org.apache.hadoop.security.authorize.ServiceAuthorizationManager.java Source code

Java tutorial

Introduction

Here is the source code for org.apache.hadoop.security.authorize.ServiceAuthorizationManager.java

Source

/**
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.hadoop.security.authorize;

import java.io.IOException;
import java.net.InetAddress;
import java.util.IdentityHashMap;
import java.util.Map;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.CommonConfigurationKeys;
import org.apache.hadoop.security.KerberosInfo;
import org.apache.hadoop.security.SecurityUtil;
import org.apache.hadoop.security.UserGroupInformation;

/**
 * An authorization manager which handles service-level authorization
 * for incoming service requests.
 */
public class ServiceAuthorizationManager {
    private static final String HADOOP_POLICY_FILE = "hadoop-policy.xml";
    private static final Log LOG = LogFactory.getLog(ServiceAuthorizationManager.class);

    private static Map<Class<?>, AccessControlList> protocolToAcl = new IdentityHashMap<Class<?>, AccessControlList>();

    /**
     * Configuration key for controlling service-level authorization for Hadoop.
     * 
     * @deprecated Use
     *             {@link CommonConfigurationKeys#HADOOP_SECURITY_AUTHORIZATION}
     *             instead.
     */
    @Deprecated
    public static final String SERVICE_AUTHORIZATION_CONFIG = "hadoop.security.authorization";

    private static final Log AUDITLOG = LogFactory
            .getLog("SecurityLogger." + ServiceAuthorizationManager.class.getName());

    private static final String AUTHZ_SUCCESSFULL_FOR = "Authorization successfull for ";
    private static final String AUTHZ_FAILED_FOR = "Authorization failed for ";

    /**
     * Authorize the user to access the protocol being used.
     * 
     * @param user user accessing the service 
     * @param protocol service being accessed
     * @param conf configuration to use
     * @param addr InetAddress of the client
     * @throws AuthorizationException on authorization failure
     */
    public static void authorize(UserGroupInformation user, Class<?> protocol, Configuration conf, InetAddress addr)
            throws AuthorizationException {
        AccessControlList acl = protocolToAcl.get(protocol);
        if (acl == null) {
            throw new AuthorizationException("Protocol " + protocol + " is not known.");
        }

        // get client principal key to verify (if available)
        KerberosInfo krbInfo = protocol.getAnnotation(KerberosInfo.class);
        String clientPrincipal = null;
        if (krbInfo != null) {
            String clientKey = krbInfo.clientPrincipal();
            if (clientKey != null && !clientKey.equals("")) {
                try {
                    clientPrincipal = SecurityUtil.getServerPrincipal(conf.get(clientKey), addr);
                } catch (IOException e) {
                    throw (AuthorizationException) new AuthorizationException(
                            "Can't figure out Kerberos principal name for connection from " + addr + " for user="
                                    + user + " protocol=" + protocol).initCause(e);
                }
            }
        }
        if ((clientPrincipal != null && !clientPrincipal.equals(user.getUserName())) || !acl.isUserAllowed(user)) {
            AUDITLOG.warn(AUTHZ_FAILED_FOR + user + " for protocol=" + protocol
                    + ", expected client Kerberos principal is " + clientPrincipal);
            throw new AuthorizationException("User " + user + " is not authorized for protocol " + protocol
                    + ", expected client Kerberos principal is " + clientPrincipal);
        }
        AUDITLOG.info(AUTHZ_SUCCESSFULL_FOR + user + " for protocol=" + protocol);
    }

    public static synchronized void refresh(Configuration conf, PolicyProvider provider) {
        // Get the system property 'hadoop.policy.file'
        String policyFile = System.getProperty("hadoop.policy.file", HADOOP_POLICY_FILE);

        // Make a copy of the original config, and load the policy file
        Configuration policyConf = new Configuration(conf);
        policyConf.addResource(policyFile);

        final Map<Class<?>, AccessControlList> newAcls = new IdentityHashMap<Class<?>, AccessControlList>();

        // Parse the config file
        Service[] services = provider.getServices();
        if (services != null) {
            for (Service service : services) {
                AccessControlList acl = new AccessControlList(
                        policyConf.get(service.getServiceKey(), AccessControlList.WILDCARD_ACL_VALUE));
                newAcls.put(service.getProtocol(), acl);
            }
        }

        // Flip to the newly parsed permissions
        protocolToAcl = newAcls;
    }
}