[KYUUBI #7147] Enforce to use Kyuubi's PlainSASLServer for PLAIN mechanism
### Why are the changes needed?
Close #7147
### How was this patch tested?
UT is updated, I also tested it with log4j2 kafka appended (kafka uses SASL/PLAIN authN).
### Was this patch authored or co-authored using generative AI tooling?
No.
Closes #7145 from pan3793/sasl-plain.
Closes #7147
dd2f7b0a8 [Cheng Pan] rm staging repo
c5c622918 [Cheng Pan] SASL PLAIN
a5331a624 [Cheng Pan] RC
Authored-by: Cheng Pan <chengpan@apache.org>
Signed-off-by: Cheng Pan <chengpan@apache.org>
diff --git a/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLHelper.scala b/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLHelper.scala
index 2d880a3..25b3e37 100644
--- a/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLHelper.scala
+++ b/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLHelper.scala
@@ -18,9 +18,10 @@
package org.apache.kyuubi.service.authentication
import java.security.Security
+import java.util
import java.util.Collections
import javax.security.auth.callback.{Callback, CallbackHandler, NameCallback, PasswordCallback, UnsupportedCallbackException}
-import javax.security.sasl.AuthorizeCallback
+import javax.security.sasl.{AuthorizeCallback, Sasl}
import org.apache.kyuubi.config.KyuubiConf
import org.apache.kyuubi.service.authentication.AuthMethods.AuthMethod
@@ -79,17 +80,32 @@
conf: KyuubiConf,
transportFactory: Option[TSaslServerTransport.Factory] = None,
isServer: Boolean = true): TTransportFactory = {
- val saslFactory = transportFactory.getOrElse(new TSaslServerTransport.Factory())
- try {
- val handler = new PlainServerCallbackHandler(authTypeStr, conf, isServer)
- val props = new java.util.HashMap[String, String]
- saslFactory.addServerDefinition("PLAIN", authTypeStr, null, props, handler)
- } catch {
- case e: NoSuchElementException =>
- throw new IllegalArgumentException(
- s"Illegal authentication type $authTypeStr for plain transport",
- e)
+ val handler =
+ try {
+ new PlainServerCallbackHandler(authTypeStr, conf, isServer)
+ } catch {
+ case _: NoSuchElementException =>
+ throw new IllegalArgumentException(
+ s"Illegal authentication type $authTypeStr for plain transport")
+ }
+ val saslFactory = transportFactory.getOrElse {
+ val _factory = new TSaslServerTransport.Factory()
+ _factory.setSaslServerFactory { d =>
+ if (d.mechanism == "PLAIN") {
+ // [KYUUBI #7142]: There may be multiple SaslServer classes registered for PLAIN
+ // mechanism, we should not use JDK Sasl.createSaslServer to avoid picking up the
+ // unexpected SaslServer implementation.
+ val kyuubiFactory = new PlainSASLServer.SaslPlainServerFactory()
+ kyuubiFactory.createSaslServer(d.mechanism, d.protocol, d.serverName, d.props, d.cbh)
+ } else {
+ Sasl.createSaslServer(d.mechanism, d.protocol, d.serverName, d.props, d.cbh)
+ }
+ }
+ _factory
}
+ val props = new util.HashMap[String, String]
+ props.put("org.apache.kyuubi.service.name", if (isServer) "SERVER" else "ENGINE")
+ saslFactory.addServerDefinition("PLAIN", authTypeStr, null, props, handler)
saslFactory
}
diff --git a/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLServer.scala b/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLServer.scala
index 737a6d8..068b5b1 100644
--- a/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLServer.scala
+++ b/kyuubi-common/src/main/scala/org/apache/kyuubi/service/authentication/PlainSASLServer.scala
@@ -19,6 +19,7 @@
import java.io.IOException
import java.security.Provider
+import java.util
import javax.security.auth.callback.{Callback, CallbackHandler, NameCallback, PasswordCallback, UnsupportedCallbackException}
import javax.security.sasl.{AuthorizeCallback, SaslException, SaslServer, SaslServerFactory}
@@ -37,7 +38,7 @@
try {
// parse the response
// message = [authzid] UTF8NUL authcid UTF8NUL passwd'
- val tokenList = new java.util.ArrayDeque[String]
+ val tokenList = new util.ArrayDeque[String]
val messageToken: StringBuilder = new StringBuilder
response.foreach {
case 0 =>
@@ -109,9 +110,9 @@
mechanism: String,
protocol: String,
serverName: String,
- props: java.util.Map[String, _],
+ props: util.Map[String, _],
cbh: CallbackHandler): SaslServer = mechanism match {
- case PLAIN_METHOD =>
+ case PLAIN_METHOD if props.containsKey("org.apache.kyuubi.service.name") =>
try {
new PlainSASLServer(cbh, AuthMethods.withName(protocol))
} catch {
@@ -121,7 +122,7 @@
case _ => null
}
- override def getMechanismNames(props: java.util.Map[String, _]): Array[String] = {
+ override def getMechanismNames(props: util.Map[String, _]): Array[String] = {
Array(PLAIN_METHOD)
}
}
diff --git a/kyuubi-common/src/test/scala/org/apache/kyuubi/service/authentication/PlainSASLServerSuite.scala b/kyuubi-common/src/test/scala/org/apache/kyuubi/service/authentication/PlainSASLServerSuite.scala
index a7f4b95..6e1a86a 100644
--- a/kyuubi-common/src/test/scala/org/apache/kyuubi/service/authentication/PlainSASLServerSuite.scala
+++ b/kyuubi-common/src/test/scala/org/apache/kyuubi/service/authentication/PlainSASLServerSuite.scala
@@ -17,6 +17,7 @@
package org.apache.kyuubi.service.authentication
+import java.util
import java.util.Collections
import javax.security.auth.callback.{Callback, CallbackHandler}
import javax.security.sasl.{AuthorizeCallback, SaslException}
@@ -28,8 +29,10 @@
test("SaslPlainServerFactory") {
val plainServerFactory = new SaslPlainServerFactory()
- val map = Collections.emptyMap[String, String]()
- assert(plainServerFactory.getMechanismNames(map) ===
+ val invalidProps = Collections.emptyMap[String, String]()
+ val props = new util.HashMap[String, String]()
+ props.put("org.apache.kyuubi.service.name", "TEST")
+ assert(plainServerFactory.getMechanismNames(props) ===
Array(PlainSASLServer.PLAIN_METHOD))
val ch = new CallbackHandler {
override def handle(callbacks: Array[Callback]): Unit = callbacks.foreach {
@@ -38,16 +41,23 @@
}
}
- val s1 = plainServerFactory.createSaslServer("INVALID", "", "", map, ch)
+ val s1 = plainServerFactory.createSaslServer("INVALID", "", "", props, ch)
assert(s1 === null)
- val s2 = plainServerFactory.createSaslServer(PlainSASLServer.PLAIN_METHOD, "", "", map, ch)
+ val s2 = plainServerFactory.createSaslServer(PlainSASLServer.PLAIN_METHOD, "", "", props, ch)
assert(s2 === null)
+ val s3 = plainServerFactory.createSaslServer(
+ PlainSASLServer.PLAIN_METHOD,
+ AuthMethods.NONE.toString,
+ "",
+ invalidProps,
+ ch)
+ assert(s3 === null)
val server = plainServerFactory.createSaslServer(
PlainSASLServer.PLAIN_METHOD,
AuthMethods.NONE.toString,
"KYUUBI",
- map,
+ props,
ch)
assert(server.getMechanismName === PlainSASLServer.PLAIN_METHOD)
assert(!server.isComplete)
@@ -78,7 +88,7 @@
"PLAIN",
"NONE",
"KYUUBI",
- map,
+ props,
_ => {})
val e6 = intercept[SaslException](server2.evaluateResponse(res4.map(_.toByte)))
assert(e6.getMessage === "Error validating the login")
diff --git a/pom.xml b/pom.xml
index e3696c8..a171524 100644
--- a/pom.xml
+++ b/pom.xml
@@ -174,7 +174,7 @@
<junit.version>4.13.2</junit.version>
<kafka.version>3.5.2</kafka.version>
<kubernetes-client.version>6.13.5</kubernetes-client.version>
- <kyuubi-relocated.version>0.5.0</kyuubi-relocated.version>
+ <kyuubi-relocated.version>0.6.0</kyuubi-relocated.version>
<kyuubi-relocated-zookeeper.artifacts>kyuubi-relocated-zookeeper-34</kyuubi-relocated-zookeeper.artifacts>
<ldapsdk.version>6.0.5</ldapsdk.version>
<log4j.version>2.24.3</log4j.version>