Skip to content

Commit 18da9a6

Browse files
Feature: Enable/Disable kerberos authentication for cloudera manager hbase instance (#1793)
1 parent 3a5e9e4 commit 18da9a6

File tree

7 files changed

+563
-0
lines changed

7 files changed

+563
-0
lines changed

athena-hbase/athena-hbase.yaml

+25
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,22 @@ Parameters:
5252
Description: "(Optional) An IAM policy ARN to use as the PermissionsBoundary for the created Lambda function's execution role"
5353
Default: ''
5454
Type: String
55+
KerberosAuthEnabled:
56+
Description: 'Kerberos authentication enabled or not'
57+
Default: "false"
58+
Type: String
59+
KerberosConfigFilesS3Reference:
60+
Description: 'The S3 bucket reference where kerberos auth config files are uploaded. Applicable for Kerberos auth'
61+
Default: ""
62+
Type: String
63+
PrincipalName:
64+
Description: 'Principal name for Kerberos authentication'
65+
Default: ""
66+
Type: String
67+
HbaseRpcProtection:
68+
Description: 'Hbase Rpc Protection value for Kerberos authentication'
69+
Default: ""
70+
Type: String
5571
Conditions:
5672
HasPermissionsBoundary: !Not [ !Equals [ !Ref PermissionsBoundaryARN, "" ] ]
5773
Resources:
@@ -64,6 +80,10 @@ Resources:
6480
spill_bucket: !Ref SpillBucket
6581
spill_prefix: !Ref SpillPrefix
6682
default_hbase: !Ref HBaseConnectionString
83+
kerberos_auth_enabled: !Ref KerberosAuthEnabled
84+
kerberos_config_files_s3_reference: !Ref KerberosConfigFilesS3Reference
85+
principal_name: !Ref PrincipalName
86+
hbase_rpc_protection: !Ref HbaseRpcProtection
6787
FunctionName: !Ref AthenaCatalogName
6888
Handler: "com.amazonaws.athena.connectors.hbase.HbaseCompositeHandler"
6989
CodeUri: "./target/athena-hbase-2022.47.1.jar"
@@ -91,6 +111,11 @@ Resources:
91111
- glue:GetDatabase
92112
- athena:GetQueryExecution
93113
- s3:ListAllMyBuckets
114+
- s3:ListBucket
115+
- s3:GetObject
116+
- s3:GetBucketLocation
117+
- s3:GetObjectVersion
118+
- s3:GetLifecycleConfiguration
94119
Effect: Allow
95120
Resource: '*'
96121
Version: '2012-10-17'

athena-hbase/src/main/java/com/amazonaws/athena/connectors/hbase/HbaseConnectionFactory.java

+44
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,28 @@
2020
package com.amazonaws.athena.connectors.hbase;
2121

2222
import org.apache.arrow.util.VisibleForTesting;
23+
import org.apache.commons.lang3.StringUtils;
2324
import org.apache.hadoop.conf.Configuration;
2425
import org.apache.hadoop.hbase.HBaseConfiguration;
2526
import org.apache.hadoop.hbase.client.Connection;
2627
import org.apache.hadoop.hbase.client.ConnectionFactory;
28+
import org.apache.hadoop.security.UserGroupInformation;
2729
import org.slf4j.Logger;
2830
import org.slf4j.LoggerFactory;
2931

32+
import java.io.File;
3033
import java.io.IOException;
34+
import java.nio.file.Path;
3135
import java.util.Collections;
3236
import java.util.HashMap;
3337
import java.util.Map;
3438

39+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.HBASE_RPC_PROTECTION;
40+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.KERBEROS_AUTH_ENABLED;
41+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.KERBEROS_CONFIG_FILES_S3_REFERENCE;
42+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.PRINCIPAL_NAME;
43+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.copyConfigFilesFromS3ToTempFolder;
44+
3545
/**
3646
* Creates and Caches HBase Connection Instances, using the connection string as the cache key.
3747
*
@@ -113,6 +123,40 @@ private Connection createConnection(String host, String masterPort, String zooke
113123
logger.info("createConnection: applying client config {}:{}", nextConfig.getKey(), nextConfig.getValue());
114124
config.set(nextConfig.getKey(), nextConfig.getValue());
115125
}
126+
127+
Map<String, String> configOptions = System.getenv();
128+
boolean kerberosAuthEnabled = configOptions.get(KERBEROS_AUTH_ENABLED) != null && "true".equalsIgnoreCase(configOptions.get(KERBEROS_AUTH_ENABLED));
129+
logger.info("Kerberos Authentication Enabled: " + kerberosAuthEnabled);
130+
if (kerberosAuthEnabled) {
131+
String keytabLocation = null;
132+
config.set("hbase.rpc.protection", configOptions.get(HBASE_RPC_PROTECTION));
133+
logger.info("hbase.rpc.protection: " + config.get("hbase.rpc.protection"));
134+
String s3uri = configOptions.get(KERBEROS_CONFIG_FILES_S3_REFERENCE);
135+
if (StringUtils.isNotBlank(s3uri)) {
136+
try {
137+
Path tempDir = copyConfigFilesFromS3ToTempFolder(configOptions);
138+
logger.debug("tempDir: " + tempDir);
139+
keytabLocation = tempDir + File.separator + "hbase.keytab";
140+
System.setProperty("java.security.krb5.conf", tempDir + File.separator + "krb5.conf");
141+
logger.debug("krb5.conf location: " + tempDir + File.separator + "krb5.conf");
142+
}
143+
catch (Exception e) {
144+
throw new RuntimeException("Error Copying Config files from S3 to temp folder: ", e);
145+
}
146+
}
147+
logger.debug("keytabLocation: " + keytabLocation);
148+
149+
UserGroupInformation.setConfiguration(config);
150+
try {
151+
String principalName = configOptions.get(PRINCIPAL_NAME);
152+
UserGroupInformation.loginUserFromKeytab(principalName, keytabLocation);
153+
}
154+
catch (IOException ex) {
155+
throw new RuntimeException("Exception in UserGroupInformation.loginUserFromKeytab: ", ex);
156+
}
157+
logger.debug("UserGroupInformation.loginUserFromKeytab Success.");
158+
}
159+
116160
Connection conn = ConnectionFactory.createConnection(config);
117161
logger.info("createConnection: hbase.zookeeper.quorum:" + config.get("hbase.zookeeper.quorum"));
118162
logger.info("createConnection: hbase.zookeeper.property.clientPort:" + config.get("hbase.zookeeper.property.clientPort"));
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,124 @@
1+
/*-
2+
* #%L
3+
* athena-hbase
4+
* %%
5+
* Copyright (C) 2019 - 2024 Amazon Web Services
6+
* %%
7+
* Licensed under the Apache License, Version 2.0 (the "License");
8+
* you may not use this file except in compliance with the License.
9+
* You may obtain a copy of the License at
10+
*
11+
* http://www.apache.org/licenses/LICENSE-2.0
12+
*
13+
* Unless required by applicable law or agreed to in writing, software
14+
* distributed under the License is distributed on an "AS IS" BASIS,
15+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16+
* See the License for the specific language governing permissions and
17+
* limitations under the License.
18+
* #L%
19+
*/
20+
package com.amazonaws.athena.connectors.hbase;
21+
22+
import com.amazonaws.auth.AWSCredentials;
23+
import com.amazonaws.auth.AWSStaticCredentialsProvider;
24+
import com.amazonaws.auth.DefaultAWSCredentialsProviderChain;
25+
import com.amazonaws.services.s3.AmazonS3;
26+
import com.amazonaws.services.s3.AmazonS3ClientBuilder;
27+
import com.amazonaws.services.s3.model.GetObjectRequest;
28+
import com.amazonaws.services.s3.model.ObjectListing;
29+
import com.amazonaws.services.s3.model.S3Object;
30+
import com.amazonaws.services.s3.model.S3ObjectSummary;
31+
import org.slf4j.Logger;
32+
import org.slf4j.LoggerFactory;
33+
34+
import java.io.BufferedInputStream;
35+
import java.io.File;
36+
import java.io.InputStream;
37+
import java.nio.file.Files;
38+
import java.nio.file.Path;
39+
import java.nio.file.Paths;
40+
import java.nio.file.StandardCopyOption;
41+
42+
public class HbaseKerberosUtils
43+
{
44+
private static final Logger logger = LoggerFactory.getLogger(HbaseKerberosUtils.class);
45+
46+
/**
47+
* For Kerberos authentication, user need to give S3 bucket reference where the config
48+
* files are uploaded.
49+
*/
50+
public static final String KERBEROS_CONFIG_FILES_S3_REFERENCE = "kerberos_config_files_s3_reference";
51+
/**
52+
* This is temp folder where the kerberos config files from S3 will be downloaded
53+
*/
54+
public static final String TEMP_DIR = "/tmp";
55+
public static final String PRINCIPAL_NAME = "principal_name";
56+
public static final String HBASE_RPC_PROTECTION = "hbase_rpc_protection";
57+
public static final String KERBEROS_AUTH_ENABLED = "kerberos_auth_enabled";
58+
59+
private HbaseKerberosUtils() {}
60+
61+
/**
62+
* Downloads the config files from S3 to temp directory.
63+
*
64+
* @throws Exception - {@link Exception}
65+
*/
66+
public static Path copyConfigFilesFromS3ToTempFolder(java.util.Map<String, String> configOptions) throws Exception
67+
{
68+
logger.debug("Creating the connection with AWS S3 for copying config files to Temp Folder");
69+
Path tempDir = getTempDirPath();
70+
AWSCredentials credentials = new DefaultAWSCredentialsProviderChain().getCredentials();
71+
AmazonS3 s3Client = AmazonS3ClientBuilder.standard().
72+
withCredentials(new AWSStaticCredentialsProvider(credentials)).
73+
build();
74+
75+
String s3uri = getRequiredConfig(KERBEROS_CONFIG_FILES_S3_REFERENCE, configOptions);
76+
String[] s3Bucket = s3uri.split("s3://")[1].split("/");
77+
78+
ObjectListing objectListing = s3Client.listObjects(s3Bucket[0], s3Bucket[1]);
79+
80+
for (S3ObjectSummary objectSummary : objectListing.getObjectSummaries()) {
81+
S3Object object = s3Client.getObject(new GetObjectRequest(s3Bucket[0], objectSummary.getKey()));
82+
InputStream inputStream = new BufferedInputStream(object.getObjectContent());
83+
String key = objectSummary.getKey();
84+
String fName = key.substring(key.indexOf('/') + 1);
85+
if (!fName.isEmpty()) {
86+
File file = new File(tempDir + File.separator + fName);
87+
Files.copy(inputStream, file.toPath(), StandardCopyOption.REPLACE_EXISTING);
88+
}
89+
}
90+
return tempDir;
91+
}
92+
93+
/**
94+
* Creates the temp directory to put the kerberos auth config files.
95+
*
96+
* @return {@link Path} Temp directory path
97+
*/
98+
private static Path getTempDirPath()
99+
{
100+
Path tmpPath = Paths.get(TEMP_DIR).toAbsolutePath();
101+
File filePath = new File(tmpPath + File.separator + "hbasekerberosconfigs");
102+
if (filePath.exists()) {
103+
return filePath.toPath();
104+
}
105+
boolean isCreated = filePath.mkdirs();
106+
logger.info("Is new directory created? " + isCreated);
107+
return filePath.toPath();
108+
}
109+
110+
/**
111+
* Gets the environment variable.
112+
*
113+
* @param key - the config key
114+
* @return {@link String}
115+
*/
116+
private static String getRequiredConfig(String key, java.util.Map<String, String> configOptions)
117+
{
118+
String value = configOptions.getOrDefault(key, "");
119+
if (value.isEmpty()) {
120+
throw new IllegalArgumentException("Lambda Environment Variable " + key + " has not been populated! ");
121+
}
122+
return value;
123+
}
124+
}

athena-hbase/src/main/java/com/amazonaws/athena/connectors/hbase/connection/HbaseConnectionFactory.java

+41
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,26 @@
2020
package com.amazonaws.athena.connectors.hbase.connection;
2121

2222
import org.apache.arrow.util.VisibleForTesting;
23+
import org.apache.commons.lang3.StringUtils;
2324
import org.apache.hadoop.conf.Configuration;
2425
import org.apache.hadoop.hbase.HBaseConfiguration;
26+
import org.apache.hadoop.security.UserGroupInformation;
2527
import org.slf4j.Logger;
2628
import org.slf4j.LoggerFactory;
2729

30+
import java.io.File;
2831
import java.io.IOException;
32+
import java.nio.file.Path;
2933
import java.util.Collections;
3034
import java.util.HashMap;
3135
import java.util.Map;
3236

37+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.HBASE_RPC_PROTECTION;
38+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.KERBEROS_AUTH_ENABLED;
39+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.KERBEROS_CONFIG_FILES_S3_REFERENCE;
40+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.PRINCIPAL_NAME;
41+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.copyConfigFilesFromS3ToTempFolder;
42+
3343
/**
3444
* Creates and Caches HBase Connection Instances, using the connection string as the cache key.
3545
*
@@ -116,6 +126,37 @@ private HBaseConnection createConnection(String host, String masterPort, String
116126
config.set(nextConfig.getKey(), nextConfig.getValue());
117127
}
118128

129+
Map<String, String> configOptions = System.getenv();
130+
boolean kerberosAuthEnabled = configOptions.get(KERBEROS_AUTH_ENABLED) != null && "true".equalsIgnoreCase(configOptions.get(KERBEROS_AUTH_ENABLED));
131+
logger.info("Kerberos Authentication Enabled: " + kerberosAuthEnabled);
132+
if (kerberosAuthEnabled) {
133+
String keytabLocation = null;
134+
config.set("hbase.rpc.protection", configOptions.get(HBASE_RPC_PROTECTION));
135+
logger.info("hbase.rpc.protection: " + config.get("hbase.rpc.protection"));
136+
String s3uri = configOptions.get(KERBEROS_CONFIG_FILES_S3_REFERENCE);
137+
if (StringUtils.isNotBlank(s3uri)) {
138+
try {
139+
Path tempDir = copyConfigFilesFromS3ToTempFolder(configOptions);
140+
logger.debug("tempDir: " + tempDir);
141+
keytabLocation = tempDir + File.separator + "hbase.keytab";
142+
System.setProperty("java.security.krb5.conf", tempDir + File.separator + "krb5.conf");
143+
logger.debug("keytabLocation: " + keytabLocation);
144+
}
145+
catch (Exception e) {
146+
throw new RuntimeException("Error Copying Config files from S3 to temp folder: ", e);
147+
}
148+
}
149+
150+
UserGroupInformation.setConfiguration(config);
151+
try {
152+
String principalName = configOptions.get(PRINCIPAL_NAME);
153+
UserGroupInformation.loginUserFromKeytab(principalName, keytabLocation);
154+
}
155+
catch (IOException ex) {
156+
throw new RuntimeException("Exception in UserGroupInformation.loginUserFromKeytab: ", ex);
157+
}
158+
logger.debug("UserGroupInformation.loginUserFromKeytab Success.");
159+
}
119160
return new HBaseConnection(config, maxRetries);
120161
}
121162

athena-hbase/src/main/java/com/amazonaws/athena/connectors/hbase/integ/HbaseTableUtils.java

+43
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@
1919
*/
2020
package com.amazonaws.athena.connectors.hbase.integ;
2121

22+
import org.apache.commons.lang3.StringUtils;
2223
import org.apache.hadoop.conf.Configuration;
2324
import org.apache.hadoop.hbase.HBaseConfiguration;
2425
import org.apache.hadoop.hbase.HColumnDescriptor;
@@ -30,12 +31,21 @@
3031
import org.apache.hadoop.hbase.client.ConnectionFactory;
3132
import org.apache.hadoop.hbase.client.Put;
3233
import org.apache.hadoop.hbase.client.Table;
34+
import org.apache.hadoop.security.UserGroupInformation;
3335
import org.slf4j.Logger;
3436
import org.slf4j.LoggerFactory;
3537

38+
import java.io.File;
3639
import java.io.IOException;
40+
import java.nio.file.Path;
3741
import java.util.List;
3842

43+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.HBASE_RPC_PROTECTION;
44+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.KERBEROS_AUTH_ENABLED;
45+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.KERBEROS_CONFIG_FILES_S3_REFERENCE;
46+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.PRINCIPAL_NAME;
47+
import static com.amazonaws.athena.connectors.hbase.HbaseKerberosUtils.copyConfigFilesFromS3ToTempFolder;
48+
3949
/**
4050
* This class can be used to establish a connection to a HBase instance. Once the connection is established, a new
4151
* database/namespace and table can be created, and new rows can be inserted into the newly created table.
@@ -88,6 +98,39 @@ private Configuration getHbaseConfiguration(String connectionStr)
8898
configuration.set("hbase.client.pause", "500");
8999
configuration.set("zookeeper.recovery.retry", "2");
90100

101+
java.util.Map<String, String> configOptions = System.getenv();
102+
boolean kerberosAuthEnabled = configOptions.get(KERBEROS_AUTH_ENABLED) != null && "true".equalsIgnoreCase(configOptions.get(KERBEROS_AUTH_ENABLED));
103+
logger.info("Kerberos Authentication Enabled: " + kerberosAuthEnabled);
104+
if (kerberosAuthEnabled) {
105+
String keytabLocation = null;
106+
configuration.set("hbase.rpc.protection", configOptions.get(HBASE_RPC_PROTECTION));
107+
logger.info("hbase.rpc.protection: " + configuration.get("hbase.rpc.protection"));
108+
String s3uri = configOptions.get(KERBEROS_CONFIG_FILES_S3_REFERENCE);
109+
if (StringUtils.isNotBlank(s3uri)) {
110+
try {
111+
Path tempDir = copyConfigFilesFromS3ToTempFolder(configOptions);
112+
logger.debug("tempDir: " + tempDir);
113+
keytabLocation = tempDir + File.separator + "hbase.keytab";
114+
System.setProperty("java.security.krb5.conf", tempDir + File.separator + "krb5.conf");
115+
logger.debug("krb5.conf location: " + tempDir + File.separator + "krb5.conf");
116+
}
117+
catch (Exception e) {
118+
throw new RuntimeException("Error Copying Config files from S3 to temp folder: ", e);
119+
}
120+
}
121+
logger.debug("keytabLocation: " + keytabLocation);
122+
123+
UserGroupInformation.setConfiguration(configuration);
124+
try {
125+
String principalName = configOptions.get(PRINCIPAL_NAME);
126+
UserGroupInformation.loginUserFromKeytab(principalName, keytabLocation);
127+
}
128+
catch (IOException ex) {
129+
throw new RuntimeException("Exception in UserGroupInformation.loginUserFromKeytab: ", ex);
130+
}
131+
logger.debug("UserGroupInformation.loginUserFromKeytab Success.");
132+
}
133+
91134
return configuration;
92135
}
93136

0 commit comments

Comments
 (0)