter;
|
import org.apache.hadoop.mapreduce.TypeConverter;
|
||||||
@ -121,7 +123,6 @@ public void start() {
|
|||||||
InetAddress hostNameResolved = null;
|
InetAddress hostNameResolved = null;
|
||||||
try {
|
try {
|
||||||
hostNameResolved = InetAddress.getLocalHost();
|
hostNameResolved = InetAddress.getLocalHost();
|
||||||
//address.getAddress().getLocalHost();
|
|
||||||
} catch (UnknownHostException e) {
|
} catch (UnknownHostException e) {
|
||||||
throw new YarnException(e);
|
throw new YarnException(e);
|
||||||
}
|
}
|
||||||
@ -166,6 +167,16 @@ public void stop() {
|
|||||||
super.stop();
|
super.stop();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Private
|
||||||
|
public MRClientProtocol getClientHandler() {
|
||||||
|
return this.protocolHandler;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Private
|
||||||
|
public InetSocketAddress getBindAddress() {
|
||||||
|
return this.bindAddress;
|
||||||
|
}
|
||||||
|
|
||||||
private class MRClientProtocolHandler implements MRClientProtocol {
|
private class MRClientProtocolHandler implements MRClientProtocol {
|
||||||
|
|
||||||
private RecordFactory recordFactory = RecordFactoryProvider.getRecordFactory(null);
|
private RecordFactory recordFactory = RecordFactoryProvider.getRecordFactory(null);
|
||||||
@ -294,9 +305,12 @@ public GetDelegationTokenResponse getDelegationToken(
|
|||||||
GetDelegationTokenRequest request) throws YarnRemoteException {
|
GetDelegationTokenRequest request) throws YarnRemoteException {
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
|
||||||
|
UserGroupInformation ugi = UserGroupInformation.getCurrentUser();
|
||||||
|
|
||||||
// Verify that the connection is kerberos authenticated
|
// Verify that the connection is kerberos authenticated
|
||||||
AuthenticationMethod authMethod = UserGroupInformation
|
AuthenticationMethod authMethod = UserGroupInformation
|
||||||
.getRealAuthenticationMethod(UserGroupInformation.getCurrentUser());
|
.getRealAuthenticationMethod(ugi);
|
||||||
if (UserGroupInformation.isSecurityEnabled()
|
if (UserGroupInformation.isSecurityEnabled()
|
||||||
&& (authMethod != AuthenticationMethod.KERBEROS)) {
|
&& (authMethod != AuthenticationMethod.KERBEROS)) {
|
||||||
throw new IOException(
|
throw new IOException(
|
||||||
@ -305,8 +319,16 @@ public GetDelegationTokenResponse getDelegationToken(
|
|||||||
|
|
||||||
GetDelegationTokenResponse response = recordFactory.newRecordInstance(
|
GetDelegationTokenResponse response = recordFactory.newRecordInstance(
|
||||||
GetDelegationTokenResponse.class);
|
GetDelegationTokenResponse.class);
|
||||||
|
|
||||||
|
String user = ugi.getUserName();
|
||||||
|
Text owner = new Text(user);
|
||||||
|
Text realUser = null;
|
||||||
|
if (ugi.getRealUser() != null) {
|
||||||
|
realUser = new Text(ugi.getRealUser().getUserName());
|
||||||
|
}
|
||||||
MRDelegationTokenIdentifier tokenIdentifier =
|
MRDelegationTokenIdentifier tokenIdentifier =
|
||||||
new MRDelegationTokenIdentifier();
|
new MRDelegationTokenIdentifier(owner, new Text(
|
||||||
|
request.getRenewer()), realUser);
|
||||||
Token<MRDelegationTokenIdentifier> realJHSToken =
|
Token<MRDelegationTokenIdentifier> realJHSToken =
|
||||||
new Token<MRDelegationTokenIdentifier>(tokenIdentifier,
|
new Token<MRDelegationTokenIdentifier>(tokenIdentifier,
|
||||||
jhsDTSecretManager);
|
jhsDTSecretManager);
|
||||||
|
@ -22,6 +22,7 @@
|
|||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience.Private;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.mapred.JobConf;
|
import org.apache.hadoop.mapred.JobConf;
|
||||||
import org.apache.hadoop.mapreduce.MRConfig;
|
import org.apache.hadoop.mapreduce.MRConfig;
|
||||||
@ -108,6 +109,11 @@ public void stop() {
|
|||||||
super.stop();
|
super.stop();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Private
|
||||||
|
public HistoryClientService getClientService() {
|
||||||
|
return this.clientService;
|
||||||
|
}
|
||||||
|
|
||||||
public static void main(String[] args) {
|
public static void main(String[] args) {
|
||||||
StringUtils.startupShutdownMessage(JobHistoryServer.class, args, LOG);
|
StringUtils.startupShutdownMessage(JobHistoryServer.class, args, LOG);
|
||||||
try {
|
try {
|
||||||
|
@ -0,0 +1,120 @@
|
|||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.hadoop.mapreduce.security;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.security.PrivilegedAction;
|
||||||
|
import java.security.PrivilegedExceptionAction;
|
||||||
|
|
||||||
|
import junit.framework.Assert;
|
||||||
|
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
|
import org.apache.hadoop.io.Text;
|
||||||
|
import org.apache.hadoop.mapred.JobConf;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.api.HSClientProtocol;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.api.MRClientProtocol;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.api.MRDelegationTokenIdentifier;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.api.protocolrecords.GetDelegationTokenRequest;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.api.protocolrecords.GetJobReportRequest;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.hs.JobHistoryServer;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.jobhistory.JHAdminConfig;
|
||||||
|
import org.apache.hadoop.mapreduce.v2.util.MRBuilderUtils;
|
||||||
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
|
import org.apache.hadoop.security.UserGroupInformation.AuthenticationMethod;
|
||||||
|
import org.apache.hadoop.security.token.Token;
|
||||||
|
import org.apache.hadoop.yarn.api.records.DelegationToken;
|
||||||
|
import org.apache.hadoop.yarn.conf.YarnConfiguration;
|
||||||
|
import org.apache.hadoop.yarn.exceptions.YarnRemoteException;
|
||||||
|
import org.apache.hadoop.yarn.ipc.YarnRPC;
|
||||||
|
import org.apache.hadoop.yarn.util.Records;
|
||||||
|
import org.apache.log4j.Level;
|
||||||
|
import org.apache.log4j.LogManager;
|
||||||
|
import org.apache.log4j.Logger;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
public class TestJHSSecurity {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDelegationToken() throws IOException, InterruptedException {
|
||||||
|
|
||||||
|
Logger rootLogger = LogManager.getRootLogger();
|
||||||
|
rootLogger.setLevel(Level.DEBUG);
|
||||||
|
|
||||||
|
final YarnConfiguration conf = new YarnConfiguration(new JobConf());
|
||||||
|
// Just a random principle
|
||||||
|
conf.set(JHAdminConfig.MR_HISTORY_PRINCIPAL,
|
||||||
|
"RandomOrc/localhost@apache.org");
|
||||||
|
|
||||||
|
conf.set(CommonConfigurationKeysPublic.HADOOP_SECURITY_AUTHENTICATION,
|
||||||
|
"kerberos");
|
||||||
|
UserGroupInformation.setConfiguration(conf);
|
||||||
|
|
||||||
|
final JobHistoryServer jobHistoryServer = new JobHistoryServer() {
|
||||||
|
protected void doSecureLogin(Configuration conf) throws IOException {
|
||||||
|
// no keytab based login
|
||||||
|
};
|
||||||
|
};
|
||||||
|
jobHistoryServer.init(conf);
|
||||||
|
jobHistoryServer.start();
|
||||||
|
|
||||||
|
// Fake the authentication-method
|
||||||
|
UserGroupInformation loggedInUser = UserGroupInformation.getCurrentUser();
|
||||||
|
loggedInUser.setAuthenticationMethod(AuthenticationMethod.KERBEROS);
|
||||||
|
|
||||||
|
// Get the delegation token directly as it is a little difficult to setup
|
||||||
|
// the kerberos based rpc.
|
||||||
|
DelegationToken token =
|
||||||
|
loggedInUser.doAs(new PrivilegedExceptionAction<DelegationToken>() {
|
||||||
|
@Override
|
||||||
|
public DelegationToken run() throws YarnRemoteException {
|
||||||
|
GetDelegationTokenRequest request =
|
||||||
|
Records.newRecord(GetDelegationTokenRequest.class);
|
||||||
|
request.setRenewer("OneRenewerToRuleThemAll");
|
||||||
|
return jobHistoryServer.getClientService().getClientHandler()
|
||||||
|
.getDelegationToken(request).getDelegationToken();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
// Now try talking to JHS using the delegation token
|
||||||
|
UserGroupInformation ugi =
|
||||||
|
UserGroupInformation.createRemoteUser("TheDarkLord");
|
||||||
|
ugi.addToken(new Token<MRDelegationTokenIdentifier>(token.getIdentifier()
|
||||||
|
.array(), token.getPassword().array(), new Text(token.getKind()),
|
||||||
|
new Text(token.getService())));
|
||||||
|
final YarnRPC rpc = YarnRPC.create(conf);
|
||||||
|
MRClientProtocol userUsingDT =
|
||||||
|
ugi.doAs(new PrivilegedAction<MRClientProtocol>() {
|
||||||
|
@Override
|
||||||
|
public MRClientProtocol run() {
|
||||||
|
return (MRClientProtocol) rpc.getProxy(HSClientProtocol.class,
|
||||||
|
jobHistoryServer.getClientService().getBindAddress(), conf);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
GetJobReportRequest jobReportRequest =
|
||||||
|
Records.newRecord(GetJobReportRequest.class);
|
||||||
|
jobReportRequest.setJobId(MRBuilderUtils.newJobId(123456, 1, 1));
|
||||||
|
try {
|
||||||
|
userUsingDT.getJobReport(jobReportRequest);
|
||||||
|
} catch (YarnRemoteException e) {
|
||||||
|
Assert.assertEquals("Unknown job job_123456_0001", e.getMessage());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -0,0 +1,28 @@
|
|||||||
|
#
|
||||||
|
# Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
# or more contributor license agreements. See the NOTICE file
|
||||||
|
# distributed with this work for additional information
|
||||||
|
# regarding copyright ownership. The ASF licenses this file
|
||||||
|
# to you under the Apache License, Version 2.0 (the
|
||||||
|
# "License"); you may not use this file except in compliance
|
||||||
|
# with the License. You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
[libdefaults]
|
||||||
|
default_realm = APACHE.ORG
|
||||||
|
udp_preference_limit = 1
|
||||||
|
extra_addresses = 127.0.0.1
|
||||||
|
[realms]
|
||||||
|
APACHE.ORG = {
|
||||||
|
admin_server = localhost:88
|
||||||
|
kdc = localhost:88
|
||||||
|
}
|
||||||
|
[domain_realm]
|
||||||
|
localhost = APACHE.ORG
|
Loading…
Reference in New Issue
Block a user