HADOOP-15959. Revert "HADOOP-12751. While using kerberos Hadoop incorrectly assumes names with '@' to be non-simple"
This reverts commit 829a2e4d27
.
This commit is contained in:
parent
5e102f9aa5
commit
d0edd37269
@ -324,8 +324,8 @@ String apply(String[] params) throws IOException {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (result != null && nonSimplePattern.matcher(result).find()) {
|
if (result != null && nonSimplePattern.matcher(result).find()) {
|
||||||
LOG.info("Non-simple name {} after auth_to_local rule {}",
|
throw new NoMatchingRule("Non-simple name " + result +
|
||||||
result, this);
|
" after auth_to_local rule " + this);
|
||||||
}
|
}
|
||||||
if (toLowerCase && result != null) {
|
if (toLowerCase && result != null) {
|
||||||
result = result.toLowerCase(Locale.ENGLISH);
|
result = result.toLowerCase(Locale.ENGLISH);
|
||||||
@ -378,7 +378,7 @@ public static class NoMatchingRule extends IOException {
|
|||||||
/**
|
/**
|
||||||
* Get the translation of the principal name into an operating system
|
* Get the translation of the principal name into an operating system
|
||||||
* user name.
|
* user name.
|
||||||
* @return the user name
|
* @return the short name
|
||||||
* @throws IOException throws if something is wrong with the rules
|
* @throws IOException throws if something is wrong with the rules
|
||||||
*/
|
*/
|
||||||
public String getShortName() throws IOException {
|
public String getShortName() throws IOException {
|
||||||
@ -398,8 +398,7 @@ public String getShortName() throws IOException {
|
|||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
LOG.info("No auth_to_local rules applied to {}", this);
|
throw new NoMatchingRule("No rules applied to " + toString());
|
||||||
return toString();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -108,7 +108,12 @@ public void testNameRules() throws Exception {
|
|||||||
kn = new KerberosName("bar@BAR");
|
kn = new KerberosName("bar@BAR");
|
||||||
Assert.assertEquals("bar", kn.getShortName());
|
Assert.assertEquals("bar", kn.getShortName());
|
||||||
kn = new KerberosName("bar@FOO");
|
kn = new KerberosName("bar@FOO");
|
||||||
Assert.assertEquals("bar@FOO", kn.getShortName());
|
try {
|
||||||
|
kn.getShortName();
|
||||||
|
Assert.fail();
|
||||||
|
}
|
||||||
|
catch (Exception ex) {
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test(timeout=60000)
|
@Test(timeout=60000)
|
||||||
|
@ -72,14 +72,23 @@ private void checkBadName(String name) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void checkBadTranslation(String from) {
|
||||||
|
System.out.println("Checking bad translation for " + from);
|
||||||
|
KerberosName nm = new KerberosName(from);
|
||||||
|
try {
|
||||||
|
nm.getShortName();
|
||||||
|
Assert.fail("didn't get exception for " + from);
|
||||||
|
} catch (IOException ie) {
|
||||||
|
// PASS
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testAntiPatterns() throws Exception {
|
public void testAntiPatterns() throws Exception {
|
||||||
checkBadName("owen/owen/owen@FOO.COM");
|
checkBadName("owen/owen/owen@FOO.COM");
|
||||||
checkBadName("owen@foo/bar.com");
|
checkBadName("owen@foo/bar.com");
|
||||||
|
checkBadTranslation("foo@ACME.COM");
|
||||||
// no rules applied, these should pass
|
checkBadTranslation("root/joe@FOO.COM");
|
||||||
checkTranslation("foo@ACME.COM", "foo@ACME.COM");
|
|
||||||
checkTranslation("root/joe@FOO.COM", "root/joe@FOO.COM");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@ -22,7 +22,6 @@
|
|||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.conf.Configured;
|
import org.apache.hadoop.conf.Configured;
|
||||||
import org.apache.hadoop.io.Text;
|
import org.apache.hadoop.io.Text;
|
||||||
import org.apache.hadoop.security.authentication.util.KerberosName;
|
|
||||||
import org.apache.hadoop.security.token.Token;
|
import org.apache.hadoop.security.token.Token;
|
||||||
import org.apache.hadoop.security.token.TokenIdentifier;
|
import org.apache.hadoop.security.token.TokenIdentifier;
|
||||||
import org.apache.hadoop.util.ExitUtil;
|
import org.apache.hadoop.util.ExitUtil;
|
||||||
@ -55,7 +54,6 @@
|
|||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import java.util.LinkedList;
|
import java.util.LinkedList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.regex.Pattern;
|
|
||||||
|
|
||||||
import static org.apache.hadoop.fs.CommonConfigurationKeysPublic.*;
|
import static org.apache.hadoop.fs.CommonConfigurationKeysPublic.*;
|
||||||
import static org.apache.hadoop.security.UserGroupInformation.*;
|
import static org.apache.hadoop.security.UserGroupInformation.*;
|
||||||
@ -131,12 +129,6 @@ public class KDiag extends Configured implements Tool, Closeable {
|
|||||||
private boolean nofail = false;
|
private boolean nofail = false;
|
||||||
private boolean nologin = false;
|
private boolean nologin = false;
|
||||||
private boolean jaas = false;
|
private boolean jaas = false;
|
||||||
private boolean checkShortName = false;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* A pattern that recognizes simple/non-simple names. Per KerberosName
|
|
||||||
*/
|
|
||||||
private static final Pattern nonSimplePattern = Pattern.compile("[/@]");
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Flag set to true if a {@link #verify(boolean, String, String, Object...)}
|
* Flag set to true if a {@link #verify(boolean, String, String, Object...)}
|
||||||
@ -165,8 +157,6 @@ public class KDiag extends Configured implements Tool, Closeable {
|
|||||||
|
|
||||||
public static final String ARG_SECURE = "--secure";
|
public static final String ARG_SECURE = "--secure";
|
||||||
|
|
||||||
public static final String ARG_VERIFYSHORTNAME = "--verifyshortname";
|
|
||||||
|
|
||||||
@SuppressWarnings("IOResourceOpenedButNotSafelyClosed")
|
@SuppressWarnings("IOResourceOpenedButNotSafelyClosed")
|
||||||
public KDiag(Configuration conf,
|
public KDiag(Configuration conf,
|
||||||
PrintWriter out,
|
PrintWriter out,
|
||||||
@ -210,7 +200,6 @@ public int run(String[] argv) throws Exception {
|
|||||||
nofail = popOption(ARG_NOFAIL, args);
|
nofail = popOption(ARG_NOFAIL, args);
|
||||||
jaas = popOption(ARG_JAAS, args);
|
jaas = popOption(ARG_JAAS, args);
|
||||||
nologin = popOption(ARG_NOLOGIN, args);
|
nologin = popOption(ARG_NOLOGIN, args);
|
||||||
checkShortName = popOption(ARG_VERIFYSHORTNAME, args);
|
|
||||||
|
|
||||||
// look for list of resources
|
// look for list of resources
|
||||||
String resource;
|
String resource;
|
||||||
@ -256,9 +245,7 @@ private String usage() {
|
|||||||
+ arg(ARG_NOLOGIN, "", "Do not attempt to log in")
|
+ arg(ARG_NOLOGIN, "", "Do not attempt to log in")
|
||||||
+ arg(ARG_OUTPUT, "<file>", "Write output to a file")
|
+ arg(ARG_OUTPUT, "<file>", "Write output to a file")
|
||||||
+ arg(ARG_RESOURCE, "<resource>", "Load an XML configuration resource")
|
+ arg(ARG_RESOURCE, "<resource>", "Load an XML configuration resource")
|
||||||
+ arg(ARG_SECURE, "", "Require the hadoop configuration to be secure")
|
+ arg(ARG_SECURE, "", "Require the hadoop configuration to be secure");
|
||||||
+ arg(ARG_VERIFYSHORTNAME, ARG_PRINCIPAL + " <principal>",
|
|
||||||
"Verify the short name of the specific principal does not contain '@' or '/'");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private String arg(String name, String params, String meaning) {
|
private String arg(String name, String params, String meaning) {
|
||||||
@ -291,7 +278,6 @@ public boolean execute() throws Exception {
|
|||||||
println("%s = %d", ARG_KEYLEN, minKeyLength);
|
println("%s = %d", ARG_KEYLEN, minKeyLength);
|
||||||
println("%s = %s", ARG_KEYTAB, keytab);
|
println("%s = %s", ARG_KEYTAB, keytab);
|
||||||
println("%s = %s", ARG_PRINCIPAL, principal);
|
println("%s = %s", ARG_PRINCIPAL, principal);
|
||||||
println("%s = %s", ARG_VERIFYSHORTNAME, checkShortName);
|
|
||||||
|
|
||||||
// Fail fast on a JVM without JCE installed.
|
// Fail fast on a JVM without JCE installed.
|
||||||
validateKeyLength();
|
validateKeyLength();
|
||||||
@ -391,10 +377,6 @@ public boolean execute() throws Exception {
|
|||||||
validateJAAS(jaas);
|
validateJAAS(jaas);
|
||||||
validateNTPConf();
|
validateNTPConf();
|
||||||
|
|
||||||
if (checkShortName) {
|
|
||||||
validateShortName();
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!nologin) {
|
if (!nologin) {
|
||||||
title("Logging in");
|
title("Logging in");
|
||||||
if (keytab != null) {
|
if (keytab != null) {
|
||||||
@ -448,32 +430,6 @@ protected void validateKeyLength() throws NoSuchAlgorithmException {
|
|||||||
aesLen, minKeyLength);
|
aesLen, minKeyLength);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Verify whether auth_to_local rules transform a principal name
|
|
||||||
* <p>
|
|
||||||
* Having a local user name "bar@foo.com" may be harmless, so it is noted at
|
|
||||||
* info. However if what was intended is a transformation to "bar"
|
|
||||||
* it can be difficult to debug, hence this check.
|
|
||||||
*/
|
|
||||||
protected void validateShortName() {
|
|
||||||
failif(principal == null, CAT_KERBEROS, "No principal defined");
|
|
||||||
|
|
||||||
try {
|
|
||||||
KerberosName kn = new KerberosName(principal);
|
|
||||||
String result = kn.getShortName();
|
|
||||||
if (nonSimplePattern.matcher(result).find()) {
|
|
||||||
warn(CAT_KERBEROS, principal + " short name: " + result
|
|
||||||
+ " still contains @ or /");
|
|
||||||
}
|
|
||||||
} catch (IOException e) {
|
|
||||||
throw new KerberosDiagsFailure(CAT_KERBEROS, e,
|
|
||||||
"Failed to get short name for " + principal, e);
|
|
||||||
} catch (IllegalArgumentException e) {
|
|
||||||
error(CAT_KERBEROS, "KerberosName(" + principal + ") failed: %s\n%s",
|
|
||||||
e, StringUtils.stringifyException(e));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the default realm.
|
* Get the default realm.
|
||||||
* <p>
|
* <p>
|
||||||
|
@ -470,7 +470,6 @@ KDiag: Diagnose Kerberos Problems
|
|||||||
[--out <file>] : Write output to a file.
|
[--out <file>] : Write output to a file.
|
||||||
[--resource <resource>] : Load an XML configuration resource.
|
[--resource <resource>] : Load an XML configuration resource.
|
||||||
[--secure] : Require the hadoop configuration to be secure.
|
[--secure] : Require the hadoop configuration to be secure.
|
||||||
[--verifyshortname <principal>]: Verify the short name of the specific principal does not contain '@' or '/'
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### `--jaas`: Require a JAAS file to be defined in `java.security.auth.login.config`.
|
#### `--jaas`: Require a JAAS file to be defined in `java.security.auth.login.config`.
|
||||||
@ -566,11 +565,6 @@ or implicitly set to "simple":
|
|||||||
|
|
||||||
Needless to say, an application so configured cannot talk to a secure Hadoop cluster.
|
Needless to say, an application so configured cannot talk to a secure Hadoop cluster.
|
||||||
|
|
||||||
#### `--verifyshortname <principal>`: validate the short name of a principal
|
|
||||||
|
|
||||||
This verifies that the short name of a principal contains neither the `"@"`
|
|
||||||
nor `"/"` characters.
|
|
||||||
|
|
||||||
### Example
|
### Example
|
||||||
|
|
||||||
```
|
```
|
||||||
|
@ -164,22 +164,6 @@ public void testKeytabAndPrincipal() throws Throwable {
|
|||||||
ARG_PRINCIPAL, "foo@EXAMPLE.COM");
|
ARG_PRINCIPAL, "foo@EXAMPLE.COM");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testKerberosName() throws Throwable {
|
|
||||||
kdiagFailure(ARG_KEYLEN, KEYLEN,
|
|
||||||
ARG_VERIFYSHORTNAME,
|
|
||||||
ARG_PRINCIPAL, "foo/foo/foo@BAR.COM");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testShortName() throws Throwable {
|
|
||||||
kdiag(ARG_KEYLEN, KEYLEN,
|
|
||||||
ARG_KEYTAB, keytab.getAbsolutePath(),
|
|
||||||
ARG_PRINCIPAL,
|
|
||||||
ARG_VERIFYSHORTNAME,
|
|
||||||
ARG_PRINCIPAL, "foo@EXAMPLE.COM");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testFileOutput() throws Throwable {
|
public void testFileOutput() throws Throwable {
|
||||||
File f = new File("target/kdiag.txt");
|
File f = new File("target/kdiag.txt");
|
||||||
|
@ -332,15 +332,10 @@ public void testConstructorWithRules() throws Exception {
|
|||||||
UserGroupInformation.setConfiguration(conf);
|
UserGroupInformation.setConfiguration(conf);
|
||||||
testConstructorSuccess("user1", "user1");
|
testConstructorSuccess("user1", "user1");
|
||||||
testConstructorSuccess("user4@OTHER.REALM", "other-user4");
|
testConstructorSuccess("user4@OTHER.REALM", "other-user4");
|
||||||
|
// failure test
|
||||||
// pass through test, no transformation
|
testConstructorFailures("user2@DEFAULT.REALM");
|
||||||
testConstructorSuccess("user2@DEFAULT.REALM", "user2@DEFAULT.REALM");
|
testConstructorFailures("user3/cron@DEFAULT.REALM");
|
||||||
testConstructorSuccess("user3/cron@DEFAULT.REALM", "user3/cron@DEFAULT.REALM");
|
testConstructorFailures("user5/cron@OTHER.REALM");
|
||||||
testConstructorSuccess("user5/cron@OTHER.REALM", "user5/cron@OTHER.REALM");
|
|
||||||
|
|
||||||
// failures
|
|
||||||
testConstructorFailures("user6@example.com@OTHER.REALM");
|
|
||||||
testConstructorFailures("user7@example.com@DEFAULT.REALM");
|
|
||||||
testConstructorFailures(null);
|
testConstructorFailures(null);
|
||||||
testConstructorFailures("");
|
testConstructorFailures("");
|
||||||
}
|
}
|
||||||
@ -354,13 +349,10 @@ public void testConstructorWithKerberos() throws Exception {
|
|||||||
|
|
||||||
testConstructorSuccess("user1", "user1");
|
testConstructorSuccess("user1", "user1");
|
||||||
testConstructorSuccess("user2@DEFAULT.REALM", "user2");
|
testConstructorSuccess("user2@DEFAULT.REALM", "user2");
|
||||||
testConstructorSuccess("user3/cron@DEFAULT.REALM", "user3");
|
testConstructorSuccess("user3/cron@DEFAULT.REALM", "user3");
|
||||||
|
|
||||||
// no rules applied, local name remains the same
|
|
||||||
testConstructorSuccess("user4@OTHER.REALM", "user4@OTHER.REALM");
|
|
||||||
testConstructorSuccess("user5/cron@OTHER.REALM", "user5/cron@OTHER.REALM");
|
|
||||||
|
|
||||||
// failure test
|
// failure test
|
||||||
|
testConstructorFailures("user4@OTHER.REALM");
|
||||||
|
testConstructorFailures("user5/cron@OTHER.REALM");
|
||||||
testConstructorFailures(null);
|
testConstructorFailures(null);
|
||||||
testConstructorFailures("");
|
testConstructorFailures("");
|
||||||
}
|
}
|
||||||
@ -401,9 +393,8 @@ private void testConstructorFailures(String userName) {
|
|||||||
} catch (IllegalArgumentException e) {
|
} catch (IllegalArgumentException e) {
|
||||||
String expect = (userName == null || userName.isEmpty())
|
String expect = (userName == null || userName.isEmpty())
|
||||||
? "Null user" : "Illegal principal name "+userName;
|
? "Null user" : "Illegal principal name "+userName;
|
||||||
String expect2 = "Malformed Kerberos name: "+userName;
|
assertTrue("Did not find "+ expect + " in " + e,
|
||||||
assertTrue("Did not find "+ expect + " or " + expect2 + " in " + e,
|
e.toString().contains(expect));
|
||||||
e.toString().contains(expect) || e.toString().contains(expect2));
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user