[
https://issues.apache.org/jira/browse/DRILL-4280?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15630939#comment-15630939
]
ASF GitHub Bot commented on DRILL-4280:
---------------------------------------
Github user sudheeshkatkam commented on a diff in the pull request:
https://github.com/apache/drill/pull/578#discussion_r86267015
--- Diff:
exec/java-exec/src/main/java/org/apache/drill/exec/rpc/security/AuthenticationMechanismFactory.java
---
@@ -0,0 +1,182 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.drill.exec.rpc.security;
+
+import com.google.common.base.Function;
+import com.google.common.base.Strings;
+import com.google.common.collect.Iterators;
+import com.google.common.collect.Sets;
+import org.apache.drill.common.AutoCloseables;
+import org.apache.drill.common.config.DrillConfig;
+import org.apache.drill.common.map.CaseInsensitiveMap;
+import org.apache.drill.common.scanner.persistence.ScanResult;
+import org.apache.drill.exec.exception.DrillbitStartupException;
+import org.apache.drill.exec.rpc.security.kerberos.KerberosMechanism;
+import org.apache.drill.exec.rpc.security.plain.PlainMechanism;
+import org.apache.drill.exec.rpc.user.security.UserAuthenticator;
+import org.apache.drill.exec.rpc.user.security.UserAuthenticatorFactory;
+import org.apache.hadoop.conf.Configuration;
+import org.apache.hadoop.fs.CommonConfigurationKeys;
+import org.apache.hadoop.security.UserGroupInformation;
+
+import javax.annotation.Nullable;
+import java.io.IOException;
+import java.lang.reflect.Constructor;
+import java.lang.reflect.InvocationTargetException;
+import java.util.Collection;
+import java.util.List;
+import java.util.Map;
+import java.util.Set;
+
+public class AuthenticationMechanismFactory implements AutoCloseable {
+ private static final org.slf4j.Logger logger =
+
org.slf4j.LoggerFactory.getLogger(AuthenticationMechanismFactory.class);
+
+ private final Map<String, AuthenticationMechanism> mechanisms =
CaseInsensitiveMap.newHashMapWithExpectedSize(5);
+
+ @SuppressWarnings("unchecked")
+ public AuthenticationMechanismFactory(final ScanResult scan, final
DrillConfig config,
+ final List<String>
configuredMechanisms)
+ throws DrillbitStartupException {
+ logger.debug("Configuring authentication mechanisms: {}",
configuredMechanisms);
+ // transform all names to uppercase
+ final Set<String> configuredMechanismsSet =
Sets.newHashSet(Iterators.transform(configuredMechanisms.iterator(),
+ new Function<String, String>() {
+ @Nullable
+ @Override
+ public String apply(@Nullable String input) {
+ return input == null ? null : input.toUpperCase();
+ }
+ }));
+
+ // First, load Drill provided out-of-box mechanisms
+ if (configuredMechanismsSet.contains(PlainMechanism.SIMPLE_NAME)) {
+ logger.trace("Plain mechanism enabled.");
+ // instantiated here, but closed in PlainMechanism#close
+ final UserAuthenticator userAuthenticator =
UserAuthenticatorFactory.createAuthenticator(config, scan);
+ mechanisms.put(PlainMechanism.SIMPLE_NAME, new
PlainMechanism(userAuthenticator));
+ configuredMechanismsSet.remove(PlainMechanism.SIMPLE_NAME);
+ }
+
+ if (configuredMechanismsSet.contains(KerberosMechanism.SIMPLE_NAME)) {
+ logger.trace("Kerberos mechanism enabled.");
+ final String servicePrincipal =
config.getString("drill.exec.security.auth.principal");
+ final String keytab =
config.getString("drill.exec.security.auth.keytab");
+
+ try { // Kerberos mechanism requires a service to login
+ final Configuration conf = new Configuration();
+ conf.set(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION,
"KERBEROS");
+ // To parse non-typical principal name, uncomment below line
+ // CommonConfigurationKeys.HADOOP_SECURITY_AUTH_TO_LOCAL, rules);
+ UserGroupInformation.setConfiguration(conf);
+ UserGroupInformation.loginUserFromKeytab(servicePrincipal, keytab);
+ logger.trace("Login successful for user: {}", servicePrincipal);
+ } catch (IOException e) {
+ throw new DrillbitStartupException("Drillbit service login
failed", e);
--- End diff --
The code is now moved to LoginManagerImpl.
Drill as a service has to login to Kerberos (AS), so this failure condition
is required.
> Kerberos Authentication
> -----------------------
>
> Key: DRILL-4280
> URL: https://issues.apache.org/jira/browse/DRILL-4280
> Project: Apache Drill
> Issue Type: Improvement
> Reporter: Keys Botzum
> Assignee: Chunhui Shi
> Labels: security
>
> Drill should support Kerberos based authentication from clients. This means
> that both the ODBC and JDBC drivers as well as the web/REST interfaces should
> support inbound Kerberos. For Web this would most likely be SPNEGO while for
> ODBC and JDBC this will be more generic Kerberos.
> Since Hive and much of Hadoop supports Kerberos there is a potential for a
> lot of reuse of ideas if not implementation.
> Note that this is related to but not the same as
> https://issues.apache.org/jira/browse/DRILL-3584
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)