HADOOP-10224. JavaKeyStoreProvider has to protect against corrupting underlying store. (asuresh via tucu)
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/branches/branch-2@1619549 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
6d2281b4c6
commit
59c16d7947
|
@ -170,6 +170,9 @@ Release 2.6.0 - UNRELEASED
|
||||||
|
|
||||||
HADOOP-10936. Change default KeyProvider bitlength to 128. (wang)
|
HADOOP-10936. Change default KeyProvider bitlength to 128. (wang)
|
||||||
|
|
||||||
|
HADOOP-10224. JavaKeyStoreProvider has to protect against corrupting
|
||||||
|
underlying store. (asuresh via tucu)
|
||||||
|
|
||||||
BUG FIXES
|
BUG FIXES
|
||||||
|
|
||||||
HADOOP-10781. Unportable getgrouplist() usage breaks FreeBSD (Dmitry
|
HADOOP-10781. Unportable getgrouplist() usage breaks FreeBSD (Dmitry
|
||||||
|
|
|
@ -27,8 +27,11 @@ import org.apache.hadoop.fs.FileSystem;
|
||||||
import org.apache.hadoop.fs.Path;
|
import org.apache.hadoop.fs.Path;
|
||||||
import org.apache.hadoop.fs.permission.FsPermission;
|
import org.apache.hadoop.fs.permission.FsPermission;
|
||||||
import org.apache.hadoop.security.ProviderUtils;
|
import org.apache.hadoop.security.ProviderUtils;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import javax.crypto.spec.SecretKeySpec;
|
import javax.crypto.spec.SecretKeySpec;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.io.ObjectInputStream;
|
import java.io.ObjectInputStream;
|
||||||
|
@ -80,6 +83,9 @@ import java.util.concurrent.locks.ReentrantReadWriteLock;
|
||||||
@InterfaceAudience.Private
|
@InterfaceAudience.Private
|
||||||
public class JavaKeyStoreProvider extends KeyProvider {
|
public class JavaKeyStoreProvider extends KeyProvider {
|
||||||
private static final String KEY_METADATA = "KeyMetadata";
|
private static final String KEY_METADATA = "KeyMetadata";
|
||||||
|
private static Logger LOG =
|
||||||
|
LoggerFactory.getLogger(JavaKeyStoreProvider.class);
|
||||||
|
|
||||||
public static final String SCHEME_NAME = "jceks";
|
public static final String SCHEME_NAME = "jceks";
|
||||||
|
|
||||||
public static final String KEYSTORE_PASSWORD_FILE_KEY =
|
public static final String KEYSTORE_PASSWORD_FILE_KEY =
|
||||||
|
@ -115,6 +121,10 @@ public class JavaKeyStoreProvider extends KeyProvider {
|
||||||
if (pwFile != null) {
|
if (pwFile != null) {
|
||||||
ClassLoader cl = Thread.currentThread().getContextClassLoader();
|
ClassLoader cl = Thread.currentThread().getContextClassLoader();
|
||||||
URL pwdFile = cl.getResource(pwFile);
|
URL pwdFile = cl.getResource(pwFile);
|
||||||
|
if (pwdFile == null) {
|
||||||
|
// Provided Password file does not exist
|
||||||
|
throw new IOException("Password file does not exists");
|
||||||
|
}
|
||||||
if (pwdFile != null) {
|
if (pwdFile != null) {
|
||||||
InputStream is = pwdFile.openStream();
|
InputStream is = pwdFile.openStream();
|
||||||
try {
|
try {
|
||||||
|
@ -129,19 +139,25 @@ public class JavaKeyStoreProvider extends KeyProvider {
|
||||||
password = KEYSTORE_PASSWORD_DEFAULT;
|
password = KEYSTORE_PASSWORD_DEFAULT;
|
||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
|
Path oldPath = constructOldPath(path);
|
||||||
|
Path newPath = constructNewPath(path);
|
||||||
keyStore = KeyStore.getInstance(SCHEME_NAME);
|
keyStore = KeyStore.getInstance(SCHEME_NAME);
|
||||||
|
FsPermission perm = null;
|
||||||
if (fs.exists(path)) {
|
if (fs.exists(path)) {
|
||||||
// save off permissions in case we need to
|
// flush did not proceed to completion
|
||||||
// rewrite the keystore in flush()
|
// _NEW should not exist
|
||||||
FileStatus s = fs.getFileStatus(path);
|
if (fs.exists(newPath)) {
|
||||||
permissions = s.getPermission();
|
throw new IOException(
|
||||||
|
String.format("Keystore not loaded due to some inconsistency "
|
||||||
keyStore.load(fs.open(path), password);
|
+ "('%s' and '%s' should not exist together)!!", path, newPath));
|
||||||
|
}
|
||||||
|
perm = tryLoadFromPath(path, oldPath);
|
||||||
} else {
|
} else {
|
||||||
permissions = new FsPermission("700");
|
perm = tryLoadIncompleteFlush(oldPath, newPath);
|
||||||
// required to create an empty keystore. *sigh*
|
|
||||||
keyStore.load(null, password);
|
|
||||||
}
|
}
|
||||||
|
// Need to save off permissions in case we need to
|
||||||
|
// rewrite the keystore in flush()
|
||||||
|
permissions = perm;
|
||||||
} catch (KeyStoreException e) {
|
} catch (KeyStoreException e) {
|
||||||
throw new IOException("Can't create keystore", e);
|
throw new IOException("Can't create keystore", e);
|
||||||
} catch (NoSuchAlgorithmException e) {
|
} catch (NoSuchAlgorithmException e) {
|
||||||
|
@ -154,6 +170,136 @@ public class JavaKeyStoreProvider extends KeyProvider {
|
||||||
writeLock = lock.writeLock();
|
writeLock = lock.writeLock();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Try loading from the user specified path, else load from the backup
|
||||||
|
* path in case Exception is not due to bad/wrong password
|
||||||
|
* @param path Actual path to load from
|
||||||
|
* @param backupPath Backup path (_OLD)
|
||||||
|
* @return The permissions of the loaded file
|
||||||
|
* @throws NoSuchAlgorithmException
|
||||||
|
* @throws CertificateException
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
private FsPermission tryLoadFromPath(Path path, Path backupPath)
|
||||||
|
throws NoSuchAlgorithmException, CertificateException,
|
||||||
|
IOException {
|
||||||
|
FsPermission perm = null;
|
||||||
|
try {
|
||||||
|
perm = loadFromPath(path, password);
|
||||||
|
// Remove _OLD if exists
|
||||||
|
if (fs.exists(backupPath)) {
|
||||||
|
fs.delete(backupPath, true);
|
||||||
|
}
|
||||||
|
LOG.debug("KeyStore loaded successfully !!");
|
||||||
|
} catch (IOException ioe) {
|
||||||
|
// If file is corrupted for some reason other than
|
||||||
|
// wrong password try the _OLD file if exits
|
||||||
|
if (!isBadorWrongPassword(ioe)) {
|
||||||
|
perm = loadFromPath(backupPath, password);
|
||||||
|
// Rename CURRENT to CORRUPTED
|
||||||
|
renameOrFail(path, new Path(path.toString() + "_CORRUPTED_"
|
||||||
|
+ System.currentTimeMillis()));
|
||||||
|
renameOrFail(backupPath, path);
|
||||||
|
LOG.debug(String.format(
|
||||||
|
"KeyStore loaded successfully from '%s' since '%s'"
|
||||||
|
+ "was corrupted !!", backupPath, path));
|
||||||
|
} else {
|
||||||
|
throw ioe;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return perm;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The KeyStore might have gone down during a flush, In which case either the
|
||||||
|
* _NEW or _OLD files might exists. This method tries to load the KeyStore
|
||||||
|
* from one of these intermediate files.
|
||||||
|
* @param oldPath the _OLD file created during flush
|
||||||
|
* @param newPath the _NEW file created during flush
|
||||||
|
* @return The permissions of the loaded file
|
||||||
|
* @throws IOException
|
||||||
|
* @throws NoSuchAlgorithmException
|
||||||
|
* @throws CertificateException
|
||||||
|
*/
|
||||||
|
private FsPermission tryLoadIncompleteFlush(Path oldPath, Path newPath)
|
||||||
|
throws IOException, NoSuchAlgorithmException, CertificateException {
|
||||||
|
FsPermission perm = null;
|
||||||
|
// Check if _NEW exists (in case flush had finished writing but not
|
||||||
|
// completed the re-naming)
|
||||||
|
if (fs.exists(newPath)) {
|
||||||
|
perm = loadAndReturnPerm(newPath, oldPath);
|
||||||
|
}
|
||||||
|
// try loading from _OLD (An earlier Flushing MIGHT not have completed
|
||||||
|
// writing completely)
|
||||||
|
if ((perm == null) && fs.exists(oldPath)) {
|
||||||
|
perm = loadAndReturnPerm(oldPath, newPath);
|
||||||
|
}
|
||||||
|
// If not loaded yet,
|
||||||
|
// required to create an empty keystore. *sigh*
|
||||||
|
if (perm == null) {
|
||||||
|
keyStore.load(null, password);
|
||||||
|
LOG.debug("KeyStore initialized anew successfully !!");
|
||||||
|
perm = new FsPermission("700");
|
||||||
|
}
|
||||||
|
return perm;
|
||||||
|
}
|
||||||
|
|
||||||
|
private FsPermission loadAndReturnPerm(Path pathToLoad, Path pathToDelete)
|
||||||
|
throws NoSuchAlgorithmException, CertificateException,
|
||||||
|
IOException {
|
||||||
|
FsPermission perm = null;
|
||||||
|
try {
|
||||||
|
perm = loadFromPath(pathToLoad, password);
|
||||||
|
renameOrFail(pathToLoad, path);
|
||||||
|
LOG.debug(String.format("KeyStore loaded successfully from '%s'!!",
|
||||||
|
pathToLoad));
|
||||||
|
if (fs.exists(pathToDelete)) {
|
||||||
|
fs.delete(pathToDelete, true);
|
||||||
|
}
|
||||||
|
} catch (IOException e) {
|
||||||
|
// Check for password issue : don't want to trash file due
|
||||||
|
// to wrong password
|
||||||
|
if (isBadorWrongPassword(e)) {
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return perm;
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean isBadorWrongPassword(IOException ioe) {
|
||||||
|
// As per documentation this is supposed to be the way to figure
|
||||||
|
// if password was correct
|
||||||
|
if (ioe.getCause() instanceof UnrecoverableKeyException) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
// Unfortunately that doesn't seem to work..
|
||||||
|
// Workaround :
|
||||||
|
if ((ioe.getCause() == null)
|
||||||
|
&& (ioe.getMessage() != null)
|
||||||
|
&& ((ioe.getMessage().contains("Keystore was tampered")) || (ioe
|
||||||
|
.getMessage().contains("password was incorrect")))) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
private FsPermission loadFromPath(Path p, char[] password)
|
||||||
|
throws IOException, NoSuchAlgorithmException, CertificateException {
|
||||||
|
FileStatus s = fs.getFileStatus(p);
|
||||||
|
keyStore.load(fs.open(p), password);
|
||||||
|
return s.getPermission();
|
||||||
|
}
|
||||||
|
|
||||||
|
private Path constructNewPath(Path path) {
|
||||||
|
Path newPath = new Path(path.toString() + "_NEW");
|
||||||
|
return newPath;
|
||||||
|
}
|
||||||
|
|
||||||
|
private Path constructOldPath(Path path) {
|
||||||
|
Path oldPath = new Path(path.toString() + "_OLD");
|
||||||
|
return oldPath;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public KeyVersion getKeyVersion(String versionName) throws IOException {
|
public KeyVersion getKeyVersion(String versionName) throws IOException {
|
||||||
readLock.lock();
|
readLock.lock();
|
||||||
|
@ -352,11 +498,22 @@ public class JavaKeyStoreProvider extends KeyProvider {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void flush() throws IOException {
|
public void flush() throws IOException {
|
||||||
|
Path newPath = constructNewPath(path);
|
||||||
|
Path oldPath = constructOldPath(path);
|
||||||
writeLock.lock();
|
writeLock.lock();
|
||||||
try {
|
try {
|
||||||
if (!changed) {
|
if (!changed) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
// Might exist if a backup has been restored etc.
|
||||||
|
if (fs.exists(newPath)) {
|
||||||
|
renameOrFail(newPath, new Path(newPath.toString()
|
||||||
|
+ "_ORPHANED_" + System.currentTimeMillis()));
|
||||||
|
}
|
||||||
|
if (fs.exists(oldPath)) {
|
||||||
|
renameOrFail(oldPath, new Path(oldPath.toString()
|
||||||
|
+ "_ORPHANED_" + System.currentTimeMillis()));
|
||||||
|
}
|
||||||
// put all of the updates into the keystore
|
// put all of the updates into the keystore
|
||||||
for(Map.Entry<String, Metadata> entry: cache.entrySet()) {
|
for(Map.Entry<String, Metadata> entry: cache.entrySet()) {
|
||||||
try {
|
try {
|
||||||
|
@ -366,25 +523,77 @@ public class JavaKeyStoreProvider extends KeyProvider {
|
||||||
throw new IOException("Can't set metadata key " + entry.getKey(),e );
|
throw new IOException("Can't set metadata key " + entry.getKey(),e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Save old File first
|
||||||
|
boolean fileExisted = backupToOld(oldPath);
|
||||||
// write out the keystore
|
// write out the keystore
|
||||||
FSDataOutputStream out = FileSystem.create(fs, path, permissions);
|
// Write to _NEW path first :
|
||||||
try {
|
try {
|
||||||
keyStore.store(out, password);
|
writeToNew(newPath);
|
||||||
} catch (KeyStoreException e) {
|
} catch (IOException ioe) {
|
||||||
throw new IOException("Can't store keystore " + this, e);
|
// rename _OLD back to curent and throw Exception
|
||||||
} catch (NoSuchAlgorithmException e) {
|
revertFromOld(oldPath, fileExisted);
|
||||||
throw new IOException("No such algorithm storing keystore " + this, e);
|
throw ioe;
|
||||||
} catch (CertificateException e) {
|
|
||||||
throw new IOException("Certificate exception storing keystore " + this,
|
|
||||||
e);
|
|
||||||
}
|
}
|
||||||
out.close();
|
// Rename _NEW to CURRENT and delete _OLD
|
||||||
|
cleanupNewAndOld(newPath, oldPath);
|
||||||
changed = false;
|
changed = false;
|
||||||
} finally {
|
} finally {
|
||||||
writeLock.unlock();
|
writeLock.unlock();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void cleanupNewAndOld(Path newPath, Path oldPath) throws IOException {
|
||||||
|
// Rename _NEW to CURRENT
|
||||||
|
renameOrFail(newPath, path);
|
||||||
|
// Delete _OLD
|
||||||
|
if (fs.exists(oldPath)) {
|
||||||
|
fs.delete(oldPath, true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void writeToNew(Path newPath) throws IOException {
|
||||||
|
FSDataOutputStream out =
|
||||||
|
FileSystem.create(fs, newPath, permissions);
|
||||||
|
try {
|
||||||
|
keyStore.store(out, password);
|
||||||
|
} catch (KeyStoreException e) {
|
||||||
|
throw new IOException("Can't store keystore " + this, e);
|
||||||
|
} catch (NoSuchAlgorithmException e) {
|
||||||
|
throw new IOException(
|
||||||
|
"No such algorithm storing keystore " + this, e);
|
||||||
|
} catch (CertificateException e) {
|
||||||
|
throw new IOException(
|
||||||
|
"Certificate exception storing keystore " + this, e);
|
||||||
|
}
|
||||||
|
out.close();
|
||||||
|
}
|
||||||
|
|
||||||
|
private void revertFromOld(Path oldPath, boolean fileExisted)
|
||||||
|
throws IOException {
|
||||||
|
if (fileExisted) {
|
||||||
|
renameOrFail(oldPath, path);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private boolean backupToOld(Path oldPath)
|
||||||
|
throws IOException {
|
||||||
|
boolean fileExisted = false;
|
||||||
|
if (fs.exists(path)) {
|
||||||
|
renameOrFail(path, oldPath);
|
||||||
|
fileExisted = true;
|
||||||
|
}
|
||||||
|
return fileExisted;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void renameOrFail(Path src, Path dest)
|
||||||
|
throws IOException {
|
||||||
|
if (!fs.rename(src, dest)) {
|
||||||
|
throw new IOException("Rename unsuccessful : "
|
||||||
|
+ String.format("'%s' to '%s'", src, dest));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public String toString() {
|
public String toString() {
|
||||||
return uri.toString();
|
return uri.toString();
|
||||||
|
|
|
@ -211,11 +211,76 @@ public class TestKeyProviderFactory {
|
||||||
assertTrue(s.getPermission().toString().equals("rwx------"));
|
assertTrue(s.getPermission().toString().equals("rwx------"));
|
||||||
assertTrue(file + " should exist", file.isFile());
|
assertTrue(file + " should exist", file.isFile());
|
||||||
|
|
||||||
|
// Corrupt file and Check if JKS can reload from _OLD file
|
||||||
|
File oldFile = new File(file.getPath() + "_OLD");
|
||||||
|
file.renameTo(oldFile);
|
||||||
|
file.delete();
|
||||||
|
file.createNewFile();
|
||||||
|
assertTrue(oldFile.exists());
|
||||||
|
KeyProvider provider = KeyProviderFactory.getProviders(conf).get(0);
|
||||||
|
assertTrue(file.exists());
|
||||||
|
assertTrue(oldFile + "should be deleted", !oldFile.exists());
|
||||||
|
verifyAfterReload(file, provider);
|
||||||
|
assertTrue(!oldFile.exists());
|
||||||
|
|
||||||
|
// _NEW and current file should not exist together
|
||||||
|
File newFile = new File(file.getPath() + "_NEW");
|
||||||
|
newFile.createNewFile();
|
||||||
|
try {
|
||||||
|
provider = KeyProviderFactory.getProviders(conf).get(0);
|
||||||
|
Assert.fail("_NEW and current file should not exist together !!");
|
||||||
|
} catch (Exception e) {
|
||||||
|
// Ignore
|
||||||
|
} finally {
|
||||||
|
if (newFile.exists()) {
|
||||||
|
newFile.delete();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load from _NEW file
|
||||||
|
file.renameTo(newFile);
|
||||||
|
file.delete();
|
||||||
|
try {
|
||||||
|
provider = KeyProviderFactory.getProviders(conf).get(0);
|
||||||
|
Assert.assertFalse(newFile.exists());
|
||||||
|
Assert.assertFalse(oldFile.exists());
|
||||||
|
} catch (Exception e) {
|
||||||
|
Assert.fail("JKS should load from _NEW file !!");
|
||||||
|
// Ignore
|
||||||
|
}
|
||||||
|
verifyAfterReload(file, provider);
|
||||||
|
|
||||||
|
// _NEW exists but corrupt.. must load from _OLD
|
||||||
|
newFile.createNewFile();
|
||||||
|
file.renameTo(oldFile);
|
||||||
|
file.delete();
|
||||||
|
try {
|
||||||
|
provider = KeyProviderFactory.getProviders(conf).get(0);
|
||||||
|
Assert.assertFalse(newFile.exists());
|
||||||
|
Assert.assertFalse(oldFile.exists());
|
||||||
|
} catch (Exception e) {
|
||||||
|
Assert.fail("JKS should load from _OLD file !!");
|
||||||
|
// Ignore
|
||||||
|
} finally {
|
||||||
|
if (newFile.exists()) {
|
||||||
|
newFile.delete();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
verifyAfterReload(file, provider);
|
||||||
|
|
||||||
// check permission retention after explicit change
|
// check permission retention after explicit change
|
||||||
fs.setPermission(path, new FsPermission("777"));
|
fs.setPermission(path, new FsPermission("777"));
|
||||||
checkPermissionRetention(conf, ourUrl, path);
|
checkPermissionRetention(conf, ourUrl, path);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void verifyAfterReload(File file, KeyProvider provider)
|
||||||
|
throws IOException {
|
||||||
|
List<String> existingKeys = provider.getKeys();
|
||||||
|
assertTrue(existingKeys.contains("key4"));
|
||||||
|
assertTrue(existingKeys.contains("key3"));
|
||||||
|
assertTrue(file.exists());
|
||||||
|
}
|
||||||
|
|
||||||
public void checkPermissionRetention(Configuration conf, String ourUrl, Path path) throws Exception {
|
public void checkPermissionRetention(Configuration conf, String ourUrl, Path path) throws Exception {
|
||||||
KeyProvider provider = KeyProviderFactory.getProviders(conf).get(0);
|
KeyProvider provider = KeyProviderFactory.getProviders(conf).get(0);
|
||||||
// let's add a new key and flush and check that permissions are still set to 777
|
// let's add a new key and flush and check that permissions are still set to 777
|
||||||
|
|
Loading…
Reference in New Issue