All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.trino.tests.product.jdbc.TestKerberosConstrainedDelegationJdbc Maven / Gradle / Ivy

There is a newer version: 468
Show newest version
/*
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package io.trino.tests.product.jdbc;

import com.google.inject.Inject;
import com.google.inject.name.Named;
import io.trino.tempto.BeforeMethodWithContext;
import io.trino.tempto.ProductTest;
import io.trino.tempto.kerberos.KerberosAuthentication;
import io.trino.tests.product.TpchTableResults;
import org.ietf.jgss.GSSCredential;
import org.ietf.jgss.GSSManager;
import org.ietf.jgss.Oid;
import org.testng.annotations.Test;

import javax.security.auth.Subject;

import java.security.Principal;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.PreparedStatement;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.util.Properties;

import static com.google.common.collect.Iterables.getOnlyElement;
import static io.trino.tempto.query.QueryResult.forResultSet;
import static io.trino.tests.product.TestGroups.JDBC_KERBEROS_CONSTRAINED_DELEGATION;
import static java.lang.String.format;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
import static org.ietf.jgss.GSSCredential.DEFAULT_LIFETIME;
import static org.ietf.jgss.GSSCredential.INITIATE_ONLY;
import static org.ietf.jgss.GSSName.NT_USER_NAME;

public class TestKerberosConstrainedDelegationJdbc
        extends ProductTest
{
    private static final String KERBEROS_OID = "1.2.840.113554.1.2.2";
    @Inject
    @Named("databases.presto.jdbc_url")
    String jdbcUrl;

    @Inject
    @Named("databases.presto.kerberos_principal")
    private String kerberosPrincipal;

    @Inject
    @Named("databases.presto.kerberos_keytab")
    private String kerberosKeytab;

    private GSSManager gssManager;
    private KerberosAuthentication kerberosAuthentication;

    @BeforeMethodWithContext
    public void setUp()
    {
        this.gssManager = GSSManager.getInstance();
        this.kerberosAuthentication = new KerberosAuthentication(kerberosPrincipal, kerberosKeytab);
    }

    @Test(groups = JDBC_KERBEROS_CONSTRAINED_DELEGATION)
    public void testSelectConstrainedDelegationKerberos()
            throws Exception
    {
        Properties driverProperties = new Properties();
        GSSCredential credential = createGssCredential();
        driverProperties.put("KerberosConstrainedDelegation", credential);
        try (Connection connection = DriverManager.getConnection(jdbcUrl, driverProperties);
                PreparedStatement statement = connection.prepareStatement("SELECT * FROM tpch.tiny.nation");
                ResultSet results = statement.executeQuery()) {
            assertThat(forResultSet(results)).matches(TpchTableResults.PRESTO_NATION_RESULT);
        }
        finally {
            credential.dispose();
        }
    }

    @Test(groups = JDBC_KERBEROS_CONSTRAINED_DELEGATION)
    public void testCtasConstrainedDelegationKerberos()
            throws Exception
    {
        Properties driverProperties = new Properties();
        GSSCredential credential = createGssCredential();
        driverProperties.put("KerberosConstrainedDelegation", credential);
        try (Connection connection = DriverManager.getConnection(jdbcUrl, driverProperties);
                PreparedStatement statement = connection.prepareStatement(format("CREATE TABLE %s AS SELECT * FROM tpch.tiny.nation", "test_kerberos_ctas"))) {
            int results = statement.executeUpdate();
            assertThat(results).isEqualTo(25);
        }
        finally {
            credential.dispose();
        }
    }

    @Test(groups = JDBC_KERBEROS_CONSTRAINED_DELEGATION)
    public void testQueryOnDisposedCredential()
            throws Exception
    {
        Properties driverProperties = new Properties();
        GSSCredential credential = createGssCredential();
        credential.dispose();
        driverProperties.put("KerberosConstrainedDelegation", credential);
        try (Connection connection = DriverManager.getConnection(jdbcUrl, driverProperties)) {
            assertThatThrownBy(() -> connection.prepareStatement("SELECT * FROM tpch.tiny.nation"))
                    .cause()
                    .isInstanceOf(IllegalStateException.class)
                    .hasMessageContaining("This credential is no longer valid");
        }
    }

    @Test(groups = JDBC_KERBEROS_CONSTRAINED_DELEGATION)
    public void testQueryOnExpiredCredential()
            throws Exception
    {
        Properties driverProperties = new Properties();
        GSSCredential credential = createGssCredential();
        // ticket default lifetime is 80s by kerb.conf, sleep to expire ticket
        Thread.sleep(30000);
        // check before execution that current lifetime is less than 60s (MIN_LIFETIME on client), to be sure that we already expired
        assertThat(credential.getRemainingLifetime()).isLessThanOrEqualTo(60);
        driverProperties.put("KerberosConstrainedDelegation", credential);
        try (Connection connection = DriverManager.getConnection(jdbcUrl, driverProperties)) {
            assertThatThrownBy(() -> connection.prepareStatement("SELECT * FROM tpch.tiny.nation"))
                    .isInstanceOf(SQLException.class)
                    .hasMessageContaining("Kerberos credential is expired");
        }
        finally {
            credential.dispose();
        }
    }

    private GSSCredential createGssCredential()
    {
        Subject authenticatedSubject = this.kerberosAuthentication.authenticate();
        Principal clientPrincipal = getOnlyElement(authenticatedSubject.getPrincipals());
        return Subject.callAs(authenticatedSubject,
                () ->
                        gssManager.createCredential(
                                gssManager.createName(clientPrincipal.getName(), NT_USER_NAME),
                                DEFAULT_LIFETIME,
                                new Oid(KERBEROS_OID),
                                INITIATE_ONLY));
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy