blob: d0920d6255f2ab3cfa282dc1710b4264e4dd4d13 [file] [log] [blame]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>Source code</title>
<link rel="stylesheet" type="text/css" href="../../../../../../../stylesheet.css" title="Style">
</head>
<body>
<div class="sourceContainer">
<pre><span class="sourceLineNo">001</span>/*<a name="line.1"></a>
<span class="sourceLineNo">002</span> * Licensed to the Apache Software Foundation (ASF) under one<a name="line.2"></a>
<span class="sourceLineNo">003</span> * or more contributor license agreements. See the NOTICE file<a name="line.3"></a>
<span class="sourceLineNo">004</span> * distributed with this work for additional information<a name="line.4"></a>
<span class="sourceLineNo">005</span> * regarding copyright ownership. The ASF licenses this file<a name="line.5"></a>
<span class="sourceLineNo">006</span> * to you under the Apache License, Version 2.0 (the<a name="line.6"></a>
<span class="sourceLineNo">007</span> * "License"); you may not use this file except in compliance<a name="line.7"></a>
<span class="sourceLineNo">008</span> * with the License. You may obtain a copy of the License at<a name="line.8"></a>
<span class="sourceLineNo">009</span> *<a name="line.9"></a>
<span class="sourceLineNo">010</span> * http://www.apache.org/licenses/LICENSE-2.0<a name="line.10"></a>
<span class="sourceLineNo">011</span> *<a name="line.11"></a>
<span class="sourceLineNo">012</span> * Unless required by applicable law or agreed to in writing, software<a name="line.12"></a>
<span class="sourceLineNo">013</span> * distributed under the License is distributed on an "AS IS" BASIS,<a name="line.13"></a>
<span class="sourceLineNo">014</span> * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.<a name="line.14"></a>
<span class="sourceLineNo">015</span> * See the License for the specific language governing permissions and<a name="line.15"></a>
<span class="sourceLineNo">016</span> * limitations under the License.<a name="line.16"></a>
<span class="sourceLineNo">017</span> */<a name="line.17"></a>
<span class="sourceLineNo">018</span>package org.apache.hadoop.hbase.io.asyncfs;<a name="line.18"></a>
<span class="sourceLineNo">019</span><a name="line.19"></a>
<span class="sourceLineNo">020</span>import static org.apache.hadoop.hbase.util.NettyFutureUtils.safeWrite;<a name="line.20"></a>
<span class="sourceLineNo">021</span>import static org.apache.hadoop.hdfs.client.HdfsClientConfigKeys.DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY;<a name="line.21"></a>
<span class="sourceLineNo">022</span>import static org.apache.hbase.thirdparty.io.netty.handler.timeout.IdleState.READER_IDLE;<a name="line.22"></a>
<span class="sourceLineNo">023</span><a name="line.23"></a>
<span class="sourceLineNo">024</span>import com.google.protobuf.CodedOutputStream;<a name="line.24"></a>
<span class="sourceLineNo">025</span>import java.io.IOException;<a name="line.25"></a>
<span class="sourceLineNo">026</span>import java.lang.reflect.Constructor;<a name="line.26"></a>
<span class="sourceLineNo">027</span>import java.lang.reflect.Field;<a name="line.27"></a>
<span class="sourceLineNo">028</span>import java.lang.reflect.InvocationTargetException;<a name="line.28"></a>
<span class="sourceLineNo">029</span>import java.lang.reflect.Method;<a name="line.29"></a>
<span class="sourceLineNo">030</span>import java.net.InetAddress;<a name="line.30"></a>
<span class="sourceLineNo">031</span>import java.net.InetSocketAddress;<a name="line.31"></a>
<span class="sourceLineNo">032</span>import java.nio.ByteBuffer;<a name="line.32"></a>
<span class="sourceLineNo">033</span>import java.security.GeneralSecurityException;<a name="line.33"></a>
<span class="sourceLineNo">034</span>import java.util.Arrays;<a name="line.34"></a>
<span class="sourceLineNo">035</span>import java.util.Base64;<a name="line.35"></a>
<span class="sourceLineNo">036</span>import java.util.Collections;<a name="line.36"></a>
<span class="sourceLineNo">037</span>import java.util.List;<a name="line.37"></a>
<span class="sourceLineNo">038</span>import java.util.Map;<a name="line.38"></a>
<span class="sourceLineNo">039</span>import java.util.Set;<a name="line.39"></a>
<span class="sourceLineNo">040</span>import java.util.concurrent.TimeUnit;<a name="line.40"></a>
<span class="sourceLineNo">041</span>import java.util.concurrent.atomic.AtomicBoolean;<a name="line.41"></a>
<span class="sourceLineNo">042</span>import javax.security.auth.callback.Callback;<a name="line.42"></a>
<span class="sourceLineNo">043</span>import javax.security.auth.callback.CallbackHandler;<a name="line.43"></a>
<span class="sourceLineNo">044</span>import javax.security.auth.callback.NameCallback;<a name="line.44"></a>
<span class="sourceLineNo">045</span>import javax.security.auth.callback.PasswordCallback;<a name="line.45"></a>
<span class="sourceLineNo">046</span>import javax.security.auth.callback.UnsupportedCallbackException;<a name="line.46"></a>
<span class="sourceLineNo">047</span>import javax.security.sasl.RealmCallback;<a name="line.47"></a>
<span class="sourceLineNo">048</span>import javax.security.sasl.RealmChoiceCallback;<a name="line.48"></a>
<span class="sourceLineNo">049</span>import javax.security.sasl.Sasl;<a name="line.49"></a>
<span class="sourceLineNo">050</span>import javax.security.sasl.SaslClient;<a name="line.50"></a>
<span class="sourceLineNo">051</span>import javax.security.sasl.SaslException;<a name="line.51"></a>
<span class="sourceLineNo">052</span>import org.apache.commons.lang3.StringUtils;<a name="line.52"></a>
<span class="sourceLineNo">053</span>import org.apache.hadoop.conf.Configuration;<a name="line.53"></a>
<span class="sourceLineNo">054</span>import org.apache.hadoop.crypto.CipherOption;<a name="line.54"></a>
<span class="sourceLineNo">055</span>import org.apache.hadoop.crypto.CipherSuite;<a name="line.55"></a>
<span class="sourceLineNo">056</span>import org.apache.hadoop.crypto.CryptoCodec;<a name="line.56"></a>
<span class="sourceLineNo">057</span>import org.apache.hadoop.crypto.Decryptor;<a name="line.57"></a>
<span class="sourceLineNo">058</span>import org.apache.hadoop.crypto.Encryptor;<a name="line.58"></a>
<span class="sourceLineNo">059</span>import org.apache.hadoop.crypto.key.KeyProvider;<a name="line.59"></a>
<span class="sourceLineNo">060</span>import org.apache.hadoop.crypto.key.KeyProvider.KeyVersion;<a name="line.60"></a>
<span class="sourceLineNo">061</span>import org.apache.hadoop.fs.FileEncryptionInfo;<a name="line.61"></a>
<span class="sourceLineNo">062</span>import org.apache.hadoop.hdfs.DFSClient;<a name="line.62"></a>
<span class="sourceLineNo">063</span>import org.apache.hadoop.hdfs.protocol.DatanodeInfo;<a name="line.63"></a>
<span class="sourceLineNo">064</span>import org.apache.hadoop.hdfs.protocol.HdfsFileStatus;<a name="line.64"></a>
<span class="sourceLineNo">065</span>import org.apache.hadoop.hdfs.protocol.datatransfer.InvalidEncryptionKeyException;<a name="line.65"></a>
<span class="sourceLineNo">066</span>import org.apache.hadoop.hdfs.protocol.datatransfer.TrustedChannelResolver;<a name="line.66"></a>
<span class="sourceLineNo">067</span>import org.apache.hadoop.hdfs.protocol.datatransfer.sasl.SaslDataTransferClient;<a name="line.67"></a>
<span class="sourceLineNo">068</span>import org.apache.hadoop.hdfs.protocol.proto.DataTransferProtos.DataTransferEncryptorMessageProto;<a name="line.68"></a>
<span class="sourceLineNo">069</span>import org.apache.hadoop.hdfs.protocol.proto.DataTransferProtos.DataTransferEncryptorMessageProto.DataTransferEncryptorStatus;<a name="line.69"></a>
<span class="sourceLineNo">070</span>import org.apache.hadoop.hdfs.protocolPB.PBHelperClient;<a name="line.70"></a>
<span class="sourceLineNo">071</span>import org.apache.hadoop.hdfs.security.token.block.BlockTokenIdentifier;<a name="line.71"></a>
<span class="sourceLineNo">072</span>import org.apache.hadoop.hdfs.security.token.block.DataEncryptionKey;<a name="line.72"></a>
<span class="sourceLineNo">073</span>import org.apache.hadoop.security.SaslPropertiesResolver;<a name="line.73"></a>
<span class="sourceLineNo">074</span>import org.apache.hadoop.security.SaslRpcServer.QualityOfProtection;<a name="line.74"></a>
<span class="sourceLineNo">075</span>import org.apache.hadoop.security.UserGroupInformation;<a name="line.75"></a>
<span class="sourceLineNo">076</span>import org.apache.hadoop.security.token.Token;<a name="line.76"></a>
<span class="sourceLineNo">077</span>import org.apache.yetus.audience.InterfaceAudience;<a name="line.77"></a>
<span class="sourceLineNo">078</span>import org.slf4j.Logger;<a name="line.78"></a>
<span class="sourceLineNo">079</span>import org.slf4j.LoggerFactory;<a name="line.79"></a>
<span class="sourceLineNo">080</span><a name="line.80"></a>
<span class="sourceLineNo">081</span>import org.apache.hbase.thirdparty.com.google.common.base.Throwables;<a name="line.81"></a>
<span class="sourceLineNo">082</span>import org.apache.hbase.thirdparty.com.google.common.collect.ImmutableSet;<a name="line.82"></a>
<span class="sourceLineNo">083</span>import org.apache.hbase.thirdparty.com.google.common.collect.Maps;<a name="line.83"></a>
<span class="sourceLineNo">084</span>import org.apache.hbase.thirdparty.io.netty.buffer.ByteBuf;<a name="line.84"></a>
<span class="sourceLineNo">085</span>import org.apache.hbase.thirdparty.io.netty.buffer.ByteBufOutputStream;<a name="line.85"></a>
<span class="sourceLineNo">086</span>import org.apache.hbase.thirdparty.io.netty.buffer.CompositeByteBuf;<a name="line.86"></a>
<span class="sourceLineNo">087</span>import org.apache.hbase.thirdparty.io.netty.buffer.Unpooled;<a name="line.87"></a>
<span class="sourceLineNo">088</span>import org.apache.hbase.thirdparty.io.netty.channel.Channel;<a name="line.88"></a>
<span class="sourceLineNo">089</span>import org.apache.hbase.thirdparty.io.netty.channel.ChannelDuplexHandler;<a name="line.89"></a>
<span class="sourceLineNo">090</span>import org.apache.hbase.thirdparty.io.netty.channel.ChannelHandlerContext;<a name="line.90"></a>
<span class="sourceLineNo">091</span>import org.apache.hbase.thirdparty.io.netty.channel.ChannelOutboundHandlerAdapter;<a name="line.91"></a>
<span class="sourceLineNo">092</span>import org.apache.hbase.thirdparty.io.netty.channel.ChannelPipeline;<a name="line.92"></a>
<span class="sourceLineNo">093</span>import org.apache.hbase.thirdparty.io.netty.channel.ChannelPromise;<a name="line.93"></a>
<span class="sourceLineNo">094</span>import org.apache.hbase.thirdparty.io.netty.channel.SimpleChannelInboundHandler;<a name="line.94"></a>
<span class="sourceLineNo">095</span>import org.apache.hbase.thirdparty.io.netty.handler.codec.LengthFieldBasedFrameDecoder;<a name="line.95"></a>
<span class="sourceLineNo">096</span>import org.apache.hbase.thirdparty.io.netty.handler.codec.MessageToByteEncoder;<a name="line.96"></a>
<span class="sourceLineNo">097</span>import org.apache.hbase.thirdparty.io.netty.handler.codec.protobuf.ProtobufVarint32FrameDecoder;<a name="line.97"></a>
<span class="sourceLineNo">098</span>import org.apache.hbase.thirdparty.io.netty.handler.timeout.IdleStateEvent;<a name="line.98"></a>
<span class="sourceLineNo">099</span>import org.apache.hbase.thirdparty.io.netty.handler.timeout.IdleStateHandler;<a name="line.99"></a>
<span class="sourceLineNo">100</span>import org.apache.hbase.thirdparty.io.netty.util.concurrent.Promise;<a name="line.100"></a>
<span class="sourceLineNo">101</span><a name="line.101"></a>
<span class="sourceLineNo">102</span>/**<a name="line.102"></a>
<span class="sourceLineNo">103</span> * Helper class for adding sasl support for {@link FanOutOneBlockAsyncDFSOutput}.<a name="line.103"></a>
<span class="sourceLineNo">104</span> */<a name="line.104"></a>
<span class="sourceLineNo">105</span>@InterfaceAudience.Private<a name="line.105"></a>
<span class="sourceLineNo">106</span>public final class FanOutOneBlockAsyncDFSOutputSaslHelper {<a name="line.106"></a>
<span class="sourceLineNo">107</span> private static final Logger LOG =<a name="line.107"></a>
<span class="sourceLineNo">108</span> LoggerFactory.getLogger(FanOutOneBlockAsyncDFSOutputSaslHelper.class);<a name="line.108"></a>
<span class="sourceLineNo">109</span><a name="line.109"></a>
<span class="sourceLineNo">110</span> private FanOutOneBlockAsyncDFSOutputSaslHelper() {<a name="line.110"></a>
<span class="sourceLineNo">111</span> }<a name="line.111"></a>
<span class="sourceLineNo">112</span><a name="line.112"></a>
<span class="sourceLineNo">113</span> private static final String SERVER_NAME = "0";<a name="line.113"></a>
<span class="sourceLineNo">114</span> private static final String PROTOCOL = "hdfs";<a name="line.114"></a>
<span class="sourceLineNo">115</span> private static final String MECHANISM = "DIGEST-MD5";<a name="line.115"></a>
<span class="sourceLineNo">116</span> private static final int SASL_TRANSFER_MAGIC_NUMBER = 0xDEADBEEF;<a name="line.116"></a>
<span class="sourceLineNo">117</span> private static final String NAME_DELIMITER = " ";<a name="line.117"></a>
<span class="sourceLineNo">118</span><a name="line.118"></a>
<span class="sourceLineNo">119</span> private interface SaslAdaptor {<a name="line.119"></a>
<span class="sourceLineNo">120</span><a name="line.120"></a>
<span class="sourceLineNo">121</span> TrustedChannelResolver getTrustedChannelResolver(SaslDataTransferClient saslClient);<a name="line.121"></a>
<span class="sourceLineNo">122</span><a name="line.122"></a>
<span class="sourceLineNo">123</span> SaslPropertiesResolver getSaslPropsResolver(SaslDataTransferClient saslClient);<a name="line.123"></a>
<span class="sourceLineNo">124</span><a name="line.124"></a>
<span class="sourceLineNo">125</span> AtomicBoolean getFallbackToSimpleAuth(SaslDataTransferClient saslClient);<a name="line.125"></a>
<span class="sourceLineNo">126</span> }<a name="line.126"></a>
<span class="sourceLineNo">127</span><a name="line.127"></a>
<span class="sourceLineNo">128</span> private static final SaslAdaptor SASL_ADAPTOR;<a name="line.128"></a>
<span class="sourceLineNo">129</span><a name="line.129"></a>
<span class="sourceLineNo">130</span> private interface TransparentCryptoHelper {<a name="line.130"></a>
<span class="sourceLineNo">131</span><a name="line.131"></a>
<span class="sourceLineNo">132</span> Encryptor createEncryptor(Configuration conf, FileEncryptionInfo feInfo, DFSClient client)<a name="line.132"></a>
<span class="sourceLineNo">133</span> throws IOException;<a name="line.133"></a>
<span class="sourceLineNo">134</span> }<a name="line.134"></a>
<span class="sourceLineNo">135</span><a name="line.135"></a>
<span class="sourceLineNo">136</span> private static final TransparentCryptoHelper TRANSPARENT_CRYPTO_HELPER;<a name="line.136"></a>
<span class="sourceLineNo">137</span><a name="line.137"></a>
<span class="sourceLineNo">138</span> private static SaslAdaptor createSaslAdaptor()<a name="line.138"></a>
<span class="sourceLineNo">139</span> throws NoSuchFieldException, NoSuchMethodException {<a name="line.139"></a>
<span class="sourceLineNo">140</span> Field saslPropsResolverField =<a name="line.140"></a>
<span class="sourceLineNo">141</span> SaslDataTransferClient.class.getDeclaredField("saslPropsResolver");<a name="line.141"></a>
<span class="sourceLineNo">142</span> saslPropsResolverField.setAccessible(true);<a name="line.142"></a>
<span class="sourceLineNo">143</span> Field trustedChannelResolverField =<a name="line.143"></a>
<span class="sourceLineNo">144</span> SaslDataTransferClient.class.getDeclaredField("trustedChannelResolver");<a name="line.144"></a>
<span class="sourceLineNo">145</span> trustedChannelResolverField.setAccessible(true);<a name="line.145"></a>
<span class="sourceLineNo">146</span> Field fallbackToSimpleAuthField =<a name="line.146"></a>
<span class="sourceLineNo">147</span> SaslDataTransferClient.class.getDeclaredField("fallbackToSimpleAuth");<a name="line.147"></a>
<span class="sourceLineNo">148</span> fallbackToSimpleAuthField.setAccessible(true);<a name="line.148"></a>
<span class="sourceLineNo">149</span> return new SaslAdaptor() {<a name="line.149"></a>
<span class="sourceLineNo">150</span><a name="line.150"></a>
<span class="sourceLineNo">151</span> @Override<a name="line.151"></a>
<span class="sourceLineNo">152</span> public TrustedChannelResolver getTrustedChannelResolver(SaslDataTransferClient saslClient) {<a name="line.152"></a>
<span class="sourceLineNo">153</span> try {<a name="line.153"></a>
<span class="sourceLineNo">154</span> return (TrustedChannelResolver) trustedChannelResolverField.get(saslClient);<a name="line.154"></a>
<span class="sourceLineNo">155</span> } catch (IllegalAccessException e) {<a name="line.155"></a>
<span class="sourceLineNo">156</span> throw new RuntimeException(e);<a name="line.156"></a>
<span class="sourceLineNo">157</span> }<a name="line.157"></a>
<span class="sourceLineNo">158</span> }<a name="line.158"></a>
<span class="sourceLineNo">159</span><a name="line.159"></a>
<span class="sourceLineNo">160</span> @Override<a name="line.160"></a>
<span class="sourceLineNo">161</span> public SaslPropertiesResolver getSaslPropsResolver(SaslDataTransferClient saslClient) {<a name="line.161"></a>
<span class="sourceLineNo">162</span> try {<a name="line.162"></a>
<span class="sourceLineNo">163</span> return (SaslPropertiesResolver) saslPropsResolverField.get(saslClient);<a name="line.163"></a>
<span class="sourceLineNo">164</span> } catch (IllegalAccessException e) {<a name="line.164"></a>
<span class="sourceLineNo">165</span> throw new RuntimeException(e);<a name="line.165"></a>
<span class="sourceLineNo">166</span> }<a name="line.166"></a>
<span class="sourceLineNo">167</span> }<a name="line.167"></a>
<span class="sourceLineNo">168</span><a name="line.168"></a>
<span class="sourceLineNo">169</span> @Override<a name="line.169"></a>
<span class="sourceLineNo">170</span> public AtomicBoolean getFallbackToSimpleAuth(SaslDataTransferClient saslClient) {<a name="line.170"></a>
<span class="sourceLineNo">171</span> try {<a name="line.171"></a>
<span class="sourceLineNo">172</span> return (AtomicBoolean) fallbackToSimpleAuthField.get(saslClient);<a name="line.172"></a>
<span class="sourceLineNo">173</span> } catch (IllegalAccessException e) {<a name="line.173"></a>
<span class="sourceLineNo">174</span> throw new RuntimeException(e);<a name="line.174"></a>
<span class="sourceLineNo">175</span> }<a name="line.175"></a>
<span class="sourceLineNo">176</span> }<a name="line.176"></a>
<span class="sourceLineNo">177</span> };<a name="line.177"></a>
<span class="sourceLineNo">178</span> }<a name="line.178"></a>
<span class="sourceLineNo">179</span><a name="line.179"></a>
<span class="sourceLineNo">180</span> private static TransparentCryptoHelper createTransparentCryptoHelperWithoutHDFS12396()<a name="line.180"></a>
<span class="sourceLineNo">181</span> throws NoSuchMethodException {<a name="line.181"></a>
<span class="sourceLineNo">182</span> Method decryptEncryptedDataEncryptionKeyMethod = DFSClient.class<a name="line.182"></a>
<span class="sourceLineNo">183</span> .getDeclaredMethod("decryptEncryptedDataEncryptionKey", FileEncryptionInfo.class);<a name="line.183"></a>
<span class="sourceLineNo">184</span> decryptEncryptedDataEncryptionKeyMethod.setAccessible(true);<a name="line.184"></a>
<span class="sourceLineNo">185</span> return new TransparentCryptoHelper() {<a name="line.185"></a>
<span class="sourceLineNo">186</span><a name="line.186"></a>
<span class="sourceLineNo">187</span> @Override<a name="line.187"></a>
<span class="sourceLineNo">188</span> public Encryptor createEncryptor(Configuration conf, FileEncryptionInfo feInfo,<a name="line.188"></a>
<span class="sourceLineNo">189</span> DFSClient client) throws IOException {<a name="line.189"></a>
<span class="sourceLineNo">190</span> try {<a name="line.190"></a>
<span class="sourceLineNo">191</span> KeyVersion decryptedKey =<a name="line.191"></a>
<span class="sourceLineNo">192</span> (KeyVersion) decryptEncryptedDataEncryptionKeyMethod.invoke(client, feInfo);<a name="line.192"></a>
<span class="sourceLineNo">193</span> CryptoCodec cryptoCodec = CryptoCodec.getInstance(conf, feInfo.getCipherSuite());<a name="line.193"></a>
<span class="sourceLineNo">194</span> Encryptor encryptor = cryptoCodec.createEncryptor();<a name="line.194"></a>
<span class="sourceLineNo">195</span> encryptor.init(decryptedKey.getMaterial(), feInfo.getIV());<a name="line.195"></a>
<span class="sourceLineNo">196</span> return encryptor;<a name="line.196"></a>
<span class="sourceLineNo">197</span> } catch (InvocationTargetException e) {<a name="line.197"></a>
<span class="sourceLineNo">198</span> Throwables.propagateIfPossible(e.getTargetException(), IOException.class);<a name="line.198"></a>
<span class="sourceLineNo">199</span> throw new RuntimeException(e.getTargetException());<a name="line.199"></a>
<span class="sourceLineNo">200</span> } catch (GeneralSecurityException e) {<a name="line.200"></a>
<span class="sourceLineNo">201</span> throw new IOException(e);<a name="line.201"></a>
<span class="sourceLineNo">202</span> } catch (IllegalAccessException e) {<a name="line.202"></a>
<span class="sourceLineNo">203</span> throw new RuntimeException(e);<a name="line.203"></a>
<span class="sourceLineNo">204</span> }<a name="line.204"></a>
<span class="sourceLineNo">205</span> }<a name="line.205"></a>
<span class="sourceLineNo">206</span> };<a name="line.206"></a>
<span class="sourceLineNo">207</span> }<a name="line.207"></a>
<span class="sourceLineNo">208</span><a name="line.208"></a>
<span class="sourceLineNo">209</span> private static TransparentCryptoHelper createTransparentCryptoHelperWithHDFS12396()<a name="line.209"></a>
<span class="sourceLineNo">210</span> throws ClassNotFoundException, NoSuchMethodException {<a name="line.210"></a>
<span class="sourceLineNo">211</span> Class&lt;?&gt; hdfsKMSUtilCls = Class.forName("org.apache.hadoop.hdfs.HdfsKMSUtil");<a name="line.211"></a>
<span class="sourceLineNo">212</span> Method decryptEncryptedDataEncryptionKeyMethod = hdfsKMSUtilCls.getDeclaredMethod(<a name="line.212"></a>
<span class="sourceLineNo">213</span> "decryptEncryptedDataEncryptionKey", FileEncryptionInfo.class, KeyProvider.class);<a name="line.213"></a>
<span class="sourceLineNo">214</span> decryptEncryptedDataEncryptionKeyMethod.setAccessible(true);<a name="line.214"></a>
<span class="sourceLineNo">215</span> return new TransparentCryptoHelper() {<a name="line.215"></a>
<span class="sourceLineNo">216</span><a name="line.216"></a>
<span class="sourceLineNo">217</span> @Override<a name="line.217"></a>
<span class="sourceLineNo">218</span> public Encryptor createEncryptor(Configuration conf, FileEncryptionInfo feInfo,<a name="line.218"></a>
<span class="sourceLineNo">219</span> DFSClient client) throws IOException {<a name="line.219"></a>
<span class="sourceLineNo">220</span> try {<a name="line.220"></a>
<span class="sourceLineNo">221</span> KeyVersion decryptedKey = (KeyVersion) decryptEncryptedDataEncryptionKeyMethod<a name="line.221"></a>
<span class="sourceLineNo">222</span> .invoke(null, feInfo, client.getKeyProvider());<a name="line.222"></a>
<span class="sourceLineNo">223</span> CryptoCodec cryptoCodec = CryptoCodec.getInstance(conf, feInfo.getCipherSuite());<a name="line.223"></a>
<span class="sourceLineNo">224</span> Encryptor encryptor = cryptoCodec.createEncryptor();<a name="line.224"></a>
<span class="sourceLineNo">225</span> encryptor.init(decryptedKey.getMaterial(), feInfo.getIV());<a name="line.225"></a>
<span class="sourceLineNo">226</span> return encryptor;<a name="line.226"></a>
<span class="sourceLineNo">227</span> } catch (InvocationTargetException e) {<a name="line.227"></a>
<span class="sourceLineNo">228</span> Throwables.propagateIfPossible(e.getTargetException(), IOException.class);<a name="line.228"></a>
<span class="sourceLineNo">229</span> throw new RuntimeException(e.getTargetException());<a name="line.229"></a>
<span class="sourceLineNo">230</span> } catch (GeneralSecurityException e) {<a name="line.230"></a>
<span class="sourceLineNo">231</span> throw new IOException(e);<a name="line.231"></a>
<span class="sourceLineNo">232</span> } catch (IllegalAccessException e) {<a name="line.232"></a>
<span class="sourceLineNo">233</span> throw new RuntimeException(e);<a name="line.233"></a>
<span class="sourceLineNo">234</span> }<a name="line.234"></a>
<span class="sourceLineNo">235</span> }<a name="line.235"></a>
<span class="sourceLineNo">236</span> };<a name="line.236"></a>
<span class="sourceLineNo">237</span> }<a name="line.237"></a>
<span class="sourceLineNo">238</span><a name="line.238"></a>
<span class="sourceLineNo">239</span> private static TransparentCryptoHelper createTransparentCryptoHelper()<a name="line.239"></a>
<span class="sourceLineNo">240</span> throws NoSuchMethodException, ClassNotFoundException {<a name="line.240"></a>
<span class="sourceLineNo">241</span> try {<a name="line.241"></a>
<span class="sourceLineNo">242</span> return createTransparentCryptoHelperWithoutHDFS12396();<a name="line.242"></a>
<span class="sourceLineNo">243</span> } catch (NoSuchMethodException e) {<a name="line.243"></a>
<span class="sourceLineNo">244</span> LOG.debug("No decryptEncryptedDataEncryptionKey method in DFSClient,"<a name="line.244"></a>
<span class="sourceLineNo">245</span> + " should be hadoop version with HDFS-12396", e);<a name="line.245"></a>
<span class="sourceLineNo">246</span> }<a name="line.246"></a>
<span class="sourceLineNo">247</span> return createTransparentCryptoHelperWithHDFS12396();<a name="line.247"></a>
<span class="sourceLineNo">248</span> }<a name="line.248"></a>
<span class="sourceLineNo">249</span><a name="line.249"></a>
<span class="sourceLineNo">250</span> static {<a name="line.250"></a>
<span class="sourceLineNo">251</span> try {<a name="line.251"></a>
<span class="sourceLineNo">252</span> SASL_ADAPTOR = createSaslAdaptor();<a name="line.252"></a>
<span class="sourceLineNo">253</span> TRANSPARENT_CRYPTO_HELPER = createTransparentCryptoHelper();<a name="line.253"></a>
<span class="sourceLineNo">254</span> } catch (Exception e) {<a name="line.254"></a>
<span class="sourceLineNo">255</span> String msg = "Couldn't properly initialize access to HDFS internals. Please "<a name="line.255"></a>
<span class="sourceLineNo">256</span> + "update your WAL Provider to not make use of the 'asyncfs' provider. See "<a name="line.256"></a>
<span class="sourceLineNo">257</span> + "HBASE-16110 for more information.";<a name="line.257"></a>
<span class="sourceLineNo">258</span> LOG.error(msg, e);<a name="line.258"></a>
<span class="sourceLineNo">259</span> throw new Error(msg, e);<a name="line.259"></a>
<span class="sourceLineNo">260</span> }<a name="line.260"></a>
<span class="sourceLineNo">261</span> }<a name="line.261"></a>
<span class="sourceLineNo">262</span><a name="line.262"></a>
<span class="sourceLineNo">263</span> /**<a name="line.263"></a>
<span class="sourceLineNo">264</span> * Sets user name and password when asked by the client-side SASL object.<a name="line.264"></a>
<span class="sourceLineNo">265</span> */<a name="line.265"></a>
<span class="sourceLineNo">266</span> private static final class SaslClientCallbackHandler implements CallbackHandler {<a name="line.266"></a>
<span class="sourceLineNo">267</span><a name="line.267"></a>
<span class="sourceLineNo">268</span> private final char[] password;<a name="line.268"></a>
<span class="sourceLineNo">269</span> private final String userName;<a name="line.269"></a>
<span class="sourceLineNo">270</span><a name="line.270"></a>
<span class="sourceLineNo">271</span> /**<a name="line.271"></a>
<span class="sourceLineNo">272</span> * Creates a new SaslClientCallbackHandler.<a name="line.272"></a>
<span class="sourceLineNo">273</span> * @param userName SASL user name<a name="line.273"></a>
<span class="sourceLineNo">274</span> * @param password SASL password<a name="line.274"></a>
<span class="sourceLineNo">275</span> */<a name="line.275"></a>
<span class="sourceLineNo">276</span> public SaslClientCallbackHandler(String userName, char[] password) {<a name="line.276"></a>
<span class="sourceLineNo">277</span> this.password = password;<a name="line.277"></a>
<span class="sourceLineNo">278</span> this.userName = userName;<a name="line.278"></a>
<span class="sourceLineNo">279</span> }<a name="line.279"></a>
<span class="sourceLineNo">280</span><a name="line.280"></a>
<span class="sourceLineNo">281</span> @Override<a name="line.281"></a>
<span class="sourceLineNo">282</span> public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {<a name="line.282"></a>
<span class="sourceLineNo">283</span> NameCallback nc = null;<a name="line.283"></a>
<span class="sourceLineNo">284</span> PasswordCallback pc = null;<a name="line.284"></a>
<span class="sourceLineNo">285</span> RealmCallback rc = null;<a name="line.285"></a>
<span class="sourceLineNo">286</span> for (Callback callback : callbacks) {<a name="line.286"></a>
<span class="sourceLineNo">287</span> if (callback instanceof RealmChoiceCallback) {<a name="line.287"></a>
<span class="sourceLineNo">288</span> continue;<a name="line.288"></a>
<span class="sourceLineNo">289</span> } else if (callback instanceof NameCallback) {<a name="line.289"></a>
<span class="sourceLineNo">290</span> nc = (NameCallback) callback;<a name="line.290"></a>
<span class="sourceLineNo">291</span> } else if (callback instanceof PasswordCallback) {<a name="line.291"></a>
<span class="sourceLineNo">292</span> pc = (PasswordCallback) callback;<a name="line.292"></a>
<span class="sourceLineNo">293</span> } else if (callback instanceof RealmCallback) {<a name="line.293"></a>
<span class="sourceLineNo">294</span> rc = (RealmCallback) callback;<a name="line.294"></a>
<span class="sourceLineNo">295</span> } else {<a name="line.295"></a>
<span class="sourceLineNo">296</span> throw new UnsupportedCallbackException(callback, "Unrecognized SASL client callback");<a name="line.296"></a>
<span class="sourceLineNo">297</span> }<a name="line.297"></a>
<span class="sourceLineNo">298</span> }<a name="line.298"></a>
<span class="sourceLineNo">299</span> if (nc != null) {<a name="line.299"></a>
<span class="sourceLineNo">300</span> nc.setName(userName);<a name="line.300"></a>
<span class="sourceLineNo">301</span> }<a name="line.301"></a>
<span class="sourceLineNo">302</span> if (pc != null) {<a name="line.302"></a>
<span class="sourceLineNo">303</span> pc.setPassword(password);<a name="line.303"></a>
<span class="sourceLineNo">304</span> }<a name="line.304"></a>
<span class="sourceLineNo">305</span> if (rc != null) {<a name="line.305"></a>
<span class="sourceLineNo">306</span> rc.setText(rc.getDefaultText());<a name="line.306"></a>
<span class="sourceLineNo">307</span> }<a name="line.307"></a>
<span class="sourceLineNo">308</span> }<a name="line.308"></a>
<span class="sourceLineNo">309</span> }<a name="line.309"></a>
<span class="sourceLineNo">310</span><a name="line.310"></a>
<span class="sourceLineNo">311</span> private static final class SaslNegotiateHandler extends ChannelDuplexHandler {<a name="line.311"></a>
<span class="sourceLineNo">312</span><a name="line.312"></a>
<span class="sourceLineNo">313</span> private final Configuration conf;<a name="line.313"></a>
<span class="sourceLineNo">314</span><a name="line.314"></a>
<span class="sourceLineNo">315</span> private final Map&lt;String, String&gt; saslProps;<a name="line.315"></a>
<span class="sourceLineNo">316</span><a name="line.316"></a>
<span class="sourceLineNo">317</span> private final SaslClient saslClient;<a name="line.317"></a>
<span class="sourceLineNo">318</span><a name="line.318"></a>
<span class="sourceLineNo">319</span> private final int timeoutMs;<a name="line.319"></a>
<span class="sourceLineNo">320</span><a name="line.320"></a>
<span class="sourceLineNo">321</span> private final Promise&lt;Void&gt; promise;<a name="line.321"></a>
<span class="sourceLineNo">322</span><a name="line.322"></a>
<span class="sourceLineNo">323</span> private final DFSClient dfsClient;<a name="line.323"></a>
<span class="sourceLineNo">324</span><a name="line.324"></a>
<span class="sourceLineNo">325</span> private int step = 0;<a name="line.325"></a>
<span class="sourceLineNo">326</span><a name="line.326"></a>
<span class="sourceLineNo">327</span> public SaslNegotiateHandler(Configuration conf, String username, char[] password,<a name="line.327"></a>
<span class="sourceLineNo">328</span> Map&lt;String, String&gt; saslProps, int timeoutMs, Promise&lt;Void&gt; promise, DFSClient dfsClient)<a name="line.328"></a>
<span class="sourceLineNo">329</span> throws SaslException {<a name="line.329"></a>
<span class="sourceLineNo">330</span> this.conf = conf;<a name="line.330"></a>
<span class="sourceLineNo">331</span> this.saslProps = saslProps;<a name="line.331"></a>
<span class="sourceLineNo">332</span> this.saslClient = Sasl.createSaslClient(new String[] { MECHANISM }, username, PROTOCOL,<a name="line.332"></a>
<span class="sourceLineNo">333</span> SERVER_NAME, saslProps, new SaslClientCallbackHandler(username, password));<a name="line.333"></a>
<span class="sourceLineNo">334</span> this.timeoutMs = timeoutMs;<a name="line.334"></a>
<span class="sourceLineNo">335</span> this.promise = promise;<a name="line.335"></a>
<span class="sourceLineNo">336</span> this.dfsClient = dfsClient;<a name="line.336"></a>
<span class="sourceLineNo">337</span> }<a name="line.337"></a>
<span class="sourceLineNo">338</span><a name="line.338"></a>
<span class="sourceLineNo">339</span> private void sendSaslMessage(ChannelHandlerContext ctx, byte[] payload) throws IOException {<a name="line.339"></a>
<span class="sourceLineNo">340</span> sendSaslMessage(ctx, payload, null);<a name="line.340"></a>
<span class="sourceLineNo">341</span> }<a name="line.341"></a>
<span class="sourceLineNo">342</span><a name="line.342"></a>
<span class="sourceLineNo">343</span> private List&lt;CipherOption&gt; getCipherOptions() throws IOException {<a name="line.343"></a>
<span class="sourceLineNo">344</span> // Negotiate cipher suites if configured. Currently, the only supported<a name="line.344"></a>
<span class="sourceLineNo">345</span> // cipher suite is AES/CTR/NoPadding, but the protocol allows multiple<a name="line.345"></a>
<span class="sourceLineNo">346</span> // values for future expansion.<a name="line.346"></a>
<span class="sourceLineNo">347</span> String cipherSuites = conf.get(DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY);<a name="line.347"></a>
<span class="sourceLineNo">348</span> if (StringUtils.isBlank(cipherSuites)) {<a name="line.348"></a>
<span class="sourceLineNo">349</span> return null;<a name="line.349"></a>
<span class="sourceLineNo">350</span> }<a name="line.350"></a>
<span class="sourceLineNo">351</span> if (!cipherSuites.equals(CipherSuite.AES_CTR_NOPADDING.getName())) {<a name="line.351"></a>
<span class="sourceLineNo">352</span> throw new IOException(String.format("Invalid cipher suite, %s=%s",<a name="line.352"></a>
<span class="sourceLineNo">353</span> DFS_ENCRYPT_DATA_TRANSFER_CIPHER_SUITES_KEY, cipherSuites));<a name="line.353"></a>
<span class="sourceLineNo">354</span> }<a name="line.354"></a>
<span class="sourceLineNo">355</span> return Collections.singletonList(new CipherOption(CipherSuite.AES_CTR_NOPADDING));<a name="line.355"></a>
<span class="sourceLineNo">356</span> }<a name="line.356"></a>
<span class="sourceLineNo">357</span><a name="line.357"></a>
<span class="sourceLineNo">358</span> /**<a name="line.358"></a>
<span class="sourceLineNo">359</span> * The asyncfs subsystem emulates a HDFS client by sending protobuf messages via netty. After<a name="line.359"></a>
<span class="sourceLineNo">360</span> * Hadoop 3.3.0, the protobuf classes are relocated to org.apache.hadoop.thirdparty.protobuf.*.<a name="line.360"></a>
<span class="sourceLineNo">361</span> * Use Reflection to check which ones to use.<a name="line.361"></a>
<span class="sourceLineNo">362</span> */<a name="line.362"></a>
<span class="sourceLineNo">363</span> private static class BuilderPayloadSetter {<a name="line.363"></a>
<span class="sourceLineNo">364</span> private static Method setPayloadMethod;<a name="line.364"></a>
<span class="sourceLineNo">365</span> private static Constructor&lt;?&gt; constructor;<a name="line.365"></a>
<span class="sourceLineNo">366</span><a name="line.366"></a>
<span class="sourceLineNo">367</span> /**<a name="line.367"></a>
<span class="sourceLineNo">368</span> * Create a ByteString from byte array without copying (wrap), and then set it as the payload<a name="line.368"></a>
<span class="sourceLineNo">369</span> * for the builder.<a name="line.369"></a>
<span class="sourceLineNo">370</span> * @param builder builder for HDFS DataTransferEncryptorMessage.<a name="line.370"></a>
<span class="sourceLineNo">371</span> * @param payload byte array of payload.<a name="line.371"></a>
<span class="sourceLineNo">372</span> */<a name="line.372"></a>
<span class="sourceLineNo">373</span> static void wrapAndSetPayload(DataTransferEncryptorMessageProto.Builder builder,<a name="line.373"></a>
<span class="sourceLineNo">374</span> byte[] payload) throws IOException {<a name="line.374"></a>
<span class="sourceLineNo">375</span> Object byteStringObject;<a name="line.375"></a>
<span class="sourceLineNo">376</span> try {<a name="line.376"></a>
<span class="sourceLineNo">377</span> // byteStringObject = new LiteralByteString(payload);<a name="line.377"></a>
<span class="sourceLineNo">378</span> byteStringObject = constructor.newInstance(payload);<a name="line.378"></a>
<span class="sourceLineNo">379</span> // builder.setPayload(byteStringObject);<a name="line.379"></a>
<span class="sourceLineNo">380</span> setPayloadMethod.invoke(builder, constructor.getDeclaringClass().cast(byteStringObject));<a name="line.380"></a>
<span class="sourceLineNo">381</span> } catch (IllegalAccessException | InstantiationException e) {<a name="line.381"></a>
<span class="sourceLineNo">382</span> throw new RuntimeException(e);<a name="line.382"></a>
<span class="sourceLineNo">383</span><a name="line.383"></a>
<span class="sourceLineNo">384</span> } catch (InvocationTargetException e) {<a name="line.384"></a>
<span class="sourceLineNo">385</span> Throwables.propagateIfPossible(e.getTargetException(), IOException.class);<a name="line.385"></a>
<span class="sourceLineNo">386</span> throw new RuntimeException(e.getTargetException());<a name="line.386"></a>
<span class="sourceLineNo">387</span> }<a name="line.387"></a>
<span class="sourceLineNo">388</span> }<a name="line.388"></a>
<span class="sourceLineNo">389</span><a name="line.389"></a>
<span class="sourceLineNo">390</span> static {<a name="line.390"></a>
<span class="sourceLineNo">391</span> Class&lt;?&gt; builderClass = DataTransferEncryptorMessageProto.Builder.class;<a name="line.391"></a>
<span class="sourceLineNo">392</span><a name="line.392"></a>
<span class="sourceLineNo">393</span> // Try the unrelocated ByteString<a name="line.393"></a>
<span class="sourceLineNo">394</span> Class&lt;?&gt; byteStringClass = com.google.protobuf.ByteString.class;<a name="line.394"></a>
<span class="sourceLineNo">395</span> try {<a name="line.395"></a>
<span class="sourceLineNo">396</span> // See if it can load the relocated ByteString, which comes from hadoop-thirdparty.<a name="line.396"></a>
<span class="sourceLineNo">397</span> byteStringClass = Class.forName("org.apache.hadoop.thirdparty.protobuf.ByteString");<a name="line.397"></a>
<span class="sourceLineNo">398</span> LOG.debug("Found relocated ByteString class from hadoop-thirdparty."<a name="line.398"></a>
<span class="sourceLineNo">399</span> + " Assuming this is Hadoop 3.3.0+.");<a name="line.399"></a>
<span class="sourceLineNo">400</span> } catch (ClassNotFoundException e) {<a name="line.400"></a>
<span class="sourceLineNo">401</span> LOG.debug("Did not find relocated ByteString class from hadoop-thirdparty."<a name="line.401"></a>
<span class="sourceLineNo">402</span> + " Assuming this is below Hadoop 3.3.0", e);<a name="line.402"></a>
<span class="sourceLineNo">403</span> }<a name="line.403"></a>
<span class="sourceLineNo">404</span><a name="line.404"></a>
<span class="sourceLineNo">405</span> // LiteralByteString is a package private class in protobuf. Make it accessible.<a name="line.405"></a>
<span class="sourceLineNo">406</span> Class&lt;?&gt; literalByteStringClass;<a name="line.406"></a>
<span class="sourceLineNo">407</span> try {<a name="line.407"></a>
<span class="sourceLineNo">408</span> literalByteStringClass =<a name="line.408"></a>
<span class="sourceLineNo">409</span> Class.forName("org.apache.hadoop.thirdparty.protobuf.ByteString$LiteralByteString");<a name="line.409"></a>
<span class="sourceLineNo">410</span> LOG.debug("Shaded LiteralByteString from hadoop-thirdparty is found.");<a name="line.410"></a>
<span class="sourceLineNo">411</span> } catch (ClassNotFoundException e) {<a name="line.411"></a>
<span class="sourceLineNo">412</span> try {<a name="line.412"></a>
<span class="sourceLineNo">413</span> literalByteStringClass = Class.forName("com.google.protobuf.LiteralByteString");<a name="line.413"></a>
<span class="sourceLineNo">414</span> LOG.debug("com.google.protobuf.LiteralByteString found.");<a name="line.414"></a>
<span class="sourceLineNo">415</span> } catch (ClassNotFoundException ex) {<a name="line.415"></a>
<span class="sourceLineNo">416</span> throw new RuntimeException(ex);<a name="line.416"></a>
<span class="sourceLineNo">417</span> }<a name="line.417"></a>
<span class="sourceLineNo">418</span> }<a name="line.418"></a>
<span class="sourceLineNo">419</span><a name="line.419"></a>
<span class="sourceLineNo">420</span> try {<a name="line.420"></a>
<span class="sourceLineNo">421</span> constructor = literalByteStringClass.getDeclaredConstructor(byte[].class);<a name="line.421"></a>
<span class="sourceLineNo">422</span> constructor.setAccessible(true);<a name="line.422"></a>
<span class="sourceLineNo">423</span> } catch (NoSuchMethodException e) {<a name="line.423"></a>
<span class="sourceLineNo">424</span> throw new RuntimeException(e);<a name="line.424"></a>
<span class="sourceLineNo">425</span> }<a name="line.425"></a>
<span class="sourceLineNo">426</span><a name="line.426"></a>
<span class="sourceLineNo">427</span> try {<a name="line.427"></a>
<span class="sourceLineNo">428</span> setPayloadMethod = builderClass.getMethod("setPayload", byteStringClass);<a name="line.428"></a>
<span class="sourceLineNo">429</span> } catch (NoSuchMethodException e) {<a name="line.429"></a>
<span class="sourceLineNo">430</span> // if either method is not found, we are in big trouble. Abort.<a name="line.430"></a>
<span class="sourceLineNo">431</span> throw new RuntimeException(e);<a name="line.431"></a>
<span class="sourceLineNo">432</span> }<a name="line.432"></a>
<span class="sourceLineNo">433</span> }<a name="line.433"></a>
<span class="sourceLineNo">434</span> }<a name="line.434"></a>
<span class="sourceLineNo">435</span><a name="line.435"></a>
<span class="sourceLineNo">436</span> private void sendSaslMessage(ChannelHandlerContext ctx, byte[] payload,<a name="line.436"></a>
<span class="sourceLineNo">437</span> List&lt;CipherOption&gt; options) throws IOException {<a name="line.437"></a>
<span class="sourceLineNo">438</span> DataTransferEncryptorMessageProto.Builder builder =<a name="line.438"></a>
<span class="sourceLineNo">439</span> DataTransferEncryptorMessageProto.newBuilder();<a name="line.439"></a>
<span class="sourceLineNo">440</span> builder.setStatus(DataTransferEncryptorStatus.SUCCESS);<a name="line.440"></a>
<span class="sourceLineNo">441</span> if (payload != null) {<a name="line.441"></a>
<span class="sourceLineNo">442</span> BuilderPayloadSetter.wrapAndSetPayload(builder, payload);<a name="line.442"></a>
<span class="sourceLineNo">443</span> }<a name="line.443"></a>
<span class="sourceLineNo">444</span> if (options != null) {<a name="line.444"></a>
<span class="sourceLineNo">445</span> builder.addAllCipherOption(PBHelperClient.convertCipherOptions(options));<a name="line.445"></a>
<span class="sourceLineNo">446</span> }<a name="line.446"></a>
<span class="sourceLineNo">447</span> DataTransferEncryptorMessageProto proto = builder.build();<a name="line.447"></a>
<span class="sourceLineNo">448</span> int size = proto.getSerializedSize();<a name="line.448"></a>
<span class="sourceLineNo">449</span> size += CodedOutputStream.computeRawVarint32Size(size);<a name="line.449"></a>
<span class="sourceLineNo">450</span> ByteBuf buf = ctx.alloc().buffer(size);<a name="line.450"></a>
<span class="sourceLineNo">451</span> proto.writeDelimitedTo(new ByteBufOutputStream(buf));<a name="line.451"></a>
<span class="sourceLineNo">452</span> safeWrite(ctx, buf);<a name="line.452"></a>
<span class="sourceLineNo">453</span> }<a name="line.453"></a>
<span class="sourceLineNo">454</span><a name="line.454"></a>
<span class="sourceLineNo">455</span> @Override<a name="line.455"></a>
<span class="sourceLineNo">456</span> public void handlerAdded(ChannelHandlerContext ctx) throws Exception {<a name="line.456"></a>
<span class="sourceLineNo">457</span> safeWrite(ctx, ctx.alloc().buffer(4).writeInt(SASL_TRANSFER_MAGIC_NUMBER));<a name="line.457"></a>
<span class="sourceLineNo">458</span> sendSaslMessage(ctx, new byte[0]);<a name="line.458"></a>
<span class="sourceLineNo">459</span> ctx.flush();<a name="line.459"></a>
<span class="sourceLineNo">460</span> step++;<a name="line.460"></a>
<span class="sourceLineNo">461</span> }<a name="line.461"></a>
<span class="sourceLineNo">462</span><a name="line.462"></a>
<span class="sourceLineNo">463</span> @Override<a name="line.463"></a>
<span class="sourceLineNo">464</span> public void channelInactive(ChannelHandlerContext ctx) throws Exception {<a name="line.464"></a>
<span class="sourceLineNo">465</span> saslClient.dispose();<a name="line.465"></a>
<span class="sourceLineNo">466</span> }<a name="line.466"></a>
<span class="sourceLineNo">467</span><a name="line.467"></a>
<span class="sourceLineNo">468</span> private void check(DataTransferEncryptorMessageProto proto) throws IOException {<a name="line.468"></a>
<span class="sourceLineNo">469</span> if (proto.getStatus() == DataTransferEncryptorStatus.ERROR_UNKNOWN_KEY) {<a name="line.469"></a>
<span class="sourceLineNo">470</span> dfsClient.clearDataEncryptionKey();<a name="line.470"></a>
<span class="sourceLineNo">471</span> throw new InvalidEncryptionKeyException(proto.getMessage());<a name="line.471"></a>
<span class="sourceLineNo">472</span> } else if (proto.getStatus() == DataTransferEncryptorStatus.ERROR) {<a name="line.472"></a>
<span class="sourceLineNo">473</span> throw new IOException(proto.getMessage());<a name="line.473"></a>
<span class="sourceLineNo">474</span> }<a name="line.474"></a>
<span class="sourceLineNo">475</span> }<a name="line.475"></a>
<span class="sourceLineNo">476</span><a name="line.476"></a>
<span class="sourceLineNo">477</span> private String getNegotiatedQop() {<a name="line.477"></a>
<span class="sourceLineNo">478</span> return (String) saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.478"></a>
<span class="sourceLineNo">479</span> }<a name="line.479"></a>
<span class="sourceLineNo">480</span><a name="line.480"></a>
<span class="sourceLineNo">481</span> private boolean isNegotiatedQopPrivacy() {<a name="line.481"></a>
<span class="sourceLineNo">482</span> String qop = getNegotiatedQop();<a name="line.482"></a>
<span class="sourceLineNo">483</span> return qop != null &amp;&amp; "auth-conf".equalsIgnoreCase(qop);<a name="line.483"></a>
<span class="sourceLineNo">484</span> }<a name="line.484"></a>
<span class="sourceLineNo">485</span><a name="line.485"></a>
<span class="sourceLineNo">486</span> private boolean requestedQopContainsPrivacy() {<a name="line.486"></a>
<span class="sourceLineNo">487</span> Set&lt;String&gt; requestedQop =<a name="line.487"></a>
<span class="sourceLineNo">488</span> ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a name="line.488"></a>
<span class="sourceLineNo">489</span> return requestedQop.contains("auth-conf");<a name="line.489"></a>
<span class="sourceLineNo">490</span> }<a name="line.490"></a>
<span class="sourceLineNo">491</span><a name="line.491"></a>
<span class="sourceLineNo">492</span> private void checkSaslComplete() throws IOException {<a name="line.492"></a>
<span class="sourceLineNo">493</span> if (!saslClient.isComplete()) {<a name="line.493"></a>
<span class="sourceLineNo">494</span> throw new IOException("Failed to complete SASL handshake");<a name="line.494"></a>
<span class="sourceLineNo">495</span> }<a name="line.495"></a>
<span class="sourceLineNo">496</span> Set&lt;String&gt; requestedQop =<a name="line.496"></a>
<span class="sourceLineNo">497</span> ImmutableSet.copyOf(Arrays.asList(saslProps.get(Sasl.QOP).split(",")));<a name="line.497"></a>
<span class="sourceLineNo">498</span> String negotiatedQop = getNegotiatedQop();<a name="line.498"></a>
<span class="sourceLineNo">499</span> LOG.debug(<a name="line.499"></a>
<span class="sourceLineNo">500</span> "Verifying QOP, requested QOP = " + requestedQop + ", negotiated QOP = " + negotiatedQop);<a name="line.500"></a>
<span class="sourceLineNo">501</span> if (!requestedQop.contains(negotiatedQop)) {<a name="line.501"></a>
<span class="sourceLineNo">502</span> throw new IOException(String.format("SASL handshake completed, but "<a name="line.502"></a>
<span class="sourceLineNo">503</span> + "channel does not have acceptable quality of protection, "<a name="line.503"></a>
<span class="sourceLineNo">504</span> + "requested = %s, negotiated = %s", requestedQop, negotiatedQop));<a name="line.504"></a>
<span class="sourceLineNo">505</span> }<a name="line.505"></a>
<span class="sourceLineNo">506</span> }<a name="line.506"></a>
<span class="sourceLineNo">507</span><a name="line.507"></a>
<span class="sourceLineNo">508</span> private boolean useWrap() {<a name="line.508"></a>
<span class="sourceLineNo">509</span> String qop = (String) saslClient.getNegotiatedProperty(Sasl.QOP);<a name="line.509"></a>
<span class="sourceLineNo">510</span> return qop != null &amp;&amp; !"auth".equalsIgnoreCase(qop);<a name="line.510"></a>
<span class="sourceLineNo">511</span> }<a name="line.511"></a>
<span class="sourceLineNo">512</span><a name="line.512"></a>
<span class="sourceLineNo">513</span> private CipherOption unwrap(CipherOption option, SaslClient saslClient) throws IOException {<a name="line.513"></a>
<span class="sourceLineNo">514</span> byte[] inKey = option.getInKey();<a name="line.514"></a>
<span class="sourceLineNo">515</span> if (inKey != null) {<a name="line.515"></a>
<span class="sourceLineNo">516</span> inKey = saslClient.unwrap(inKey, 0, inKey.length);<a name="line.516"></a>
<span class="sourceLineNo">517</span> }<a name="line.517"></a>
<span class="sourceLineNo">518</span> byte[] outKey = option.getOutKey();<a name="line.518"></a>
<span class="sourceLineNo">519</span> if (outKey != null) {<a name="line.519"></a>
<span class="sourceLineNo">520</span> outKey = saslClient.unwrap(outKey, 0, outKey.length);<a name="line.520"></a>
<span class="sourceLineNo">521</span> }<a name="line.521"></a>
<span class="sourceLineNo">522</span> return new CipherOption(option.getCipherSuite(), inKey, option.getInIv(), outKey,<a name="line.522"></a>
<span class="sourceLineNo">523</span> option.getOutIv());<a name="line.523"></a>
<span class="sourceLineNo">524</span> }<a name="line.524"></a>
<span class="sourceLineNo">525</span><a name="line.525"></a>
<span class="sourceLineNo">526</span> private CipherOption getCipherOption(DataTransferEncryptorMessageProto proto,<a name="line.526"></a>
<span class="sourceLineNo">527</span> boolean isNegotiatedQopPrivacy, SaslClient saslClient) throws IOException {<a name="line.527"></a>
<span class="sourceLineNo">528</span> List&lt;CipherOption&gt; cipherOptions =<a name="line.528"></a>
<span class="sourceLineNo">529</span> PBHelperClient.convertCipherOptionProtos(proto.getCipherOptionList());<a name="line.529"></a>
<span class="sourceLineNo">530</span> if (cipherOptions == null || cipherOptions.isEmpty()) {<a name="line.530"></a>
<span class="sourceLineNo">531</span> return null;<a name="line.531"></a>
<span class="sourceLineNo">532</span> }<a name="line.532"></a>
<span class="sourceLineNo">533</span> CipherOption cipherOption = cipherOptions.get(0);<a name="line.533"></a>
<span class="sourceLineNo">534</span> return isNegotiatedQopPrivacy ? unwrap(cipherOption, saslClient) : cipherOption;<a name="line.534"></a>
<span class="sourceLineNo">535</span> }<a name="line.535"></a>
<span class="sourceLineNo">536</span><a name="line.536"></a>
<span class="sourceLineNo">537</span> @Override<a name="line.537"></a>
<span class="sourceLineNo">538</span> public void channelRead(ChannelHandlerContext ctx, Object msg) throws Exception {<a name="line.538"></a>
<span class="sourceLineNo">539</span> if (msg instanceof DataTransferEncryptorMessageProto) {<a name="line.539"></a>
<span class="sourceLineNo">540</span> DataTransferEncryptorMessageProto proto = (DataTransferEncryptorMessageProto) msg;<a name="line.540"></a>
<span class="sourceLineNo">541</span> check(proto);<a name="line.541"></a>
<span class="sourceLineNo">542</span> byte[] challenge = proto.getPayload().toByteArray();<a name="line.542"></a>
<span class="sourceLineNo">543</span> byte[] response = saslClient.evaluateChallenge(challenge);<a name="line.543"></a>
<span class="sourceLineNo">544</span> switch (step) {<a name="line.544"></a>
<span class="sourceLineNo">545</span> case 1: {<a name="line.545"></a>
<span class="sourceLineNo">546</span> List&lt;CipherOption&gt; cipherOptions = null;<a name="line.546"></a>
<span class="sourceLineNo">547</span> if (requestedQopContainsPrivacy()) {<a name="line.547"></a>
<span class="sourceLineNo">548</span> cipherOptions = getCipherOptions();<a name="line.548"></a>
<span class="sourceLineNo">549</span> }<a name="line.549"></a>
<span class="sourceLineNo">550</span> sendSaslMessage(ctx, response, cipherOptions);<a name="line.550"></a>
<span class="sourceLineNo">551</span> ctx.flush();<a name="line.551"></a>
<span class="sourceLineNo">552</span> step++;<a name="line.552"></a>
<span class="sourceLineNo">553</span> break;<a name="line.553"></a>
<span class="sourceLineNo">554</span> }<a name="line.554"></a>
<span class="sourceLineNo">555</span> case 2: {<a name="line.555"></a>
<span class="sourceLineNo">556</span> assert response == null;<a name="line.556"></a>
<span class="sourceLineNo">557</span> checkSaslComplete();<a name="line.557"></a>
<span class="sourceLineNo">558</span> CipherOption cipherOption =<a name="line.558"></a>
<span class="sourceLineNo">559</span> getCipherOption(proto, isNegotiatedQopPrivacy(), saslClient);<a name="line.559"></a>
<span class="sourceLineNo">560</span> ChannelPipeline p = ctx.pipeline();<a name="line.560"></a>
<span class="sourceLineNo">561</span> while (p.first() != null) {<a name="line.561"></a>
<span class="sourceLineNo">562</span> p.removeFirst();<a name="line.562"></a>
<span class="sourceLineNo">563</span> }<a name="line.563"></a>
<span class="sourceLineNo">564</span> if (cipherOption != null) {<a name="line.564"></a>
<span class="sourceLineNo">565</span> CryptoCodec codec = CryptoCodec.getInstance(conf, cipherOption.getCipherSuite());<a name="line.565"></a>
<span class="sourceLineNo">566</span> p.addLast(new EncryptHandler(codec, cipherOption.getInKey(), cipherOption.getInIv()),<a name="line.566"></a>
<span class="sourceLineNo">567</span> new DecryptHandler(codec, cipherOption.getOutKey(), cipherOption.getOutIv()));<a name="line.567"></a>
<span class="sourceLineNo">568</span> } else {<a name="line.568"></a>
<span class="sourceLineNo">569</span> if (useWrap()) {<a name="line.569"></a>
<span class="sourceLineNo">570</span> p.addLast(new SaslWrapHandler(saslClient),<a name="line.570"></a>
<span class="sourceLineNo">571</span> new LengthFieldBasedFrameDecoder(Integer.MAX_VALUE, 0, 4),<a name="line.571"></a>
<span class="sourceLineNo">572</span> new SaslUnwrapHandler(saslClient));<a name="line.572"></a>
<span class="sourceLineNo">573</span> }<a name="line.573"></a>
<span class="sourceLineNo">574</span> }<a name="line.574"></a>
<span class="sourceLineNo">575</span> promise.trySuccess(null);<a name="line.575"></a>
<span class="sourceLineNo">576</span> break;<a name="line.576"></a>
<span class="sourceLineNo">577</span> }<a name="line.577"></a>
<span class="sourceLineNo">578</span> default:<a name="line.578"></a>
<span class="sourceLineNo">579</span> throw new IllegalArgumentException("Unrecognized negotiation step: " + step);<a name="line.579"></a>
<span class="sourceLineNo">580</span> }<a name="line.580"></a>
<span class="sourceLineNo">581</span> } else {<a name="line.581"></a>
<span class="sourceLineNo">582</span> ctx.fireChannelRead(msg);<a name="line.582"></a>
<span class="sourceLineNo">583</span> }<a name="line.583"></a>
<span class="sourceLineNo">584</span> }<a name="line.584"></a>
<span class="sourceLineNo">585</span><a name="line.585"></a>
<span class="sourceLineNo">586</span> @Override<a name="line.586"></a>
<span class="sourceLineNo">587</span> public void exceptionCaught(ChannelHandlerContext ctx, Throwable cause) throws Exception {<a name="line.587"></a>
<span class="sourceLineNo">588</span> promise.tryFailure(cause);<a name="line.588"></a>
<span class="sourceLineNo">589</span> }<a name="line.589"></a>
<span class="sourceLineNo">590</span><a name="line.590"></a>
<span class="sourceLineNo">591</span> @Override<a name="line.591"></a>
<span class="sourceLineNo">592</span> public void userEventTriggered(ChannelHandlerContext ctx, Object evt) throws Exception {<a name="line.592"></a>
<span class="sourceLineNo">593</span> if (evt instanceof IdleStateEvent &amp;&amp; ((IdleStateEvent) evt).state() == READER_IDLE) {<a name="line.593"></a>
<span class="sourceLineNo">594</span> promise.tryFailure(new IOException("Timeout(" + timeoutMs + "ms) waiting for response"));<a name="line.594"></a>
<span class="sourceLineNo">595</span> } else {<a name="line.595"></a>
<span class="sourceLineNo">596</span> super.userEventTriggered(ctx, evt);<a name="line.596"></a>
<span class="sourceLineNo">597</span> }<a name="line.597"></a>
<span class="sourceLineNo">598</span> }<a name="line.598"></a>
<span class="sourceLineNo">599</span> }<a name="line.599"></a>
<span class="sourceLineNo">600</span><a name="line.600"></a>
<span class="sourceLineNo">601</span> private static final class SaslUnwrapHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a name="line.601"></a>
<span class="sourceLineNo">602</span><a name="line.602"></a>
<span class="sourceLineNo">603</span> private final SaslClient saslClient;<a name="line.603"></a>
<span class="sourceLineNo">604</span><a name="line.604"></a>
<span class="sourceLineNo">605</span> public SaslUnwrapHandler(SaslClient saslClient) {<a name="line.605"></a>
<span class="sourceLineNo">606</span> this.saslClient = saslClient;<a name="line.606"></a>
<span class="sourceLineNo">607</span> }<a name="line.607"></a>
<span class="sourceLineNo">608</span><a name="line.608"></a>
<span class="sourceLineNo">609</span> @Override<a name="line.609"></a>
<span class="sourceLineNo">610</span> public void channelInactive(ChannelHandlerContext ctx) throws Exception {<a name="line.610"></a>
<span class="sourceLineNo">611</span> saslClient.dispose();<a name="line.611"></a>
<span class="sourceLineNo">612</span> }<a name="line.612"></a>
<span class="sourceLineNo">613</span><a name="line.613"></a>
<span class="sourceLineNo">614</span> @Override<a name="line.614"></a>
<span class="sourceLineNo">615</span> protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a name="line.615"></a>
<span class="sourceLineNo">616</span> msg.skipBytes(4);<a name="line.616"></a>
<span class="sourceLineNo">617</span> byte[] b = new byte[msg.readableBytes()];<a name="line.617"></a>
<span class="sourceLineNo">618</span> msg.readBytes(b);<a name="line.618"></a>
<span class="sourceLineNo">619</span> ctx.fireChannelRead(Unpooled.wrappedBuffer(saslClient.unwrap(b, 0, b.length)));<a name="line.619"></a>
<span class="sourceLineNo">620</span> }<a name="line.620"></a>
<span class="sourceLineNo">621</span> }<a name="line.621"></a>
<span class="sourceLineNo">622</span><a name="line.622"></a>
<span class="sourceLineNo">623</span> private static final class SaslWrapHandler extends ChannelOutboundHandlerAdapter {<a name="line.623"></a>
<span class="sourceLineNo">624</span><a name="line.624"></a>
<span class="sourceLineNo">625</span> private final SaslClient saslClient;<a name="line.625"></a>
<span class="sourceLineNo">626</span><a name="line.626"></a>
<span class="sourceLineNo">627</span> private CompositeByteBuf cBuf;<a name="line.627"></a>
<span class="sourceLineNo">628</span><a name="line.628"></a>
<span class="sourceLineNo">629</span> public SaslWrapHandler(SaslClient saslClient) {<a name="line.629"></a>
<span class="sourceLineNo">630</span> this.saslClient = saslClient;<a name="line.630"></a>
<span class="sourceLineNo">631</span> }<a name="line.631"></a>
<span class="sourceLineNo">632</span><a name="line.632"></a>
<span class="sourceLineNo">633</span> @Override<a name="line.633"></a>
<span class="sourceLineNo">634</span> public void handlerAdded(ChannelHandlerContext ctx) throws Exception {<a name="line.634"></a>
<span class="sourceLineNo">635</span> cBuf = new CompositeByteBuf(ctx.alloc(), false, Integer.MAX_VALUE);<a name="line.635"></a>
<span class="sourceLineNo">636</span> }<a name="line.636"></a>
<span class="sourceLineNo">637</span><a name="line.637"></a>
<span class="sourceLineNo">638</span> @Override<a name="line.638"></a>
<span class="sourceLineNo">639</span> public void write(ChannelHandlerContext ctx, Object msg, ChannelPromise promise)<a name="line.639"></a>
<span class="sourceLineNo">640</span> throws Exception {<a name="line.640"></a>
<span class="sourceLineNo">641</span> if (msg instanceof ByteBuf) {<a name="line.641"></a>
<span class="sourceLineNo">642</span> ByteBuf buf = (ByteBuf) msg;<a name="line.642"></a>
<span class="sourceLineNo">643</span> cBuf.addComponent(buf);<a name="line.643"></a>
<span class="sourceLineNo">644</span> cBuf.writerIndex(cBuf.writerIndex() + buf.readableBytes());<a name="line.644"></a>
<span class="sourceLineNo">645</span> } else {<a name="line.645"></a>
<span class="sourceLineNo">646</span> safeWrite(ctx, msg);<a name="line.646"></a>
<span class="sourceLineNo">647</span> }<a name="line.647"></a>
<span class="sourceLineNo">648</span> }<a name="line.648"></a>
<span class="sourceLineNo">649</span><a name="line.649"></a>
<span class="sourceLineNo">650</span> @Override<a name="line.650"></a>
<span class="sourceLineNo">651</span> public void flush(ChannelHandlerContext ctx) throws Exception {<a name="line.651"></a>
<span class="sourceLineNo">652</span> if (cBuf.isReadable()) {<a name="line.652"></a>
<span class="sourceLineNo">653</span> byte[] b = new byte[cBuf.readableBytes()];<a name="line.653"></a>
<span class="sourceLineNo">654</span> cBuf.readBytes(b);<a name="line.654"></a>
<span class="sourceLineNo">655</span> cBuf.discardReadComponents();<a name="line.655"></a>
<span class="sourceLineNo">656</span> byte[] wrapped = saslClient.wrap(b, 0, b.length);<a name="line.656"></a>
<span class="sourceLineNo">657</span> ByteBuf buf = ctx.alloc().ioBuffer(4 + wrapped.length);<a name="line.657"></a>
<span class="sourceLineNo">658</span> buf.writeInt(wrapped.length);<a name="line.658"></a>
<span class="sourceLineNo">659</span> buf.writeBytes(wrapped);<a name="line.659"></a>
<span class="sourceLineNo">660</span> safeWrite(ctx, buf);<a name="line.660"></a>
<span class="sourceLineNo">661</span> }<a name="line.661"></a>
<span class="sourceLineNo">662</span> ctx.flush();<a name="line.662"></a>
<span class="sourceLineNo">663</span> }<a name="line.663"></a>
<span class="sourceLineNo">664</span><a name="line.664"></a>
<span class="sourceLineNo">665</span> @Override<a name="line.665"></a>
<span class="sourceLineNo">666</span> public void handlerRemoved(ChannelHandlerContext ctx) throws Exception {<a name="line.666"></a>
<span class="sourceLineNo">667</span> // Release buffer on removal.<a name="line.667"></a>
<span class="sourceLineNo">668</span> cBuf.release();<a name="line.668"></a>
<span class="sourceLineNo">669</span> cBuf = null;<a name="line.669"></a>
<span class="sourceLineNo">670</span> }<a name="line.670"></a>
<span class="sourceLineNo">671</span> }<a name="line.671"></a>
<span class="sourceLineNo">672</span><a name="line.672"></a>
<span class="sourceLineNo">673</span> private static final class DecryptHandler extends SimpleChannelInboundHandler&lt;ByteBuf&gt; {<a name="line.673"></a>
<span class="sourceLineNo">674</span><a name="line.674"></a>
<span class="sourceLineNo">675</span> private final Decryptor decryptor;<a name="line.675"></a>
<span class="sourceLineNo">676</span><a name="line.676"></a>
<span class="sourceLineNo">677</span> public DecryptHandler(CryptoCodec codec, byte[] key, byte[] iv)<a name="line.677"></a>
<span class="sourceLineNo">678</span> throws GeneralSecurityException, IOException {<a name="line.678"></a>
<span class="sourceLineNo">679</span> this.decryptor = codec.createDecryptor();<a name="line.679"></a>
<span class="sourceLineNo">680</span> this.decryptor.init(key, Arrays.copyOf(iv, iv.length));<a name="line.680"></a>
<span class="sourceLineNo">681</span> }<a name="line.681"></a>
<span class="sourceLineNo">682</span><a name="line.682"></a>
<span class="sourceLineNo">683</span> @Override<a name="line.683"></a>
<span class="sourceLineNo">684</span> protected void channelRead0(ChannelHandlerContext ctx, ByteBuf msg) throws Exception {<a name="line.684"></a>
<span class="sourceLineNo">685</span> ByteBuf inBuf;<a name="line.685"></a>
<span class="sourceLineNo">686</span> boolean release = false;<a name="line.686"></a>
<span class="sourceLineNo">687</span> if (msg.nioBufferCount() == 1) {<a name="line.687"></a>
<span class="sourceLineNo">688</span> inBuf = msg;<a name="line.688"></a>
<span class="sourceLineNo">689</span> } else {<a name="line.689"></a>
<span class="sourceLineNo">690</span> inBuf = ctx.alloc().directBuffer(msg.readableBytes());<a name="line.690"></a>
<span class="sourceLineNo">691</span> msg.readBytes(inBuf);<a name="line.691"></a>
<span class="sourceLineNo">692</span> release = true;<a name="line.692"></a>
<span class="sourceLineNo">693</span> }<a name="line.693"></a>
<span class="sourceLineNo">694</span> ByteBuffer inBuffer = inBuf.nioBuffer();<a name="line.694"></a>
<span class="sourceLineNo">695</span> ByteBuf outBuf = ctx.alloc().directBuffer(inBuf.readableBytes());<a name="line.695"></a>
<span class="sourceLineNo">696</span> ByteBuffer outBuffer = outBuf.nioBuffer(0, inBuf.readableBytes());<a name="line.696"></a>
<span class="sourceLineNo">697</span> decryptor.decrypt(inBuffer, outBuffer);<a name="line.697"></a>
<span class="sourceLineNo">698</span> outBuf.writerIndex(inBuf.readableBytes());<a name="line.698"></a>
<span class="sourceLineNo">699</span> if (release) {<a name="line.699"></a>
<span class="sourceLineNo">700</span> inBuf.release();<a name="line.700"></a>
<span class="sourceLineNo">701</span> }<a name="line.701"></a>
<span class="sourceLineNo">702</span> ctx.fireChannelRead(outBuf);<a name="line.702"></a>
<span class="sourceLineNo">703</span> }<a name="line.703"></a>
<span class="sourceLineNo">704</span> }<a name="line.704"></a>
<span class="sourceLineNo">705</span><a name="line.705"></a>
<span class="sourceLineNo">706</span> private static final class EncryptHandler extends MessageToByteEncoder&lt;ByteBuf&gt; {<a name="line.706"></a>
<span class="sourceLineNo">707</span><a name="line.707"></a>
<span class="sourceLineNo">708</span> private final Encryptor encryptor;<a name="line.708"></a>
<span class="sourceLineNo">709</span><a name="line.709"></a>
<span class="sourceLineNo">710</span> public EncryptHandler(CryptoCodec codec, byte[] key, byte[] iv)<a name="line.710"></a>
<span class="sourceLineNo">711</span> throws GeneralSecurityException, IOException {<a name="line.711"></a>
<span class="sourceLineNo">712</span> this.encryptor = codec.createEncryptor();<a name="line.712"></a>
<span class="sourceLineNo">713</span> this.encryptor.init(key, Arrays.copyOf(iv, iv.length));<a name="line.713"></a>
<span class="sourceLineNo">714</span> }<a name="line.714"></a>
<span class="sourceLineNo">715</span><a name="line.715"></a>
<span class="sourceLineNo">716</span> @Override<a name="line.716"></a>
<span class="sourceLineNo">717</span> protected ByteBuf allocateBuffer(ChannelHandlerContext ctx, ByteBuf msg, boolean preferDirect)<a name="line.717"></a>
<span class="sourceLineNo">718</span> throws Exception {<a name="line.718"></a>
<span class="sourceLineNo">719</span> if (preferDirect) {<a name="line.719"></a>
<span class="sourceLineNo">720</span> return ctx.alloc().directBuffer(msg.readableBytes());<a name="line.720"></a>
<span class="sourceLineNo">721</span> } else {<a name="line.721"></a>
<span class="sourceLineNo">722</span> return ctx.alloc().buffer(msg.readableBytes());<a name="line.722"></a>
<span class="sourceLineNo">723</span> }<a name="line.723"></a>
<span class="sourceLineNo">724</span> }<a name="line.724"></a>
<span class="sourceLineNo">725</span><a name="line.725"></a>
<span class="sourceLineNo">726</span> @Override<a name="line.726"></a>
<span class="sourceLineNo">727</span> protected void encode(ChannelHandlerContext ctx, ByteBuf msg, ByteBuf out) throws Exception {<a name="line.727"></a>
<span class="sourceLineNo">728</span> ByteBuf inBuf;<a name="line.728"></a>
<span class="sourceLineNo">729</span> boolean release = false;<a name="line.729"></a>
<span class="sourceLineNo">730</span> if (msg.nioBufferCount() == 1) {<a name="line.730"></a>
<span class="sourceLineNo">731</span> inBuf = msg;<a name="line.731"></a>
<span class="sourceLineNo">732</span> } else {<a name="line.732"></a>
<span class="sourceLineNo">733</span> inBuf = ctx.alloc().directBuffer(msg.readableBytes());<a name="line.733"></a>
<span class="sourceLineNo">734</span> msg.readBytes(inBuf);<a name="line.734"></a>
<span class="sourceLineNo">735</span> release = true;<a name="line.735"></a>
<span class="sourceLineNo">736</span> }<a name="line.736"></a>
<span class="sourceLineNo">737</span> ByteBuffer inBuffer = inBuf.nioBuffer();<a name="line.737"></a>
<span class="sourceLineNo">738</span> ByteBuffer outBuffer = out.nioBuffer(0, inBuf.readableBytes());<a name="line.738"></a>
<span class="sourceLineNo">739</span> encryptor.encrypt(inBuffer, outBuffer);<a name="line.739"></a>
<span class="sourceLineNo">740</span> out.writerIndex(inBuf.readableBytes());<a name="line.740"></a>
<span class="sourceLineNo">741</span> if (release) {<a name="line.741"></a>
<span class="sourceLineNo">742</span> inBuf.release();<a name="line.742"></a>
<span class="sourceLineNo">743</span> }<a name="line.743"></a>
<span class="sourceLineNo">744</span> }<a name="line.744"></a>
<span class="sourceLineNo">745</span> }<a name="line.745"></a>
<span class="sourceLineNo">746</span><a name="line.746"></a>
<span class="sourceLineNo">747</span> private static String getUserNameFromEncryptionKey(DataEncryptionKey encryptionKey) {<a name="line.747"></a>
<span class="sourceLineNo">748</span> return encryptionKey.keyId + NAME_DELIMITER + encryptionKey.blockPoolId + NAME_DELIMITER<a name="line.748"></a>
<span class="sourceLineNo">749</span> + Base64.getEncoder().encodeToString(encryptionKey.nonce);<a name="line.749"></a>
<span class="sourceLineNo">750</span> }<a name="line.750"></a>
<span class="sourceLineNo">751</span><a name="line.751"></a>
<span class="sourceLineNo">752</span> private static char[] encryptionKeyToPassword(byte[] encryptionKey) {<a name="line.752"></a>
<span class="sourceLineNo">753</span> return Base64.getEncoder().encodeToString(encryptionKey).toCharArray();<a name="line.753"></a>
<span class="sourceLineNo">754</span> }<a name="line.754"></a>
<span class="sourceLineNo">755</span><a name="line.755"></a>
<span class="sourceLineNo">756</span> private static String buildUsername(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a name="line.756"></a>
<span class="sourceLineNo">757</span> return Base64.getEncoder().encodeToString(blockToken.getIdentifier());<a name="line.757"></a>
<span class="sourceLineNo">758</span> }<a name="line.758"></a>
<span class="sourceLineNo">759</span><a name="line.759"></a>
<span class="sourceLineNo">760</span> private static char[] buildClientPassword(Token&lt;BlockTokenIdentifier&gt; blockToken) {<a name="line.760"></a>
<span class="sourceLineNo">761</span> return Base64.getEncoder().encodeToString(blockToken.getPassword()).toCharArray();<a name="line.761"></a>
<span class="sourceLineNo">762</span> }<a name="line.762"></a>
<span class="sourceLineNo">763</span><a name="line.763"></a>
<span class="sourceLineNo">764</span> private static Map&lt;String, String&gt; createSaslPropertiesForEncryption(String encryptionAlgorithm) {<a name="line.764"></a>
<span class="sourceLineNo">765</span> Map&lt;String, String&gt; saslProps = Maps.newHashMapWithExpectedSize(3);<a name="line.765"></a>
<span class="sourceLineNo">766</span> saslProps.put(Sasl.QOP, QualityOfProtection.PRIVACY.getSaslQop());<a name="line.766"></a>
<span class="sourceLineNo">767</span> saslProps.put(Sasl.SERVER_AUTH, "true");<a name="line.767"></a>
<span class="sourceLineNo">768</span> saslProps.put("com.sun.security.sasl.digest.cipher", encryptionAlgorithm);<a name="line.768"></a>
<span class="sourceLineNo">769</span> return saslProps;<a name="line.769"></a>
<span class="sourceLineNo">770</span> }<a name="line.770"></a>
<span class="sourceLineNo">771</span><a name="line.771"></a>
<span class="sourceLineNo">772</span> private static void doSaslNegotiation(Configuration conf, Channel channel, int timeoutMs,<a name="line.772"></a>
<span class="sourceLineNo">773</span> String username, char[] password, Map&lt;String, String&gt; saslProps, Promise&lt;Void&gt; saslPromise,<a name="line.773"></a>
<span class="sourceLineNo">774</span> DFSClient dfsClient) {<a name="line.774"></a>
<span class="sourceLineNo">775</span> try {<a name="line.775"></a>
<span class="sourceLineNo">776</span> channel.pipeline().addLast(new IdleStateHandler(timeoutMs, 0, 0, TimeUnit.MILLISECONDS),<a name="line.776"></a>
<span class="sourceLineNo">777</span> new ProtobufVarint32FrameDecoder(),<a name="line.777"></a>
<span class="sourceLineNo">778</span> new ProtobufDecoder(DataTransferEncryptorMessageProto.getDefaultInstance()),<a name="line.778"></a>
<span class="sourceLineNo">779</span> new SaslNegotiateHandler(conf, username, password, saslProps, timeoutMs, saslPromise,<a name="line.779"></a>
<span class="sourceLineNo">780</span> dfsClient));<a name="line.780"></a>
<span class="sourceLineNo">781</span> } catch (SaslException e) {<a name="line.781"></a>
<span class="sourceLineNo">782</span> saslPromise.tryFailure(e);<a name="line.782"></a>
<span class="sourceLineNo">783</span> }<a name="line.783"></a>
<span class="sourceLineNo">784</span> }<a name="line.784"></a>
<span class="sourceLineNo">785</span><a name="line.785"></a>
<span class="sourceLineNo">786</span> static void trySaslNegotiate(Configuration conf, Channel channel, DatanodeInfo dnInfo,<a name="line.786"></a>
<span class="sourceLineNo">787</span> int timeoutMs, DFSClient client, Token&lt;BlockTokenIdentifier&gt; accessToken,<a name="line.787"></a>
<span class="sourceLineNo">788</span> Promise&lt;Void&gt; saslPromise) throws IOException {<a name="line.788"></a>
<span class="sourceLineNo">789</span> SaslDataTransferClient saslClient = client.getSaslDataTransferClient();<a name="line.789"></a>
<span class="sourceLineNo">790</span> SaslPropertiesResolver saslPropsResolver = SASL_ADAPTOR.getSaslPropsResolver(saslClient);<a name="line.790"></a>
<span class="sourceLineNo">791</span> TrustedChannelResolver trustedChannelResolver =<a name="line.791"></a>
<span class="sourceLineNo">792</span> SASL_ADAPTOR.getTrustedChannelResolver(saslClient);<a name="line.792"></a>
<span class="sourceLineNo">793</span> AtomicBoolean fallbackToSimpleAuth = SASL_ADAPTOR.getFallbackToSimpleAuth(saslClient);<a name="line.793"></a>
<span class="sourceLineNo">794</span> InetAddress addr = ((InetSocketAddress) channel.remoteAddress()).getAddress();<a name="line.794"></a>
<span class="sourceLineNo">795</span> if (trustedChannelResolver.isTrusted() || trustedChannelResolver.isTrusted(addr)) {<a name="line.795"></a>
<span class="sourceLineNo">796</span> saslPromise.trySuccess(null);<a name="line.796"></a>
<span class="sourceLineNo">797</span> return;<a name="line.797"></a>
<span class="sourceLineNo">798</span> }<a name="line.798"></a>
<span class="sourceLineNo">799</span> DataEncryptionKey encryptionKey = client.newDataEncryptionKey();<a name="line.799"></a>
<span class="sourceLineNo">800</span> if (encryptionKey != null) {<a name="line.800"></a>
<span class="sourceLineNo">801</span> if (LOG.isDebugEnabled()) {<a name="line.801"></a>
<span class="sourceLineNo">802</span> LOG.debug(<a name="line.802"></a>
<span class="sourceLineNo">803</span> "SASL client doing encrypted handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.803"></a>
<span class="sourceLineNo">804</span> }<a name="line.804"></a>
<span class="sourceLineNo">805</span> doSaslNegotiation(conf, channel, timeoutMs, getUserNameFromEncryptionKey(encryptionKey),<a name="line.805"></a>
<span class="sourceLineNo">806</span> encryptionKeyToPassword(encryptionKey.encryptionKey),<a name="line.806"></a>
<span class="sourceLineNo">807</span> createSaslPropertiesForEncryption(encryptionKey.encryptionAlgorithm), saslPromise, client);<a name="line.807"></a>
<span class="sourceLineNo">808</span> } else if (!UserGroupInformation.isSecurityEnabled()) {<a name="line.808"></a>
<span class="sourceLineNo">809</span> if (LOG.isDebugEnabled()) {<a name="line.809"></a>
<span class="sourceLineNo">810</span> LOG.debug("SASL client skipping handshake in unsecured configuration for addr = " + addr<a name="line.810"></a>
<span class="sourceLineNo">811</span> + ", datanodeId = " + dnInfo);<a name="line.811"></a>
<span class="sourceLineNo">812</span> }<a name="line.812"></a>
<span class="sourceLineNo">813</span> saslPromise.trySuccess(null);<a name="line.813"></a>
<span class="sourceLineNo">814</span> } else if (dnInfo.getXferPort() &lt; 1024) {<a name="line.814"></a>
<span class="sourceLineNo">815</span> if (LOG.isDebugEnabled()) {<a name="line.815"></a>
<span class="sourceLineNo">816</span> LOG.debug("SASL client skipping handshake in secured configuration with "<a name="line.816"></a>
<span class="sourceLineNo">817</span> + "privileged port for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.817"></a>
<span class="sourceLineNo">818</span> }<a name="line.818"></a>
<span class="sourceLineNo">819</span> saslPromise.trySuccess(null);<a name="line.819"></a>
<span class="sourceLineNo">820</span> } else if (fallbackToSimpleAuth != null &amp;&amp; fallbackToSimpleAuth.get()) {<a name="line.820"></a>
<span class="sourceLineNo">821</span> if (LOG.isDebugEnabled()) {<a name="line.821"></a>
<span class="sourceLineNo">822</span> LOG.debug("SASL client skipping handshake in secured configuration with "<a name="line.822"></a>
<span class="sourceLineNo">823</span> + "unsecured cluster for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.823"></a>
<span class="sourceLineNo">824</span> }<a name="line.824"></a>
<span class="sourceLineNo">825</span> saslPromise.trySuccess(null);<a name="line.825"></a>
<span class="sourceLineNo">826</span> } else if (saslPropsResolver != null) {<a name="line.826"></a>
<span class="sourceLineNo">827</span> if (LOG.isDebugEnabled()) {<a name="line.827"></a>
<span class="sourceLineNo">828</span> LOG.debug(<a name="line.828"></a>
<span class="sourceLineNo">829</span> "SASL client doing general handshake for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.829"></a>
<span class="sourceLineNo">830</span> }<a name="line.830"></a>
<span class="sourceLineNo">831</span> doSaslNegotiation(conf, channel, timeoutMs, buildUsername(accessToken),<a name="line.831"></a>
<span class="sourceLineNo">832</span> buildClientPassword(accessToken), saslPropsResolver.getClientProperties(addr), saslPromise,<a name="line.832"></a>
<span class="sourceLineNo">833</span> client);<a name="line.833"></a>
<span class="sourceLineNo">834</span> } else {<a name="line.834"></a>
<span class="sourceLineNo">835</span> // It's a secured cluster using non-privileged ports, but no SASL. The only way this can<a name="line.835"></a>
<span class="sourceLineNo">836</span> // happen is if the DataNode has ignore.secure.ports.for.testing configured, so this is a rare<a name="line.836"></a>
<span class="sourceLineNo">837</span> // edge case.<a name="line.837"></a>
<span class="sourceLineNo">838</span> if (LOG.isDebugEnabled()) {<a name="line.838"></a>
<span class="sourceLineNo">839</span> LOG.debug("SASL client skipping handshake in secured configuration with no SASL "<a name="line.839"></a>
<span class="sourceLineNo">840</span> + "protection configured for addr = " + addr + ", datanodeId = " + dnInfo);<a name="line.840"></a>
<span class="sourceLineNo">841</span> }<a name="line.841"></a>
<span class="sourceLineNo">842</span> saslPromise.trySuccess(null);<a name="line.842"></a>
<span class="sourceLineNo">843</span> }<a name="line.843"></a>
<span class="sourceLineNo">844</span> }<a name="line.844"></a>
<span class="sourceLineNo">845</span><a name="line.845"></a>
<span class="sourceLineNo">846</span> static Encryptor createEncryptor(Configuration conf, HdfsFileStatus stat, DFSClient client)<a name="line.846"></a>
<span class="sourceLineNo">847</span> throws IOException {<a name="line.847"></a>
<span class="sourceLineNo">848</span> FileEncryptionInfo feInfo = stat.getFileEncryptionInfo();<a name="line.848"></a>
<span class="sourceLineNo">849</span> if (feInfo == null) {<a name="line.849"></a>
<span class="sourceLineNo">850</span> return null;<a name="line.850"></a>
<span class="sourceLineNo">851</span> }<a name="line.851"></a>
<span class="sourceLineNo">852</span> return TRANSPARENT_CRYPTO_HELPER.createEncryptor(conf, feInfo, client);<a name="line.852"></a>
<span class="sourceLineNo">853</span> }<a name="line.853"></a>
<span class="sourceLineNo">854</span>}<a name="line.854"></a>
</pre>
</div>
</body>
</html>