Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -665,7 +665,7 @@ static void setCoprocessorError(RpcController controller, Throwable error) {
}
}

static boolean isUnexpectedPreambleHeaderException(IOException e) {
public static boolean isUnexpectedPreambleHeaderException(IOException e) {
if (!(e instanceof RemoteException)) {
return false;
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@
import static org.apache.hadoop.hbase.ipc.IPCUtil.toIOE;
import static org.apache.hadoop.hbase.ipc.IPCUtil.wrapException;

import com.google.errorprone.annotations.RestrictedApi;
import io.opentelemetry.api.trace.Span;
import io.opentelemetry.api.trace.StatusCode;
import io.opentelemetry.context.Scope;
Expand Down Expand Up @@ -542,6 +543,12 @@ public RpcChannel createRpcChannel(ServerName sn, User user, int rpcTimeout) {
return new RpcChannelImplementation(this, createAddr(sn), user, rpcTimeout);
}

@RestrictedApi(explanation = "Should only be called in tests", link = "",
allowedOnPath = ".*/src/test/.*")
PoolMap<ConnectionId, T> getConnections() {
return connections;
}

private static class AbstractRpcChannel {

protected final Address addr;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,12 +37,14 @@
import java.util.ArrayDeque;
import java.util.Locale;
import java.util.Queue;
import java.util.Set;
import java.util.concurrent.ConcurrentHashMap;
import java.util.concurrent.ConcurrentMap;
import java.util.concurrent.ThreadLocalRandom;
import javax.security.sasl.SaslException;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.hbase.DoNotRetryIOException;
import org.apache.hadoop.hbase.client.ConnectionUtils;
import org.apache.hadoop.hbase.exceptions.ConnectionClosingException;
import org.apache.hadoop.hbase.io.ByteArrayOutputStream;
import org.apache.hadoop.hbase.ipc.HBaseRpcController.CancellationCallback;
Expand Down Expand Up @@ -352,13 +354,13 @@ private void disposeSasl() {
}
}

private boolean setupSaslConnection(final InputStream in2, final OutputStream out2)
throws IOException {
private boolean setupSaslConnection(final InputStream in2, final OutputStream out2,
String serverPrincipal) throws IOException {
if (this.metrics != null) {
this.metrics.incrNsLookups();
}
saslRpcClient = new HBaseSaslRpcClient(this.rpcClient.conf, provider, token,
socket.getInetAddress(), securityInfo, this.rpcClient.fallbackAllowed,
socket.getInetAddress(), serverPrincipal, this.rpcClient.fallbackAllowed,
this.rpcClient.conf.get("hbase.rpc.protection",
QualityOfProtection.AUTHENTICATION.name().toLowerCase(Locale.ROOT)),
this.rpcClient.conf.getBoolean(CRYPTO_AES_ENABLED_KEY, CRYPTO_AES_ENABLED_DEFAULT));
Expand All @@ -379,7 +381,8 @@ private boolean setupSaslConnection(final InputStream in2, final OutputStream ou
* </p>
*/
private void handleSaslConnectionFailure(final int currRetries, final int maxRetries,
final Exception ex, final UserGroupInformation user) throws IOException, InterruptedException {
final Exception ex, final UserGroupInformation user, final String serverPrincipal)
throws IOException, InterruptedException {
closeSocket();
user.doAs(new PrivilegedExceptionAction<Object>() {
@Override
Expand Down Expand Up @@ -419,25 +422,75 @@ public Object run() throws IOException, InterruptedException {
Thread.sleep(ThreadLocalRandom.current().nextInt(reloginMaxBackoff) + 1);
return null;
} else {
String msg =
"Failed to initiate connection for " + UserGroupInformation.getLoginUser().getUserName()
+ " to " + securityInfo.getServerPrincipal();
String msg = "Failed to initiate connection for "
+ UserGroupInformation.getLoginUser().getUserName() + " to " + serverPrincipal;
throw new IOException(msg, ex);
}
}
});
}

private void getConnectionRegistry(OutputStream outStream) throws IOException {
private void getConnectionRegistry(InputStream inStream, OutputStream outStream,
Call connectionRegistryCall) throws IOException {
outStream.write(RpcClient.REGISTRY_PREAMBLE_HEADER);
readResponse(new DataInputStream(inStream), calls, connectionRegistryCall, remoteExc -> {
synchronized (this) {
closeConn(remoteExc);
}
});
}

private void createStreams(InputStream inStream, OutputStream outStream) {
this.in = new DataInputStream(new BufferedInputStream(inStream));
this.out = new DataOutputStream(new BufferedOutputStream(outStream));
}

private void setupIOstreams() throws IOException {
// choose the server principal to use
private String chooseServerPrincipal(InputStream inStream, OutputStream outStream)
throws IOException {
Set<String> serverPrincipals = getServerPrincipals();
if (serverPrincipals.size() == 1) {
return serverPrincipals.iterator().next();
}
// this means we use kerberos authentication and there are multiple server principal candidates,
// in this way we need to send a special preamble header to get server principal from server
Call securityPreambleCall = createSecurityPreambleCall(r -> {
});
outStream.write(RpcClient.SECURITY_PREAMBLE_HEADER);
readResponse(new DataInputStream(inStream), calls, securityPreambleCall, remoteExc -> {
synchronized (this) {
closeConn(remoteExc);
}
});
if (securityPreambleCall.error != null) {
LOG.debug("Error when trying to do a security preamble call to {}", remoteId.address,
securityPreambleCall.error);
if (ConnectionUtils.isUnexpectedPreambleHeaderException(securityPreambleCall.error)) {
// this means we are connecting to an old server which does not support the security
// preamble call, so we should fallback to randomly select a principal to use
// TODO: find a way to reconnect without failing all the pending calls, for now, when we
// reach here, shutdown should have already been scheduled
throw securityPreambleCall.error;
}
if (IPCUtil.isSecurityNotEnabledException(securityPreambleCall.error)) {
// server tells us security is not enabled, then we should check whether fallback to
// simple is allowed, if so we just go without security, otherwise we should fail the
// negotiation immediately
if (rpcClient.fallbackAllowed) {
// TODO: just change the preamble and skip the fallback to simple logic, for now, just
// select the first principal can finish the connection setup, but waste one client
// message
return serverPrincipals.iterator().next();
} else {
throw new FallbackDisallowedException();
}
}
return randomSelect(serverPrincipals);
}
return chooseServerPrincipal(serverPrincipals, securityPreambleCall);
}

private void setupIOstreams(Call connectionRegistryCall) throws IOException {
if (socket != null) {
// The connection is already available. Perfect.
return;
Expand Down Expand Up @@ -465,32 +518,37 @@ private void setupIOstreams() throws IOException {
// This creates a socket with a write timeout. This timeout cannot be changed.
OutputStream outStream = NetUtils.getOutputStream(socket, this.rpcClient.writeTO);
if (connectionRegistryCall != null) {
getConnectionRegistry(outStream);
createStreams(inStream, outStream);
break;
getConnectionRegistry(inStream, outStream, connectionRegistryCall);
closeSocket();
return;
}
// Write out the preamble -- MAGIC, version, and auth to use.
writeConnectionHeaderPreamble(outStream);

if (useSasl) {
final InputStream in2 = inStream;
final OutputStream out2 = outStream;
UserGroupInformation ticket = provider.getRealUser(remoteId.ticket);
boolean continueSasl;
if (ticket == null) {
throw new FatalConnectionException("ticket/user is null");
}
String serverPrincipal = chooseServerPrincipal(inStream, outStream);
// Write out the preamble -- MAGIC, version, and auth to use.
writeConnectionHeaderPreamble(outStream);
try {
final InputStream in2 = inStream;
final OutputStream out2 = outStream;
continueSasl = ticket.doAs(new PrivilegedExceptionAction<Boolean>() {
@Override
public Boolean run() throws IOException {
return setupSaslConnection(in2, out2);
return setupSaslConnection(in2, out2, serverPrincipal);
}
});
} catch (Exception ex) {
ExceptionUtil.rethrowIfInterrupt(ex);
handleSaslConnectionFailure(numRetries++, reloginMaxRetries, ex, ticket);
saslNegotiationDone(serverPrincipal, false);
handleSaslConnectionFailure(numRetries++, reloginMaxRetries, ex, ticket,
serverPrincipal);
continue;
}
saslNegotiationDone(serverPrincipal, true);
if (continueSasl) {
// Sasl connect is successful. Let's set up Sasl i/o streams.
inStream = saslRpcClient.getInputStream();
Expand All @@ -501,6 +559,9 @@ public Boolean run() throws IOException {
// reconnecting because regionserver may change its sasl config after restart.
saslRpcClient = null;
}
} else {
// Write out the preamble -- MAGIC, version, and auth to use.
writeConnectionHeaderPreamble(outStream);
}
createStreams(inStream, outStream);
// Now write out the connection header
Expand Down Expand Up @@ -618,9 +679,10 @@ private void writeRequest(Call call) throws IOException {
}
RequestHeader requestHeader = buildRequestHeader(call, cellBlockMeta);
if (call.isConnectionRegistryCall()) {
connectionRegistryCall = call;
setupIOstreams(call);
return;
}
setupIOstreams();
setupIOstreams(null);

// Now we're going to write the call. We take the lock, then check that the connection
// is still valid, and, if so we do the write to the socket. If the write fails, we don't
Expand Down Expand Up @@ -655,7 +717,7 @@ private void writeRequest(Call call) throws IOException {
*/
private void readResponse() {
try {
readResponse(in, calls, remoteExc -> {
readResponse(in, calls, null, remoteExc -> {
synchronized (this) {
closeConn(remoteExc);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@
import io.opentelemetry.api.trace.Span;
import java.io.IOException;
import java.util.Map;
import java.util.Optional;
import org.apache.commons.lang3.builder.ToStringBuilder;
import org.apache.commons.lang3.builder.ToStringStyle;
import org.apache.hadoop.hbase.CellScanner;
Expand Down Expand Up @@ -85,16 +84,15 @@ class Call {
* Builds a simplified {@link #toString()} that includes just the id and method name.
*/
public String toShortString() {
// Call[id=32153218,methodName=Get]
return new ToStringBuilder(this, ToStringStyle.SHORT_PREFIX_STYLE).append("id", id)
.append("methodName", md.getName()).toString();
.append("methodName", md != null ? md.getName() : "").toString();
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

might be weird to see Call[id=23123123,methodName=] in null case. Is there anything more useful we can put?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The log has been like this for a long time so just want to keep it align, as this is not a problem which want to resolve here. Can open another issue for optimizing this message. For logging in this PR, I outout the response type so we could know the preamble call type.

}

@Override
public String toString() {
// Call[id=32153218,methodName=Get]
return new ToStringBuilder(this, ToStringStyle.SHORT_PREFIX_STYLE).appendSuper(toShortString())
.append("param", Optional.ofNullable(param).map(ProtobufUtil::getShortTextFormat).orElse(""))
.toString();
.append("param", param != null ? ProtobufUtil.getShortTextFormat(param) : "").toString();
}

/**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -178,6 +178,11 @@ static boolean isFatalConnectionException(ExceptionResponse e) {
}
}

static boolean isSecurityNotEnabledException(IOException e) {
return e instanceof RemoteException
&& SecurityNotEnabledException.class.getName().equals(((RemoteException) e).getClassName());
}

static IOException toIOE(Throwable t) {
if (t instanceof IOException) {
return (IOException) t;
Expand Down
Loading