| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.hadoop.hdfs.web; |
| |
| import java.io.IOException; |
| import java.net.URI; |
| import java.net.URL; |
| |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.fs.CommonConfigurationKeys; |
| import org.apache.hadoop.fs.FileSystem; |
| import org.apache.hadoop.fs.Path; |
| import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier; |
| import org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenSecretManager; |
| import org.apache.hadoop.hdfs.server.namenode.FSNamesystem; |
| import org.apache.hadoop.hdfs.web.resources.DelegationParam; |
| import org.apache.hadoop.hdfs.web.resources.TokenArgumentParam; |
| import org.apache.hadoop.hdfs.web.resources.HttpOpParam; |
| import org.apache.hadoop.hdfs.web.resources.PutOpParam; |
| import org.apache.hadoop.io.Text; |
| import org.apache.hadoop.security.SecurityUtilTestHelper; |
| import org.apache.hadoop.security.UserGroupInformation; |
| import org.apache.hadoop.security.token.Token; |
| import org.apache.hadoop.security.token.TokenIdentifier; |
| import org.junit.Assert; |
| import org.junit.Test; |
| |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertNotNull; |
| import static org.junit.Assert.assertNull; |
| import static org.mockito.Mockito.mock; |
| |
| public class TestWebHdfsUrl { |
| |
| @Test |
| public void testDelegationTokenInUrl() throws IOException { |
| Configuration conf = new Configuration(); |
| final String uri = WebHdfsFileSystem.SCHEME + "://" + "127.0.0.1:9071"; |
| // Turn on security |
| conf.set(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION, "kerberos"); |
| UserGroupInformation.setConfiguration(conf); |
| UserGroupInformation ugi = UserGroupInformation.getCurrentUser(); |
| DelegationTokenIdentifier dtId = new DelegationTokenIdentifier(new Text( |
| ugi.getUserName()), null, null); |
| FSNamesystem namesystem = mock(FSNamesystem.class); |
| DelegationTokenSecretManager dtSecretManager = new DelegationTokenSecretManager( |
| 86400000, 86400000, 86400000, 86400000, namesystem); |
| dtSecretManager.startThreads(); |
| Token<DelegationTokenIdentifier> token = new Token<DelegationTokenIdentifier>( |
| dtId, dtSecretManager); |
| token.setService(new Text("127.0.0.1:9071")); |
| token.setKind(WebHdfsFileSystem.TOKEN_KIND); |
| ugi.addToken(token); |
| final WebHdfsFileSystem webhdfs = (WebHdfsFileSystem) FileSystem.get( |
| URI.create(uri), conf); |
| String tokenString = token.encodeToUrlString(); |
| Path fsPath = new Path("/"); |
| URL renewTokenUrl = webhdfs.toUrl(PutOpParam.Op.RENEWDELEGATIONTOKEN, |
| fsPath, new TokenArgumentParam(tokenString)); |
| URL cancelTokenUrl = webhdfs.toUrl(PutOpParam.Op.CANCELDELEGATIONTOKEN, |
| fsPath, new TokenArgumentParam(tokenString)); |
| Assert.assertEquals( |
| generateUrlQueryPrefix(PutOpParam.Op.RENEWDELEGATIONTOKEN, |
| ugi.getUserName()) |
| + "&token=" + tokenString, renewTokenUrl.getQuery()); |
| Token<DelegationTokenIdentifier> delegationToken = new Token<DelegationTokenIdentifier>( |
| token); |
| delegationToken.setKind(WebHdfsFileSystem.TOKEN_KIND); |
| Assert.assertEquals( |
| generateUrlQueryPrefix(PutOpParam.Op.CANCELDELEGATIONTOKEN, |
| ugi.getUserName()) |
| + "&token=" |
| + tokenString |
| + "&" |
| + DelegationParam.NAME |
| + "=" |
| + delegationToken.encodeToUrlString(), cancelTokenUrl.getQuery()); |
| } |
| |
| private String generateUrlQueryPrefix(HttpOpParam.Op op, String username) { |
| return "op=" + op.toString() + "&user.name=" + username; |
| } |
| |
| @Test |
| public void testSelectHdfsDelegationToken() throws Exception { |
| SecurityUtilTestHelper.setTokenServiceUseIp(true); |
| |
| Configuration conf = new Configuration(); |
| conf.setClass("fs.webhdfs.impl", MyWebHdfsFileSystem.class, FileSystem.class); |
| |
| // test with implicit default port |
| URI fsUri = URI.create("webhdfs://localhost"); |
| MyWebHdfsFileSystem fs = (MyWebHdfsFileSystem) FileSystem.get(fsUri, conf); |
| checkTokenSelection(fs, conf); |
| |
| // test with explicit default port |
| fsUri = URI.create("webhdfs://localhost:"+fs.getDefaultPort()); |
| fs = (MyWebHdfsFileSystem) FileSystem.get(fsUri, conf); |
| checkTokenSelection(fs, conf); |
| |
| // test with non-default port |
| fsUri = URI.create("webhdfs://localhost:"+(fs.getDefaultPort()-1)); |
| fs = (MyWebHdfsFileSystem) FileSystem.get(fsUri, conf); |
| checkTokenSelection(fs, conf); |
| |
| } |
| |
| private void checkTokenSelection(MyWebHdfsFileSystem fs, |
| Configuration conf) throws IOException { |
| int port = fs.getCanonicalUri().getPort(); |
| // can't clear tokens from ugi, so create a new user everytime |
| UserGroupInformation ugi = |
| UserGroupInformation.createUserForTesting(fs.getUri().getAuthority(), new String[]{}); |
| |
| // use ip-based tokens |
| SecurityUtilTestHelper.setTokenServiceUseIp(true); |
| |
| // test fallback to hdfs token |
| Token<?> hdfsToken = new Token<TokenIdentifier>( |
| new byte[0], new byte[0], |
| DelegationTokenIdentifier.HDFS_DELEGATION_KIND, |
| new Text("127.0.0.1:8020")); |
| ugi.addToken(hdfsToken); |
| |
| // test fallback to hdfs token |
| Token<?> token = fs.selectDelegationToken(ugi); |
| assertNotNull(token); |
| assertEquals(hdfsToken, token); |
| |
| // test webhdfs is favored over hdfs |
| Token<?> webHdfsToken = new Token<TokenIdentifier>( |
| new byte[0], new byte[0], |
| WebHdfsFileSystem.TOKEN_KIND, new Text("127.0.0.1:"+port)); |
| ugi.addToken(webHdfsToken); |
| token = fs.selectDelegationToken(ugi); |
| assertNotNull(token); |
| assertEquals(webHdfsToken, token); |
| |
| // switch to using host-based tokens, no token should match |
| SecurityUtilTestHelper.setTokenServiceUseIp(false); |
| token = fs.selectDelegationToken(ugi); |
| assertNull(token); |
| |
| // test fallback to hdfs token |
| hdfsToken = new Token<TokenIdentifier>( |
| new byte[0], new byte[0], |
| DelegationTokenIdentifier.HDFS_DELEGATION_KIND, |
| new Text("localhost:8020")); |
| ugi.addToken(hdfsToken); |
| token = fs.selectDelegationToken(ugi); |
| assertNotNull(token); |
| assertEquals(hdfsToken, token); |
| |
| // test webhdfs is favored over hdfs |
| webHdfsToken = new Token<TokenIdentifier>( |
| new byte[0], new byte[0], |
| WebHdfsFileSystem.TOKEN_KIND, new Text("localhost:"+port)); |
| ugi.addToken(webHdfsToken); |
| token = fs.selectDelegationToken(ugi); |
| assertNotNull(token); |
| assertEquals(webHdfsToken, token); |
| } |
| |
| static class MyWebHdfsFileSystem extends WebHdfsFileSystem { |
| @Override |
| public URI getCanonicalUri() { |
| return super.getCanonicalUri(); |
| } |
| @Override |
| public int getDefaultPort() { |
| return super.getDefaultPort(); |
| } |
| // don't automatically get a token |
| @Override |
| protected void initDelegationToken() throws IOException {} |
| } |
| } |