diff --git a/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/client/KerberosAuthenticator.java b/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/client/KerberosAuthenticator.java
index 30e65efe10cba..d27b93bd50c3d 100644
--- a/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/client/KerberosAuthenticator.java
+++ b/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/client/KerberosAuthenticator.java
@@ -19,6 +19,7 @@
import org.apache.hadoop.security.authentication.server.HttpConstants;
import org.apache.hadoop.security.authentication.util.AuthToken;
import org.apache.hadoop.security.authentication.util.KerberosUtil;
+import org.apache.hadoop.security.authentication.util.SubjectUtil;
import org.ietf.jgss.GSSContext;
import org.ietf.jgss.GSSManager;
import org.ietf.jgss.GSSName;
@@ -35,8 +36,6 @@
import java.io.IOException;
import java.net.HttpURLConnection;
import java.net.URL;
-import java.security.AccessControlContext;
-import java.security.AccessController;
import java.security.PrivilegedActionException;
import java.security.PrivilegedExceptionAction;
import java.util.HashMap;
@@ -300,8 +299,7 @@ private boolean isNegotiate(HttpURLConnection conn) throws IOException {
private void doSpnegoSequence(final AuthenticatedURL.Token token)
throws IOException, AuthenticationException {
try {
- AccessControlContext context = AccessController.getContext();
- Subject subject = Subject.getSubject(context);
+ Subject subject = SubjectUtil.current();
if (subject == null
|| (!KerberosUtil.hasKerberosKeyTab(subject)
&& !KerberosUtil.hasKerberosTicket(subject))) {
diff --git a/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/util/SubjectUtil.java b/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/util/SubjectUtil.java
new file mode 100644
index 0000000000000..faf2d6c7d8131
--- /dev/null
+++ b/hadoop-common-project/hadoop-auth/src/main/java/org/apache/hadoop/security/authentication/util/SubjectUtil.java
@@ -0,0 +1,308 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.hadoop.security.authentication.util;
+
+import java.lang.invoke.MethodHandle;
+import java.lang.invoke.MethodHandles;
+import java.lang.invoke.MethodType;
+import java.security.PrivilegedAction;
+import java.security.PrivilegedActionException;
+import java.security.PrivilegedExceptionAction;
+import java.util.Objects;
+import java.util.concurrent.Callable;
+import java.util.concurrent.CompletionException;
+
+import javax.security.auth.Subject;
+
+import org.apache.hadoop.classification.InterfaceAudience.Private;
+
+/**
+ * An utility class that adapts the Security Manager and APIs related to it for
+ * JDK 8 and above.
+ *
+ * In JDK 17, the Security Manager and APIs related to it have been deprecated
+ * and are subject to removal in a future release. There is no replacement for
+ * the Security Manager. See JEP 411
+ * for discussion and alternatives.
+ *
+ * In JDK 24, the Security Manager has been permanently disabled. See
+ * JEP 486 for more information.
+ *
+ * This is derived from Apache Calcite Avatica, which is derived from the Jetty
+ * implementation.
+ */
+@Private
+public final class SubjectUtil {
+ private static final MethodHandle CALL_AS = lookupCallAs();
+ static final boolean HAS_CALL_AS = CALL_AS != null;
+ private static final MethodHandle DO_AS = HAS_CALL_AS ? null : lookupDoAs();
+ private static final MethodHandle DO_AS_THROW_EXCEPTION =
+ HAS_CALL_AS ? null : lookupDoAsThrowException();
+ private static final MethodHandle CURRENT = lookupCurrent();
+
+ private static MethodHandle lookupCallAs() {
+ MethodHandles.Lookup lookup = MethodHandles.lookup();
+ try {
+ try {
+ // Subject.callAs() is available since Java 18.
+ return lookup.findStatic(Subject.class, "callAs",
+ MethodType.methodType(Object.class, Subject.class, Callable.class));
+ } catch (NoSuchMethodException x) {
+ return null;
+ }
+ } catch (IllegalAccessException e) {
+ throw new ExceptionInInitializerError(e);
+ }
+ }
+
+ private static MethodHandle lookupDoAs() {
+ MethodHandles.Lookup lookup = MethodHandles.lookup();
+ try {
+ MethodType signature = MethodType.methodType(
+ Object.class, Subject.class, PrivilegedAction.class);
+ return lookup.findStatic(Subject.class, "doAs", signature);
+ } catch (IllegalAccessException | NoSuchMethodException e) {
+ throw new ExceptionInInitializerError(e);
+ }
+ }
+
+ private static MethodHandle lookupDoAsThrowException() {
+ MethodHandles.Lookup lookup = MethodHandles.lookup();
+ try {
+ MethodType signature = MethodType.methodType(
+ Object.class, Subject.class, PrivilegedExceptionAction.class);
+ return lookup.findStatic(Subject.class, "doAs", signature);
+ } catch (IllegalAccessException | NoSuchMethodException e) {
+ throw new ExceptionInInitializerError(e);
+ }
+ }
+
+ private static MethodHandle lookupCurrent() {
+ MethodHandles.Lookup lookup = MethodHandles.lookup();
+ try {
+ // Subject.getSubject(AccessControlContext) is deprecated for removal and
+ // replaced by Subject.current().
+ // Lookup first the new API, since for Java versions where both exists, the
+ // new API delegates to the old API (e.g. Java 18, 19 and 20).
+ // Otherwise (e.g. Java 17), lookup the old API.
+ return lookup.findStatic(
+ Subject.class, "current", MethodType.methodType(Subject.class));
+ } catch (NoSuchMethodException e) {
+ MethodHandle getContext = lookupGetContext();
+ MethodHandle getSubject = lookupGetSubject();
+ return MethodHandles.filterReturnValue(getContext, getSubject);
+ } catch (IllegalAccessException e) {
+ throw new ExceptionInInitializerError(e);
+ }
+ }
+
+ private static MethodHandle lookupGetSubject() {
+ MethodHandles.Lookup lookup = MethodHandles.lookup();
+ try {
+ Class> contextKlass = ClassLoader.getSystemClassLoader()
+ .loadClass("java.security.AccessControlContext");
+ return lookup.findStatic(Subject.class,
+ "getSubject", MethodType.methodType(Subject.class, contextKlass));
+ } catch (ClassNotFoundException | NoSuchMethodException | IllegalAccessException e) {
+ throw new ExceptionInInitializerError(e);
+ }
+ }
+
+ private static MethodHandle lookupGetContext() {
+ try {
+ // Use reflection to work with Java versions that have and don't have
+ // AccessController.
+ Class> controllerKlass = ClassLoader.getSystemClassLoader()
+ .loadClass("java.security.AccessController");
+ Class> contextKlass = ClassLoader.getSystemClassLoader()
+ .loadClass("java.security.AccessControlContext");
+
+ MethodHandles.Lookup lookup = MethodHandles.lookup();
+ return lookup.findStatic(
+ controllerKlass, "getContext", MethodType.methodType(contextKlass));
+ } catch (ClassNotFoundException | NoSuchMethodException | IllegalAccessException e) {
+ throw new ExceptionInInitializerError(e);
+ }
+ }
+
+ /**
+ * Map to Subject.callAs() if available, otherwise maps to Subject.doAs().
+ *
+ * @param subject the subject this action runs as
+ * @param action the action to run
+ * @return the result of the action
+ * @param the type of the result
+ * @throws NullPointerException if action is null
+ * @throws CompletionException if {@code action.call()} throws an exception.
+ * The cause of the {@code CompletionException} is set to the exception
+ * thrown by {@code action.call()}.
+ */
+ @SuppressWarnings("unchecked")
+ public static T callAs(Subject subject, Callable action) throws CompletionException {
+ Objects.requireNonNull(action);
+ if (HAS_CALL_AS) {
+ try {
+ return (T) CALL_AS.invoke(subject, action);
+ } catch (Throwable t) {
+ throw sneakyThrow(t);
+ }
+ } else {
+ try {
+ return doAs(subject, callableToPrivilegedAction(action));
+ } catch (Exception e) {
+ throw new CompletionException(e);
+ }
+ }
+ }
+
+ /**
+ * Map action to a Callable on Java 18 onwards, and delegates to callAs().
+ * Call Subject.doAs directly on older JVM.
+ *
+ * Note: Exception propagation behavior is different since Java 12, it always
+ * throw the original exception thrown by action; for lower Java versions,
+ * throw a PrivilegedActionException that wraps the original exception when
+ * action throw a checked exception.
+ *
+ * @param subject the subject this action runs as
+ * @param action the action to run
+ * @return the result of the action
+ * @param the type of the result
+ * @throws NullPointerException if action is null
+ */
+ @SuppressWarnings("unchecked")
+ public static T doAs(Subject subject, PrivilegedAction action) {
+ Objects.requireNonNull(action);
+ if (HAS_CALL_AS) {
+ try {
+ return callAs(subject, privilegedActionToCallable(action));
+ } catch (CompletionException ce) {
+ Throwable cause = ce.getCause();
+ if (cause != null) {
+ throw sneakyThrow(cause);
+ } else {
+ // This should never happen, CompletionException thrown by Subject.callAs
+ // should always wrap an exception
+ throw ce;
+ }
+ }
+ } else {
+ try {
+ return (T) DO_AS.invoke(subject, action);
+ } catch (Throwable t) {
+ throw sneakyThrow(t);
+ }
+ }
+ }
+
+ /**
+ * Maps action to a Callable on Java 18 onwards, and delegates to callAs().
+ * Call Subject.doAs directly on older JVM.
+ *
+ * @param subject the subject this action runs as
+ * @param action the action to run
+ * @return the result of the action
+ * @param the type of the result
+ * @throws NullPointerException if action is null
+ * @throws PrivilegedActionException if {@code action.run()} throws an checked exception.
+ * The cause of the {@code PrivilegedActionException} is set to the exception thrown
+ * by {@code action.run()}.
+ */
+ @SuppressWarnings("unchecked")
+ public static T doAs(
+ Subject subject, PrivilegedExceptionAction action) throws PrivilegedActionException {
+ Objects.requireNonNull(action);
+ if (HAS_CALL_AS) {
+ try {
+ return callAs(subject, privilegedExceptionActionToCallable(action));
+ } catch (CompletionException ce) {
+ Throwable cause = ce.getCause();
+ if (cause instanceof RuntimeException) {
+ throw (RuntimeException) cause;
+ } else if (cause instanceof Exception) {
+ throw new PrivilegedActionException((Exception) cause);
+ } else {
+ // This should never happen, CompletionException should only wraps an exception
+ throw sneakyThrow(cause);
+ }
+ }
+ } else {
+ try {
+ return (T) DO_AS_THROW_EXCEPTION.invoke(subject, action);
+ } catch (Throwable t) {
+ throw sneakyThrow(t);
+ }
+ }
+ }
+
+ /**
+ * Maps to Subject.current() if available, otherwise maps to Subject.getSubject().
+ *
+ * @return the current subject
+ */
+ public static Subject current() {
+ try {
+ return (Subject) CURRENT.invoke();
+ } catch (Throwable t) {
+ throw sneakyThrow(t);
+ }
+ }
+
+ private static PrivilegedAction callableToPrivilegedAction(
+ Callable callable) {
+ return () -> {
+ try {
+ return callable.call();
+ } catch (Exception e) {
+ throw sneakyThrow(e);
+ }
+ };
+ }
+
+ private static Callable privilegedExceptionActionToCallable(
+ PrivilegedExceptionAction action) {
+ return action::run;
+ }
+
+ private static Callable privilegedActionToCallable(
+ PrivilegedAction action) {
+ return action::run;
+ }
+
+ /**
+ * The sneaky throw concept allows the caller to throw any checked exception without
+ * defining it explicitly in the method signature.
+ *
+ * See "Sneaky Throws" in Java
+ * for more details.
+ *
+ * @param e the exception that will be thrown.
+ * @return unreachable, the method always throws an exception before returning
+ * @param the thrown exception type, trick the compiler into inferring it as
+ * a {@code RuntimeException} type.
+ * @throws E the original exception passes by caller
+ */
+ @SuppressWarnings("unchecked")
+ static RuntimeException sneakyThrow(Throwable e) throws E {
+ throw (E) e;
+ }
+
+ private SubjectUtil() {
+ }
+}
diff --git a/hadoop-common-project/hadoop-auth/src/test/java/org/apache/hadoop/security/authentication/util/TestSubjectUtil.java b/hadoop-common-project/hadoop-auth/src/test/java/org/apache/hadoop/security/authentication/util/TestSubjectUtil.java
new file mode 100644
index 0000000000000..403a328d44d88
--- /dev/null
+++ b/hadoop-common-project/hadoop-auth/src/test/java/org/apache/hadoop/security/authentication/util/TestSubjectUtil.java
@@ -0,0 +1,336 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements. See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership. The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.hadoop.security.authentication.util;
+
+import org.junit.Assert;
+import org.junit.Test;
+
+import java.io.IOException;
+import java.security.PrivilegedAction;
+import java.security.PrivilegedActionException;
+import java.security.PrivilegedExceptionAction;
+import java.util.concurrent.Callable;
+import java.util.concurrent.CompletionException;
+
+public class TestSubjectUtil {
+
+ // "1.8"->8, "9"->9, "10"->10
+ private static final int JAVA_SPEC_VER = Math.max(8, Integer.parseInt(
+ System.getProperty("java.specification.version").split("\\.")[0]));
+
+ @Test
+ public void testHasCallAs() {
+ Assert.assertEquals(JAVA_SPEC_VER > 17, SubjectUtil.HAS_CALL_AS);
+ }
+
+ @Test
+ public void testDoAsPrivilegedActionExceptionPropagation() {
+ // in Java 12 onwards, always throw the original exception thrown by action;
+ // in lower Java versions, throw a PrivilegedActionException that wraps the
+ // original exception when action throws a checked exception
+ Throwable e = Assert.assertThrows(Exception.class, () ->
+ SubjectUtil.doAs(SubjectUtil.current(), new PrivilegedAction