[ 
https://issues.apache.org/jira/browse/RANGER-4506?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jianchun Xu updated RANGER-4506:
--------------------------------
    Description: 
RangerKeyStoreProvider illegally writes to key store under Read lock. This 
happens in both getMetadata and getKeyVersion.

E.g. in following getKeyVersion, under Read lock, the code calls 
`dbStore.engineLoad(null, masterKey)` which reloads all the keys. Since 
multiple threads can hold the Read lock, multiple threads can enter and reload 
all the keys. Thus the 2nd `dbStore.engineContainsAlias(versionName)` test and 
following `dbStore.engineGetDecryptedZoneKeyByte(versionName)` can both get 
wrong result if another thread is reloading keys.

[https://github.com/apache/ranger/blob/master/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStoreProvider.java#L331]
{code:java}
    @Override
    public KeyVersion getKeyVersion(String versionName) throws IOException {
        if (logger.isDebugEnabled()) {
            logger.debug("==> getKeyVersion({})", versionName);
        }

        KeyVersion ret = null;

        try (AutoClosableReadLock ignored = new AutoClosableReadLock(lock)) {
            if (keyVaultEnabled) {
                try {
                    boolean versionNameExists = 
dbStore.engineContainsAlias(versionName);

                    if (!versionNameExists) {
                        dbStore.engineLoad(null, masterKey);

                        versionNameExists = 
dbStore.engineContainsAlias(versionName);
                    }

                    if (versionNameExists) {
                        byte[] decryptKeyByte;

                        try {
                            decryptKeyByte = 
dbStore.engineGetDecryptedZoneKeyByte(versionName);
{code}

  was:
RangerKeyStoreProvider illegally writes to key store under Read lock. This 
happens in both getMetadata and getKeyVersion.

E.g. in following getKeyVersion, under Read lock, the code calls 
`dbStore.engineLoad(null, masterKey)` which reloads all the keys. Since 
multiple threads can hold the Read lock, multiple threads can enter and reload 
all the keys. Thus the 2nd `dbStore.engineContainsAlias(versionName)` test and 
following `dbStore.engineGetDecryptedZoneKeyByte(versionName)` can both get 
wrong result if another threads is reloading keys.

[https://github.com/apache/ranger/blob/master/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStoreProvider.java#L331]
{code:java}
    @Override
    public KeyVersion getKeyVersion(String versionName) throws IOException {
        if (logger.isDebugEnabled()) {
            logger.debug("==> getKeyVersion({})", versionName);
        }

        KeyVersion ret = null;

        try (AutoClosableReadLock ignored = new AutoClosableReadLock(lock)) {
            if (keyVaultEnabled) {
                try {
                    boolean versionNameExists = 
dbStore.engineContainsAlias(versionName);

                    if (!versionNameExists) {
                        dbStore.engineLoad(null, masterKey);

                        versionNameExists = 
dbStore.engineContainsAlias(versionName);
                    }

                    if (versionNameExists) {
                        byte[] decryptKeyByte;

                        try {
                            decryptKeyByte = 
dbStore.engineGetDecryptedZoneKeyByte(versionName);
{code}


> Illegal read lock usage in getMetadata/getKeyVersion
> ----------------------------------------------------
>
>                 Key: RANGER-4506
>                 URL: https://issues.apache.org/jira/browse/RANGER-4506
>             Project: Ranger
>          Issue Type: Bug
>          Components: kms
>            Reporter: Jianchun Xu
>            Priority: Major
>
> RangerKeyStoreProvider illegally writes to key store under Read lock. This 
> happens in both getMetadata and getKeyVersion.
> E.g. in following getKeyVersion, under Read lock, the code calls 
> `dbStore.engineLoad(null, masterKey)` which reloads all the keys. Since 
> multiple threads can hold the Read lock, multiple threads can enter and 
> reload all the keys. Thus the 2nd `dbStore.engineContainsAlias(versionName)` 
> test and following `dbStore.engineGetDecryptedZoneKeyByte(versionName)` can 
> both get wrong result if another thread is reloading keys.
> [https://github.com/apache/ranger/blob/master/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStoreProvider.java#L331]
> {code:java}
>     @Override
>     public KeyVersion getKeyVersion(String versionName) throws IOException {
>         if (logger.isDebugEnabled()) {
>             logger.debug("==> getKeyVersion({})", versionName);
>         }
>         KeyVersion ret = null;
>         try (AutoClosableReadLock ignored = new AutoClosableReadLock(lock)) {
>             if (keyVaultEnabled) {
>                 try {
>                     boolean versionNameExists = 
> dbStore.engineContainsAlias(versionName);
>                     if (!versionNameExists) {
>                         dbStore.engineLoad(null, masterKey);
>                         versionNameExists = 
> dbStore.engineContainsAlias(versionName);
>                     }
>                     if (versionNameExists) {
>                         byte[] decryptKeyByte;
>                         try {
>                             decryptKeyByte = 
> dbStore.engineGetDecryptedZoneKeyByte(versionName);
> {code}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to