You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@spark.apache.org by "Partha Pratim Ghosh (JIRA)" <ji...@apache.org> on 2016/06/20 12:28:06 UTC

[jira] [Created] (SPARK-16067) Spark overriding JAAS privilege using keytab

Partha Pratim Ghosh created SPARK-16067:
-------------------------------------------

             Summary: Spark overriding JAAS privilege using keytab 
                 Key: SPARK-16067
                 URL: https://issues.apache.org/jira/browse/SPARK-16067
             Project: Spark
          Issue Type: Bug
            Reporter: Partha Pratim Ghosh


I am using a JAAS doAsPrivileged method with kerberos (with keytab) authenticated subject to invoke a Spark configuration but the spark conf is opening with  the Kerberos authentication from system cache instead. I want that to use the authentication from JAAS.

Following is my JAAS file - 

public void sparkJaas(){
		final String principal = "user2";
		final String keytab = "/app/user2.keytab";
		/*final String principal = "user1";
		final String keytab = "/app/user1.keytab";*/
		final Subject subject;
		
		subject = JaasKerbCall.getInstance().login(principal);
		Subject.doAsPrivileged(subject, new PrivilegedAction<Object>() {
			public Object run() {
				String classServerUri = "http://<server host>:<server port>";
				Set<Principal> principals = subject.getPrincipals();
				for (Principal principal : principals) {
					System.out.println("amlpoc : Subject principal" + principal.getName());
				}
				String sparkBasePath = "/app/spark-1.5.0-bin-hadoop2.6";
				File pysparkPath = new File(sparkBasePath, "python" + File.separator + "lib");
				File sparkPath = new File(sparkBasePath, "lib");
				String[] sparkLibs = new String[] { "spark-assembly-1.5.0-hadoop2.6.0.jar" };
				// Open Spark context
				SparkConf conf = new SparkConf().setMaster("yarn-client").setAppName("spark-test")
						.set("spark.repl.class.uri", classServerUri);
				conf.setSparkHome(sparkBasePath);
				

				
				conf.set("spark.app.name", "spark-test");
				conf.set("spark.executor.memory", "8g");
				conf.set("spark.scheduler.mode", "FAIR");
				conf.set("spark.yarn.principal", principal);
				conf.set("spark.yarn.keytab", keytab);

				// Only one of py4j-0.9-src.zip and py4j-0.8.2.1-src.zip should exist
				String[] pythonLibs = new String[] { "pyspark.zip", "py4j-0.9-src.zip", "py4j-0.8.2.1-src.zip" };
				ArrayList<String> pythonLibUris = new ArrayList<String>();
				for (String lib : pythonLibs) {
					File libFile = new File(pysparkPath, lib);
					if (libFile.exists()) {
						pythonLibUris.add(libFile.toURI().toString());
					}
				}


				for (String lib : sparkLibs) {
					File libFile = new File(sparkPath, lib);
					if (libFile.exists()) {
						pythonLibUris.add(libFile.toURI().toString());
					}
				}

				pythonLibUris.trimToSize();

				// Distribute two libraries(pyspark.zip and py4j-*.zip) to workers
				// when spark version is less than or equal to 1.4.1
				if (pythonLibUris.size() == 2) {
					try {
						String confValue = conf.get("spark.yarn.dist.files");
						conf.set("spark.yarn.dist.files", confValue + "," + Joiner.on(",").join(pythonLibUris));
					} catch (NoSuchElementException e) {
						conf.set("spark.yarn.dist.files", Joiner.on(",").join(pythonLibUris));
					}
					conf.set("spark.files", conf.get("spark.yarn.dist.files"));
					conf.set("spark.submit.pyArchives", Joiner.on(":").join(pythonLibs));
				}

				conf.set("spark.yarn.isPython", "true");

				SparkContext sparkContext = new SparkContext(conf);
				System.out.println("SparkContext created : AppId : " + sparkContext.getConf().getAppId());
				return sparkContext;
			}// End run()

		}, null);
	}


Following is the kerberos log - 

[INFO] 
[INFO] --- exec-maven-plugin:1.4.0:java (default-cli) @ spark-connectivity ---
>>> KeyTabInputStream, readName(): XX.XX.XX.XX
>>> KeyTabInputStream, readName(): user2
>>> KeyTab: load() entry length: 81; type: 18
>>> KeyTabInputStream, readName(): XX.XX.XX.XX
>>> KeyTabInputStream, readName(): user2
>>> KeyTab: load() entry length: 65; type: 17
>>> KeyTabInputStream, readName(): XX.XX.XX.XX
>>> KeyTabInputStream, readName(): user2
>>> KeyTab: load() entry length: 65; type: 17
>>> KeyTabInputStream, readName(): XX.XX.XX.XX
>>> KeyTabInputStream, readName(): user2
>>> KeyTab: load() entry length: 65; type: 17
Looking for keys for: user2@XX.XX.XX.XX
Java config name: /app/java/spark-connectivity/src/main/resources/krb5.conf
Loaded from Java config
Added key: 17version: 1
Added key: 17version: 1
Added key: 17version: 1
Added key: 18version: 1
>>> KdcAccessibility: reset
Looking for keys for: user2@XX.XX.XX.XX
Added key: 17version: 1
Added key: 17version: 1
Added key: 17version: 1
Added key: 18version: 1
default etypes for default_tkt_enctypes: 17 16 23.
>>> KrbAsReq creating message
>>> KrbKdcReq send: kdc=kdcs2-yy.yy.yy.yy UDP:88, timeout=30000, number of retries =3, #bytes=160
>>> KDCCommunication: kdc=kdcs2-yy.yy.yy.yy UDP:88, timeout=30000,Attempt =1, #bytes=160
>>> KrbKdcReq send: #bytes read=255
>>>Pre-Authentication Data:
         PA-DATA type = 2
         PA-ENC-TIMESTAMP
>>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = <salt>, s2kparams = null

>>>Pre-Authentication Data:
         PA-DATA type = 13

>>> KdcAccessibility: remove kdcs2-yy.yy.yy.yy:88
>>> KDCRep: init() encoding tag is 126 req type is 11
>>>KRBError:
         cTime is Wed Mar 30 13:18:20 EDT 2022 1648660700000
         sTime is Mon Jun 20 07:57:20 EDT 2016 1466423840000
         suSec is 762837
         error code is 25
         error Message is Additional pre-authentication required
         cname is user2@XX.XX.XX.XX
         sname is <server>/XX.XX.XX.XX@XX.XX.XX.XX
         eData provided.
         msgType is 30
>>>Pre-Authentication Data:
         PA-DATA type = 2
         PA-ENC-TIMESTAMP
>>>Pre-Authentication Data:
         PA-DATA type = 19
         PA-ETYPE-INFO2 etype = 17, salt = <salt>, s2kparams = null

>>>Pre-Authentication Data:
         PA-DATA type = 13

KRBError received: NEEDED_PREAUTH
KrbAsReqBuilder: PREAUTH FAILED/REQ, re-send AS-REQ
default etypes for default_tkt_enctypes: 17 16 23.
Looking for keys for: user2@XX.XX.XX.XX
Added key: 17version: 1
Added key: 17version: 1
Added key: 17version: 1
Added key: 18version: 1
Looking for keys for: user2@XX.XX.XX.XX
Added key: 17version: 1
Added key: 17version: 1
Added key: 17version: 1
Added key: 18version: 1
default etypes for default_tkt_enctypes: 17 16 23.
>>> EType: sun.security.krb5.internal.crypto.<CryptoType>
>>> KrbAsReq creating message
>>> KrbKdcReq send: kdc=kdcs2-yy.yy.yy.yy UDP:88, timeout=30000, number of retries =3, #bytes=247
>>> KDCCommunication: kdc=kdcs2-yy.yy.yy.yy UDP:88, timeout=30000,Attempt =1, #bytes=247
>>> KrbKdcReq send: #bytes read=632
>>> KdcAccessibility: remove kdcs2-yy.yy.yy.yy:88
Looking for keys for: user2@XX.XX.XX.XX
Added key: 17version: 1
Added key: 17version: 1
Added key: 17version: 1
Added key: 18version: 1
>>> EType: sun.security.krb5.internal.crypto.<CryptoType>
>>> KrbAsRep cons in KrbAsReq.getReply user2
Authentication succeeded!
<projName> : Subject principaluser2@XX.XX.XX.XX
Using Spark's default log4j profile: org/apache/spark/log4j-defaults.properties
16/06/20 07:57:21 INFO SparkContext: Running Spark version 1.5.0
>>>KinitOptions cache name is /tmp/krb5cc_515
>>>DEBUG <CCacheInputStream>  client principal is user1@XX.XX.XX.XX

Why is spark checking ticket cache when JAAS is providing keytab authentication?





--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@spark.apache.org
For additional commands, e-mail: issues-help@spark.apache.org