Repository: hbase-site Updated Branches: refs/heads/asf-site be6740763 -> ca5b02753
http://git-wip-us.apache.org/repos/asf/hbase-site/blob/ca5b0275/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.EncryptHandler.html ---------------------------------------------------------------------- diff --git a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.EncryptHandler.html b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.EncryptHandler.html index 42b6f60..37a733a 100644 --- a/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.EncryptHandler.html +++ b/devapidocs/src-html/org/apache/hadoop/hbase/io/asyncfs/FanOutOneBlockAsyncDFSOutputSaslHelper.EncryptHandler.html @@ -28,10 +28,10 @@ <span class="sourceLineNo">020</span>import static io.netty.handler.timeout.IdleState.READER_IDLE;<a name="line.20"></a> <span class="sourceLineNo">021</span>import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY;<a name="line.21"></a> <span class="sourceLineNo">022</span><a name="line.22"></a> -<span class="sourceLineNo">023</span>import com.google.common.base.Charsets;<a name="line.23"></a> -<span class="sourceLineNo">024</span>import com.google.common.base.Throwables;<a name="line.24"></a> -<span class="sourceLineNo">025</span>import com.google.common.collect.ImmutableSet;<a name="line.25"></a> -<span class="sourceLineNo">026</span>import com.google.common.collect.Maps;<a name="line.26"></a> +<span class="sourceLineNo">023</span>import org.apache.hadoop.hbase.shaded.com.google.common.base.Charsets;<a name="line.23"></a> +<span class="sourceLineNo">024</span>import org.apache.hadoop.hbase.shaded.com.google.common.base.Throwables;<a name="line.24"></a> +<span class="sourceLineNo">025</span>import org.apache.hadoop.hbase.shaded.com.google.common.collect.ImmutableSet;<a name="line.25"></a> +<span class="sourceLineNo">026</span>import org.apache.hadoop.hbase.shaded.com.google.common.collect.Maps;<a name="line.26"></a> <span class="sourceLineNo">027</span>import com.google.protobuf.CodedOutputStream;<a name="line.27"></a> <span class="sourceLineNo">028</span><a name="line.28"></a> <span class="sourceLineNo">029</span>import io.netty.buffer.ByteBuf;<a name="line.29"></a> @@ -93,7 +93,7 @@ <span class="sourceLineNo">085</span>import org.apache.hadoop.crypto.key.KeyProvider.KeyVersion;<a name="line.85"></a> <span class="sourceLineNo">086</span>import org.apache.hadoop.fs.FileEncryptionInfo;<a name="line.86"></a> <span class="sourceLineNo">087</span>import org.apache.hadoop.hbase.classification.InterfaceAudience;<a name="line.87"></a> -<span class="sourceLineNo">088</span>import org.apache.hadoop.hbase.util.ByteStringer;<a name="line.88"></a> +<span class="sourceLineNo">088</span>import com.google.protobuf.ByteString;<a name="line.88"></a> <span class="sourceLineNo">089</span>import org.apache.hadoop.hdfs.DFSClient;<a name="line.89"></a> <span class="sourceLineNo">090</span>import org.apache.hadoop.hdfs.protocol.DatanodeInfo;<a name="line.90"></a> <span class="sourceLineNo">091</span>import org.apache.hadoop.hdfs.protocol.HdfsFileStatus;<a name="line.91"></a> @@ -373,416 +373,418 @@ <span class="sourceLineNo">365</span> DataTransferEncryptorMessageProto.newBuilder();<a name="line.365"></a> <span class="sourceLineNo">366</span> builder.setStatus(DataTransferEncryptorStatus.SUCCESS);<a name="line.366"></a> <span class="sourceLineNo">367</span> if (payload != null) {<a name="line.367"></a> -<span class="sourceLineNo">368</span> builder.setPayload(ByteStringer.wrap(payload));<a name="line.368"></a> -<span class="sourceLineNo">369</span> }<a name="line.369"></a> -<span class="sourceLineNo">370</span> if (options != null) {<a name="line.370"></a> -<span class="sourceLineNo">371</span> builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a name="line.371"></a> -<span class="sourceLineNo">372</span> }<a name="line.372"></a> -<span class="sourceLineNo">373</span> DataTransferEncryptorMessageProto proto = builder.build();<a name="line.373"></a> -<span class="sourceLineNo">374</span> int size = proto.getSerializedSize();<a name="line.374"></a> -<span class="sourceLineNo">375</span> size += CodedOutputStream.computeRawVarint32Size(size);<a name="line.375"></a> -<span class="sourceLineNo">376</span> ByteBuf buf = ctx.alloc().buffer(size);<a name="line.376"></a> -<span class="sourceLineNo">377</span> proto.writeDelimitedTo(new ByteBufOutputStream(buf));<a name="line.377"></a> -<span class="sourceLineNo">378</span> ctx.write(buf);<a name="line.378"></a> -<span class="sourceLineNo">379</span> }<a name="line.379"></a> -<span class="sourceLineNo">380</span><a name="line.380"></a> -<span class="sourceLineNo">381</span> @Override<a name="line.381"></a> -<span class="sourceLineNo">382</span> public void handlerAdded(ChannelHandlerContext ctx) throws Exception {<a name="line.382"></a> -<span class="sourceLineNo">383</span> ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a name="line.383"></a> -<span class="sourceLineNo">384</span> sendSaslMessage(ctx, new byte[0]);<a name="line.384"></a> -<span class="sourceLineNo">385</span> ctx.flush();<a name="line.385"></a> -<span class="sourceLineNo">386</span> step++;<a name="line.386"></a> -<span class="sourceLineNo">387</span> }<a name="line.387"></a> -<span class="sourceLineNo">388</span><a name="line.388"></a> -<span class="sourceLineNo">389</span> @Override<a name="line.389"></a> -<span class="sourceLineNo">390</span> public void channelInactive(ChannelHandlerContext ctx) throws Exception {<a name="line.390"></a> -<span class="sourceLineNo">391</span> saslClient.dispose();<a name="line.391"></a> -<span class="sourceLineNo">392</span> }<a name="line.392"></a> -<span class="sourceLineNo">393</span><a name="line.393"></a> -<span class="sourceLineNo">394</span> private void check(DataTransferEncryptorMessageProto proto) throws IOException {<a name="line.394"></a> -<span class="sourceLineNo">395</span> if (proto.getStatus() == DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.395"></a> -<span class="sourceLineNo">396</span> throw new InvalidEncryptionKeyException(proto.getMessage());<a name="line.396"></a> -<span class="sourceLineNo">397</span> } else if (proto.getStatus() == DataTransferEncryptorStatus.ERROR) {<a name="line.397"></a> -<span class="sourceLineNo">398</span> throw new IOException(proto.getMessage());<a name="line.398"></a> -<span class="sourceLineNo">399</span> }<a name="line.399"></a> -<span class="sourceLineNo">400</span> }<a name="line.400"></a> -<span class="sourceLineNo">401</span><a name="line.401"></a> -<span class="sourceLineNo">402</span> private String getNegotiatedQop() {<a name="line.402"></a> -<span class="sourceLineNo">403</span> return (String) saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.403"></a> -<span class="sourceLineNo">404</span> }<a name="line.404"></a> -<span class="sourceLineNo">405</span><a name="line.405"></a> -<span class="sourceLineNo">406</span> private boolean isNegotiatedQopPrivacy() {<a name="line.406"></a> -<span class="sourceLineNo">407</span> String qop = getNegotiatedQop();<a name="line.407"></a> -<span class="sourceLineNo">408</span> return qop != null && "auth-conf".equalsIgnoreCase(qop);<a name="line.408"></a> -<span class="sourceLineNo">409</span> }<a name="line.409"></a> -<span class="sourceLineNo">410</span><a name="line.410"></a> -<span class="sourceLineNo">411</span> private boolean requestedQopContainsPrivacy() {<a name="line.411"></a> -<span class="sourceLineNo">412</span> Set<String> requestedQop =<a name="line.412"></a> -<span class="sourceLineNo">413</span> ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a name="line.413"></a> -<span class="sourceLineNo">414</span> return requestedQop.contains("auth-conf");<a name="line.414"></a> -<span class="sourceLineNo">415</span> }<a name="line.415"></a> -<span class="sourceLineNo">416</span><a name="line.416"></a> -<span class="sourceLineNo">417</span> private void checkSaslComplete() throws IOException {<a name="line.417"></a> -<span class="sourceLineNo">418</span> if (!saslClient.isComplete()) {<a name="line.418"></a> -<span class="sourceLineNo">419</span> throw new IOException("Failed to complete SASL handshake");<a name="line.419"></a> -<span class="sourceLineNo">420</span> }<a name="line.420"></a> -<span class="sourceLineNo">421</span> Set<String> requestedQop =<a name="line.421"></a> -<span class="sourceLineNo">422</span> ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a name="line.422"></a> -<span class="sourceLineNo">423</span> String negotiatedQop = getNegotiatedQop();<a name="line.423"></a> -<span class="sourceLineNo">424</span> LOG.debug(<a name="line.424"></a> -<span class="sourceLineNo">425</span> "Verifying QOP, requested QOP = " + requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.425"></a> -<span class="sourceLineNo">426</span> if (!requestedQop.contains(negotiatedQop)) {<a name="line.426"></a> -<span class="sourceLineNo">427</span> throw new IOException(String.format("SASL handshake completed, but "<a name="line.427"></a> -<span class="sourceLineNo">428</span> + "channel does not have acceptable quality of protection, "<a name="line.428"></a> -<span class="sourceLineNo">429</span> + "requested = %s, negotiated = %s",<a name="line.429"></a> -<span class="sourceLineNo">430</span> requestedQop, negotiatedQop));<a name="line.430"></a> -<span class="sourceLineNo">431</span> }<a name="line.431"></a> -<span class="sourceLineNo">432</span> }<a name="line.432"></a> -<span class="sourceLineNo">433</span><a name="line.433"></a> -<span class="sourceLineNo">434</span> private boolean useWrap() {<a name="line.434"></a> -<span class="sourceLineNo">435</span> String qop = (String) saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.435"></a> -<span class="sourceLineNo">436</span> return qop != null && !"auth".equalsIgnoreCase(qop);<a name="line.436"></a> -<span class="sourceLineNo">437</span> }<a name="line.437"></a> -<span class="sourceLineNo">438</span><a name="line.438"></a> -<span class="sourceLineNo">439</span> private CipherOption unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a name="line.439"></a> -<span class="sourceLineNo">440</span> byte[] inKey = option.getInKey();<a name="line.440"></a> -<span class="sourceLineNo">441</span> if (inKey != null) {<a name="line.441"></a> -<span class="sourceLineNo">442</span> inKey = saslClient.unwrap(inKey, 0, inKey.length);<a name="line.442"></a> -<span class="sourceLineNo">443</span> }<a name="line.443"></a> -<span class="sourceLineNo">444</span> byte[] outKey = option.getOutKey();<a name="line.444"></a> -<span class="sourceLineNo">445</span> if (outKey != null) {<a name="line.445"></a> -<span class="sourceLineNo">446</span> outKey = saslClient.unwrap(outKey, 0, outKey.length);<a name="line.446"></a> -<span class="sourceLineNo">447</span> }<a name="line.447"></a> -<span class="sourceLineNo">448</span> return new CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a name="line.448"></a> -<span class="sourceLineNo">449</span> option.getOutIv());<a name="line.449"></a> -<span class="sourceLineNo">450</span> }<a name="line.450"></a> -<span class="sourceLineNo">451</span><a name="line.451"></a> -<span class="sourceLineNo">452</span> private CipherOption getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.452"></a> -<span class="sourceLineNo">453</span> boolean isNegotiatedQopPrivacy, SaslClient saslClient) throws IOException {<a name="line.453"></a> -<span class="sourceLineNo">454</span> List<CipherOption> cipherOptions =<a name="line.454"></a> -<span class="sourceLineNo">455</span> PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a name="line.455"></a> -<span class="sourceLineNo">456</span> if (cipherOptions == null || cipherOptions.isEmpty()) {<a name="line.456"></a> -<span class="sourceLineNo">457</span> return null;<a name="line.457"></a> -<span class="sourceLineNo">458</span> }<a name="line.458"></a> -<span class="sourceLineNo">459</span> CipherOption cipherOption = cipherOptions.get(0);<a name="line.459"></a> -<span class="sourceLineNo">460</span> return isNegotiatedQopPrivacy ? unwrap(cipherOption, saslClient) : cipherOption;<a name="line.460"></a> -<span class="sourceLineNo">461</span> }<a name="line.461"></a> -<span class="sourceLineNo">462</span><a name="line.462"></a> -<span class="sourceLineNo">463</span> @Override<a name="line.463"></a> -<span class="sourceLineNo">464</span> public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a name="line.464"></a> -<span class="sourceLineNo">465</span> if (msg instanceof DataTransferEncryptorMessageProto) {<a name="line.465"></a> -<span class="sourceLineNo">466</span> DataTransferEncryptorMessageProto proto = (DataTransferEncryptorMessageProto) msg;<a name="line.466"></a> -<span class="sourceLineNo">467</span> check(proto);<a name="line.467"></a> -<span class="sourceLineNo">468</span> byte[] challenge = proto.getPayload().toByteArray();<a name="line.468"></a> -<span class="sourceLineNo">469</span> byte[] response = saslClient.evaluateChallenge(challenge);<a name="line.469"></a> -<span class="sourceLineNo">470</span> switch (step) {<a name="line.470"></a> -<span class="sourceLineNo">471</span> case 1: {<a name="line.471"></a> -<span class="sourceLineNo">472</span> List<CipherOption> cipherOptions = null;<a name="line.472"></a> -<span class="sourceLineNo">473</span> if (requestedQopContainsPrivacy()) {<a name="line.473"></a> -<span class="sourceLineNo">474</span> cipherOptions = getCipherOptions();<a name="line.474"></a> -<span class="sourceLineNo">475</span> }<a name="line.475"></a> -<span class="sourceLineNo">476</span> sendSaslMessage(ctx, response, cipherOptions);<a name="line.476"></a> -<span class="sourceLineNo">477</span> ctx.flush();<a name="line.477"></a> -<span class="sourceLineNo">478</span> step++;<a name="line.478"></a> -<span class="sourceLineNo">479</span> break;<a name="line.479"></a> -<span class="sourceLineNo">480</span> }<a name="line.480"></a> -<span class="sourceLineNo">481</span> case 2: {<a name="line.481"></a> -<span class="sourceLineNo">482</span> assert response == null;<a name="line.482"></a> -<span class="sourceLineNo">483</span> checkSaslComplete();<a name="line.483"></a> -<span class="sourceLineNo">484</span> CipherOption cipherOption =<a name="line.484"></a> -<span class="sourceLineNo">485</span> getCipherOption(proto, isNegotiatedQopPrivacy(), saslClient);<a name="line.485"></a> -<span class="sourceLineNo">486</span> ChannelPipeline p = ctx.pipeline();<a name="line.486"></a> -<span class="sourceLineNo">487</span> while (p.first() != null) {<a name="line.487"></a> -<span class="sourceLineNo">488</span> p.removeFirst();<a name="line.488"></a> -<span class="sourceLineNo">489</span> }<a name="line.489"></a> -<span class="sourceLineNo">490</span> if (cipherOption != null) {<a name="line.490"></a> -<span class="sourceLineNo">491</span> CryptoCodec codec = CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a name="line.491"></a> -<span class="sourceLineNo">492</span> p.addLast(new EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a name="line.492"></a> -<span class="sourceLineNo">493</span> new DecryptHandler(codec, cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.493"></a> -<span class="sourceLineNo">494</span> } else {<a name="line.494"></a> -<span class="sourceLineNo">495</span> if (useWrap()) {<a name="line.495"></a> -<span class="sourceLineNo">496</span> p.addLast(new SaslWrapHandler(saslClient),<a name="line.496"></a> -<span class="sourceLineNo">497</span> new LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.497"></a> -<span class="sourceLineNo">498</span> new SaslUnwrapHandler(saslClient));<a name="line.498"></a> -<span class="sourceLineNo">499</span> }<a name="line.499"></a> -<span class="sourceLineNo">500</span> }<a name="line.500"></a> -<span class="sourceLineNo">501</span> promise.trySuccess(null);<a name="line.501"></a> -<span class="sourceLineNo">502</span> break;<a name="line.502"></a> -<span class="sourceLineNo">503</span> }<a name="line.503"></a> -<span class="sourceLineNo">504</span> default:<a name="line.504"></a> -<span class="sourceLineNo">505</span> throw new IllegalArgumentException("Unrecognized negotiation step: " + step);<a name="line.505"></a> -<span class="sourceLineNo">506</span> }<a name="line.506"></a> -<span class="sourceLineNo">507</span> } else {<a name="line.507"></a> -<span class="sourceLineNo">508</span> ctx.fireChannelRead(msg);<a name="line.508"></a> -<span class="sourceLineNo">509</span> }<a name="line.509"></a> -<span class="sourceLineNo">510</span> }<a name="line.510"></a> -<span class="sourceLineNo">511</span><a name="line.511"></a> -<span class="sourceLineNo">512</span> @Override<a name="line.512"></a> -<span class="sourceLineNo">513</span> public void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception {<a name="line.513"></a> -<span class="sourceLineNo">514</span> promise.tryFailure(cause);<a name="line.514"></a> -<span class="sourceLineNo">515</span> }<a name="line.515"></a> -<span class="sourceLineNo">516</span><a name="line.516"></a> -<span class="sourceLineNo">517</span> @Override<a name="line.517"></a> -<span class="sourceLineNo">518</span> public void userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a name="line.518"></a> -<span class="sourceLineNo">519</span> if (evt instanceof IdleStateEvent && ((IdleStateEvent) evt).state() == READER_IDLE) {<a name="line.519"></a> -<span class="sourceLineNo">520</span> promise.tryFailure(new IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a name="line.520"></a> -<span class="sourceLineNo">521</span> } else {<a name="line.521"></a> -<span class="sourceLineNo">522</span> super.userEventTriggered(ctx, evt);<a name="line.522"></a> -<span class="sourceLineNo">523</span> }<a name="line.523"></a> -<span class="sourceLineNo">524</span> }<a name="line.524"></a> -<span class="sourceLineNo">525</span> }<a name="line.525"></a> -<span class="sourceLineNo">526</span><a name="line.526"></a> -<span class="sourceLineNo">527</span> private static final class SaslUnwrapHandler extends SimpleChannelInboundHandler<ByteBuf> {<a name="line.527"></a> +<span class="sourceLineNo">368</span> // Was ByteStringer; fix w/o using ByteStringer. Its in hbase-protocol<a name="line.368"></a> +<span class="sourceLineNo">369</span> // and we want to keep that out of hbase-server.<a name="line.369"></a> +<span class="sourceLineNo">370</span> builder.setPayload(ByteString.copyFrom(payload));<a name="line.370"></a> +<span class="sourceLineNo">371</span> }<a name="line.371"></a> +<span class="sourceLineNo">372</span> if (options != null) {<a name="line.372"></a> +<span class="sourceLineNo">373</span> builder.addAllCipherOption(PB_HELPER.convertCipherOptions(options));<a name="line.373"></a> +<span class="sourceLineNo">374</span> }<a name="line.374"></a> +<span class="sourceLineNo">375</span> DataTransferEncryptorMessageProto proto = builder.build();<a name="line.375"></a> +<span class="sourceLineNo">376</span> int size = proto.getSerializedSize();<a name="line.376"></a> +<span class="sourceLineNo">377</span> size += CodedOutputStream.computeRawVarint32Size(size);<a name="line.377"></a> +<span class="sourceLineNo">378</span> ByteBuf buf = ctx.alloc().buffer(size);<a name="line.378"></a> +<span class="sourceLineNo">379</span> proto.writeDelimitedTo(new ByteBufOutputStream(buf));<a name="line.379"></a> +<span class="sourceLineNo">380</span> ctx.write(buf);<a name="line.380"></a> +<span class="sourceLineNo">381</span> }<a name="line.381"></a> +<span class="sourceLineNo">382</span><a name="line.382"></a> +<span class="sourceLineNo">383</span> @Override<a name="line.383"></a> +<span class="sourceLineNo">384</span> public void handlerAdded(ChannelHandlerContext ctx) throws Exception {<a name="line.384"></a> +<span class="sourceLineNo">385</span> ctx.write(ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a name="line.385"></a> +<span class="sourceLineNo">386</span> sendSaslMessage(ctx, new byte[0]);<a name="line.386"></a> +<span class="sourceLineNo">387</span> ctx.flush();<a name="line.387"></a> +<span class="sourceLineNo">388</span> step++;<a name="line.388"></a> +<span class="sourceLineNo">389</span> }<a name="line.389"></a> +<span class="sourceLineNo">390</span><a name="line.390"></a> +<span class="sourceLineNo">391</span> @Override<a name="line.391"></a> +<span class="sourceLineNo">392</span> public void channelInactive(ChannelHandlerContext ctx) throws Exception {<a name="line.392"></a> +<span class="sourceLineNo">393</span> saslClient.dispose();<a name="line.393"></a> +<span class="sourceLineNo">394</span> }<a name="line.394"></a> +<span class="sourceLineNo">395</span><a name="line.395"></a> +<span class="sourceLineNo">396</span> private void check(DataTransferEncryptorMessageProto proto) throws IOException {<a name="line.396"></a> +<span class="sourceLineNo">397</span> if (proto.getStatus() == DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.397"></a> +<span class="sourceLineNo">398</span> throw new InvalidEncryptionKeyException(proto.getMessage());<a name="line.398"></a> +<span class="sourceLineNo">399</span> } else if (proto.getStatus() == DataTransferEncryptorStatus.ERROR) {<a name="line.399"></a> +<span class="sourceLineNo">400</span> throw new IOException(proto.getMessage());<a name="line.400"></a> +<span class="sourceLineNo">401</span> }<a name="line.401"></a> +<span class="sourceLineNo">402</span> }<a name="line.402"></a> +<span class="sourceLineNo">403</span><a name="line.403"></a> +<span class="sourceLineNo">404</span> private String getNegotiatedQop() {<a name="line.404"></a> +<span class="sourceLineNo">405</span> return (String) saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.405"></a> +<span class="sourceLineNo">406</span> }<a name="line.406"></a> +<span class="sourceLineNo">407</span><a name="line.407"></a> +<span class="sourceLineNo">408</span> private boolean isNegotiatedQopPrivacy() {<a name="line.408"></a> +<span class="sourceLineNo">409</span> String qop = getNegotiatedQop();<a name="line.409"></a> +<span class="sourceLineNo">410</span> return qop != null && "auth-conf".equalsIgnoreCase(qop);<a name="line.410"></a> +<span class="sourceLineNo">411</span> }<a name="line.411"></a> +<span class="sourceLineNo">412</span><a name="line.412"></a> +<span class="sourceLineNo">413</span> private boolean requestedQopContainsPrivacy() {<a name="line.413"></a> +<span class="sourceLineNo">414</span> Set<String> requestedQop =<a name="line.414"></a> +<span class="sourceLineNo">415</span> ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a name="line.415"></a> +<span class="sourceLineNo">416</span> return requestedQop.contains("auth-conf");<a name="line.416"></a> +<span class="sourceLineNo">417</span> }<a name="line.417"></a> +<span class="sourceLineNo">418</span><a name="line.418"></a> +<span class="sourceLineNo">419</span> private void checkSaslComplete() throws IOException {<a name="line.419"></a> +<span class="sourceLineNo">420</span> if (!saslClient.isComplete()) {<a name="line.420"></a> +<span class="sourceLineNo">421</span> throw new IOException("Failed to complete SASL handshake");<a name="line.421"></a> +<span class="sourceLineNo">422</span> }<a name="line.422"></a> +<span class="sourceLineNo">423</span> Set<String> requestedQop =<a name="line.423"></a> +<span class="sourceLineNo">424</span> ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a name="line.424"></a> +<span class="sourceLineNo">425</span> String negotiatedQop = getNegotiatedQop();<a name="line.425"></a> +<span class="sourceLineNo">426</span> LOG.debug(<a name="line.426"></a> +<span class="sourceLineNo">427</span> "Verifying QOP, requested QOP = " + requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.427"></a> +<span class="sourceLineNo">428</span> if (!requestedQop.contains(negotiatedQop)) {<a name="line.428"></a> +<span class="sourceLineNo">429</span> throw new IOException(String.format("SASL handshake completed, but "<a name="line.429"></a> +<span class="sourceLineNo">430</span> + "channel does not have acceptable quality of protection, "<a name="line.430"></a> +<span class="sourceLineNo">431</span> + "requested = %s, negotiated = %s",<a name="line.431"></a> +<span class="sourceLineNo">432</span> requestedQop, negotiatedQop));<a name="line.432"></a> +<span class="sourceLineNo">433</span> }<a name="line.433"></a> +<span class="sourceLineNo">434</span> }<a name="line.434"></a> +<span class="sourceLineNo">435</span><a name="line.435"></a> +<span class="sourceLineNo">436</span> private boolean useWrap() {<a name="line.436"></a> +<span class="sourceLineNo">437</span> String qop = (String) saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.437"></a> +<span class="sourceLineNo">438</span> return qop != null && !"auth".equalsIgnoreCase(qop);<a name="line.438"></a> +<span class="sourceLineNo">439</span> }<a name="line.439"></a> +<span class="sourceLineNo">440</span><a name="line.440"></a> +<span class="sourceLineNo">441</span> private CipherOption unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a name="line.441"></a> +<span class="sourceLineNo">442</span> byte[] inKey = option.getInKey();<a name="line.442"></a> +<span class="sourceLineNo">443</span> if (inKey != null) {<a name="line.443"></a> +<span class="sourceLineNo">444</span> inKey = saslClient.unwrap(inKey, 0, inKey.length);<a name="line.444"></a> +<span class="sourceLineNo">445</span> }<a name="line.445"></a> +<span class="sourceLineNo">446</span> byte[] outKey = option.getOutKey();<a name="line.446"></a> +<span class="sourceLineNo">447</span> if (outKey != null) {<a name="line.447"></a> +<span class="sourceLineNo">448</span> outKey = saslClient.unwrap(outKey, 0, outKey.length);<a name="line.448"></a> +<span class="sourceLineNo">449</span> }<a name="line.449"></a> +<span class="sourceLineNo">450</span> return new CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a name="line.450"></a> +<span class="sourceLineNo">451</span> option.getOutIv());<a name="line.451"></a> +<span class="sourceLineNo">452</span> }<a name="line.452"></a> +<span class="sourceLineNo">453</span><a name="line.453"></a> +<span class="sourceLineNo">454</span> private CipherOption getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.454"></a> +<span class="sourceLineNo">455</span> boolean isNegotiatedQopPrivacy, SaslClient saslClient) throws IOException {<a name="line.455"></a> +<span class="sourceLineNo">456</span> List<CipherOption> cipherOptions =<a name="line.456"></a> +<span class="sourceLineNo">457</span> PB_HELPER.convertCipherOptionProtos(proto.getCipherOptionList());<a name="line.457"></a> +<span class="sourceLineNo">458</span> if (cipherOptions == null || cipherOptions.isEmpty()) {<a name="line.458"></a> +<span class="sourceLineNo">459</span> return null;<a name="line.459"></a> +<span class="sourceLineNo">460</span> }<a name="line.460"></a> +<span class="sourceLineNo">461</span> CipherOption cipherOption = cipherOptions.get(0);<a name="line.461"></a> +<span class="sourceLineNo">462</span> return isNegotiatedQopPrivacy ? unwrap(cipherOption, saslClient) : cipherOption;<a name="line.462"></a> +<span class="sourceLineNo">463</span> }<a name="line.463"></a> +<span class="sourceLineNo">464</span><a name="line.464"></a> +<span class="sourceLineNo">465</span> @Override<a name="line.465"></a> +<span class="sourceLineNo">466</span> public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a name="line.466"></a> +<span class="sourceLineNo">467</span> if (msg instanceof DataTransferEncryptorMessageProto) {<a name="line.467"></a> +<span class="sourceLineNo">468</span> DataTransferEncryptorMessageProto proto = (DataTransferEncryptorMessageProto) msg;<a name="line.468"></a> +<span class="sourceLineNo">469</span> check(proto);<a name="line.469"></a> +<span class="sourceLineNo">470</span> byte[] challenge = proto.getPayload().toByteArray();<a name="line.470"></a> +<span class="sourceLineNo">471</span> byte[] response = saslClient.evaluateChallenge(challenge);<a name="line.471"></a> +<span class="sourceLineNo">472</span> switch (step) {<a name="line.472"></a> +<span class="sourceLineNo">473</span> case 1: {<a name="line.473"></a> +<span class="sourceLineNo">474</span> List<CipherOption> cipherOptions = null;<a name="line.474"></a> +<span class="sourceLineNo">475</span> if (requestedQopContainsPrivacy()) {<a name="line.475"></a> +<span class="sourceLineNo">476</span> cipherOptions = getCipherOptions();<a name="line.476"></a> +<span class="sourceLineNo">477</span> }<a name="line.477"></a> +<span class="sourceLineNo">478</span> sendSaslMessage(ctx, response, cipherOptions);<a name="line.478"></a> +<span class="sourceLineNo">479</span> ctx.flush();<a name="line.479"></a> +<span class="sourceLineNo">480</span> step++;<a name="line.480"></a> +<span class="sourceLineNo">481</span> break;<a name="line.481"></a> +<span class="sourceLineNo">482</span> }<a name="line.482"></a> +<span class="sourceLineNo">483</span> case 2: {<a name="line.483"></a> +<span class="sourceLineNo">484</span> assert response == null;<a name="line.484"></a> +<span class="sourceLineNo">485</span> checkSaslComplete();<a name="line.485"></a> +<span class="sourceLineNo">486</span> CipherOption cipherOption =<a name="line.486"></a> +<span class="sourceLineNo">487</span> getCipherOption(proto, isNegotiatedQopPrivacy(), saslClient);<a name="line.487"></a> +<span class="sourceLineNo">488</span> ChannelPipeline p = ctx.pipeline();<a name="line.488"></a> +<span class="sourceLineNo">489</span> while (p.first() != null) {<a name="line.489"></a> +<span class="sourceLineNo">490</span> p.removeFirst();<a name="line.490"></a> +<span class="sourceLineNo">491</span> }<a name="line.491"></a> +<span class="sourceLineNo">492</span> if (cipherOption != null) {<a name="line.492"></a> +<span class="sourceLineNo">493</span> CryptoCodec codec = CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a name="line.493"></a> +<span class="sourceLineNo">494</span> p.addLast(new EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a name="line.494"></a> +<span class="sourceLineNo">495</span> new DecryptHandler(codec, cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.495"></a> +<span class="sourceLineNo">496</span> } else {<a name="line.496"></a> +<span class="sourceLineNo">497</span> if (useWrap()) {<a name="line.497"></a> +<span class="sourceLineNo">498</span> p.addLast(new SaslWrapHandler(saslClient),<a name="line.498"></a> +<span class="sourceLineNo">499</span> new LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.499"></a> +<span class="sourceLineNo">500</span> new SaslUnwrapHandler(saslClient));<a name="line.500"></a> +<span class="sourceLineNo">501</span> }<a name="line.501"></a> +<span class="sourceLineNo">502</span> }<a name="line.502"></a> +<span class="sourceLineNo">503</span> promise.trySuccess(null);<a name="line.503"></a> +<span class="sourceLineNo">504</span> break;<a name="line.504"></a> +<span class="sourceLineNo">505</span> }<a name="line.505"></a> +<span class="sourceLineNo">506</span> default:<a name="line.506"></a> +<span class="sourceLineNo">507</span> throw new IllegalArgumentException("Unrecognized negotiation step: " + step);<a name="line.507"></a> +<span class="sourceLineNo">508</span> }<a name="line.508"></a> +<span class="sourceLineNo">509</span> } else {<a name="line.509"></a> +<span class="sourceLineNo">510</span> ctx.fireChannelRead(msg);<a name="line.510"></a> +<span class="sourceLineNo">511</span> }<a name="line.511"></a> +<span class="sourceLineNo">512</span> }<a name="line.512"></a> +<span class="sourceLineNo">513</span><a name="line.513"></a> +<span class="sourceLineNo">514</span> @Override<a name="line.514"></a> +<span class="sourceLineNo">515</span> public void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception {<a name="line.515"></a> +<span class="sourceLineNo">516</span> promise.tryFailure(cause);<a name="line.516"></a> +<span class="sourceLineNo">517</span> }<a name="line.517"></a> +<span class="sourceLineNo">518</span><a name="line.518"></a> +<span class="sourceLineNo">519</span> @Override<a name="line.519"></a> +<span class="sourceLineNo">520</span> public void userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a name="line.520"></a> +<span class="sourceLineNo">521</span> if (evt instanceof IdleStateEvent && ((IdleStateEvent) evt).state() == READER_IDLE) {<a name="line.521"></a> +<span class="sourceLineNo">522</span> promise.tryFailure(new IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a name="line.522"></a> +<span class="sourceLineNo">523</span> } else {<a name="line.523"></a> +<span class="sourceLineNo">524</span> super.userEventTriggered(ctx, evt);<a name="line.524"></a> +<span class="sourceLineNo">525</span> }<a name="line.525"></a> +<span class="sourceLineNo">526</span> }<a name="line.526"></a> +<span class="sourceLineNo">527</span> }<a name="line.527"></a> <span class="sourceLineNo">528</span><a name="line.528"></a> -<span class="sourceLineNo">529</span> private final SaslClient saslClient;<a name="line.529"></a> +<span class="sourceLineNo">529</span> private static final class SaslUnwrapHandler extends SimpleChannelInboundHandler<ByteBuf> {<a name="line.529"></a> <span class="sourceLineNo">530</span><a name="line.530"></a> -<span class="sourceLineNo">531</span> public SaslUnwrapHandler(SaslClient saslClient) {<a name="line.531"></a> -<span class="sourceLineNo">532</span> this.saslClient = saslClient;<a name="line.532"></a> -<span class="sourceLineNo">533</span> }<a name="line.533"></a> -<span class="sourceLineNo">534</span><a name="line.534"></a> -<span class="sourceLineNo">535</span> @Override<a name="line.535"></a> -<span class="sourceLineNo">536</span> public void channelInactive(ChannelHandlerContext ctx) throws Exception {<a name="line.536"></a> -<span class="sourceLineNo">537</span> saslClient.dispose();<a name="line.537"></a> -<span class="sourceLineNo">538</span> }<a name="line.538"></a> -<span class="sourceLineNo">539</span><a name="line.539"></a> -<span class="sourceLineNo">540</span> @Override<a name="line.540"></a> -<span class="sourceLineNo">541</span> protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a name="line.541"></a> -<span class="sourceLineNo">542</span> msg.skipBytes(4);<a name="line.542"></a> -<span class="sourceLineNo">543</span> byte[] b = new byte[msg.readableBytes()];<a name="line.543"></a> -<span class="sourceLineNo">544</span> msg.readBytes(b);<a name="line.544"></a> -<span class="sourceLineNo">545</span> ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, b.length)));<a name="line.545"></a> -<span class="sourceLineNo">546</span> }<a name="line.546"></a> -<span class="sourceLineNo">547</span> }<a name="line.547"></a> -<span class="sourceLineNo">548</span><a name="line.548"></a> -<span class="sourceLineNo">549</span> private static final class SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.549"></a> +<span class="sourceLineNo">531</span> private final SaslClient saslClient;<a name="line.531"></a> +<span class="sourceLineNo">532</span><a name="line.532"></a> +<span class="sourceLineNo">533</span> public SaslUnwrapHandler(SaslClient saslClient) {<a name="line.533"></a> +<span class="sourceLineNo">534</span> this.saslClient = saslClient;<a name="line.534"></a> +<span class="sourceLineNo">535</span> }<a name="line.535"></a> +<span class="sourceLineNo">536</span><a name="line.536"></a> +<span class="sourceLineNo">537</span> @Override<a name="line.537"></a> +<span class="sourceLineNo">538</span> public void channelInactive(ChannelHandlerContext ctx) throws Exception {<a name="line.538"></a> +<span class="sourceLineNo">539</span> saslClient.dispose();<a name="line.539"></a> +<span class="sourceLineNo">540</span> }<a name="line.540"></a> +<span class="sourceLineNo">541</span><a name="line.541"></a> +<span class="sourceLineNo">542</span> @Override<a name="line.542"></a> +<span class="sourceLineNo">543</span> protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a name="line.543"></a> +<span class="sourceLineNo">544</span> msg.skipBytes(4);<a name="line.544"></a> +<span class="sourceLineNo">545</span> byte[] b = new byte[msg.readableBytes()];<a name="line.545"></a> +<span class="sourceLineNo">546</span> msg.readBytes(b);<a name="line.546"></a> +<span class="sourceLineNo">547</span> ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, b.length)));<a name="line.547"></a> +<span class="sourceLineNo">548</span> }<a name="line.548"></a> +<span class="sourceLineNo">549</span> }<a name="line.549"></a> <span class="sourceLineNo">550</span><a name="line.550"></a> -<span class="sourceLineNo">551</span> private final SaslClient saslClient;<a name="line.551"></a> +<span class="sourceLineNo">551</span> private static final class SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.551"></a> <span class="sourceLineNo">552</span><a name="line.552"></a> -<span class="sourceLineNo">553</span> private CompositeByteBuf cBuf;<a name="line.553"></a> +<span class="sourceLineNo">553</span> private final SaslClient saslClient;<a name="line.553"></a> <span class="sourceLineNo">554</span><a name="line.554"></a> -<span class="sourceLineNo">555</span> public SaslWrapHandler(SaslClient saslClient) {<a name="line.555"></a> -<span class="sourceLineNo">556</span> this.saslClient = saslClient;<a name="line.556"></a> -<span class="sourceLineNo">557</span> }<a name="line.557"></a> -<span class="sourceLineNo">558</span><a name="line.558"></a> -<span class="sourceLineNo">559</span> @Override<a name="line.559"></a> -<span class="sourceLineNo">560</span> public void handlerAdded(ChannelHandlerContext ctx) throws Exception {<a name="line.560"></a> -<span class="sourceLineNo">561</span> cBuf = new CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.561"></a> -<span class="sourceLineNo">562</span> }<a name="line.562"></a> -<span class="sourceLineNo">563</span><a name="line.563"></a> -<span class="sourceLineNo">564</span> @Override<a name="line.564"></a> -<span class="sourceLineNo">565</span> public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a name="line.565"></a> -<span class="sourceLineNo">566</span> throws Exception {<a name="line.566"></a> -<span class="sourceLineNo">567</span> if (msg instanceof ByteBuf) {<a name="line.567"></a> -<span class="sourceLineNo">568</span> ByteBuf buf = (ByteBuf) msg;<a name="line.568"></a> -<span class="sourceLineNo">569</span> cBuf.addComponent(buf);<a name="line.569"></a> -<span class="sourceLineNo">570</span> cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a name="line.570"></a> -<span class="sourceLineNo">571</span> } else {<a name="line.571"></a> -<span class="sourceLineNo">572</span> ctx.write(msg);<a name="line.572"></a> -<span class="sourceLineNo">573</span> }<a name="line.573"></a> -<span class="sourceLineNo">574</span> }<a name="line.574"></a> -<span class="sourceLineNo">575</span><a name="line.575"></a> -<span class="sourceLineNo">576</span> @Override<a name="line.576"></a> -<span class="sourceLineNo">577</span> public void flush(ChannelHandlerContext ctx) throws Exception {<a name="line.577"></a> -<span class="sourceLineNo">578</span> if (cBuf.isReadable()) {<a name="line.578"></a> -<span class="sourceLineNo">579</span> byte[] b = new byte[cBuf.readableBytes()];<a name="line.579"></a> -<span class="sourceLineNo">580</span> cBuf.readBytes(b);<a name="line.580"></a> -<span class="sourceLineNo">581</span> cBuf.discardReadComponents();<a name="line.581"></a> -<span class="sourceLineNo">582</span> byte[] wrapped = saslClient.wrap(b, 0, b.length);<a name="line.582"></a> -<span class="sourceLineNo">583</span> ByteBuf buf = ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.583"></a> -<span class="sourceLineNo">584</span> buf.writeInt(wrapped.length);<a name="line.584"></a> -<span class="sourceLineNo">585</span> buf.writeBytes(wrapped);<a name="line.585"></a> -<span class="sourceLineNo">586</span> ctx.write(buf);<a name="line.586"></a> -<span class="sourceLineNo">587</span> }<a name="line.587"></a> -<span class="sourceLineNo">588</span> ctx.flush();<a name="line.588"></a> -<span class="sourceLineNo">589</span> }<a name="line.589"></a> -<span class="sourceLineNo">590</span><a name="line.590"></a> -<span class="sourceLineNo">591</span> @Override<a name="line.591"></a> -<span class="sourceLineNo">592</span> public void close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a name="line.592"></a> -<span class="sourceLineNo">593</span> cBuf.release();<a name="line.593"></a> -<span class="sourceLineNo">594</span> cBuf = null;<a name="line.594"></a> -<span class="sourceLineNo">595</span> }<a name="line.595"></a> -<span class="sourceLineNo">596</span> }<a name="line.596"></a> -<span class="sourceLineNo">597</span><a name="line.597"></a> -<span class="sourceLineNo">598</span> private static final class DecryptHandler extends SimpleChannelInboundHandler<ByteBuf> {<a name="line.598"></a> +<span class="sourceLineNo">555</span> private CompositeByteBuf cBuf;<a name="line.555"></a> +<span class="sourceLineNo">556</span><a name="line.556"></a> +<span class="sourceLineNo">557</span> public SaslWrapHandler(SaslClient saslClient) {<a name="line.557"></a> +<span class="sourceLineNo">558</span> this.saslClient = saslClient;<a name="line.558"></a> +<span class="sourceLineNo">559</span> }<a name="line.559"></a> +<span class="sourceLineNo">560</span><a name="line.560"></a> +<span class="sourceLineNo">561</span> @Override<a name="line.561"></a> +<span class="sourceLineNo">562</span> public void handlerAdded(ChannelHandlerContext ctx) throws Exception {<a name="line.562"></a> +<span class="sourceLineNo">563</span> cBuf = new CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.563"></a> +<span class="sourceLineNo">564</span> }<a name="line.564"></a> +<span class="sourceLineNo">565</span><a name="line.565"></a> +<span class="sourceLineNo">566</span> @Override<a name="line.566"></a> +<span class="sourceLineNo">567</span> public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a name="line.567"></a> +<span class="sourceLineNo">568</span> throws Exception {<a name="line.568"></a> +<span class="sourceLineNo">569</span> if (msg instanceof ByteBuf) {<a name="line.569"></a> +<span class="sourceLineNo">570</span> ByteBuf buf = (ByteBuf) msg;<a name="line.570"></a> +<span class="sourceLineNo">571</span> cBuf.addComponent(buf);<a name="line.571"></a> +<span class="sourceLineNo">572</span> cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a name="line.572"></a> +<span class="sourceLineNo">573</span> } else {<a name="line.573"></a> +<span class="sourceLineNo">574</span> ctx.write(msg);<a name="line.574"></a> +<span class="sourceLineNo">575</span> }<a name="line.575"></a> +<span class="sourceLineNo">576</span> }<a name="line.576"></a> +<span class="sourceLineNo">577</span><a name="line.577"></a> +<span class="sourceLineNo">578</span> @Override<a name="line.578"></a> +<span class="sourceLineNo">579</span> public void flush(ChannelHandlerContext ctx) throws Exception {<a name="line.579"></a> +<span class="sourceLineNo">580</span> if (cBuf.isReadable()) {<a name="line.580"></a> +<span class="sourceLineNo">581</span> byte[] b = new byte[cBuf.readableBytes()];<a name="line.581"></a> +<span class="sourceLineNo">582</span> cBuf.readBytes(b);<a name="line.582"></a> +<span class="sourceLineNo">583</span> cBuf.discardReadComponents();<a name="line.583"></a> +<span class="sourceLineNo">584</span> byte[] wrapped = saslClient.wrap(b, 0, b.length);<a name="line.584"></a> +<span class="sourceLineNo">585</span> ByteBuf buf = ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.585"></a> +<span class="sourceLineNo">586</span> buf.writeInt(wrapped.length);<a name="line.586"></a> +<span class="sourceLineNo">587</span> buf.writeBytes(wrapped);<a name="line.587"></a> +<span class="sourceLineNo">588</span> ctx.write(buf);<a name="line.588"></a> +<span class="sourceLineNo">589</span> }<a name="line.589"></a> +<span class="sourceLineNo">590</span> ctx.flush();<a name="line.590"></a> +<span class="sourceLineNo">591</span> }<a name="line.591"></a> +<span class="sourceLineNo">592</span><a name="line.592"></a> +<span class="sourceLineNo">593</span> @Override<a name="line.593"></a> +<span class="sourceLineNo">594</span> public void close(ChannelHandlerContext ctx, ChannelPromise promise) throws Exception {<a name="line.594"></a> +<span class="sourceLineNo">595</span> cBuf.release();<a name="line.595"></a> +<span class="sourceLineNo">596</span> cBuf = null;<a name="line.596"></a> +<span class="sourceLineNo">597</span> }<a name="line.597"></a> +<span class="sourceLineNo">598</span> }<a name="line.598"></a> <span class="sourceLineNo">599</span><a name="line.599"></a> -<span class="sourceLineNo">600</span> private final Decryptor decryptor;<a name="line.600"></a> +<span class="sourceLineNo">600</span> private static final class DecryptHandler extends SimpleChannelInboundHandler<ByteBuf> {<a name="line.600"></a> <span class="sourceLineNo">601</span><a name="line.601"></a> -<span class="sourceLineNo">602</span> public DecryptHandler(CryptoCodec codec, byte[] key, byte[] iv)<a name="line.602"></a> -<span class="sourceLineNo">603</span> throws GeneralSecurityException, IOException {<a name="line.603"></a> -<span class="sourceLineNo">604</span> this.decryptor = codec.createDecryptor();<a name="line.604"></a> -<span class="sourceLineNo">605</span> this.decryptor.init(key, Arrays.copyOf(iv, iv.length));<a name="line.605"></a> -<span class="sourceLineNo">606</span> }<a name="line.606"></a> -<span class="sourceLineNo">607</span><a name="line.607"></a> -<span class="sourceLineNo">608</span> @Override<a name="line.608"></a> -<span class="sourceLineNo">609</span> protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a name="line.609"></a> -<span class="sourceLineNo">610</span> ByteBuf inBuf;<a name="line.610"></a> -<span class="sourceLineNo">611</span> boolean release = false;<a name="line.611"></a> -<span class="sourceLineNo">612</span> if (msg.nioBufferCount() == 1) {<a name="line.612"></a> -<span class="sourceLineNo">613</span> inBuf = msg;<a name="line.613"></a> -<span class="sourceLineNo">614</span> } else {<a name="line.614"></a> -<span class="sourceLineNo">615</span> inBuf = ctx.alloc().directBuffer(msg.readableBytes());<a name="line.615"></a> -<span class="sourceLineNo">616</span> msg.readBytes(inBuf);<a name="line.616"></a> -<span class="sourceLineNo">617</span> release = true;<a name="line.617"></a> -<span class="sourceLineNo">618</span> }<a name="line.618"></a> -<span class="sourceLineNo">619</span> ByteBuffer inBuffer = inBuf.nioBuffer();<a name="line.619"></a> -<span class="sourceLineNo">620</span> ByteBuf outBuf = ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.620"></a> -<span class="sourceLineNo">621</span> ByteBuffer outBuffer = outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.621"></a> -<span class="sourceLineNo">622</span> decryptor.decrypt(inBuffer, outBuffer);<a name="line.622"></a> -<span class="sourceLineNo">623</span> outBuf.writerIndex(inBuf.readableBytes());<a name="line.623"></a> -<span class="sourceLineNo">624</span> if (release) {<a name="line.624"></a> -<span class="sourceLineNo">625</span> inBuf.release();<a name="line.625"></a> -<span class="sourceLineNo">626</span> }<a name="line.626"></a> -<span class="sourceLineNo">627</span> ctx.fireChannelRead(outBuf);<a name="line.627"></a> -<span class="sourceLineNo">628</span> }<a name="line.628"></a> -<span class="sourceLineNo">629</span> }<a name="line.629"></a> -<span class="sourceLineNo">630</span><a name="line.630"></a> -<span class="sourceLineNo">631</span> private static final class EncryptHandler extends MessageToByteEncoder<ByteBuf> {<a name="line.631"></a> +<span class="sourceLineNo">602</span> private final Decryptor decryptor;<a name="line.602"></a> +<span class="sourceLineNo">603</span><a name="line.603"></a> +<span class="sourceLineNo">604</span> public DecryptHandler(CryptoCodec codec, byte[] key, byte[] iv)<a name="line.604"></a> +<span class="sourceLineNo">605</span> throws GeneralSecurityException, IOException {<a name="line.605"></a> +<span class="sourceLineNo">606</span> this.decryptor = codec.createDecryptor();<a name="line.606"></a> +<span class="sourceLineNo">607</span> this.decryptor.init(key, Arrays.copyOf(iv, iv.length));<a name="line.607"></a> +<span class="sourceLineNo">608</span> }<a name="line.608"></a> +<span class="sourceLineNo">609</span><a name="line.609"></a> +<span class="sourceLineNo">610</span> @Override<a name="line.610"></a> +<span class="sourceLineNo">611</span> protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a name="line.611"></a> +<span class="sourceLineNo">612</span> ByteBuf inBuf;<a name="line.612"></a> +<span class="sourceLineNo">613</span> boolean release = false;<a name="line.613"></a> +<span class="sourceLineNo">614</span> if (msg.nioBufferCount() == 1) {<a name="line.614"></a> +<span class="sourceLineNo">615</span> inBuf = msg;<a name="line.615"></a> +<span class="sourceLineNo">616</span> } else {<a name="line.616"></a> +<span class="sourceLineNo">617</span> inBuf = ctx.alloc().directBuffer(msg.readableBytes());<a name="line.617"></a> +<span class="sourceLineNo">618</span> msg.readBytes(inBuf);<a name="line.618"></a> +<span class="sourceLineNo">619</span> release = true;<a name="line.619"></a> +<span class="sourceLineNo">620</span> }<a name="line.620"></a> +<span class="sourceLineNo">621</span> ByteBuffer inBuffer = inBuf.nioBuffer();<a name="line.621"></a> +<span class="sourceLineNo">622</span> ByteBuf outBuf = ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.622"></a> +<span class="sourceLineNo">623</span> ByteBuffer outBuffer = outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.623"></a> +<span class="sourceLineNo">624</span> decryptor.decrypt(inBuffer, outBuffer);<a name="line.624"></a> +<span class="sourceLineNo">625</span> outBuf.writerIndex(inBuf.readableBytes());<a name="line.625"></a> +<span class="sourceLineNo">626</span> if (release) {<a name="line.626"></a> +<span class="sourceLineNo">627</span> inBuf.release();<a name="line.627"></a> +<span class="sourceLineNo">628</span> }<a name="line.628"></a> +<span class="sourceLineNo">629</span> ctx.fireChannelRead(outBuf);<a name="line.629"></a> +<span class="sourceLineNo">630</span> }<a name="line.630"></a> +<span class="sourceLineNo">631</span> }<a name="line.631"></a> <span class="sourceLineNo">632</span><a name="line.632"></a> -<span class="sourceLineNo">633</span> private final Encryptor encryptor;<a name="line.633"></a> +<span class="sourceLineNo">633</span> private static final class EncryptHandler extends MessageToByteEncoder<ByteBuf> {<a name="line.633"></a> <span class="sourceLineNo">634</span><a name="line.634"></a> -<span class="sourceLineNo">635</span> public EncryptHandler(CryptoCodec codec, byte[] key, byte[] iv)<a name="line.635"></a> -<span class="sourceLineNo">636</span> throws GeneralSecurityException, IOException {<a name="line.636"></a> -<span class="sourceLineNo">637</span> this.encryptor = codec.createEncryptor();<a name="line.637"></a> -<span class="sourceLineNo">638</span> this.encryptor.init(key, Arrays.copyOf(iv, iv.length));<a name="line.638"></a> -<span class="sourceLineNo">639</span> }<a name="line.639"></a> -<span class="sourceLineNo">640</span><a name="line.640"></a> -<span class="sourceLineNo">641</span> @Override<a name="line.641"></a> -<span class="sourceLineNo">642</span> protected ByteBuf allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a name="line.642"></a> -<span class="sourceLineNo">643</span> throws Exception {<a name="line.643"></a> -<span class="sourceLineNo">644</span> if (preferDirect) {<a name="line.644"></a> -<span class="sourceLineNo">645</span> return ctx.alloc().directBuffer(msg.readableBytes());<a name="line.645"></a> -<span class="sourceLineNo">646</span> } else {<a name="line.646"></a> -<span class="sourceLineNo">647</span> return ctx.alloc().buffer(msg.readableBytes());<a name="line.647"></a> -<span class="sourceLineNo">648</span> }<a name="line.648"></a> -<span class="sourceLineNo">649</span> }<a name="line.649"></a> -<span class="sourceLineNo">650</span><a name="line.650"></a> -<span class="sourceLineNo">651</span> @Override<a name="line.651"></a> -<span class="sourceLineNo">652</span> protected void encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception {<a name="line.652"></a> -<span class="sourceLineNo">653</span> ByteBuf inBuf;<a name="line.653"></a> -<span class="sourceLineNo">654</span> boolean release = false;<a name="line.654"></a> -<span class="sourceLineNo">655</span> if (msg.nioBufferCount() == 1) {<a name="line.655"></a> -<span class="sourceLineNo">656</span> inBuf = msg;<a name="line.656"></a> -<span class="sourceLineNo">657</span> } else {<a name="line.657"></a> -<span class="sourceLineNo">658</span> inBuf = ctx.alloc().directBuffer(msg.readableBytes());<a name="line.658"></a> -<span class="sourceLineNo">659</span> msg.readBytes(inBuf);<a name="line.659"></a> -<span class="sourceLineNo">660</span> release = true;<a name="line.660"></a> -<span class="sourceLineNo">661</span> }<a name="line.661"></a> -<span class="sourceLineNo">662</span> ByteBuffer inBuffer = inBuf.nioBuffer();<a name="line.662"></a> -<span class="sourceLineNo">663</span> ByteBuffer outBuffer = out.nioBuffer(0, inBuf.readableBytes());<a name="line.663"></a> -<span class="sourceLineNo">664</span> encryptor.encrypt(inBuffer, outBuffer);<a name="line.664"></a> -<span class="sourceLineNo">665</span> out.writerIndex(inBuf.readableBytes());<a name="line.665"></a> -<span class="sourceLineNo">666</span> if (release) {<a name="line.666"></a> -<span class="sourceLineNo">667</span> inBuf.release();<a name="line.667"></a> -<span class="sourceLineNo">668</span> }<a name="line.668"></a> -<span class="sourceLineNo">669</span> }<a name="line.669"></a> -<span class="sourceLineNo">670</span> }<a name="line.670"></a> -<span class="sourceLineNo">671</span><a name="line.671"></a> -<span class="sourceLineNo">672</span> private static String getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a name="line.672"></a> -<span class="sourceLineNo">673</span> return encryptionKey.keyId + NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a name="line.673"></a> -<span class="sourceLineNo">674</span> + new String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a name="line.674"></a> -<span class="sourceLineNo">675</span> }<a name="line.675"></a> -<span class="sourceLineNo">676</span><a name="line.676"></a> -<span class="sourceLineNo">677</span> private static char[] encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.677"></a> -<span class="sourceLineNo">678</span> return new String(Base64.encodeBase64(encryptionKey, false), Charsets.UTF_8).toCharArray();<a name="line.678"></a> -<span class="sourceLineNo">679</span> }<a name="line.679"></a> -<span class="sourceLineNo">680</span><a name="line.680"></a> -<span class="sourceLineNo">681</span> private static String buildUsername(Token<BlockTokenIdentifier> blockToken) {<a name="line.681"></a> -<span class="sourceLineNo">682</span> return new String(Base64.encodeBase64(blockToken.getIdentifier(), false), Charsets.UTF_8);<a name="line.682"></a> -<span class="sourceLineNo">683</span> }<a name="line.683"></a> -<span class="sourceLineNo">684</span><a name="line.684"></a> -<span class="sourceLineNo">685</span> private static char[] buildClientPassword(Token<BlockTokenIdentifier> blockToken) {<a name="line.685"></a> -<span class="sourceLineNo">686</span> return new String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a name="line.686"></a> -<span class="sourceLineNo">687</span> .toCharArray();<a name="line.687"></a> -<span class="sourceLineNo">688</span> }<a name="line.688"></a> -<span class="sourceLineNo">689</span><a name="line.689"></a> -<span class="sourceLineNo">690</span> private static Map<String, String> createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a name="line.690"></a> -<span class="sourceLineNo">691</span> Map<String, String> saslProps = Maps.newHashMapWithExpectedSize(3);<a name="line.691"></a> -<span class="sourceLineNo">692</span> saslProps.put(Sasl.QOP, QualityOfProtection.PRIVACY.getSaslQop());<a name="line.692"></a> -<span class="sourceLineNo">693</span> saslProps.put(Sasl.SERVER_AUTH, "true");<a name="line.693"></a> -<span class="sourceLineNo">694</span> saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a name="line.694"></a> -<span class="sourceLineNo">695</span> return saslProps;<a name="line.695"></a> -<span class="sourceLineNo">696</span> }<a name="line.696"></a> -<span class="sourceLineNo">697</span><a name="line.697"></a> -<span class="sourceLineNo">698</span> private static void doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a name="line.698"></a> -<span class="sourceLineNo">699</span> String username, char[] password, Map<String, String> saslProps, Promise<Void> saslPromise) {<a name="line.699"></a> -<span class="sourceLineNo">700</span> try {<a name="line.700"></a> -<span class="sourceLineNo">701</span> channel.pipeline().addLast(new IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.701"></a> -<span class="sourceLineNo">702</span> new ProtobufVarint32FrameDecoder(),<a name="line.702"></a> -<span class="sourceLineNo">703</span> new ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a name="line.703"></a> -<span class="sourceLineNo">704</span> new SaslNegotiateHandler(conf, username, password, saslProps, timeoutMs, saslPromise));<a name="line.704"></a> -<span class="sourceLineNo">705</span> } catch (SaslException e) {<a name="line.705"></a> -<span class="sourceLineNo">706</span> saslPromise.tryFailure(e);<a name="line.706"></a> -<span class="sourceLineNo">707</span> }<a name="line.707"></a> -<span class="sourceLineNo">708</span> }<a name="line.708"></a> -<span class="sourceLineNo">709</span><a name="line.709"></a> -<span class="sourceLineNo">710</span> static void trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a name="line.710"></a> -<span class="sourceLineNo">711</span> int timeoutMs, DFSClient client, Token<BlockTokenIdentifier> accessToken,<a name="line.711"></a> -<span class="sourceLineNo">712</span> Promise<Void> saslPromise) throws IOException {<a name="line.712"></a> -<span class="sourceLineNo">713</span> SaslDataTransferClient saslClient = client.getSaslDataTransferClient();<a name="line.713"></a> -<span class="sourceLineNo">714</span> SaslPropertiesResolver saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a name="line.714"></a> -<span class="sourceLineNo">715</span> TrustedChannelResolver trustedChannelResolver =<a name="line.715"></a> -<span class="sourceLineNo">716</span> SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.716"></a> -<span class="sourceLineNo">717</span> AtomicBoolean fallbackToSimpleAuth = SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.717"></a> -<span class="sourceLineNo">718</span> InetAddress addr = ((InetSocketAddress) channel.remoteAddress()).getAddress();<a name="line.718"></a> -<span class="sourceLineNo">719</span> if (trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) {<a name="line.719"></a> -<span class="sourceLineNo">720</span> saslPromise.trySuccess(null);<a name="line.720"></a> -<span class="sourceLineNo">721</span> return;<a name="line.721"></a> -<span class="sourceLineNo">722</span> }<a name="line.722"></a> -<span class="sourceLineNo">723</span> DataEncryptionKey encryptionKey = client.newDataEncryptionKey();<a name="line.723"></a> -<span class="sourceLineNo">724</span> if (encryptionKey != null) {<a name="line.724"></a> -<span class="sourceLineNo">725</span> if (LOG.isDebugEnabled()) {<a name="line.725"></a> -<span class="sourceLineNo">726</span> LOG.debug(<a name="line.726"></a> -<span class="sourceLineNo">727</span> "SASL client doing encrypted handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.727"></a> -<span class="sourceLineNo">728</span> }<a name="line.728"></a> -<span class="sourceLineNo">729</span> doSaslNegotiation(conf, channel, timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.729"></a> -<span class="sourceLineNo">730</span> encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.730"></a> -<span class="sourceLineNo">731</span> createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), saslPromise);<a name="line.731"></a> -<span class="sourceLineNo">732</span> } else if (!UserGroupInformation.isSecurityEnabled()) {<a name="line.732"></a> -<span class="sourceLineNo">733</span> if (LOG.isDebugEnabled()) {<a name="line.733"></a> -<span class="sourceLineNo">734</span> LOG.debug("SASL client skipping handshake in unsecured configuration for addr = " + addr<a name="line.734"></a> -<span class="sourceLineNo">735</span> + ", datanodeId = " + dnInfo);<a name="line.735"></a> -<span class="sourceLineNo">736</span> }<a name="line.736"></a> -<span class="sourceLineNo">737</span> saslPromise.trySuccess(null);<a name="line.737"></a> -<span class="sourceLineNo">738</span> } else if (dnInfo.getXferPort() < 1024) {<a name="line.738"></a> -<span class="sourceLineNo">739</span> if (LOG.isDebugEnabled()) {<a name="line.739"></a> -<span class="sourceLineNo">740</span> LOG.debug("SASL client skipping handshake in secured configuration with "<a name="line.740"></a> -<span class="sourceLineNo">741</span> + "privileged port for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.741"></a> -<span class="sourceLineNo">742</span> }<a name="line.742"></a> -<span class="sourceLineNo">743</span> saslPromise.trySuccess(null);<a name="line.743"></a> -<span class="sourceLineNo">744</span> } else if (fallbackToSimpleAuth != null && fallbackToSimpleAuth.get()) {<a name="line.744"></a> -<span class="sourceLineNo">745</span> if (LOG.isDebugEnabled()) {<a name="line.745"></a> -<span class="sourceLineNo">746</span> LOG.debug("SASL client skipping handshake in secured configuration with "<a name="line.746"></a> -<span class="sourceLineNo">747</span> + "unsecured cluster for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.747"></a> -<span class="sourceLineNo">748</span> }<a name="line.748"></a> -<span class="sourceLineNo">749</span> saslPromise.trySuccess(null);<a name="line.749"></a> -<span class="sourceLineNo">750</span> } else if (saslPropsResolver != null) {<a name="line.750"></a> -<span class="sourceLineNo">751</span> if (LOG.isDebugEnabled()) {<a name="line.751"></a> -<span class="sourceLineNo">752</span> LOG.debug(<a name="line.752"></a> -<span class="sourceLineNo">753</span> "SASL client doing general handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.753"></a> -<span class="sourceLineNo">754</span> }<a name="line.754"></a> -<span class="sourceLineNo">755</span> doSaslNegotiation(conf, channel, timeoutMs, buildUsername(accessToken),<a name="line.755"></a> -<span class="sourceLineNo">756</span> buildClientPassword(accessToken), saslPropsResolver.getClientProperties(addr), saslPromise);<a name="line.756"></a> -<span class="sourceLineNo">757</span> } else {<a name="line.757"></a> -<span class="sourceLineNo">758</span> // It's a secured cluster using non-privileged ports, but no SASL. The only way this can<a name="line.758"></a> -<span class="sourceLineNo">759</span> // happen is if the DataNode has ignore.secure.ports.for.testing configured, so this is a rare<a name="line.759"></a> -<span class="sourceLineNo">760</span> // edge case.<a name="line.760"></a> -<span class="sourceLineNo">761</span> if (LOG.isDebugEnabled()) {<a name="line.761"></a> -<span class="sourceLineNo">762</span> LOG.debug("SASL client skipping handshake in secured configuration with no SASL "<a name="line.762"></a> -<span class="sourceLineNo">763</span> + "protection configured for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.763"></a> -<span class="sourceLineNo">764</span> }<a name="line.764"></a> -<span class="sourceLineNo">765</span> saslPromise.trySuccess(null);<a name="line.765"></a> -<span class="sourceLineNo">766</span> }<a name="line.766"></a> -<span class="sourceLineNo">767</span> }<a name="line.767"></a> -<span class="sourceLineNo">768</span><a name="line.768"></a> -<span class="sourceLineNo">769</span> static Encryptor createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a name="line.769"></a> -<span class="sourceLineNo">770</span> throws IOException {<a name="line.770"></a> -<span class="sourceLineNo">771</span> FileEncryptionInfo feInfo = stat.getFileEncryptionInfo();<a name="line.771"></a> -<span class="sourceLineNo">772</span> if (feInfo == null) {<a name="line.772"></a> -<span class="sourceLineNo">773</span> return null;<a name="line.773"></a> -<span class="sourceLineNo">774</span> }<a name="line.774"></a> -<span class="sourceLineNo">775</span> return TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a name="line.775"></a> -<span class="sourceLineNo">776</span> }<a name="line.776"></a> -<span class="sourceLineNo">777</span>}<a name="line.777"></a> +<span class="sourceLineNo">635</span> private final Encryptor encryptor;<a name="line.635"></a> +<span class="sourceLineNo">636</span><a name="line.636"></a> +<span class="sourceLineNo">637</span> public EncryptHandler(CryptoCodec codec, byte[] key, byte[] iv)<a name="line.637"></a> +<span class="sourceLineNo">638</span> throws GeneralSecurityException, IOException {<a name="line.638"></a> +<span class="sourceLineNo">639</span> this.encryptor = codec.createEncryptor();<a name="line.639"></a> +<span class="sourceLineNo">640</span> this.encryptor.init(key, Arrays.copyOf(iv, iv.length));<a name="line.640"></a> +<span class="sourceLineNo">641</span> }<a name="line.641"></a> +<span class="sourceLineNo">642</span><a name="line.642"></a> +<span class="sourceLineNo">643</span> @Override<a name="line.643"></a> +<span class="sourceLineNo">644</span> protected ByteBuf allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a name="line.644"></a> +<span class="sourceLineNo">645</span> throws Exception {<a name="line.645"></a> +<span class="sourceLineNo">646</span> if (preferDirect) {<a name="line.646"></a> +<span class="sourceLineNo">647</span> return ctx.alloc().directBuffer(msg.readableBytes());<a name="line.647"></a> +<span class="sourceLineNo">648</span> } else {<a name="line.648"></a> +<span class="sourceLineNo">649</span> return ctx.alloc().buffer(msg.readableBytes());<a name="line.649"></a> +<span class="sourceLineNo">650</span> }<a name="line.650"></a> +<span class="sourceLineNo">651</span> }<a name="line.651"></a> +<span class="sourceLineNo">652</span><a name="line.652"></a> +<span class="sourceLineNo">653</span> @Override<a name="line.653"></a> +<span class="sourceLineNo">654</span> protected void encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception {<a name="line.654"></a> +<span class="sourceLineNo">655</span> ByteBuf inBuf;<a name="line.655"></a> +<span class="sourceLineNo">656</span> boolean release = false;<a name="line.656"></a> +<span class="sourceLineNo">657</span> if (msg.nioBufferCount() == 1) {<a name="line.657"></a> +<span class="sourceLineNo">658</span> inBuf = msg;<a name="line.658"></a> +<span class="sourceLineNo">659</span> } else {<a name="line.659"></a> +<span class="sourceLineNo">660</span> inBuf = ctx.alloc().directBuffer(msg.readableBytes());<a name="line.660"></a> +<span class="sourceLineNo">661</span> msg.readBytes(inBuf);<a name="line.661"></a> +<span class="sourceLineNo">662</span> release = true;<a name="line.662"></a> +<span class="sourceLineNo">663</span> }<a name="line.663"></a> +<span class="sourceLineNo">664</span> ByteBuffer inBuffer = inBuf.nioBuffer();<a name="line.664"></a> +<span class="sourceLineNo">665</span> ByteBuffer outBuffer = out.nioBuffer(0, inBuf.readableBytes());<a name="line.665"></a> +<span class="sourceLineNo">666</span> encryptor.encrypt(inBuffer, outBuffer);<a name="line.666"></a> +<span class="sourceLineNo">667</span> out.writerIndex(inBuf.readableBytes());<a name="line.667"></a> +<span class="sourceLineNo">668</span> if (release) {<a name="line.668"></a> +<span class="sourceLineNo">669</span> inBuf.release();<a name="line.669"></a> +<span class="sourceLineNo">670</span> }<a name="line.670"></a> +<span class="sourceLineNo">671</span> }<a name="line.671"></a> +<span class="sourceLineNo">672</span> }<a name="line.672"></a> +<span class="sourceLineNo">673</span><a name="line.673"></a> +<span class="sourceLineNo">674</span> private static String getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a name="line.674"></a> +<span class="sourceLineNo">675</span> return encryptionKey.keyId + NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a name="line.675"></a> +<span class="sourceLineNo">676</span> + new String(Base64.encodeBase64(encryptionKey.nonce, false), Charsets.UTF_8);<a name="line.676"></a> +<span class="sourceLineNo">677</span> }<a name="line.677"></a> +<span class="sourceLineNo">678</span><a name="line.678"></a> +<span class="sourceLineNo">679</span> private static char[] encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.679"></a> +<span class="sourceLineNo">680</span> return new String(Base64.encodeBase64(encryptionKey, false), Charsets.UTF_8).toCharArray();<a name="line.680"></a> +<span class="sourceLineNo">681</span> }<a name="line.681"></a> +<span class="sourceLineNo">682</span><a name="line.682"></a> +<span class="sourceLineNo">683</span> private static String buildUsername(Token<BlockTokenIdentifier> blockToken) {<a name="line.683"></a> +<span class="sourceLineNo">684</span> return new String(Base64.encodeBase64(blockToken.getIdentifier(), false), Charsets.UTF_8);<a name="line.684"></a> +<span class="sourceLineNo">685</span> }<a name="line.685"></a> +<span class="sourceLineNo">686</span><a name="line.686"></a> +<span class="sourceLineNo">687</span> private static char[] buildClientPassword(Token<BlockTokenIdentifier> blockToken) {<a name="line.687"></a> +<span class="sourceLineNo">688</span> return new String(Base64.encodeBase64(blockToken.getPassword(), false), Charsets.UTF_8)<a name="line.688"></a> +<span class="sourceLineNo">689</span> .toCharArray();<a name="line.689"></a> +<span class="sourceLineNo">690</span> }<a name="line.690"></a> +<span class="sourceLineNo">691</span><a name="line.691"></a> +<span class="sourceLineNo">692</span> private static Map<String, String> createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a name="line.692"></a> +<span class="sourceLineNo">693</span> Map<String, String> saslProps = Maps.newHashMapWithExpectedSize(3);<a name="line.693"></a> +<span class="sourceLineNo">694</span> saslProps.put(Sasl.QOP, QualityOfProtection.PRIVACY.getSaslQop());<a name="line.694"></a> +<span class="sourceLineNo">695</span> saslProps.put(Sasl.SERVER_AUTH, "true");<a name="line.695"></a> +<span class="sourceLineNo">696</span> saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a name="line.696"></a> +<span class="sourceLineNo">697</span> return saslProps;<a name="line.697"></a> +<span class="sourceLineNo">698</span> }<a name="line.698"></a> +<span class="sourceLineNo">699</span><a name="line.699"></a> +<span class="sourceLineNo">700</span> private static void doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a name="line.700"></a> +<span class="sourceLineNo">701</span> String username, char[] password, Map<String, String> saslProps, Promise<Void> saslPromise) {<a name="line.701"></a> +<span class="sourceLineNo">702</span> try {<a name="line.702"></a> +<span class="sourceLineNo">703</span> channel.pipeline().addLast(new IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.703"></a> +<span class="sourceLineNo">704</span> new ProtobufVarint32FrameDecoder(),<a name="line.704"></a> +<span class="sourceLineNo">705</span> new ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a name="line.705"></a> +<span class="sourceLineNo">706</span> new SaslNegotiateHandler(conf, username, password, saslProps, timeoutMs, saslPromise));<a name="line.706"></a> +<span class="sourceLineNo">707</span> } catch (SaslException e) {<a name="line.707"></a> +<span class="sourceLineNo">708</span> saslPromise.tryFailure(e);<a name="line.708"></a> +<span class="sourceLineNo">709</span> }<a name="line.709"></a> +<span class="sourceLineNo">710</span> }<a name="line.710"></a> +<span class="sourceLineNo">711</span><a name="line.711"></a> +<span class="sourceLineNo">712</span> static void trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a name="line.712"></a> +<span class="sourceLineNo">713</span> int timeoutMs, DFSClient client, Token<BlockTokenIdentifier> accessToken,<a name="line.713"></a> +<span class="sourceLineNo">714</span> Promise<Void> saslPromise) throws IOException {<a name="line.714"></a> +<span class="sourceLineNo">715</span> SaslDataTransferClient saslClient = client.getSaslDataTransferClient();<a name="line.715"></a> +<span class="sourceLineNo">716</span> SaslPropertiesResolver saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a name="line.716"></a> +<span class="sourceLineNo">717</span> TrustedChannelResolver trustedChannelResolver =<a name="line.717"></a> +<span class="sourceLineNo">718</span> SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.718"></a> +<span class="sourceLineNo">719</span> AtomicBoolean fallbackToSimpleAuth = SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.719"></a> +<span class="sourceLineNo">720</span> InetAddress addr = ((InetSocketAddress) channel.remoteAddress()).getAddress();<a name="line.720"></a> +<span class="sourceLineNo">721</span> if (trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) {<a name="line.721"></a> +<span class="sourceLineNo">722</span> saslPromise.trySuccess(null);<a name="line.722"></a> +<span class="sourceLineNo">723</span> return;<a name="line.723"></a> +<span class="sourceLineNo">724</span> }<a name="line.724"></a> +<span class="sourceLineNo">725</span> DataEncryptionKey encryptionKey = client.newDataEncryptionKey();<a name="line.725"></a> +<span class="sourceLineNo">726</span> if (encryptionKey != null) {<a name="line.726"></a> +<span class="sourceLineNo">727</span> if (LOG.isDebugEnabled()) {<a name="line.727"></a> +<span class="sourceLineNo">728</span> LOG.debug(<a name="line.728"></a> +<span class="sourceLineNo">729</span> "SASL client doing encrypted handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.729"></a> +<span class="sourceLineNo">730</span> }<a name="line.730"></a> +<span class="sourceLineNo">731</span> doSaslNegotiation(conf, channel, timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.731"></a> +<span class="sourceLineNo">732</span> encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.732"></a> +<span class="sourceLineNo">733</span> createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), saslPromise);<a name="line.733"></a> +<span class="sourceLineNo">734</span> } else if (!UserGroupInformation.isSecurityEnabled()) {<a name="line.734"></a> +<span class="sourceLineNo">735</span> if (LOG.isDebugEnabled()) {<a name="line.735"></a> +<span class="sourceLineNo">736</span> LOG.debug("SASL client skipping handshake in unsecured configuration for addr = " + addr<a name="line.736"></a> +<span class="sourceLineNo">737</span> + ", datanodeId = " + dnInfo);<a name="line.737"></a> +<span class="sourceLineNo">738</span> }<a name="line.738"></a> +<span class="sourceLineNo">739</span> saslPromise.trySuccess(null);<a name="line.739"></a> +<span class="sourceLineNo">740</span> } else if (dnInfo.getXferPort() < 1024) {<a name="line.740"></a> +<span class="sourceLineNo">741</span> if (LOG.isDebugEnabled()) {<a name="line.741"></a> +<span class="sourceLineNo">742</span> LOG.debug("SASL client skipping handshake in secured configuration with "<a name="line.742"></a> +<span class="sourceLineNo">743</span> + "privileged port for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.743"></a> +<span class="sourceLineNo">744</span> }<a name="line.744"></a> +<span class="sourceLineNo">745</span> saslPromise.trySuccess(null);<a name="line.745"></a> +<span class="sourceLineNo">746</span> } else if (fallbackToSimpleAuth != null && fallbackToSimpleAuth.get()) {<a name="line.746"></a> +<span class="sourceLineNo">747</span> if (LOG.isDebugEnabled()) {<a name="line.747"></a> +<span class="sourceLineNo">748</span> LOG.debug("SASL client skipping handshake in secured configuration with "<a name="line.748"></a> +<span class="sourceLineNo">749</span> + "unsecured cluster for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.749"></a> +<span class="sourceLineNo">750</span> }<a name="line.750"></a> +<span class="sourceLineNo">751</span> saslPromise.trySuccess(null);<a name="line.751"></a> +<span class="sourceLineNo">752</span> } else if (saslPropsResolver != null) {<a name="line.752"></a> +<span class="sourceLineNo">753</span> if (LOG.isDebugEnabled()) {<a name="line.753"></a> +<span class="sourceLineNo">754</span> LOG.debug(<a name="line.754"></a> +<span class="sourceLineNo">755</span> "SASL client doing general handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.755"></a> +<span class="sourceLineNo">756</span> }<a name="line.756"></a> +<span class="sourceLineNo">757</span> doSaslNegotiation(conf, channel, timeoutMs, buildUsername(accessToken),<a name="line.757"></a> +<span class="sourceLineNo">758</span> buildClientPassword(accessToken), saslPropsResolver.getClientProperties(addr), saslPromise);<a name="line.758"></a> +<span class="sourceLineNo">759</span> } else {<a name="line.759"></a> +<span class="sourceLineNo">760</span> // It's a secured cluster using non-privileged ports, but no SASL. The only way this can<a name="line.760"></a> +<span class="sourceLineNo">761</span> // happen is if the DataNode has ignore.secure.ports.for.testing configured, so this is a rare<a name="line.761"></a> +<span class="sourceLineNo">762</span> // edge case.<a name="line.762"></a> +<span class="sourceLineNo">763</span> if (LOG.isDebugEnabled()) {<a name="line.763"></a> +<span class="sourceLineNo">764</span> LOG.debug("SASL client skipping handshake in secured configuration with no SASL "<a name="line.764"></a> +<span class="sourceLineNo">765</span> + "protection configured for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.765"></a> +<span class="sourceLineNo">766</span> }<a name="line.766"></a> +<span class="sourceLineNo">767</span> saslPromise.trySuccess(null);<a name="line.767"></a> +<span class="sourceLineNo">768</span> }<a name="line.768"></a> +<span class="sourceLineNo">769</span> }<a name="line.769"></a> +<span class="sourceLineNo">770</span><a name="line.770"></a> +<span class="sourceLineNo">771</span> static Encryptor createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a name="line.771"></a> +<span class="sourceLineNo">772</span> throws IOException {<a name="line.772"></a> +<span class="sourceLineNo">773</span> FileEncryptionInfo feInfo = stat.getFileEncryptionInfo();<a name="line.773"></a> +<span class="sourceLineNo">774</span> if (feInfo == null) {<a name="line.774"></a> +<span class="sourceLineNo">775</span> return null;<a name="line.775"></a> +<span class="sourceLineNo">776</span> }<a name="line.776"></a> +<span class="sourceLineNo">777</span> return TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a name="line.777"></a> +<span class="sourceLineNo">778</span> }<a name="line.778"></a> +<span class="sourceLineNo">779</span>}<a name="line.779"></a>