-
Notifications
You must be signed in to change notification settings - Fork 9.1k
HADOOP-19359. Accelerate token negotiation for other similar mechanisms. #7983
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: trunk
Are you sure you want to change the base?
Conversation
💔 -1 overall
This message was automatically generated. |
HADOOP-19227 has words
Why can this be extended to other mechanisms now? |
It is only for mechanisms similar to DIGEST-MD5. For other mechanisms, it can't. |
💔 -1 overall
This message was automatically generated. |
💔 -1 overall
This message was automatically generated. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi thanks @szetszwo left a few questions
// in the negotiation response | ||
if (enabledAuthMethods.contains(AuthMethod.TOKEN) | ||
&& SaslMechanismFactory.isDefaultMechanism(AuthMethod.TOKEN.getMechanismName())) { | ||
&& SaslMechanismFactory.isDigestMechanism(AuthMethod.TOKEN.getMechanismName())) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
inside of matching just DIGEST-MD5, match any mechanisms starting with DIGEST-*
What mechanisms do we have in mind? I am only aware of DIGEST-MD5. Others may be possible but not standardized.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
DIGEST-MD5 uses MD5 and some other old algorithms. We are working with a new DIGEST based mechanism for replacing the old algorithms.
} | ||
|
||
public static boolean isDigestMechanism(String saslMechanism) { | ||
return saslMechanism.startsWith("DIGEST-"); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe consider using hadoop.security.sasl.mechanism to ensure the value is expected?
<property>
<name>hadoop.security.sasl.mechanism</name>
<value>DIGEST-MD5</value>
<description>
The SASL mechanism used in Hadoop.
</description>
</property>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In some cases, conf objects are unavailable.
Description of PR
HADOOP-19359
HADOOP-19227 changed ipc.Server to accelerate token negotiation only for the default mechanism.
In this JIRA, we change to support other similar mechanisms.
The previous pull request #7213 turned stale. Submitting this one with last trunk.
How was this patch tested?
Tested it manually.
For code changes:
LICENSE
,LICENSE-binary
,NOTICE-binary
files?