Github user sohami commented on a diff in the pull request: https://github.com/apache/drill/pull/1040#discussion_r158135221 --- Diff: exec/java-exec/src/main/java/org/apache/drill/exec/server/rest/auth/SpnegoUtil.java --- @@ -0,0 +1,115 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * <p> + * http://www.apache.org/licenses/LICENSE-2.0 + * <p> + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + + +package org.apache.drill.exec.server.rest.auth; + +import com.google.common.base.Preconditions; +import org.apache.drill.common.config.DrillConfig; +import org.apache.drill.common.exceptions.DrillException; +import org.apache.drill.exec.ExecConstants; +import org.apache.hadoop.conf.Configuration; +import org.apache.hadoop.fs.CommonConfigurationKeys; +import org.apache.hadoop.security.UserGroupInformation; + +public class SpnegoUtil { + + private UserGroupInformation loggedInUgi; + + //private String realm; + + private String principal; + + private String keytab; + + public SpnegoUtil(DrillConfig config) { + + keytab = config.hasPath(ExecConstants.HTTP_SPNEGO_KEYTAB) ? + config.getString(ExecConstants.HTTP_SPNEGO_KEYTAB) : + null; + + principal = config.hasPath(ExecConstants.HTTP_SPNEGO_PRINCIPAL) ? + config.getString(ExecConstants.HTTP_SPNEGO_PRINCIPAL) : + null; + } + + //Reads the SPNEGO principal from the config file + public String getSpnegoPrincipal() { + return principal; + } + + public void validateSpnegoConfig() throws DrillException { + + StringBuilder errorMsg = new StringBuilder(); + + if (principal != null && keytab != null) { + return; + } + + if (principal == null) { + errorMsg.append("\nConfiguration "); + errorMsg.append(ExecConstants.HTTP_SPNEGO_PRINCIPAL); + errorMsg.append(" is not found"); + } + + if (keytab == null) { + errorMsg.append("\nConfiguration "); + errorMsg.append(ExecConstants.HTTP_SPNEGO_KEYTAB); + errorMsg.append(" is not found"); + } + + throw new DrillException(errorMsg.toString()); + } + + //Performs the Server login to KDC for SPNEGO + private UserGroupInformation loginAndReturnUgi() throws DrillException { + + validateSpnegoConfig(); + + UserGroupInformation ugi; + try { + // Check if security is not enabled and try to set the security parameter to login the principal. + // After the login is performed reset the static UGI state. + if (!UserGroupInformation.isSecurityEnabled()) { + final Configuration newConfig = new Configuration(); + newConfig.set(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION, + UserGroupInformation.AuthenticationMethod.KERBEROS.toString()); + + UserGroupInformation.setConfiguration(newConfig); + ugi = UserGroupInformation.loginUserFromKeytabAndReturnUGI(principal, keytab); + + // Reset the original configuration for static UGI + UserGroupInformation.setConfiguration(new Configuration()); --- End diff -- There is no concurrency issue here since this will be called only once during WebServer setup time.
---