Skip to content

Commit fddcb94

Browse files
committed
Revert "HDFS-14884. Add sanity check that zone key equals feinfo key while setting Xattrs. Contributed by Mukul Kumar Singh." (#7529)
This reverts commit a901405. Conflicts: hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirXAttrOp.java (cherry picked from commit 5ccb0dc) (cherry picked from commit 9d3082e) Conflicts: hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirXAttrOp.java
1 parent 2736485 commit fddcb94

File tree

2 files changed

+0
-90
lines changed

2 files changed

+0
-90
lines changed

hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/namenode/FSDirXAttrOp.java

-22
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@
2121
import org.apache.hadoop.thirdparty.com.google.common.base.Preconditions;
2222
import org.apache.hadoop.thirdparty.com.google.common.collect.Lists;
2323
import org.apache.hadoop.HadoopIllegalArgumentException;
24-
import org.apache.hadoop.crypto.key.KeyProviderCryptoExtension;
2524
import org.apache.hadoop.fs.FileStatus;
2625
import org.apache.hadoop.fs.XAttr;
2726
import org.apache.hadoop.fs.XAttrSetFlag;
@@ -45,8 +44,6 @@
4544
import static org.apache.hadoop.hdfs.server.common.HdfsServerConstants.CRYPTO_XATTR_ENCRYPTION_ZONE;
4645
import static org.apache.hadoop.hdfs.server.common.HdfsServerConstants.SECURITY_XATTR_UNREADABLE_BY_SUPERUSER;
4746
import static org.apache.hadoop.hdfs.server.common.HdfsServerConstants.XATTR_SATISFY_STORAGE_POLICY;
48-
import static org.apache.hadoop.hdfs.server.common.HdfsServerConstants.CRYPTO_XATTR_FILE_ENCRYPTION_INFO;
49-
5047
class FSDirXAttrOp {
5148
private static final XAttr KEYID_XATTR =
5249
XAttrHelper.buildXAttr(CRYPTO_XATTR_ENCRYPTION_ZONE, null);
@@ -281,25 +278,6 @@ static INode unprotectedSetXAttrs(
281278
* If we're adding the encryption zone xattr, then add src to the list
282279
* of encryption zones.
283280
*/
284-
285-
if (CRYPTO_XATTR_FILE_ENCRYPTION_INFO.equals(xaName)) {
286-
HdfsProtos.PerFileEncryptionInfoProto fileProto = HdfsProtos.
287-
PerFileEncryptionInfoProto.parseFrom(xattr.getValue());
288-
String keyVersionName = fileProto.getEzKeyVersionName();
289-
String zoneKeyName = fsd.ezManager.getKeyName(iip);
290-
if (zoneKeyName == null) {
291-
throw new IOException("Cannot add raw feInfo XAttr to a file in a " +
292-
"non-encryption zone");
293-
}
294-
295-
if (!KeyProviderCryptoExtension.
296-
getBaseName(keyVersionName).equals(zoneKeyName)) {
297-
throw new IllegalArgumentException(String.format(
298-
"KeyVersion '%s' does not belong to the key '%s'",
299-
keyVersionName, zoneKeyName));
300-
}
301-
}
302-
303281
if (CRYPTO_XATTR_ENCRYPTION_ZONE.equals(xaName)) {
304282
final HdfsProtos.ZoneEncryptionInfoProto ezProto =
305283
HdfsProtos.ZoneEncryptionInfoProto.parseFrom(xattr.getValue());

hadoop-hdfs-project/hadoop-hdfs/src/test/java/org/apache/hadoop/hdfs/TestEncryptionZones.java

-68
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@
3535
import java.util.Collection;
3636
import java.util.EnumSet;
3737
import java.util.List;
38-
import java.util.Map;
3938
import java.util.concurrent.Callable;
4039
import java.util.concurrent.CountDownLatch;
4140
import java.util.concurrent.ExecutionException;
@@ -61,7 +60,6 @@
6160
import org.apache.hadoop.fs.FileSystem;
6261
import org.apache.hadoop.fs.FileSystemTestHelper;
6362
import org.apache.hadoop.fs.FileSystemTestWrapper;
64-
import org.apache.hadoop.fs.FileUtil;
6563
import org.apache.hadoop.fs.FsServerDefaults;
6664
import org.apache.hadoop.fs.FsShell;
6765
import org.apache.hadoop.fs.Path;
@@ -326,72 +324,6 @@ public Object run() throws Exception {
326324
});
327325
}
328326

329-
/**
330-
* Tests encrypted files with same original content placed in two different
331-
* EZ are not same in encrypted form.
332-
*/
333-
@Test
334-
public void testEncryptionZonesDictCp() throws Exception {
335-
final String testkey1 = "testkey1";
336-
final String testkey2 = "testkey2";
337-
DFSTestUtil.createKey(testkey1, cluster, conf);
338-
DFSTestUtil.createKey(testkey2, cluster, conf);
339-
340-
final int len = 8196;
341-
final Path zone1 = new Path("/zone1");
342-
final Path zone1File = new Path(zone1, "file");
343-
final Path raw1File = new Path("/.reserved/raw/zone1/file");
344-
345-
final Path zone2 = new Path("/zone2");
346-
final Path zone2File = new Path(zone2, "file");
347-
final Path raw2File = new Path(zone2, "/.reserved/raw/zone2/file");
348-
349-
// 1. Create two encrypted zones
350-
fs.mkdirs(zone1, new FsPermission(700));
351-
dfsAdmin.createEncryptionZone(zone1, testkey1, NO_TRASH);
352-
353-
fs.mkdirs(zone2, new FsPermission(700));
354-
dfsAdmin.createEncryptionZone(zone2, testkey2, NO_TRASH);
355-
356-
// 2. Create a file in one of the zones
357-
DFSTestUtil.createFile(fs, zone1File, len, (short) 1, 0xFEED);
358-
// 3. Copy it to the other zone through /.raw/reserved
359-
FileUtil.copy(fs, raw1File, fs, raw2File, false, conf);
360-
Map<String, byte[]> attrs = fs.getXAttrs(raw1File);
361-
if (attrs != null) {
362-
for (Map.Entry<String, byte[]> entry : attrs.entrySet()) {
363-
String xattrName = entry.getKey();
364-
365-
try {
366-
fs.setXAttr(raw2File, xattrName, entry.getValue());
367-
fail("Exception should be thrown while setting: " +
368-
xattrName + " on file:" + raw2File);
369-
} catch (RemoteException e) {
370-
Assert.assertEquals(e.getClassName(),
371-
IllegalArgumentException.class.getCanonicalName());
372-
Assert.assertTrue(e.getMessage().
373-
contains("does not belong to the key"));
374-
}
375-
}
376-
}
377-
378-
assertEquals("File can be created on the root encryption zone " +
379-
"with correct length", len, fs.getFileStatus(zone1File).getLen());
380-
assertTrue("/zone1 dir is encrypted",
381-
fs.getFileStatus(zone1).isEncrypted());
382-
assertTrue("File is encrypted", fs.getFileStatus(zone1File).isEncrypted());
383-
384-
assertTrue("/zone2 dir is encrypted",
385-
fs.getFileStatus(zone2).isEncrypted());
386-
assertTrue("File is encrypted", fs.getFileStatus(zone2File).isEncrypted());
387-
388-
// 4. Now the decrypted contents of the files should be different.
389-
DFSTestUtil.verifyFilesNotEqual(fs, zone1File, zone2File, len);
390-
391-
// 5. Encrypted contents of the files should be same.
392-
DFSTestUtil.verifyFilesEqual(fs, raw1File, raw2File, len);
393-
}
394-
395327
/**
396328
* Make sure hdfs crypto -provisionTrash command creates a trash directory
397329
* with sticky bits.

0 commit comments

Comments
 (0)