This is an automated email from the ASF dual-hosted git repository.
prasanthj pushed a commit to branch branch-3.1
in repository https://gitbox.apache.org/repos/asf/hive.git
The following commit(s) were added to refs/heads/branch-3.1 by this push:
new 10184f5f647 [WIP] HIVE-26522: Backport of HIVE-22033 and HIVE-26522 to
branch-3.1 (#3587)
10184f5f647 is described below
commit 10184f5f6470df7dec7cf5ccc1fca3328ab93e67
Author: Pavan Lanka <[email protected]>
AuthorDate: Mon Nov 14 10:51:20 2022 -0800
[WIP] HIVE-26522: Backport of HIVE-22033 and HIVE-26522 to branch-3.1
(#3587)
* HIVE-26522: Backport HIVE-22033 to branch-3.1
HIVE-22033: HiveServer2: fix delegation token renewal (Ion ALberdi via
Szehon)
* HIVE-26522: Backport HIVE-26522 to branch-3.1
HIVE-26522: Added test for HIVE-22033 regarding delegation token renewal
Co-authored-by: Szehon Ho <[email protected]>
---
.../TokenStoreDelegationTokenSecretManager.java | 5 +-
...TestTokenStoreDelegationTokenSecretManager.java | 121 +++++++++++++++++++++
2 files changed, 125 insertions(+), 1 deletion(-)
diff --git
a/standalone-metastore/src/main/java/org/apache/hadoop/hive/metastore/security/TokenStoreDelegationTokenSecretManager.java
b/standalone-metastore/src/main/java/org/apache/hadoop/hive/metastore/security/TokenStoreDelegationTokenSecretManager.java
index 7b325449ce1..ee2ace8cbed 100644
---
a/standalone-metastore/src/main/java/org/apache/hadoop/hive/metastore/security/TokenStoreDelegationTokenSecretManager.java
+++
b/standalone-metastore/src/main/java/org/apache/hadoop/hive/metastore/security/TokenStoreDelegationTokenSecretManager.java
@@ -161,7 +161,10 @@ public class TokenStoreDelegationTokenSecretManager
extends DelegationTokenSecre
synchronized (this) {
super.currentTokens.put(id, tokenInfo);
try {
- return super.renewToken(token, renewer);
+ long res = super.renewToken(token, renewer);
+ this.tokenStore.removeToken(id);
+ this.tokenStore.addToken(id, super.currentTokens.get(id));
+ return res;
} finally {
super.currentTokens.remove(id);
}
diff --git
a/standalone-metastore/src/test/java/org/apache/hadoop/hive/metastore/security/TestTokenStoreDelegationTokenSecretManager.java
b/standalone-metastore/src/test/java/org/apache/hadoop/hive/metastore/security/TestTokenStoreDelegationTokenSecretManager.java
new file mode 100644
index 00000000000..35e3d36ff8a
--- /dev/null
+++
b/standalone-metastore/src/test/java/org/apache/hadoop/hive/metastore/security/TestTokenStoreDelegationTokenSecretManager.java
@@ -0,0 +1,121 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.hadoop.hive.metastore.security;
+
+import org.apache.hadoop.conf.Configuration;
+import org.apache.hadoop.hive.metastore.annotation.MetastoreUnitTest;
+import org.apache.hadoop.hive.metastore.conf.MetastoreConf;
+import org.apache.hadoop.security.UserGroupInformation;
+import org.apache.hadoop.security.token.SecretManager;
+import org.apache.hadoop.security.token.Token;
+import org.junit.Assert;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.experimental.categories.Category;
+import org.junit.rules.ExpectedException;
+
+import java.io.ByteArrayInputStream;
+import java.io.DataInputStream;
+import java.io.IOException;
+import java.util.concurrent.TimeUnit;
+
+/**
+ * Test the renewal of Delegation tokens obtained from the Metastore.
+ */
+@Category(MetastoreUnitTest.class) public class
TestTokenStoreDelegationTokenSecretManager {
+ private final Configuration conf = MetastoreConf.newMetastoreConf();
+
+ private TokenStoreDelegationTokenSecretManager
createTokenMgr(DelegationTokenStore tokenStore,
+ long renewSecs) {
+ MetastoreConf.setTimeVar(conf,
MetastoreConf.ConfVars.DELEGATION_TOKEN_RENEW_INTERVAL,
+ renewSecs, TimeUnit.SECONDS);
+ long secretKeyInterval =
+ MetastoreConf.getTimeVar(conf,
MetastoreConf.ConfVars.DELEGATION_KEY_UPDATE_INTERVAL,
+ TimeUnit.MILLISECONDS);
+ long tokenMaxLifetime =
+ MetastoreConf.getTimeVar(conf,
MetastoreConf.ConfVars.DELEGATION_TOKEN_MAX_LIFETIME,
+ TimeUnit.MILLISECONDS);
+ long tokenRenewInterval =
+ MetastoreConf.getTimeVar(conf,
MetastoreConf.ConfVars.DELEGATION_TOKEN_RENEW_INTERVAL,
+ TimeUnit.MILLISECONDS);
+ long tokenGcInterval =
+ MetastoreConf.getTimeVar(conf,
MetastoreConf.ConfVars.DELEGATION_TOKEN_GC_INTERVAL,
+ TimeUnit.MILLISECONDS);
+ return new TokenStoreDelegationTokenSecretManager(secretKeyInterval,
tokenMaxLifetime,
+ tokenRenewInterval, tokenGcInterval, tokenStore);
+ }
+
+ private DelegationTokenIdentifier getID(String tokenStr) throws IOException {
+ DelegationTokenIdentifier id = new DelegationTokenIdentifier();
+ Token<DelegationTokenIdentifier> token = new Token<>();
+ token.decodeFromUrlString(tokenStr);
+ try (DataInputStream in = new DataInputStream(
+ new ByteArrayInputStream(token.getIdentifier()))) {
+ id.readFields(in);
+ }
+ return id;
+ }
+
+ @Test public void testRenewal() throws IOException, InterruptedException {
+ DelegationTokenStore tokenStore = new MemoryTokenStore();
+ // Have a long renewal to ensure that Thread.sleep does not overshoot the
initial validity
+ TokenStoreDelegationTokenSecretManager mgr = createTokenMgr(tokenStore,
3600);
+ try {
+ mgr.startThreads();
+ String tokenStr =
+
mgr.getDelegationToken(UserGroupInformation.getCurrentUser().getShortUserName(),
+ UserGroupInformation.getCurrentUser().getShortUserName());
+ Assert.assertNotNull(mgr.verifyDelegationToken(tokenStr));
+ DelegationTokenIdentifier id = getID(tokenStr);
+ long initialExpiry = tokenStore.getToken(id).getRenewDate();
+ Thread.sleep(100);
+ Assert.assertTrue(System.currentTimeMillis() > id.getIssueDate());
+ // No change in renewal date without renewal
+ Assert.assertEquals(tokenStore.getToken(id).getRenewDate(),
initialExpiry);
+ mgr.renewDelegationToken(tokenStr);
+ // Verify the token is valid
+ Assert.assertNotNull(mgr.verifyDelegationToken(tokenStr));
+ // Renewal date has increased after renewal
+ Assert.assertTrue(tokenStore.getToken(id).getRenewDate() >
initialExpiry);
+ } finally {
+ mgr.stopThreads();
+ }
+ }
+
+ @Rule public ExpectedException thrown = ExpectedException.none();
+
+ @Test public void testExpiry() throws IOException, InterruptedException {
+ DelegationTokenStore tokenStore = new MemoryTokenStore();
+ TokenStoreDelegationTokenSecretManager mgr = createTokenMgr(tokenStore, 1);
+ try {
+ mgr.startThreads();
+ String tokenStr =
+
mgr.getDelegationToken(UserGroupInformation.getCurrentUser().getShortUserName(),
+ UserGroupInformation.getCurrentUser().getShortUserName());
+ DelegationTokenIdentifier id = getID(tokenStr);
+ Assert.assertNotNull(mgr.verifyDelegationToken(tokenStr));
+ // Sleep for the renewal duration
+ Thread.sleep(1000);
+ thrown.expect(SecretManager.InvalidToken.class);
+ thrown.expectMessage("is expired");
+ mgr.verifyDelegationToken(tokenStr);
+ } finally {
+ mgr.stopThreads();
+ }
+ }
+}
\ No newline at end of file