Skip to content

Commit

Permalink
Merge pull request #565 from thobbs/more-kerberos-configuration
Browse files Browse the repository at this point in the history
Add SASL transport support, allow setting max frame size
  • Loading branch information
zznate committed Nov 21, 2012
2 parents 2bf74f9 + 2391121 commit da71030
Show file tree
Hide file tree
Showing 6 changed files with 329 additions and 12 deletions.
Expand Up @@ -85,12 +85,7 @@ public HKerberosThriftClient open() {

// TODO (patricioe) What should I do with it ?
// KerberosHelper.getSourcePrinciple(clientContext));

if (cassandraHost.getUseThriftFramedTransport()) {
transport = new TFramedTransport(socket);
} else {
transport = socket;
}
transport = maybeWrapWithTFramedTransport(socket);

try {
transport.open();
Expand Down
@@ -0,0 +1,221 @@
package me.prettyprint.cassandra.connection.client;

import java.io.DataInput;
import java.io.DataOutput;
import java.io.IOException;
import java.net.Socket;
import java.net.SocketException;
import java.security.PrivilegedAction;
import java.util.HashMap;
import java.util.Map;
import java.util.TreeMap;
import java.util.concurrent.atomic.AtomicLong;

import javax.security.auth.Subject;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.NameCallback;
import javax.security.auth.callback.PasswordCallback;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.auth.login.AppConfigurationEntry;
import javax.security.auth.login.LoginContext;
import javax.security.auth.login.LoginException;
import javax.security.sasl.RealmCallback;
import javax.security.sasl.RealmChoiceCallback;
import javax.security.sasl.Sasl;

import me.prettyprint.cassandra.connection.security.KerberosHelper;
import me.prettyprint.cassandra.service.CassandraHost;
import me.prettyprint.cassandra.service.SystemProperties;
import me.prettyprint.hector.api.exceptions.HInvalidRequestException;
import me.prettyprint.hector.api.exceptions.HectorTransportException;

import org.apache.cassandra.thrift.Cassandra;
import org.apache.cassandra.thrift.InvalidRequestException;
import org.apache.commons.codec.binary.Base64;
import org.apache.commons.lang.StringUtils;
import org.apache.thrift.TException;
import org.apache.thrift.protocol.TBinaryProtocol;
import org.apache.thrift.transport.TFramedTransport;
import org.apache.thrift.transport.TSSLTransportFactory;
import org.apache.thrift.transport.TSaslClientTransport;
import org.apache.thrift.transport.TSocket;
import org.apache.thrift.transport.TTransport;
import org.apache.thrift.transport.TTransportException;
import org.apache.thrift.transport.TSSLTransportFactory.TSSLTransportParameters;
import org.ietf.jgss.GSSContext;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import com.sun.security.auth.module.Krb5LoginModule;

public class HSaslThriftClient extends HThriftClient implements HClient {

private static Logger log = LoggerFactory.getLogger(HSaslThriftClient.class);

private String servicePrincipalName;
private TSSLTransportParameters params;

/**
* Constructor
* @param cassandraHost
* @param servicePrincipalName, name/_HOST@DOMAIN, e.g. mapred/bdplab0.datastax.com@EXAMPLE.COM
*/
public HSaslThriftClient(CassandraHost cassandraHost, String servicePrincipalName) {
super(cassandraHost);
this.servicePrincipalName = servicePrincipalName;
}

/**
* Constructor
* @param cassandraHost
* @param servicePrincipalName, name/_HOST@DOMAIN, e.g. mapred/bdplab0.datastax.com@EXAMPLE.COM
* @param params
*/
public HSaslThriftClient(CassandraHost cassandraHost, String servicePrincipalName, TSSLTransportParameters params) {
super(cassandraHost);
this.servicePrincipalName = servicePrincipalName;
this.params = params;
}

/**
* {@inheritDoc}
*/
public HSaslThriftClient open() {
if ( isOpen() ) {
throw new IllegalStateException("Open called on already open SASL connection. You should not have gotten here.");
}
if ( log.isDebugEnabled() ) {
log.debug("Creating a new SASL thrift connection to {}", cassandraHost);
}

TSocket socket;
try {
if (params == null)
socket = new TSocket(cassandraHost.getHost(), cassandraHost.getPort(), timeout);
else
socket = TSSLTransportFactory.getClientSocket(cassandraHost.getHost(), cassandraHost.getPort(), timeout, params);
} catch (TTransportException e) {
throw new HectorTransportException("Could not get client socket: ", e);
}

if ( cassandraHost.getUseSocketKeepalive() ) {
try {
socket.getSocket().setKeepAlive(true);
} catch (SocketException se) {
throw new HectorTransportException("Could not set SO_KEEPALIVE on socket: ", se);
}
}

try {
transport = openKerberosTransport(socket, servicePrincipalName);
} catch (LoginException e) {
log.error("Kerberos login failed: ", e);
close();
throw new HectorTransportException("Kerberos context couldn't be established with client: ", e);
} catch (TTransportException e) {
log.error("Failed to open Kerberos transport.", e);
close();
throw new HectorTransportException("Kerberos context couldn't be established with client: ", e);
}

transport = maybeWrapWithTFramedTransport(transport);

return this;
}

public static TTransport openKerberosTransport(TTransport socket, String kerberosServicePrincipal) throws LoginException, TTransportException {
try {
log.debug("Opening kerberos transport...");
Subject kerberosTicket = new Subject();
KerberosUserConfiguration kerberosConfig = new KerberosUserConfiguration();
LoginContext login = new LoginContext("Client", kerberosTicket, null, kerberosConfig);
login.login();

// pull the domain portion out, if there is one
String nonDomainName = kerberosServicePrincipal.split("@")[0];
String names[] = nonDomainName.split("[/]");

if (names.length != 2) {
throw new IOException("Kerberos principal name does NOT have the expected hostname part: " + kerberosServicePrincipal);
}

final TSaslClientTransport transport = new TSaslClientTransport(
"GSSAPI",
null,
names[0], names[1],
SASL_PROPS, null,
socket);

Subject.doAs(kerberosTicket, new PrivilegedAction<Void>() {

@Override
public Void run() {
try {
transport.open();
} catch (TTransportException e) {
throw new RuntimeException("Unable to connect to dse server:", e);
}

return null;
}
});

log.debug("Kerberos transport opened successfully");
return transport;
} catch (IOException e) {
throw new TTransportException("Failed to open secure transport using KERBEROS", e);
}
}


public static class KerberosUserConfiguration extends javax.security.auth.login.Configuration {

private static final HashMap<String, String> DEFAULT_KERBEROS_OPTIONS =
new HashMap<String, String>();

static {
DEFAULT_KERBEROS_OPTIONS.put("doNotPrompt", "true");
DEFAULT_KERBEROS_OPTIONS.put("useTicketCache", "true");
DEFAULT_KERBEROS_OPTIONS.put("renewTGT", "true");
DEFAULT_KERBEROS_OPTIONS.put("useKeyTab", "true");
}

// See http://docs.oracle.com/javase/1.5.0/docs/guide/security/jaas/spec/com/sun/security/auth/module/Krb5LoginModule.html
// for the meaning of these options.
private static final String[] recognizedOptions = {
"debug", "useTicketCache", "ticketCache", "renewTGT", "useKeyTab",
"keyTab", "principal"
};

private HashMap<String, String> options;

public KerberosUserConfiguration() {
this.options = new HashMap<String, String>(DEFAULT_KERBEROS_OPTIONS);

log.debug("Setting Kerberos options:");
for (int i = 0; i < recognizedOptions.length; i++) {
String option = recognizedOptions[i];
String value = System.getProperty("kerberos." + option);
if (value != null) {
log.debug(" " + option + ": " + value);
this.options.put(option, value);
}
}
}

@Override
public AppConfigurationEntry[] getAppConfigurationEntry(String arg0) {
AppConfigurationEntry kerberosLogin = new AppConfigurationEntry(
Krb5LoginModule.class.getName(),
AppConfigurationEntry.LoginModuleControlFlag.OPTIONAL,
this.options);
return new AppConfigurationEntry[] { kerberosLogin };
}
}

public static final Map<String, String> SASL_PROPS = new TreeMap<String, String>() {{
put(Sasl.QOP, "auth");
put(Sasl.SERVER_AUTH, "true");
}};
}
Expand Up @@ -160,11 +160,8 @@ public HThriftClient open() {
throw new HectorTransportException("Could not set SO_KEEPALIVE on socket: ", se);
}
}
if (cassandraHost.getUseThriftFramedTransport()) {
transport = new TFramedTransport(socket);
} else {
transport = socket;
}

transport = maybeWrapWithTFramedTransport(socket);

// If using SSL, the socket will already be connected, and TFramedTransport and
// TSocket just wind up calling socket.isConnected(), so check this before calling
Expand All @@ -184,6 +181,14 @@ public HThriftClient open() {
return this;
}

protected TTransport maybeWrapWithTFramedTransport(TTransport transport) {
if (cassandraHost.getUseThriftFramedTransport()) {
return new TFramedTransport(transport, cassandraHost.getMaxFrameSize());
} else {
return transport;
}
}

/**
* {@inheritDoc}
*/
Expand Down
@@ -0,0 +1,74 @@
/**
* Client Factory that provides Secure sockets using Kerberos as authentication
* SASL mechanism.
*
* It expects few system properties to be set up:
* <ul>
* <li><code>kerberos.service.principal.name</code> Kerberos Service principal name without the domain. Default: "cassandra".
*
* <li><code>ssl.truststore</code> File path for trust store
* <li><code>ssl.truststore.password</code> Password for trust store
* <li><code>ssl.protocol</code> SSL protocol, default SSL
* <li><code>ssl.store.type</code> Store type, default JKS
* <li><code>ssl.cipher.suites</code> Cipher suites
* </ul>
* <p>
*
*
* @see HSaslThriftClient
*
*/
package me.prettyprint.cassandra.connection.factory;

import org.apache.thrift.transport.TSSLTransportFactory.TSSLTransportParameters;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import me.prettyprint.cassandra.connection.client.HClient;
import me.prettyprint.cassandra.connection.client.HKerberosThriftClient;
import me.prettyprint.cassandra.connection.client.HSaslThriftClient;
import me.prettyprint.cassandra.connection.security.SSLHelper;
import me.prettyprint.cassandra.service.CassandraHost;

public class HKerberosSaslThriftClientFactoryImpl implements HClientFactory {


private static final Logger log = LoggerFactory.getLogger(HKerberosSecuredThriftClientFactoryImpl.class);

public static final String JAAS_CONFIG = "jaas.conf";
public static final String KRB5_CONFIG = "krb5.conf";

private String krbServicePrincipalName;
private TSSLTransportParameters params;

public HKerberosSaslThriftClientFactoryImpl() {

params = SSLHelper.getTSSLTransportParameters();
if (params != null) {
log.debug("SSL properties:");
log.debug(" ssl.truststore = {}", System.getProperty("ssl.truststore"));
log.debug(" ssl.protocol = {}", System.getProperty("ssl.protocol"));
log.debug(" ssl.store.type = {}", System.getProperty("ssl.store.type"));
log.debug(" ssl.cipher.suites = {}", System.getProperty("ssl.cipher.suites"));
}

krbServicePrincipalName = System.getProperty("kerberos.service.principal.name");
if (krbServicePrincipalName != null) {
log.debug("Kerberos service principal name = {}", krbServicePrincipalName);
}
}

/**
* {@inheritDoc}
*/
public HClient createClient(CassandraHost ch) {
if (log.isDebugEnabled()) {
log.debug("Creation of new client");
}

if (params == null)
return new HSaslThriftClient(ch, krbServicePrincipalName);
else
return new HSaslThriftClient(ch, krbServicePrincipalName, params);
}
}
Expand Up @@ -28,6 +28,11 @@ public final class CassandraHost {
*/
public static final boolean DEFAULT_USE_FRAMED_THRIFT_TRANSPORT = true;

/**
* By default, match TFramedTransport's default max frame size (Integer.MAX_VALUE).
*/
public static final int DEFAULT_MAX_FRAME_SIZE = 0x7FFFFFFF;

/**
* The default max wait time when exhausted happens, default value is negative, which means
* it'll block indefinitely.
Expand All @@ -47,6 +52,7 @@ public final class CassandraHost {
private long maxWaitTimeWhenExhausted = DEFAULT_MAX_WAITTIME_WHEN_EXHAUSTED;
private int cassandraThriftSocketTimeout;
private boolean useThriftFramedTransport = DEFAULT_USE_FRAMED_THRIFT_TRANSPORT;
private int maxFrameSize = DEFAULT_MAX_FRAME_SIZE;
private boolean useSocketKeepalive;
//TODO(ran): private FailoverPolicy failoverPolicy = DEFAULT_FAILOVER_POLICY;

Expand Down Expand Up @@ -166,6 +172,14 @@ public void setUseThriftFramedTransport(boolean useThriftFramedTransport) {
this.useThriftFramedTransport = useThriftFramedTransport;
}

public int getMaxFrameSize() {
return maxFrameSize;
}

public void setMaxFrameSize(int maxFrameSize) {
this.maxFrameSize = maxFrameSize;
}

public static String parseHostFromUrl(String urlPort) {
return urlPort.lastIndexOf(':') > 0 ? urlPort.substring(0, urlPort.lastIndexOf(':')) : urlPort;
}
Expand Down

0 comments on commit da71030

Please sign in to comment.