http://git-wip-us.apache.org/repos/asf/hbase-site/blob/ca5b0275/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
----------------------------------------------------------------------
diff --git
a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
index 42b6f60..37a733a 100644
---
a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
+++
b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.DecryptHandler.html
@@ -28,10 +28,10 @@
<span class="sourceLineNo">020</span>import static
io.netty.handler.timeout.IdleState.READER_IDLE;<a name="line.20"></a>
<span class="sourceLineNo">021</span>import static
org.apache.hadoop.hdfs.DFSConfigKeys.DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY;<a
name="line.21"></a>
<span class="sourceLineNo">022</span><a name="line.22"></a>
-<span class="sourceLineNo">023</span>import com.google.common.base.Charsets;<a
name="line.23"></a>
-<span class="sourceLineNo">024</span>import
com.google.common.base.Throwables;<a name="line.24"></a>
-<span class="sourceLineNo">025</span>import
com.google.common.collect.ImmutableSet;<a name="line.25"></a>
-<span class="sourceLineNo">026</span>import com.google.common.collect.Maps;<a
name="line.26"></a>
+<span class="sourceLineNo">023</span>import
org.apache.hadoop.hbase.shaded.com.google.common.base.Charsets;<a
name="line.23"></a>
+<span class="sourceLineNo">024</span>import
org.apache.hadoop.hbase.shaded.com.google.common.base.Throwables;<a
name="line.24"></a>
+<span class="sourceLineNo">025</span>import
org.apache.hadoop.hbase.shaded.com.google.common.collect.ImmutableSet;<a
name="line.25"></a>
+<span class="sourceLineNo">026</span>import
org.apache.hadoop.hbase.shaded.com.google.common.collect.Maps;<a
name="line.26"></a>
<span class="sourceLineNo">027</span>import
com.google.protobuf.CodedOutputStream;<a name="line.27"></a>
<span class="sourceLineNo">028</span><a name="line.28"></a>
<span class="sourceLineNo">029</span>import io.netty.buffer.ByteBuf;<a
name="line.29"></a>
@@ -93,7 +93,7 @@
<span class="sourceLineNo">085</span>import
org.apache.hadoop.crypto.key.KeyProvider.KeyVersion;<a name="line.85"></a>
<span class="sourceLineNo">086</span>import
org.apache.hadoop.fs.FileEncryptionInfo;<a name="line.86"></a>
<span class="sourceLineNo">087</span>import
org.apache.hadoop.hbase.classification.InterfaceAudience;<a name="line.87"></a>
-<span class="sourceLineNo">088</span>import
org.apache.hadoop.hbase.util.ByteStringer;<a name="line.88"></a>
+<span class="sourceLineNo">088</span>import com.google.protobuf.ByteString;<a
name="line.88"></a>
<span class="sourceLineNo">089</span>import
org.apache.hadoop.hdfs.DFSClient;<a name="line.89"></a>
<span class="sourceLineNo">090</span>import
org.apache.hadoop.hdfs.protocol.DatanodeInfo;<a name="line.90"></a>
<span class="sourceLineNo">091</span>import
org.apache.hadoop.hdfs.protocol.HdfsFileStatus;<a name="line.91"></a>
@@ -373,416 +373,418 @@
<span class="sourceLineNo">365</span>
DataTransferEncryptorMessageProto.newBuilder();<a name="line.365"></a>
<span class="sourceLineNo">366</span>
builder.setStatus(DataTransferEncryptorStatus.SUCCESS);<a name="line.366"></a>
<span class="sourceLineNo">367</span> if (payload != null) {<a
name="line.367"></a>
-<span class="sourceLineNo">368</span>
builder.setPayload(ByteStringer.wrap(payload));<a name="line.368"></a>
-<span class="sourceLineNo">369</span> }<a name="line.369"></a>
-<span class="sourceLineNo">370</span> if (options != null) {<a
name="line.370"></a>
-<span class="sourceLineNo">371</span>
builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a
name="line.371"></a>
-<span class="sourceLineNo">372</span> }<a name="line.372"></a>
-<span class="sourceLineNo">373</span> DataTransferEncryptorMessageProto
proto = builder.build();<a name="line.373"></a>
-<span class="sourceLineNo">374</span> int size =
proto.getSerializedSize();<a name="line.374"></a>
-<span class="sourceLineNo">375</span> size +=
CodedOutputStream.computeRawVarint32Size(size);<a name="line.375"></a>
-<span class="sourceLineNo">376</span> ByteBuf buf =
ctx.alloc().buffer(size);<a name="line.376"></a>
-<span class="sourceLineNo">377</span> proto.writeDelimitedTo(new
ByteBufOutputStream(buf));<a name="line.377"></a>
-<span class="sourceLineNo">378</span> ctx.write(buf);<a
name="line.378"></a>
-<span class="sourceLineNo">379</span> }<a name="line.379"></a>
-<span class="sourceLineNo">380</span><a name="line.380"></a>
-<span class="sourceLineNo">381</span> @Override<a name="line.381"></a>
-<span class="sourceLineNo">382</span> public void
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a
name="line.382"></a>
-<span class="sourceLineNo">383</span>
ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a
name="line.383"></a>
-<span class="sourceLineNo">384</span> sendSaslMessage(ctx, new
byte[0]);<a name="line.384"></a>
-<span class="sourceLineNo">385</span> ctx.flush();<a name="line.385"></a>
-<span class="sourceLineNo">386</span> step++;<a name="line.386"></a>
-<span class="sourceLineNo">387</span> }<a name="line.387"></a>
-<span class="sourceLineNo">388</span><a name="line.388"></a>
-<span class="sourceLineNo">389</span> @Override<a name="line.389"></a>
-<span class="sourceLineNo">390</span> public void
channelInactive(ChannelHandlerContext ctx) throws Exception {<a
name="line.390"></a>
-<span class="sourceLineNo">391</span> saslClient.dispose();<a
name="line.391"></a>
-<span class="sourceLineNo">392</span> }<a name="line.392"></a>
-<span class="sourceLineNo">393</span><a name="line.393"></a>
-<span class="sourceLineNo">394</span> private void
check(DataTransferEncryptorMessageProto proto) throws IOException {<a
name="line.394"></a>
-<span class="sourceLineNo">395</span> if (proto.getStatus() ==
DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.395"></a>
-<span class="sourceLineNo">396</span> throw new
InvalidEncryptionKeyException(proto.getMessage());<a name="line.396"></a>
-<span class="sourceLineNo">397</span> } else if (proto.getStatus() ==
DataTransferEncryptorStatus.ERROR) {<a name="line.397"></a>
-<span class="sourceLineNo">398</span> throw new
IOException(proto.getMessage());<a name="line.398"></a>
-<span class="sourceLineNo">399</span> }<a name="line.399"></a>
-<span class="sourceLineNo">400</span> }<a name="line.400"></a>
-<span class="sourceLineNo">401</span><a name="line.401"></a>
-<span class="sourceLineNo">402</span> private String getNegotiatedQop() {<a
name="line.402"></a>
-<span class="sourceLineNo">403</span> return (String)
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.403"></a>
-<span class="sourceLineNo">404</span> }<a name="line.404"></a>
-<span class="sourceLineNo">405</span><a name="line.405"></a>
-<span class="sourceLineNo">406</span> private boolean
isNegotiatedQopPrivacy() {<a name="line.406"></a>
-<span class="sourceLineNo">407</span> String qop = getNegotiatedQop();<a
name="line.407"></a>
-<span class="sourceLineNo">408</span> return qop != null &&
"auth-conf".equalsIgnoreCase(qop);<a name="line.408"></a>
-<span class="sourceLineNo">409</span> }<a name="line.409"></a>
-<span class="sourceLineNo">410</span><a name="line.410"></a>
-<span class="sourceLineNo">411</span> private boolean
requestedQopContainsPrivacy() {<a name="line.411"></a>
-<span class="sourceLineNo">412</span> Set<String> requestedQop =<a
name="line.412"></a>
-<span class="sourceLineNo">413</span>
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a
name="line.413"></a>
-<span class="sourceLineNo">414</span> return
requestedQop.contains("auth-conf");<a name="line.414"></a>
-<span class="sourceLineNo">415</span> }<a name="line.415"></a>
-<span class="sourceLineNo">416</span><a name="line.416"></a>
-<span class="sourceLineNo">417</span> private void checkSaslComplete()
throws IOException {<a name="line.417"></a>
-<span class="sourceLineNo">418</span> if (!saslClient.isComplete()) {<a
name="line.418"></a>
-<span class="sourceLineNo">419</span> throw new IOException("Failed to
complete SASL handshake");<a name="line.419"></a>
-<span class="sourceLineNo">420</span> }<a name="line.420"></a>
-<span class="sourceLineNo">421</span> Set<String> requestedQop =<a
name="line.421"></a>
-<span class="sourceLineNo">422</span>
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a
name="line.422"></a>
-<span class="sourceLineNo">423</span> String negotiatedQop =
getNegotiatedQop();<a name="line.423"></a>
-<span class="sourceLineNo">424</span> LOG.debug(<a name="line.424"></a>
-<span class="sourceLineNo">425</span> "Verifying QOP, requested QOP = "
+ requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.425"></a>
-<span class="sourceLineNo">426</span> if
(!requestedQop.contains(negotiatedQop)) {<a name="line.426"></a>
-<span class="sourceLineNo">427</span> throw new
IOException(String.format("SASL handshake completed, but "<a
name="line.427"></a>
-<span class="sourceLineNo">428</span> + "channel does not have
acceptable quality of protection, "<a name="line.428"></a>
-<span class="sourceLineNo">429</span> + "requested = %s, negotiated
= %s",<a name="line.429"></a>
-<span class="sourceLineNo">430</span> requestedQop,
negotiatedQop));<a name="line.430"></a>
-<span class="sourceLineNo">431</span> }<a name="line.431"></a>
-<span class="sourceLineNo">432</span> }<a name="line.432"></a>
-<span class="sourceLineNo">433</span><a name="line.433"></a>
-<span class="sourceLineNo">434</span> private boolean useWrap() {<a
name="line.434"></a>
-<span class="sourceLineNo">435</span> String qop = (String)
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.435"></a>
-<span class="sourceLineNo">436</span> return qop != null &&
!"auth".equalsIgnoreCase(qop);<a name="line.436"></a>
-<span class="sourceLineNo">437</span> }<a name="line.437"></a>
-<span class="sourceLineNo">438</span><a name="line.438"></a>
-<span class="sourceLineNo">439</span> private CipherOption
unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a
name="line.439"></a>
-<span class="sourceLineNo">440</span> byte[] inKey = option.getInKey();<a
name="line.440"></a>
-<span class="sourceLineNo">441</span> if (inKey != null) {<a
name="line.441"></a>
-<span class="sourceLineNo">442</span> inKey = saslClient.unwrap(inKey,
0, inKey.length);<a name="line.442"></a>
-<span class="sourceLineNo">443</span> }<a name="line.443"></a>
-<span class="sourceLineNo">444</span> byte[] outKey =
option.getOutKey();<a name="line.444"></a>
-<span class="sourceLineNo">445</span> if (outKey != null) {<a
name="line.445"></a>
-<span class="sourceLineNo">446</span> outKey =
saslClient.unwrap(outKey, 0, outKey.length);<a name="line.446"></a>
-<span class="sourceLineNo">447</span> }<a name="line.447"></a>
-<span class="sourceLineNo">448</span> return new
CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a
name="line.448"></a>
-<span class="sourceLineNo">449</span> option.getOutIv());<a
name="line.449"></a>
-<span class="sourceLineNo">450</span> }<a name="line.450"></a>
-<span class="sourceLineNo">451</span><a name="line.451"></a>
-<span class="sourceLineNo">452</span> private CipherOption
getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.452"></a>
-<span class="sourceLineNo">453</span> boolean isNegotiatedQopPrivacy,
SaslClient saslClient) throws IOException {<a name="line.453"></a>
-<span class="sourceLineNo">454</span> List<CipherOption>
cipherOptions =<a name="line.454"></a>
-<span class="sourceLineNo">455</span>
PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a
name="line.455"></a>
-<span class="sourceLineNo">456</span> if (cipherOptions == null ||
cipherOptions.isEmpty()) {<a name="line.456"></a>
-<span class="sourceLineNo">457</span> return null;<a
name="line.457"></a>
-<span class="sourceLineNo">458</span> }<a name="line.458"></a>
-<span class="sourceLineNo">459</span> CipherOption cipherOption =
cipherOptions.get(0);<a name="line.459"></a>
-<span class="sourceLineNo">460</span> return isNegotiatedQopPrivacy ?
unwrap(cipherOption, saslClient) : cipherOption;<a name="line.460"></a>
-<span class="sourceLineNo">461</span> }<a name="line.461"></a>
-<span class="sourceLineNo">462</span><a name="line.462"></a>
-<span class="sourceLineNo">463</span> @Override<a name="line.463"></a>
-<span class="sourceLineNo">464</span> public void
channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a
name="line.464"></a>
-<span class="sourceLineNo">465</span> if (msg instanceof
DataTransferEncryptorMessageProto) {<a name="line.465"></a>
-<span class="sourceLineNo">466</span> DataTransferEncryptorMessageProto
proto = (DataTransferEncryptorMessageProto) msg;<a name="line.466"></a>
-<span class="sourceLineNo">467</span> check(proto);<a
name="line.467"></a>
-<span class="sourceLineNo">468</span> byte[] challenge =
proto.getPayload().toByteArray();<a name="line.468"></a>
-<span class="sourceLineNo">469</span> byte[] response =
saslClient.evaluateChallenge(challenge);<a name="line.469"></a>
-<span class="sourceLineNo">470</span> switch (step) {<a
name="line.470"></a>
-<span class="sourceLineNo">471</span> case 1: {<a name="line.471"></a>
-<span class="sourceLineNo">472</span> List<CipherOption>
cipherOptions = null;<a name="line.472"></a>
-<span class="sourceLineNo">473</span> if
(requestedQopContainsPrivacy()) {<a name="line.473"></a>
-<span class="sourceLineNo">474</span> cipherOptions =
getCipherOptions();<a name="line.474"></a>
-<span class="sourceLineNo">475</span> }<a name="line.475"></a>
-<span class="sourceLineNo">476</span> sendSaslMessage(ctx,
response, cipherOptions);<a name="line.476"></a>
-<span class="sourceLineNo">477</span> ctx.flush();<a
name="line.477"></a>
-<span class="sourceLineNo">478</span> step++;<a name="line.478"></a>
-<span class="sourceLineNo">479</span> break;<a name="line.479"></a>
-<span class="sourceLineNo">480</span> }<a name="line.480"></a>
-<span class="sourceLineNo">481</span> case 2: {<a name="line.481"></a>
-<span class="sourceLineNo">482</span> assert response == null;<a
name="line.482"></a>
-<span class="sourceLineNo">483</span> checkSaslComplete();<a
name="line.483"></a>
-<span class="sourceLineNo">484</span> CipherOption cipherOption =<a
name="line.484"></a>
-<span class="sourceLineNo">485</span> getCipherOption(proto,
isNegotiatedQopPrivacy(), saslClient);<a name="line.485"></a>
-<span class="sourceLineNo">486</span> ChannelPipeline p =
ctx.pipeline();<a name="line.486"></a>
-<span class="sourceLineNo">487</span> while (p.first() != null) {<a
name="line.487"></a>
-<span class="sourceLineNo">488</span> p.removeFirst();<a
name="line.488"></a>
-<span class="sourceLineNo">489</span> }<a name="line.489"></a>
-<span class="sourceLineNo">490</span> if (cipherOption != null) {<a
name="line.490"></a>
-<span class="sourceLineNo">491</span> CryptoCodec codec =
CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a
name="line.491"></a>
-<span class="sourceLineNo">492</span> p.addLast(new
EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a
name="line.492"></a>
-<span class="sourceLineNo">493</span> new DecryptHandler(codec,
cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.493"></a>
-<span class="sourceLineNo">494</span> } else {<a
name="line.494"></a>
-<span class="sourceLineNo">495</span> if (useWrap()) {<a
name="line.495"></a>
-<span class="sourceLineNo">496</span> p.addLast(new
SaslWrapHandler(saslClient),<a name="line.496"></a>
-<span class="sourceLineNo">497</span> new
LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.497"></a>
-<span class="sourceLineNo">498</span> new
SaslUnwrapHandler(saslClient));<a name="line.498"></a>
-<span class="sourceLineNo">499</span> }<a name="line.499"></a>
-<span class="sourceLineNo">500</span> }<a name="line.500"></a>
-<span class="sourceLineNo">501</span> promise.trySuccess(null);<a
name="line.501"></a>
-<span class="sourceLineNo">502</span> break;<a name="line.502"></a>
-<span class="sourceLineNo">503</span> }<a name="line.503"></a>
-<span class="sourceLineNo">504</span> default:<a name="line.504"></a>
-<span class="sourceLineNo">505</span> throw new
IllegalArgumentException("Unrecognized negotiation step: " + step);<a
name="line.505"></a>
-<span class="sourceLineNo">506</span> }<a name="line.506"></a>
-<span class="sourceLineNo">507</span> } else {<a name="line.507"></a>
-<span class="sourceLineNo">508</span> ctx.fireChannelRead(msg);<a
name="line.508"></a>
-<span class="sourceLineNo">509</span> }<a name="line.509"></a>
-<span class="sourceLineNo">510</span> }<a name="line.510"></a>
-<span class="sourceLineNo">511</span><a name="line.511"></a>
-<span class="sourceLineNo">512</span> @Override<a name="line.512"></a>
-<span class="sourceLineNo">513</span> public void
exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception
{<a name="line.513"></a>
-<span class="sourceLineNo">514</span> promise.tryFailure(cause);<a
name="line.514"></a>
-<span class="sourceLineNo">515</span> }<a name="line.515"></a>
-<span class="sourceLineNo">516</span><a name="line.516"></a>
-<span class="sourceLineNo">517</span> @Override<a name="line.517"></a>
-<span class="sourceLineNo">518</span> public void
userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a
name="line.518"></a>
-<span class="sourceLineNo">519</span> if (evt instanceof IdleStateEvent
&& ((IdleStateEvent) evt).state() == READER_IDLE) {<a
name="line.519"></a>
-<span class="sourceLineNo">520</span> promise.tryFailure(new
IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a
name="line.520"></a>
-<span class="sourceLineNo">521</span> } else {<a name="line.521"></a>
-<span class="sourceLineNo">522</span> super.userEventTriggered(ctx,
evt);<a name="line.522"></a>
-<span class="sourceLineNo">523</span> }<a name="line.523"></a>
-<span class="sourceLineNo">524</span> }<a name="line.524"></a>
-<span class="sourceLineNo">525</span> }<a name="line.525"></a>
-<span class="sourceLineNo">526</span><a name="line.526"></a>
-<span class="sourceLineNo">527</span> private static final class
SaslUnwrapHandler extends SimpleChannelInboundHandler<ByteBuf> {<a
name="line.527"></a>
+<span class="sourceLineNo">368</span> // Was ByteStringer; fix w/o
using ByteStringer. Its in hbase-protocol<a name="line.368"></a>
+<span class="sourceLineNo">369</span> // and we want to keep that out
of hbase-server.<a name="line.369"></a>
+<span class="sourceLineNo">370</span>
builder.setPayload(ByteString.copyFrom(payload));<a name="line.370"></a>
+<span class="sourceLineNo">371</span> }<a name="line.371"></a>
+<span class="sourceLineNo">372</span> if (options != null) {<a
name="line.372"></a>
+<span class="sourceLineNo">373</span>
builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a
name="line.373"></a>
+<span class="sourceLineNo">374</span> }<a name="line.374"></a>
+<span class="sourceLineNo">375</span> DataTransferEncryptorMessageProto
proto = builder.build();<a name="line.375"></a>
+<span class="sourceLineNo">376</span> int size =
proto.getSerializedSize();<a name="line.376"></a>
+<span class="sourceLineNo">377</span> size +=
CodedOutputStream.computeRawVarint32Size(size);<a name="line.377"></a>
+<span class="sourceLineNo">378</span> ByteBuf buf =
ctx.alloc().buffer(size);<a name="line.378"></a>
+<span class="sourceLineNo">379</span> proto.writeDelimitedTo(new
ByteBufOutputStream(buf));<a name="line.379"></a>
+<span class="sourceLineNo">380</span> ctx.write(buf);<a
name="line.380"></a>
+<span class="sourceLineNo">381</span> }<a name="line.381"></a>
+<span class="sourceLineNo">382</span><a name="line.382"></a>
+<span class="sourceLineNo">383</span> @Override<a name="line.383"></a>
+<span class="sourceLineNo">384</span> public void
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a
name="line.384"></a>
+<span class="sourceLineNo">385</span>
ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a
name="line.385"></a>
+<span class="sourceLineNo">386</span> sendSaslMessage(ctx, new
byte[0]);<a name="line.386"></a>
+<span class="sourceLineNo">387</span> ctx.flush();<a name="line.387"></a>
+<span class="sourceLineNo">388</span> step++;<a name="line.388"></a>
+<span class="sourceLineNo">389</span> }<a name="line.389"></a>
+<span class="sourceLineNo">390</span><a name="line.390"></a>
+<span class="sourceLineNo">391</span> @Override<a name="line.391"></a>
+<span class="sourceLineNo">392</span> public void
channelInactive(ChannelHandlerContext ctx) throws Exception {<a
name="line.392"></a>
+<span class="sourceLineNo">393</span> saslClient.dispose();<a
name="line.393"></a>
+<span class="sourceLineNo">394</span> }<a name="line.394"></a>
+<span class="sourceLineNo">395</span><a name="line.395"></a>
+<span class="sourceLineNo">396</span> private void
check(DataTransferEncryptorMessageProto proto) throws IOException {<a
name="line.396"></a>
+<span class="sourceLineNo">397</span> if (proto.getStatus() ==
DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.397"></a>
+<span class="sourceLineNo">398</span> throw new
InvalidEncryptionKeyException(proto.getMessage());<a name="line.398"></a>
+<span class="sourceLineNo">399</span> } else if (proto.getStatus() ==
DataTransferEncryptorStatus.ERROR) {<a name="line.399"></a>
+<span class="sourceLineNo">400</span> throw new
IOException(proto.getMessage());<a name="line.400"></a>
+<span class="sourceLineNo">401</span> }<a name="line.401"></a>
+<span class="sourceLineNo">402</span> }<a name="line.402"></a>
+<span class="sourceLineNo">403</span><a name="line.403"></a>
+<span class="sourceLineNo">404</span> private String getNegotiatedQop() {<a
name="line.404"></a>
+<span class="sourceLineNo">405</span> return (String)
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.405"></a>
+<span class="sourceLineNo">406</span> }<a name="line.406"></a>
+<span class="sourceLineNo">407</span><a name="line.407"></a>
+<span class="sourceLineNo">408</span> private boolean
isNegotiatedQopPrivacy() {<a name="line.408"></a>
+<span class="sourceLineNo">409</span> String qop = getNegotiatedQop();<a
name="line.409"></a>
+<span class="sourceLineNo">410</span> return qop != null &&
"auth-conf".equalsIgnoreCase(qop);<a name="line.410"></a>
+<span class="sourceLineNo">411</span> }<a name="line.411"></a>
+<span class="sourceLineNo">412</span><a name="line.412"></a>
+<span class="sourceLineNo">413</span> private boolean
requestedQopContainsPrivacy() {<a name="line.413"></a>
+<span class="sourceLineNo">414</span> Set<String> requestedQop =<a
name="line.414"></a>
+<span class="sourceLineNo">415</span>
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a
name="line.415"></a>
+<span class="sourceLineNo">416</span> return
requestedQop.contains("auth-conf");<a name="line.416"></a>
+<span class="sourceLineNo">417</span> }<a name="line.417"></a>
+<span class="sourceLineNo">418</span><a name="line.418"></a>
+<span class="sourceLineNo">419</span> private void checkSaslComplete()
throws IOException {<a name="line.419"></a>
+<span class="sourceLineNo">420</span> if (!saslClient.isComplete()) {<a
name="line.420"></a>
+<span class="sourceLineNo">421</span> throw new IOException("Failed to
complete SASL handshake");<a name="line.421"></a>
+<span class="sourceLineNo">422</span> }<a name="line.422"></a>
+<span class="sourceLineNo">423</span> Set<String> requestedQop =<a
name="line.423"></a>
+<span class="sourceLineNo">424</span>
ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a
name="line.424"></a>
+<span class="sourceLineNo">425</span> String negotiatedQop =
getNegotiatedQop();<a name="line.425"></a>
+<span class="sourceLineNo">426</span> LOG.debug(<a name="line.426"></a>
+<span class="sourceLineNo">427</span> "Verifying QOP, requested QOP = "
+ requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.427"></a>
+<span class="sourceLineNo">428</span> if
(!requestedQop.contains(negotiatedQop)) {<a name="line.428"></a>
+<span class="sourceLineNo">429</span> throw new
IOException(String.format("SASL handshake completed, but "<a
name="line.429"></a>
+<span class="sourceLineNo">430</span> + "channel does not have
acceptable quality of protection, "<a name="line.430"></a>
+<span class="sourceLineNo">431</span> + "requested = %s, negotiated
= %s",<a name="line.431"></a>
+<span class="sourceLineNo">432</span> requestedQop,
negotiatedQop));<a name="line.432"></a>
+<span class="sourceLineNo">433</span> }<a name="line.433"></a>
+<span class="sourceLineNo">434</span> }<a name="line.434"></a>
+<span class="sourceLineNo">435</span><a name="line.435"></a>
+<span class="sourceLineNo">436</span> private boolean useWrap() {<a
name="line.436"></a>
+<span class="sourceLineNo">437</span> String qop = (String)
saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.437"></a>
+<span class="sourceLineNo">438</span> return qop != null &&
!"auth".equalsIgnoreCase(qop);<a name="line.438"></a>
+<span class="sourceLineNo">439</span> }<a name="line.439"></a>
+<span class="sourceLineNo">440</span><a name="line.440"></a>
+<span class="sourceLineNo">441</span> private CipherOption
unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a
name="line.441"></a>
+<span class="sourceLineNo">442</span> byte[] inKey = option.getInKey();<a
name="line.442"></a>
+<span class="sourceLineNo">443</span> if (inKey != null) {<a
name="line.443"></a>
+<span class="sourceLineNo">444</span> inKey = saslClient.unwrap(inKey,
0, inKey.length);<a name="line.444"></a>
+<span class="sourceLineNo">445</span> }<a name="line.445"></a>
+<span class="sourceLineNo">446</span> byte[] outKey =
option.getOutKey();<a name="line.446"></a>
+<span class="sourceLineNo">447</span> if (outKey != null) {<a
name="line.447"></a>
+<span class="sourceLineNo">448</span> outKey =
saslClient.unwrap(outKey, 0, outKey.length);<a name="line.448"></a>
+<span class="sourceLineNo">449</span> }<a name="line.449"></a>
+<span class="sourceLineNo">450</span> return new
CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a
name="line.450"></a>
+<span class="sourceLineNo">451</span> option.getOutIv());<a
name="line.451"></a>
+<span class="sourceLineNo">452</span> }<a name="line.452"></a>
+<span class="sourceLineNo">453</span><a name="line.453"></a>
+<span class="sourceLineNo">454</span> private CipherOption
getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.454"></a>
+<span class="sourceLineNo">455</span> boolean isNegotiatedQopPrivacy,
SaslClient saslClient) throws IOException {<a name="line.455"></a>
+<span class="sourceLineNo">456</span> List<CipherOption>
cipherOptions =<a name="line.456"></a>
+<span class="sourceLineNo">457</span>
PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a
name="line.457"></a>
+<span class="sourceLineNo">458</span> if (cipherOptions == null ||
cipherOptions.isEmpty()) {<a name="line.458"></a>
+<span class="sourceLineNo">459</span> return null;<a
name="line.459"></a>
+<span class="sourceLineNo">460</span> }<a name="line.460"></a>
+<span class="sourceLineNo">461</span> CipherOption cipherOption =
cipherOptions.get(0);<a name="line.461"></a>
+<span class="sourceLineNo">462</span> return isNegotiatedQopPrivacy ?
unwrap(cipherOption, saslClient) : cipherOption;<a name="line.462"></a>
+<span class="sourceLineNo">463</span> }<a name="line.463"></a>
+<span class="sourceLineNo">464</span><a name="line.464"></a>
+<span class="sourceLineNo">465</span> @Override<a name="line.465"></a>
+<span class="sourceLineNo">466</span> public void
channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a
name="line.466"></a>
+<span class="sourceLineNo">467</span> if (msg instanceof
DataTransferEncryptorMessageProto) {<a name="line.467"></a>
+<span class="sourceLineNo">468</span> DataTransferEncryptorMessageProto
proto = (DataTransferEncryptorMessageProto) msg;<a name="line.468"></a>
+<span class="sourceLineNo">469</span> check(proto);<a
name="line.469"></a>
+<span class="sourceLineNo">470</span> byte[] challenge =
proto.getPayload().toByteArray();<a name="line.470"></a>
+<span class="sourceLineNo">471</span> byte[] response =
saslClient.evaluateChallenge(challenge);<a name="line.471"></a>
+<span class="sourceLineNo">472</span> switch (step) {<a
name="line.472"></a>
+<span class="sourceLineNo">473</span> case 1: {<a name="line.473"></a>
+<span class="sourceLineNo">474</span> List<CipherOption>
cipherOptions = null;<a name="line.474"></a>
+<span class="sourceLineNo">475</span> if
(requestedQopContainsPrivacy()) {<a name="line.475"></a>
+<span class="sourceLineNo">476</span> cipherOptions =
getCipherOptions();<a name="line.476"></a>
+<span class="sourceLineNo">477</span> }<a name="line.477"></a>
+<span class="sourceLineNo">478</span> sendSaslMessage(ctx,
response, cipherOptions);<a name="line.478"></a>
+<span class="sourceLineNo">479</span> ctx.flush();<a
name="line.479"></a>
+<span class="sourceLineNo">480</span> step++;<a name="line.480"></a>
+<span class="sourceLineNo">481</span> break;<a name="line.481"></a>
+<span class="sourceLineNo">482</span> }<a name="line.482"></a>
+<span class="sourceLineNo">483</span> case 2: {<a name="line.483"></a>
+<span class="sourceLineNo">484</span> assert response == null;<a
name="line.484"></a>
+<span class="sourceLineNo">485</span> checkSaslComplete();<a
name="line.485"></a>
+<span class="sourceLineNo">486</span> CipherOption cipherOption =<a
name="line.486"></a>
+<span class="sourceLineNo">487</span> getCipherOption(proto,
isNegotiatedQopPrivacy(), saslClient);<a name="line.487"></a>
+<span class="sourceLineNo">488</span> ChannelPipeline p =
ctx.pipeline();<a name="line.488"></a>
+<span class="sourceLineNo">489</span> while (p.first() != null) {<a
name="line.489"></a>
+<span class="sourceLineNo">490</span> p.removeFirst();<a
name="line.490"></a>
+<span class="sourceLineNo">491</span> }<a name="line.491"></a>
+<span class="sourceLineNo">492</span> if (cipherOption != null) {<a
name="line.492"></a>
+<span class="sourceLineNo">493</span> CryptoCodec codec =
CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a
name="line.493"></a>
+<span class="sourceLineNo">494</span> p.addLast(new
EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a
name="line.494"></a>
+<span class="sourceLineNo">495</span> new DecryptHandler(codec,
cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.495"></a>
+<span class="sourceLineNo">496</span> } else {<a
name="line.496"></a>
+<span class="sourceLineNo">497</span> if (useWrap()) {<a
name="line.497"></a>
+<span class="sourceLineNo">498</span> p.addLast(new
SaslWrapHandler(saslClient),<a name="line.498"></a>
+<span class="sourceLineNo">499</span> new
LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.499"></a>
+<span class="sourceLineNo">500</span> new
SaslUnwrapHandler(saslClient));<a name="line.500"></a>
+<span class="sourceLineNo">501</span> }<a name="line.501"></a>
+<span class="sourceLineNo">502</span> }<a name="line.502"></a>
+<span class="sourceLineNo">503</span> promise.trySuccess(null);<a
name="line.503"></a>
+<span class="sourceLineNo">504</span> break;<a name="line.504"></a>
+<span class="sourceLineNo">505</span> }<a name="line.505"></a>
+<span class="sourceLineNo">506</span> default:<a name="line.506"></a>
+<span class="sourceLineNo">507</span> throw new
IllegalArgumentException("Unrecognized negotiation step: " + step);<a
name="line.507"></a>
+<span class="sourceLineNo">508</span> }<a name="line.508"></a>
+<span class="sourceLineNo">509</span> } else {<a name="line.509"></a>
+<span class="sourceLineNo">510</span> ctx.fireChannelRead(msg);<a
name="line.510"></a>
+<span class="sourceLineNo">511</span> }<a name="line.511"></a>
+<span class="sourceLineNo">512</span> }<a name="line.512"></a>
+<span class="sourceLineNo">513</span><a name="line.513"></a>
+<span class="sourceLineNo">514</span> @Override<a name="line.514"></a>
+<span class="sourceLineNo">515</span> public void
exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception
{<a name="line.515"></a>
+<span class="sourceLineNo">516</span> promise.tryFailure(cause);<a
name="line.516"></a>
+<span class="sourceLineNo">517</span> }<a name="line.517"></a>
+<span class="sourceLineNo">518</span><a name="line.518"></a>
+<span class="sourceLineNo">519</span> @Override<a name="line.519"></a>
+<span class="sourceLineNo">520</span> public void
userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a
name="line.520"></a>
+<span class="sourceLineNo">521</span> if (evt instanceof IdleStateEvent
&& ((IdleStateEvent) evt).state() == READER_IDLE) {<a
name="line.521"></a>
+<span class="sourceLineNo">522</span> promise.tryFailure(new
IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a
name="line.522"></a>
+<span class="sourceLineNo">523</span> } else {<a name="line.523"></a>
+<span class="sourceLineNo">524</span> super.userEventTriggered(ctx,
evt);<a name="line.524"></a>
+<span class="sourceLineNo">525</span> }<a name="line.525"></a>
+<span class="sourceLineNo">526</span> }<a name="line.526"></a>
+<span class="sourceLineNo">527</span> }<a name="line.527"></a>
<span class="sourceLineNo">528</span><a name="line.528"></a>
-<span class="sourceLineNo">529</span> private final SaslClient
saslClient;<a name="line.529"></a>
+<span class="sourceLineNo">529</span> private static final class
SaslUnwrapHandler extends SimpleChannelInboundHandler<ByteBuf> {<a
name="line.529"></a>
<span class="sourceLineNo">530</span><a name="line.530"></a>
-<span class="sourceLineNo">531</span> public SaslUnwrapHandler(SaslClient
saslClient) {<a name="line.531"></a>
-<span class="sourceLineNo">532</span> this.saslClient = saslClient;<a
name="line.532"></a>
-<span class="sourceLineNo">533</span> }<a name="line.533"></a>
-<span class="sourceLineNo">534</span><a name="line.534"></a>
-<span class="sourceLineNo">535</span> @Override<a name="line.535"></a>
-<span class="sourceLineNo">536</span> public void
channelInactive(ChannelHandlerContext ctx) throws Exception {<a
name="line.536"></a>
-<span class="sourceLineNo">537</span> saslClient.dispose();<a
name="line.537"></a>
-<span class="sourceLineNo">538</span> }<a name="line.538"></a>
-<span class="sourceLineNo">539</span><a name="line.539"></a>
-<span class="sourceLineNo">540</span> @Override<a name="line.540"></a>
-<span class="sourceLineNo">541</span> protected void
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a
name="line.541"></a>
-<span class="sourceLineNo">542</span> msg.skipBytes(4);<a
name="line.542"></a>
-<span class="sourceLineNo">543</span> byte[] b = new
byte[msg.readableBytes()];<a name="line.543"></a>
-<span class="sourceLineNo">544</span> msg.readBytes(b);<a
name="line.544"></a>
-<span class="sourceLineNo">545</span>
ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0,
b.length)));<a name="line.545"></a>
-<span class="sourceLineNo">546</span> }<a name="line.546"></a>
-<span class="sourceLineNo">547</span> }<a name="line.547"></a>
-<span class="sourceLineNo">548</span><a name="line.548"></a>
-<span class="sourceLineNo">549</span> private static final class
SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.549"></a>
+<span class="sourceLineNo">531</span> private final SaslClient
saslClient;<a name="line.531"></a>
+<span class="sourceLineNo">532</span><a name="line.532"></a>
+<span class="sourceLineNo">533</span> public SaslUnwrapHandler(SaslClient
saslClient) {<a name="line.533"></a>
+<span class="sourceLineNo">534</span> this.saslClient = saslClient;<a
name="line.534"></a>
+<span class="sourceLineNo">535</span> }<a name="line.535"></a>
+<span class="sourceLineNo">536</span><a name="line.536"></a>
+<span class="sourceLineNo">537</span> @Override<a name="line.537"></a>
+<span class="sourceLineNo">538</span> public void
channelInactive(ChannelHandlerContext ctx) throws Exception {<a
name="line.538"></a>
+<span class="sourceLineNo">539</span> saslClient.dispose();<a
name="line.539"></a>
+<span class="sourceLineNo">540</span> }<a name="line.540"></a>
+<span class="sourceLineNo">541</span><a name="line.541"></a>
+<span class="sourceLineNo">542</span> @Override<a name="line.542"></a>
+<span class="sourceLineNo">543</span> protected void
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a
name="line.543"></a>
+<span class="sourceLineNo">544</span> msg.skipBytes(4);<a
name="line.544"></a>
+<span class="sourceLineNo">545</span> byte[] b = new
byte[msg.readableBytes()];<a name="line.545"></a>
+<span class="sourceLineNo">546</span> msg.readBytes(b);<a
name="line.546"></a>
+<span class="sourceLineNo">547</span>
ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0,
b.length)));<a name="line.547"></a>
+<span class="sourceLineNo">548</span> }<a name="line.548"></a>
+<span class="sourceLineNo">549</span> }<a name="line.549"></a>
<span class="sourceLineNo">550</span><a name="line.550"></a>
-<span class="sourceLineNo">551</span> private final SaslClient
saslClient;<a name="line.551"></a>
+<span class="sourceLineNo">551</span> private static final class
SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.551"></a>
<span class="sourceLineNo">552</span><a name="line.552"></a>
-<span class="sourceLineNo">553</span> private CompositeByteBuf cBuf;<a
name="line.553"></a>
+<span class="sourceLineNo">553</span> private final SaslClient
saslClient;<a name="line.553"></a>
<span class="sourceLineNo">554</span><a name="line.554"></a>
-<span class="sourceLineNo">555</span> public SaslWrapHandler(SaslClient
saslClient) {<a name="line.555"></a>
-<span class="sourceLineNo">556</span> this.saslClient = saslClient;<a
name="line.556"></a>
-<span class="sourceLineNo">557</span> }<a name="line.557"></a>
-<span class="sourceLineNo">558</span><a name="line.558"></a>
-<span class="sourceLineNo">559</span> @Override<a name="line.559"></a>
-<span class="sourceLineNo">560</span> public void
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a
name="line.560"></a>
-<span class="sourceLineNo">561</span> cBuf = new
CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.561"></a>
-<span class="sourceLineNo">562</span> }<a name="line.562"></a>
-<span class="sourceLineNo">563</span><a name="line.563"></a>
-<span class="sourceLineNo">564</span> @Override<a name="line.564"></a>
-<span class="sourceLineNo">565</span> public void
write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a
name="line.565"></a>
-<span class="sourceLineNo">566</span> throws Exception {<a
name="line.566"></a>
-<span class="sourceLineNo">567</span> if (msg instanceof ByteBuf) {<a
name="line.567"></a>
-<span class="sourceLineNo">568</span> ByteBuf buf = (ByteBuf) msg;<a
name="line.568"></a>
-<span class="sourceLineNo">569</span> cBuf.addComponent(buf);<a
name="line.569"></a>
-<span class="sourceLineNo">570</span>
cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a
name="line.570"></a>
-<span class="sourceLineNo">571</span> } else {<a name="line.571"></a>
-<span class="sourceLineNo">572</span> ctx.write(msg);<a
name="line.572"></a>
-<span class="sourceLineNo">573</span> }<a name="line.573"></a>
-<span class="sourceLineNo">574</span> }<a name="line.574"></a>
-<span class="sourceLineNo">575</span><a name="line.575"></a>
-<span class="sourceLineNo">576</span> @Override<a name="line.576"></a>
-<span class="sourceLineNo">577</span> public void
flush(ChannelHandlerContext ctx) throws Exception {<a name="line.577"></a>
-<span class="sourceLineNo">578</span> if (cBuf.isReadable()) {<a
name="line.578"></a>
-<span class="sourceLineNo">579</span> byte[] b = new
byte[cBuf.readableBytes()];<a name="line.579"></a>
-<span class="sourceLineNo">580</span> cBuf.readBytes(b);<a
name="line.580"></a>
-<span class="sourceLineNo">581</span> cBuf.discardReadComponents();<a
name="line.581"></a>
-<span class="sourceLineNo">582</span> byte[] wrapped =
saslClient.wrap(b, 0, b.length);<a name="line.582"></a>
-<span class="sourceLineNo">583</span> ByteBuf buf =
ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.583"></a>
-<span class="sourceLineNo">584</span> buf.writeInt(wrapped.length);<a
name="line.584"></a>
-<span class="sourceLineNo">585</span> buf.writeBytes(wrapped);<a
name="line.585"></a>
-<span class="sourceLineNo">586</span> ctx.write(buf);<a
name="line.586"></a>
-<span class="sourceLineNo">587</span> }<a name="line.587"></a>
-<span class="sourceLineNo">588</span> ctx.flush();<a name="line.588"></a>
-<span class="sourceLineNo">589</span> }<a name="line.589"></a>
-<span class="sourceLineNo">590</span><a name="line.590"></a>
-<span class="sourceLineNo">591</span> @Override<a name="line.591"></a>
-<span class="sourceLineNo">592</span> public void
close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a
name="line.592"></a>
-<span class="sourceLineNo">593</span> cBuf.release();<a
name="line.593"></a>
-<span class="sourceLineNo">594</span> cBuf = null;<a name="line.594"></a>
-<span class="sourceLineNo">595</span> }<a name="line.595"></a>
-<span class="sourceLineNo">596</span> }<a name="line.596"></a>
-<span class="sourceLineNo">597</span><a name="line.597"></a>
-<span class="sourceLineNo">598</span> private static final class
DecryptHandler extends SimpleChannelInboundHandler<ByteBuf> {<a
name="line.598"></a>
+<span class="sourceLineNo">555</span> private CompositeByteBuf cBuf;<a
name="line.555"></a>
+<span class="sourceLineNo">556</span><a name="line.556"></a>
+<span class="sourceLineNo">557</span> public SaslWrapHandler(SaslClient
saslClient) {<a name="line.557"></a>
+<span class="sourceLineNo">558</span> this.saslClient = saslClient;<a
name="line.558"></a>
+<span class="sourceLineNo">559</span> }<a name="line.559"></a>
+<span class="sourceLineNo">560</span><a name="line.560"></a>
+<span class="sourceLineNo">561</span> @Override<a name="line.561"></a>
+<span class="sourceLineNo">562</span> public void
handlerAdded(ChannelHandlerContext ctx) throws Exception {<a
name="line.562"></a>
+<span class="sourceLineNo">563</span> cBuf = new
CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.563"></a>
+<span class="sourceLineNo">564</span> }<a name="line.564"></a>
+<span class="sourceLineNo">565</span><a name="line.565"></a>
+<span class="sourceLineNo">566</span> @Override<a name="line.566"></a>
+<span class="sourceLineNo">567</span> public void
write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a
name="line.567"></a>
+<span class="sourceLineNo">568</span> throws Exception {<a
name="line.568"></a>
+<span class="sourceLineNo">569</span> if (msg instanceof ByteBuf) {<a
name="line.569"></a>
+<span class="sourceLineNo">570</span> ByteBuf buf = (ByteBuf) msg;<a
name="line.570"></a>
+<span class="sourceLineNo">571</span> cBuf.addComponent(buf);<a
name="line.571"></a>
+<span class="sourceLineNo">572</span>
cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a
name="line.572"></a>
+<span class="sourceLineNo">573</span> } else {<a name="line.573"></a>
+<span class="sourceLineNo">574</span> ctx.write(msg);<a
name="line.574"></a>
+<span class="sourceLineNo">575</span> }<a name="line.575"></a>
+<span class="sourceLineNo">576</span> }<a name="line.576"></a>
+<span class="sourceLineNo">577</span><a name="line.577"></a>
+<span class="sourceLineNo">578</span> @Override<a name="line.578"></a>
+<span class="sourceLineNo">579</span> public void
flush(ChannelHandlerContext ctx) throws Exception {<a name="line.579"></a>
+<span class="sourceLineNo">580</span> if (cBuf.isReadable()) {<a
name="line.580"></a>
+<span class="sourceLineNo">581</span> byte[] b = new
byte[cBuf.readableBytes()];<a name="line.581"></a>
+<span class="sourceLineNo">582</span> cBuf.readBytes(b);<a
name="line.582"></a>
+<span class="sourceLineNo">583</span> cBuf.discardReadComponents();<a
name="line.583"></a>
+<span class="sourceLineNo">584</span> byte[] wrapped =
saslClient.wrap(b, 0, b.length);<a name="line.584"></a>
+<span class="sourceLineNo">585</span> ByteBuf buf =
ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.585"></a>
+<span class="sourceLineNo">586</span> buf.writeInt(wrapped.length);<a
name="line.586"></a>
+<span class="sourceLineNo">587</span> buf.writeBytes(wrapped);<a
name="line.587"></a>
+<span class="sourceLineNo">588</span> ctx.write(buf);<a
name="line.588"></a>
+<span class="sourceLineNo">589</span> }<a name="line.589"></a>
+<span class="sourceLineNo">590</span> ctx.flush();<a name="line.590"></a>
+<span class="sourceLineNo">591</span> }<a name="line.591"></a>
+<span class="sourceLineNo">592</span><a name="line.592"></a>
+<span class="sourceLineNo">593</span> @Override<a name="line.593"></a>
+<span class="sourceLineNo">594</span> public void
close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a
name="line.594"></a>
+<span class="sourceLineNo">595</span> cBuf.release();<a
name="line.595"></a>
+<span class="sourceLineNo">596</span> cBuf = null;<a name="line.596"></a>
+<span class="sourceLineNo">597</span> }<a name="line.597"></a>
+<span class="sourceLineNo">598</span> }<a name="line.598"></a>
<span class="sourceLineNo">599</span><a name="line.599"></a>
-<span class="sourceLineNo">600</span> private final Decryptor decryptor;<a
name="line.600"></a>
+<span class="sourceLineNo">600</span> private static final class
DecryptHandler extends SimpleChannelInboundHandler<ByteBuf> {<a
name="line.600"></a>
<span class="sourceLineNo">601</span><a name="line.601"></a>
-<span class="sourceLineNo">602</span> public DecryptHandler(CryptoCodec
codec, byte[] key, byte[] iv)<a name="line.602"></a>
-<span class="sourceLineNo">603</span> throws GeneralSecurityException,
IOException {<a name="line.603"></a>
-<span class="sourceLineNo">604</span> this.decryptor =
codec.createDecryptor();<a name="line.604"></a>
-<span class="sourceLineNo">605</span> this.decryptor.init(key,
Arrays.copyOf(iv, iv.length));<a name="line.605"></a>
-<span class="sourceLineNo">606</span> }<a name="line.606"></a>
-<span class="sourceLineNo">607</span><a name="line.607"></a>
-<span class="sourceLineNo">608</span> @Override<a name="line.608"></a>
-<span class="sourceLineNo">609</span> protected void
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a
name="line.609"></a>
-<span class="sourceLineNo">610</span> ByteBuf inBuf;<a
name="line.610"></a>
-<span class="sourceLineNo">611</span> boolean release = false;<a
name="line.611"></a>
-<span class="sourceLineNo">612</span> if (msg.nioBufferCount() == 1) {<a
name="line.612"></a>
-<span class="sourceLineNo">613</span> inBuf = msg;<a
name="line.613"></a>
-<span class="sourceLineNo">614</span> } else {<a name="line.614"></a>
-<span class="sourceLineNo">615</span> inBuf =
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.615"></a>
-<span class="sourceLineNo">616</span> msg.readBytes(inBuf);<a
name="line.616"></a>
-<span class="sourceLineNo">617</span> release = true;<a
name="line.617"></a>
-<span class="sourceLineNo">618</span> }<a name="line.618"></a>
-<span class="sourceLineNo">619</span> ByteBuffer inBuffer =
inBuf.nioBuffer();<a name="line.619"></a>
-<span class="sourceLineNo">620</span> ByteBuf outBuf =
ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.620"></a>
-<span class="sourceLineNo">621</span> ByteBuffer outBuffer =
outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.621"></a>
-<span class="sourceLineNo">622</span> decryptor.decrypt(inBuffer,
outBuffer);<a name="line.622"></a>
-<span class="sourceLineNo">623</span>
outBuf.writerIndex(inBuf.readableBytes());<a name="line.623"></a>
-<span class="sourceLineNo">624</span> if (release) {<a
name="line.624"></a>
-<span class="sourceLineNo">625</span> inBuf.release();<a
name="line.625"></a>
-<span class="sourceLineNo">626</span> }<a name="line.626"></a>
-<span class="sourceLineNo">627</span> ctx.fireChannelRead(outBuf);<a
name="line.627"></a>
-<span class="sourceLineNo">628</span> }<a name="line.628"></a>
-<span class="sourceLineNo">629</span> }<a name="line.629"></a>
-<span class="sourceLineNo">630</span><a name="line.630"></a>
-<span class="sourceLineNo">631</span> private static final class
EncryptHandler extends MessageToByteEncoder<ByteBuf> {<a
name="line.631"></a>
+<span class="sourceLineNo">602</span> private final Decryptor decryptor;<a
name="line.602"></a>
+<span class="sourceLineNo">603</span><a name="line.603"></a>
+<span class="sourceLineNo">604</span> public DecryptHandler(CryptoCodec
codec, byte[] key, byte[] iv)<a name="line.604"></a>
+<span class="sourceLineNo">605</span> throws GeneralSecurityException,
IOException {<a name="line.605"></a>
+<span class="sourceLineNo">606</span> this.decryptor =
codec.createDecryptor();<a name="line.606"></a>
+<span class="sourceLineNo">607</span> this.decryptor.init(key,
Arrays.copyOf(iv, iv.length));<a name="line.607"></a>
+<span class="sourceLineNo">608</span> }<a name="line.608"></a>
+<span class="sourceLineNo">609</span><a name="line.609"></a>
+<span class="sourceLineNo">610</span> @Override<a name="line.610"></a>
+<span class="sourceLineNo">611</span> protected void
channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a
name="line.611"></a>
+<span class="sourceLineNo">612</span> ByteBuf inBuf;<a
name="line.612"></a>
+<span class="sourceLineNo">613</span> boolean release = false;<a
name="line.613"></a>
+<span class="sourceLineNo">614</span> if (msg.nioBufferCount() == 1) {<a
name="line.614"></a>
+<span class="sourceLineNo">615</span> inBuf = msg;<a
name="line.615"></a>
+<span class="sourceLineNo">616</span> } else {<a name="line.616"></a>
+<span class="sourceLineNo">617</span> inBuf =
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.617"></a>
+<span class="sourceLineNo">618</span> msg.readBytes(inBuf);<a
name="line.618"></a>
+<span class="sourceLineNo">619</span> release = true;<a
name="line.619"></a>
+<span class="sourceLineNo">620</span> }<a name="line.620"></a>
+<span class="sourceLineNo">621</span> ByteBuffer inBuffer =
inBuf.nioBuffer();<a name="line.621"></a>
+<span class="sourceLineNo">622</span> ByteBuf outBuf =
ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.622"></a>
+<span class="sourceLineNo">623</span> ByteBuffer outBuffer =
outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.623"></a>
+<span class="sourceLineNo">624</span> decryptor.decrypt(inBuffer,
outBuffer);<a name="line.624"></a>
+<span class="sourceLineNo">625</span>
outBuf.writerIndex(inBuf.readableBytes());<a name="line.625"></a>
+<span class="sourceLineNo">626</span> if (release) {<a
name="line.626"></a>
+<span class="sourceLineNo">627</span> inBuf.release();<a
name="line.627"></a>
+<span class="sourceLineNo">628</span> }<a name="line.628"></a>
+<span class="sourceLineNo">629</span> ctx.fireChannelRead(outBuf);<a
name="line.629"></a>
+<span class="sourceLineNo">630</span> }<a name="line.630"></a>
+<span class="sourceLineNo">631</span> }<a name="line.631"></a>
<span class="sourceLineNo">632</span><a name="line.632"></a>
-<span class="sourceLineNo">633</span> private final Encryptor encryptor;<a
name="line.633"></a>
+<span class="sourceLineNo">633</span> private static final class
EncryptHandler extends MessageToByteEncoder<ByteBuf> {<a
name="line.633"></a>
<span class="sourceLineNo">634</span><a name="line.634"></a>
-<span class="sourceLineNo">635</span> public EncryptHandler(CryptoCodec
codec, byte[] key, byte[] iv)<a name="line.635"></a>
-<span class="sourceLineNo">636</span> throws GeneralSecurityException,
IOException {<a name="line.636"></a>
-<span class="sourceLineNo">637</span> this.encryptor =
codec.createEncryptor();<a name="line.637"></a>
-<span class="sourceLineNo">638</span> this.encryptor.init(key,
Arrays.copyOf(iv, iv.length));<a name="line.638"></a>
-<span class="sourceLineNo">639</span> }<a name="line.639"></a>
-<span class="sourceLineNo">640</span><a name="line.640"></a>
-<span class="sourceLineNo">641</span> @Override<a name="line.641"></a>
-<span class="sourceLineNo">642</span> protected ByteBuf
allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a
name="line.642"></a>
-<span class="sourceLineNo">643</span> throws Exception {<a
name="line.643"></a>
-<span class="sourceLineNo">644</span> if (preferDirect) {<a
name="line.644"></a>
-<span class="sourceLineNo">645</span> return
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.645"></a>
-<span class="sourceLineNo">646</span> } else {<a name="line.646"></a>
-<span class="sourceLineNo">647</span> return
ctx.alloc().buffer(msg.readableBytes());<a name="line.647"></a>
-<span class="sourceLineNo">648</span> }<a name="line.648"></a>
-<span class="sourceLineNo">649</span> }<a name="line.649"></a>
-<span class="sourceLineNo">650</span><a name="line.650"></a>
-<span class="sourceLineNo">651</span> @Override<a name="line.651"></a>
-<span class="sourceLineNo">652</span> protected void
encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception
{<a name="line.652"></a>
-<span class="sourceLineNo">653</span> ByteBuf inBuf;<a
name="line.653"></a>
-<span class="sourceLineNo">654</span> boolean release = false;<a
name="line.654"></a>
-<span class="sourceLineNo">655</span> if (msg.nioBufferCount() == 1) {<a
name="line.655"></a>
-<span class="sourceLineNo">656</span> inBuf = msg;<a
name="line.656"></a>
-<span class="sourceLineNo">657</span> } else {<a name="line.657"></a>
-<span class="sourceLineNo">658</span> inBuf =
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.658"></a>
-<span class="sourceLineNo">659</span> msg.readBytes(inBuf);<a
name="line.659"></a>
-<span class="sourceLineNo">660</span> release = true;<a
name="line.660"></a>
-<span class="sourceLineNo">661</span> }<a name="line.661"></a>
-<span class="sourceLineNo">662</span> ByteBuffer inBuffer =
inBuf.nioBuffer();<a name="line.662"></a>
-<span class="sourceLineNo">663</span> ByteBuffer outBuffer =
out.nioBuffer(0, inBuf.readableBytes());<a name="line.663"></a>
-<span class="sourceLineNo">664</span> encryptor.encrypt(inBuffer,
outBuffer);<a name="line.664"></a>
-<span class="sourceLineNo">665</span>
out.writerIndex(inBuf.readableBytes());<a name="line.665"></a>
-<span class="sourceLineNo">666</span> if (release) {<a
name="line.666"></a>
-<span class="sourceLineNo">667</span> inBuf.release();<a
name="line.667"></a>
-<span class="sourceLineNo">668</span> }<a name="line.668"></a>
-<span class="sourceLineNo">669</span> }<a name="line.669"></a>
-<span class="sourceLineNo">670</span> }<a name="line.670"></a>
-<span class="sourceLineNo">671</span><a name="line.671"></a>
-<span class="sourceLineNo">672</span> private static String
getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a
name="line.672"></a>
-<span class="sourceLineNo">673</span> return encryptionKey.keyId +
NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a
name="line.673"></a>
-<span class="sourceLineNo">674</span> + new
String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a
name="line.674"></a>
-<span class="sourceLineNo">675</span> }<a name="line.675"></a>
-<span class="sourceLineNo">676</span><a name="line.676"></a>
-<span class="sourceLineNo">677</span> private static char[]
encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.677"></a>
-<span class="sourceLineNo">678</span> return new
String(Base64.encodeBase64(encryptionKey, false),
Charsets.UTF_8).toCharArray();<a name="line.678"></a>
-<span class="sourceLineNo">679</span> }<a name="line.679"></a>
-<span class="sourceLineNo">680</span><a name="line.680"></a>
-<span class="sourceLineNo">681</span> private static String
buildUsername(Token<BlockTokenIdentifier> blockToken) {<a
name="line.681"></a>
-<span class="sourceLineNo">682</span> return new
String(Base64.encodeBase64(blockToken.getIdentifier(), false),
Charsets.UTF_8);<a name="line.682"></a>
-<span class="sourceLineNo">683</span> }<a name="line.683"></a>
-<span class="sourceLineNo">684</span><a name="line.684"></a>
-<span class="sourceLineNo">685</span> private static char[]
buildClientPassword(Token<BlockTokenIdentifier> blockToken) {<a
name="line.685"></a>
-<span class="sourceLineNo">686</span> return new
String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a
name="line.686"></a>
-<span class="sourceLineNo">687</span> .toCharArray();<a
name="line.687"></a>
-<span class="sourceLineNo">688</span> }<a name="line.688"></a>
-<span class="sourceLineNo">689</span><a name="line.689"></a>
-<span class="sourceLineNo">690</span> private static Map<String,
String> createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a
name="line.690"></a>
-<span class="sourceLineNo">691</span> Map<String, String> saslProps =
Maps.newHashMapWithExpectedSize(3);<a name="line.691"></a>
-<span class="sourceLineNo">692</span> saslProps.put(Sasl.QOP,
QualityOfProtection.PRIVACY.getSaslQop());<a name="line.692"></a>
-<span class="sourceLineNo">693</span> saslProps.put(Sasl.SERVER_AUTH,
"true");<a name="line.693"></a>
-<span class="sourceLineNo">694</span>
saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a
name="line.694"></a>
-<span class="sourceLineNo">695</span> return saslProps;<a
name="line.695"></a>
-<span class="sourceLineNo">696</span> }<a name="line.696"></a>
-<span class="sourceLineNo">697</span><a name="line.697"></a>
-<span class="sourceLineNo">698</span> private static void
doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a
name="line.698"></a>
-<span class="sourceLineNo">699</span> String username, char[] password,
Map<String, String> saslProps, Promise<Void> saslPromise) {<a
name="line.699"></a>
-<span class="sourceLineNo">700</span> try {<a name="line.700"></a>
-<span class="sourceLineNo">701</span> channel.pipeline().addLast(new
IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.701"></a>
-<span class="sourceLineNo">702</span> new
ProtobufVarint32FrameDecoder(),<a name="line.702"></a>
-<span class="sourceLineNo">703</span> new
ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a
name="line.703"></a>
-<span class="sourceLineNo">704</span> new SaslNegotiateHandler(conf,
username, password, saslProps, timeoutMs, saslPromise));<a name="line.704"></a>
-<span class="sourceLineNo">705</span> } catch (SaslException e) {<a
name="line.705"></a>
-<span class="sourceLineNo">706</span> saslPromise.tryFailure(e);<a
name="line.706"></a>
-<span class="sourceLineNo">707</span> }<a name="line.707"></a>
-<span class="sourceLineNo">708</span> }<a name="line.708"></a>
-<span class="sourceLineNo">709</span><a name="line.709"></a>
-<span class="sourceLineNo">710</span> static void
trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a
name="line.710"></a>
-<span class="sourceLineNo">711</span> int timeoutMs, DFSClient client,
Token<BlockTokenIdentifier> accessToken,<a name="line.711"></a>
-<span class="sourceLineNo">712</span> Promise<Void> saslPromise)
throws IOException {<a name="line.712"></a>
-<span class="sourceLineNo">713</span> SaslDataTransferClient saslClient =
client.getSaslDataTransferClient();<a name="line.713"></a>
-<span class="sourceLineNo">714</span> SaslPropertiesResolver
saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a
name="line.714"></a>
-<span class="sourceLineNo">715</span> TrustedChannelResolver
trustedChannelResolver =<a name="line.715"></a>
-<span class="sourceLineNo">716</span>
SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.716"></a>
-<span class="sourceLineNo">717</span> AtomicBoolean fallbackToSimpleAuth =
SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.717"></a>
-<span class="sourceLineNo">718</span> InetAddress addr =
((InetSocketAddress) channel.remoteAddress()).getAddress();<a
name="line.718"></a>
-<span class="sourceLineNo">719</span> if
(trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr))
{<a name="line.719"></a>
-<span class="sourceLineNo">720</span> saslPromise.trySuccess(null);<a
name="line.720"></a>
-<span class="sourceLineNo">721</span> return;<a name="line.721"></a>
-<span class="sourceLineNo">722</span> }<a name="line.722"></a>
-<span class="sourceLineNo">723</span> DataEncryptionKey encryptionKey =
client.newDataEncryptionKey();<a name="line.723"></a>
-<span class="sourceLineNo">724</span> if (encryptionKey != null) {<a
name="line.724"></a>
-<span class="sourceLineNo">725</span> if (LOG.isDebugEnabled()) {<a
name="line.725"></a>
-<span class="sourceLineNo">726</span> LOG.debug(<a name="line.726"></a>
-<span class="sourceLineNo">727</span> "SASL client doing encrypted
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a
name="line.727"></a>
-<span class="sourceLineNo">728</span> }<a name="line.728"></a>
-<span class="sourceLineNo">729</span> doSaslNegotiation(conf, channel,
timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.729"></a>
-<span class="sourceLineNo">730</span>
encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.730"></a>
-<span class="sourceLineNo">731</span>
createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm),
saslPromise);<a name="line.731"></a>
-<span class="sourceLineNo">732</span> } else if
(!UserGroupInformation.isSecurityEnabled()) {<a name="line.732"></a>
-<span class="sourceLineNo">733</span> if (LOG.isDebugEnabled()) {<a
name="line.733"></a>
-<span class="sourceLineNo">734</span> LOG.debug("SASL client skipping
handshake in unsecured configuration for addr = " + addr<a name="line.734"></a>
-<span class="sourceLineNo">735</span> + ", datanodeId = " +
dnInfo);<a name="line.735"></a>
-<span class="sourceLineNo">736</span> }<a name="line.736"></a>
-<span class="sourceLineNo">737</span> saslPromise.trySuccess(null);<a
name="line.737"></a>
-<span class="sourceLineNo">738</span> } else if (dnInfo.getXferPort() <
1024) {<a name="line.738"></a>
-<span class="sourceLineNo">739</span> if (LOG.isDebugEnabled()) {<a
name="line.739"></a>
-<span class="sourceLineNo">740</span> LOG.debug("SASL client skipping
handshake in secured configuration with "<a name="line.740"></a>
-<span class="sourceLineNo">741</span> + "privileged port for addr =
" + addr + ", datanodeId = " + dnInfo);<a name="line.741"></a>
-<span class="sourceLineNo">742</span> }<a name="line.742"></a>
-<span class="sourceLineNo">743</span> saslPromise.trySuccess(null);<a
name="line.743"></a>
-<span class="sourceLineNo">744</span> } else if (fallbackToSimpleAuth !=
null && fallbackToSimpleAuth.get()) {<a name="line.744"></a>
-<span class="sourceLineNo">745</span> if (LOG.isDebugEnabled()) {<a
name="line.745"></a>
-<span class="sourceLineNo">746</span> LOG.debug("SASL client skipping
handshake in secured configuration with "<a name="line.746"></a>
-<span class="sourceLineNo">747</span> + "unsecured cluster for addr
= " + addr + ", datanodeId = " + dnInfo);<a name="line.747"></a>
-<span class="sourceLineNo">748</span> }<a name="line.748"></a>
-<span class="sourceLineNo">749</span> saslPromise.trySuccess(null);<a
name="line.749"></a>
-<span class="sourceLineNo">750</span> } else if (saslPropsResolver != null)
{<a name="line.750"></a>
-<span class="sourceLineNo">751</span> if (LOG.isDebugEnabled()) {<a
name="line.751"></a>
-<span class="sourceLineNo">752</span> LOG.debug(<a name="line.752"></a>
-<span class="sourceLineNo">753</span> "SASL client doing general
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a
name="line.753"></a>
-<span class="sourceLineNo">754</span> }<a name="line.754"></a>
-<span class="sourceLineNo">755</span> doSaslNegotiation(conf, channel,
timeoutMs, buildUsername(accessToken),<a name="line.755"></a>
-<span class="sourceLineNo">756</span> buildClientPassword(accessToken),
saslPropsResolver.getClientProperties(addr), saslPromise);<a
name="line.756"></a>
-<span class="sourceLineNo">757</span> } else {<a name="line.757"></a>
-<span class="sourceLineNo">758</span> // It's a secured cluster using
non-privileged ports, but no SASL. The only way this can<a name="line.758"></a>
-<span class="sourceLineNo">759</span> // happen is if the DataNode has
ignore.secure.ports.for.testing configured, so this is a rare<a
name="line.759"></a>
-<span class="sourceLineNo">760</span> // edge case.<a name="line.760"></a>
-<span class="sourceLineNo">761</span> if (LOG.isDebugEnabled()) {<a
name="line.761"></a>
-<span class="sourceLineNo">762</span> LOG.debug("SASL client skipping
handshake in secured configuration with no SASL "<a name="line.762"></a>
-<span class="sourceLineNo">763</span> + "protection configured for
addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.763"></a>
-<span class="sourceLineNo">764</span> }<a name="line.764"></a>
-<span class="sourceLineNo">765</span> saslPromise.trySuccess(null);<a
name="line.765"></a>
-<span class="sourceLineNo">766</span> }<a name="line.766"></a>
-<span class="sourceLineNo">767</span> }<a name="line.767"></a>
-<span class="sourceLineNo">768</span><a name="line.768"></a>
-<span class="sourceLineNo">769</span> static Encryptor
createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a
name="line.769"></a>
-<span class="sourceLineNo">770</span> throws IOException {<a
name="line.770"></a>
-<span class="sourceLineNo">771</span> FileEncryptionInfo feInfo =
stat.getFileEncryptionInfo();<a name="line.771"></a>
-<span class="sourceLineNo">772</span> if (feInfo == null) {<a
name="line.772"></a>
-<span class="sourceLineNo">773</span> return null;<a name="line.773"></a>
-<span class="sourceLineNo">774</span> }<a name="line.774"></a>
-<span class="sourceLineNo">775</span> return
TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a
name="line.775"></a>
-<span class="sourceLineNo">776</span> }<a name="line.776"></a>
-<span class="sourceLineNo">777</span>}<a name="line.777"></a>
+<span class="sourceLineNo">635</span> private final Encryptor encryptor;<a
name="line.635"></a>
+<span class="sourceLineNo">636</span><a name="line.636"></a>
+<span class="sourceLineNo">637</span> public EncryptHandler(CryptoCodec
codec, byte[] key, byte[] iv)<a name="line.637"></a>
+<span class="sourceLineNo">638</span> throws GeneralSecurityException,
IOException {<a name="line.638"></a>
+<span class="sourceLineNo">639</span> this.encryptor =
codec.createEncryptor();<a name="line.639"></a>
+<span class="sourceLineNo">640</span> this.encryptor.init(key,
Arrays.copyOf(iv, iv.length));<a name="line.640"></a>
+<span class="sourceLineNo">641</span> }<a name="line.641"></a>
+<span class="sourceLineNo">642</span><a name="line.642"></a>
+<span class="sourceLineNo">643</span> @Override<a name="line.643"></a>
+<span class="sourceLineNo">644</span> protected ByteBuf
allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a
name="line.644"></a>
+<span class="sourceLineNo">645</span> throws Exception {<a
name="line.645"></a>
+<span class="sourceLineNo">646</span> if (preferDirect) {<a
name="line.646"></a>
+<span class="sourceLineNo">647</span> return
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.647"></a>
+<span class="sourceLineNo">648</span> } else {<a name="line.648"></a>
+<span class="sourceLineNo">649</span> return
ctx.alloc().buffer(msg.readableBytes());<a name="line.649"></a>
+<span class="sourceLineNo">650</span> }<a name="line.650"></a>
+<span class="sourceLineNo">651</span> }<a name="line.651"></a>
+<span class="sourceLineNo">652</span><a name="line.652"></a>
+<span class="sourceLineNo">653</span> @Override<a name="line.653"></a>
+<span class="sourceLineNo">654</span> protected void
encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception
{<a name="line.654"></a>
+<span class="sourceLineNo">655</span> ByteBuf inBuf;<a
name="line.655"></a>
+<span class="sourceLineNo">656</span> boolean release = false;<a
name="line.656"></a>
+<span class="sourceLineNo">657</span> if (msg.nioBufferCount() == 1) {<a
name="line.657"></a>
+<span class="sourceLineNo">658</span> inBuf = msg;<a
name="line.658"></a>
+<span class="sourceLineNo">659</span> } else {<a name="line.659"></a>
+<span class="sourceLineNo">660</span> inBuf =
ctx.alloc().directBuffer(msg.readableBytes());<a name="line.660"></a>
+<span class="sourceLineNo">661</span> msg.readBytes(inBuf);<a
name="line.661"></a>
+<span class="sourceLineNo">662</span> release = true;<a
name="line.662"></a>
+<span class="sourceLineNo">663</span> }<a name="line.663"></a>
+<span class="sourceLineNo">664</span> ByteBuffer inBuffer =
inBuf.nioBuffer();<a name="line.664"></a>
+<span class="sourceLineNo">665</span> ByteBuffer outBuffer =
out.nioBuffer(0, inBuf.readableBytes());<a name="line.665"></a>
+<span class="sourceLineNo">666</span> encryptor.encrypt(inBuffer,
outBuffer);<a name="line.666"></a>
+<span class="sourceLineNo">667</span>
out.writerIndex(inBuf.readableBytes());<a name="line.667"></a>
+<span class="sourceLineNo">668</span> if (release) {<a
name="line.668"></a>
+<span class="sourceLineNo">669</span> inBuf.release();<a
name="line.669"></a>
+<span class="sourceLineNo">670</span> }<a name="line.670"></a>
+<span class="sourceLineNo">671</span> }<a name="line.671"></a>
+<span class="sourceLineNo">672</span> }<a name="line.672"></a>
+<span class="sourceLineNo">673</span><a name="line.673"></a>
+<span class="sourceLineNo">674</span> private static String
getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a
name="line.674"></a>
+<span class="sourceLineNo">675</span> return encryptionKey.keyId +
NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a
name="line.675"></a>
+<span class="sourceLineNo">676</span> + new
String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a
name="line.676"></a>
+<span class="sourceLineNo">677</span> }<a name="line.677"></a>
+<span class="sourceLineNo">678</span><a name="line.678"></a>
+<span class="sourceLineNo">679</span> private static char[]
encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.679"></a>
+<span class="sourceLineNo">680</span> return new
String(Base64.encodeBase64(encryptionKey, false),
Charsets.UTF_8).toCharArray();<a name="line.680"></a>
+<span class="sourceLineNo">681</span> }<a name="line.681"></a>
+<span class="sourceLineNo">682</span><a name="line.682"></a>
+<span class="sourceLineNo">683</span> private static String
buildUsername(Token<BlockTokenIdentifier> blockToken) {<a
name="line.683"></a>
+<span class="sourceLineNo">684</span> return new
String(Base64.encodeBase64(blockToken.getIdentifier(), false),
Charsets.UTF_8);<a name="line.684"></a>
+<span class="sourceLineNo">685</span> }<a name="line.685"></a>
+<span class="sourceLineNo">686</span><a name="line.686"></a>
+<span class="sourceLineNo">687</span> private static char[]
buildClientPassword(Token<BlockTokenIdentifier> blockToken) {<a
name="line.687"></a>
+<span class="sourceLineNo">688</span> return new
String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a
name="line.688"></a>
+<span class="sourceLineNo">689</span> .toCharArray();<a
name="line.689"></a>
+<span class="sourceLineNo">690</span> }<a name="line.690"></a>
+<span class="sourceLineNo">691</span><a name="line.691"></a>
+<span class="sourceLineNo">692</span> private static Map<String,
String> createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a
name="line.692"></a>
+<span class="sourceLineNo">693</span> Map<String, String> saslProps =
Maps.newHashMapWithExpectedSize(3);<a name="line.693"></a>
+<span class="sourceLineNo">694</span> saslProps.put(Sasl.QOP,
QualityOfProtection.PRIVACY.getSaslQop());<a name="line.694"></a>
+<span class="sourceLineNo">695</span> saslProps.put(Sasl.SERVER_AUTH,
"true");<a name="line.695"></a>
+<span class="sourceLineNo">696</span>
saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a
name="line.696"></a>
+<span class="sourceLineNo">697</span> return saslProps;<a
name="line.697"></a>
+<span class="sourceLineNo">698</span> }<a name="line.698"></a>
+<span class="sourceLineNo">699</span><a name="line.699"></a>
+<span class="sourceLineNo">700</span> private static void
doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a
name="line.700"></a>
+<span class="sourceLineNo">701</span> String username, char[] password,
Map<String, String> saslProps, Promise<Void> saslPromise) {<a
name="line.701"></a>
+<span class="sourceLineNo">702</span> try {<a name="line.702"></a>
+<span class="sourceLineNo">703</span> channel.pipeline().addLast(new
IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.703"></a>
+<span class="sourceLineNo">704</span> new
ProtobufVarint32FrameDecoder(),<a name="line.704"></a>
+<span class="sourceLineNo">705</span> new
ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a
name="line.705"></a>
+<span class="sourceLineNo">706</span> new SaslNegotiateHandler(conf,
username, password, saslProps, timeoutMs, saslPromise));<a name="line.706"></a>
+<span class="sourceLineNo">707</span> } catch (SaslException e) {<a
name="line.707"></a>
+<span class="sourceLineNo">708</span> saslPromise.tryFailure(e);<a
name="line.708"></a>
+<span class="sourceLineNo">709</span> }<a name="line.709"></a>
+<span class="sourceLineNo">710</span> }<a name="line.710"></a>
+<span class="sourceLineNo">711</span><a name="line.711"></a>
+<span class="sourceLineNo">712</span> static void
trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a
name="line.712"></a>
+<span class="sourceLineNo">713</span> int timeoutMs, DFSClient client,
Token<BlockTokenIdentifier> accessToken,<a name="line.713"></a>
+<span class="sourceLineNo">714</span> Promise<Void> saslPromise)
throws IOException {<a name="line.714"></a>
+<span class="sourceLineNo">715</span> SaslDataTransferClient saslClient =
client.getSaslDataTransferClient();<a name="line.715"></a>
+<span class="sourceLineNo">716</span> SaslPropertiesResolver
saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a
name="line.716"></a>
+<span class="sourceLineNo">717</span> TrustedChannelResolver
trustedChannelResolver =<a name="line.717"></a>
+<span class="sourceLineNo">718</span>
SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.718"></a>
+<span class="sourceLineNo">719</span> AtomicBoolean fallbackToSimpleAuth =
SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.719"></a>
+<span class="sourceLineNo">720</span> InetAddress addr =
((InetSocketAddress) channel.remoteAddress()).getAddress();<a
name="line.720"></a>
+<span class="sourceLineNo">721</span> if
(trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr))
{<a name="line.721"></a>
+<span class="sourceLineNo">722</span> saslPromise.trySuccess(null);<a
name="line.722"></a>
+<span class="sourceLineNo">723</span> return;<a name="line.723"></a>
+<span class="sourceLineNo">724</span> }<a name="line.724"></a>
+<span class="sourceLineNo">725</span> DataEncryptionKey encryptionKey =
client.newDataEncryptionKey();<a name="line.725"></a>
+<span class="sourceLineNo">726</span> if (encryptionKey != null) {<a
name="line.726"></a>
+<span class="sourceLineNo">727</span> if (LOG.isDebugEnabled()) {<a
name="line.727"></a>
+<span class="sourceLineNo">728</span> LOG.debug(<a name="line.728"></a>
+<span class="sourceLineNo">729</span> "SASL client doing encrypted
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a
name="line.729"></a>
+<span class="sourceLineNo">730</span> }<a name="line.730"></a>
+<span class="sourceLineNo">731</span> doSaslNegotiation(conf, channel,
timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.731"></a>
+<span class="sourceLineNo">732</span>
encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.732"></a>
+<span class="sourceLineNo">733</span>
createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm),
saslPromise);<a name="line.733"></a>
+<span class="sourceLineNo">734</span> } else if
(!UserGroupInformation.isSecurityEnabled()) {<a name="line.734"></a>
+<span class="sourceLineNo">735</span> if (LOG.isDebugEnabled()) {<a
name="line.735"></a>
+<span class="sourceLineNo">736</span> LOG.debug("SASL client skipping
handshake in unsecured configuration for addr = " + addr<a name="line.736"></a>
+<span class="sourceLineNo">737</span> + ", datanodeId = " +
dnInfo);<a name="line.737"></a>
+<span class="sourceLineNo">738</span> }<a name="line.738"></a>
+<span class="sourceLineNo">739</span> saslPromise.trySuccess(null);<a
name="line.739"></a>
+<span class="sourceLineNo">740</span> } else if (dnInfo.getXferPort() <
1024) {<a name="line.740"></a>
+<span class="sourceLineNo">741</span> if (LOG.isDebugEnabled()) {<a
name="line.741"></a>
+<span class="sourceLineNo">742</span> LOG.debug("SASL client skipping
handshake in secured configuration with "<a name="line.742"></a>
+<span class="sourceLineNo">743</span> + "privileged port for addr =
" + addr + ", datanodeId = " + dnInfo);<a name="line.743"></a>
+<span class="sourceLineNo">744</span> }<a name="line.744"></a>
+<span class="sourceLineNo">745</span> saslPromise.trySuccess(null);<a
name="line.745"></a>
+<span class="sourceLineNo">746</span> } else if (fallbackToSimpleAuth !=
null && fallbackToSimpleAuth.get()) {<a name="line.746"></a>
+<span class="sourceLineNo">747</span> if (LOG.isDebugEnabled()) {<a
name="line.747"></a>
+<span class="sourceLineNo">748</span> LOG.debug("SASL client skipping
handshake in secured configuration with "<a name="line.748"></a>
+<span class="sourceLineNo">749</span> + "unsecured cluster for addr
= " + addr + ", datanodeId = " + dnInfo);<a name="line.749"></a>
+<span class="sourceLineNo">750</span> }<a name="line.750"></a>
+<span class="sourceLineNo">751</span> saslPromise.trySuccess(null);<a
name="line.751"></a>
+<span class="sourceLineNo">752</span> } else if (saslPropsResolver != null)
{<a name="line.752"></a>
+<span class="sourceLineNo">753</span> if (LOG.isDebugEnabled()) {<a
name="line.753"></a>
+<span class="sourceLineNo">754</span> LOG.debug(<a name="line.754"></a>
+<span class="sourceLineNo">755</span> "SASL client doing general
handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a
name="line.755"></a>
+<span class="sourceLineNo">756</span> }<a name="line.756"></a>
+<span class="sourceLineNo">757</span> doSaslNegotiation(conf, channel,
timeoutMs, buildUsername(accessToken),<a name="line.757"></a>
+<span class="sourceLineNo">758</span> buildClientPassword(accessToken),
saslPropsResolver.getClientProperties(addr), saslPromise);<a
name="line.758"></a>
+<span class="sourceLineNo">759</span> } else {<a name="line.759"></a>
+<span class="sourceLineNo">760</span> // It's a secured cluster using
non-privileged ports, but no SASL. The only way this can<a name="line.760"></a>
+<span class="sourceLineNo">761</span> // happen is if the DataNode has
ignore.secure.ports.for.testing configured, so this is a rare<a
name="line.761"></a>
+<span class="sourceLineNo">762</span> // edge case.<a name="line.762"></a>
+<span class="sourceLineNo">763</span> if (LOG.isDebugEnabled()) {<a
name="line.763"></a>
+<span class="sourceLineNo">764</span> LOG.debug("SASL client skipping
handshake in secured configuration with no SASL "<a name="line.764"></a>
+<span class="sourceLineNo">765</span> + "protection configured for
addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.765"></a>
+<span class="sourceLineNo">766</span> }<a name="line.766"></a>
+<span class="sourceLineNo">767</span> saslPromise.trySuccess(null);<a
name="line.767"></a>
+<span class="sourceLineNo">768</span> }<a name="line.768"></a>
+<span class="sourceLineNo">769</span> }<a name="line.769"></a>
+<span class="sourceLineNo">770</span><a name="line.770"></a>
+<span class="sourceLineNo">771</span> static Encryptor
createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a
name="line.771"></a>
+<span class="sourceLineNo">772</span> throws IOException {<a
name="line.772"></a>
+<span class="sourceLineNo">773</span> FileEncryptionInfo feInfo =
stat.getFileEncryptionInfo();<a name="line.773"></a>
+<span class="sourceLineNo">774</span> if (feInfo == null) {<a
name="line.774"></a>
+<span class="sourceLineNo">775</span> return null;<a name="line.775"></a>
+<span class="sourceLineNo">776</span> }<a name="line.776"></a>
+<span class="sourceLineNo">777</span> return
TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a
name="line.777"></a>
+<span class="sourceLineNo">778</span> }<a name="line.778"></a>
+<span class="sourceLineNo">779</span>}<a name="line.779"></a>