Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,7 @@
import org.apache.hadoop.security.token.SecretManager;
import org.apache.hadoop.security.token.Token;
import org.apache.hadoop.util.Lists;
import org.apache.hadoop.util.StringUtils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

Expand All @@ -84,6 +85,8 @@ public class SaslDataTransferClient {
private static final Logger LOG = LoggerFactory.getLogger(
SaslDataTransferClient.class);

private static final byte[] EMPTY_BYTE_ARRAY = {};

private final Configuration conf;
private final AtomicBoolean fallbackToSimpleAuth;
private final SaslPropertiesResolver saslPropsResolver;
Expand Down Expand Up @@ -519,25 +522,29 @@ private IOStreamPair doSaslHandshake(InetAddress addr,
// In which case there will be no encrypted secret sent from NN.
BlockTokenIdentifier blockTokenIdentifier =
accessToken.decodeIdentifier();
final byte[] first = sasl.evaluateChallengeOrResponse(EMPTY_BYTE_ARRAY);
if (LOG.isDebugEnabled()) {
LOG.info("first: {}", first == null ? null : first.length == 0 ? "<empty>"
: StringUtils.byteToHexString(first));
}
if (blockTokenIdentifier != null) {
byte[] handshakeSecret =
accessToken.decodeIdentifier().getHandshakeMsg();
if (handshakeSecret == null || handshakeSecret.length == 0) {
LOG.debug("Handshake secret is null, "
+ "sending without handshake secret.");
sendSaslMessage(out, new byte[0]);
sendSaslMessage(out, first);
} else {
LOG.debug("Sending handshake secret.");
BlockTokenIdentifier identifier = new BlockTokenIdentifier();
identifier.readFields(new DataInputStream(
new ByteArrayInputStream(accessToken.getIdentifier())));
String bpid = identifier.getBlockPoolId();
sendSaslMessageHandshakeSecret(out, new byte[0],
handshakeSecret, bpid);
sendSaslMessageHandshakeSecret(out, first, handshakeSecret, bpid);
}
} else {
LOG.debug("Block token id is null, sending without handshake secret.");
sendSaslMessage(out, new byte[0]);
sendSaslMessage(out, first);
}

// step 1
Expand Down Expand Up @@ -565,6 +572,7 @@ private IOStreamPair doSaslHandshake(InetAddress addr,
cipherOptions.add(option);
}
}
LOG.debug("{}: cipherOptions={}", sasl, cipherOptions);
sendSaslMessageAndNegotiationCipherOptions(out, localResponse,
cipherOptions);

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@
import java.io.DataInputStream;
import java.io.DataOutputStream;
import java.util.Map;
import java.util.Objects;
import javax.security.auth.callback.CallbackHandler;
import javax.security.sasl.Sasl;
import javax.security.sasl.SaslClient;
Expand Down Expand Up @@ -110,7 +111,7 @@ public static SaslParticipant createClientSaslParticipant(String userName,
* @param saslServer to wrap
*/
private SaslParticipant(SaslServer saslServer) {
this.saslServer = saslServer;
this.saslServer = Objects.requireNonNull(saslServer, "saslServer == null");
this.saslClient = null;
}

Expand All @@ -121,7 +122,7 @@ private SaslParticipant(SaslServer saslServer) {
*/
private SaslParticipant(SaslClient saslClient) {
this.saslServer = null;
this.saslClient = saslClient;
this.saslClient = Objects.requireNonNull(saslClient, "saslClient == null");
}

/**
Expand Down Expand Up @@ -228,4 +229,9 @@ public IOStreamPair createStreamPair(DataOutputStream out,
new SaslOutputStream(out, saslServer));
}
}

@Override
public String toString() {
return "Sasl" + (saslServer != null? "Server" : "Client");
}
}