YARN-8415. TimelineWebServices.getEntity should throw ForbiddenException instead of 404 when ACL checks fail. Contributed by Suma Shivaprasad.

(cherry picked from commit fa9ef15ecd)
This commit is contained in:
Sunil G 2018-07-02 15:34:37 -07:00
parent 2f264764a4
commit 8ffc191f61
4 changed files with 17 additions and 2 deletions

View File

@ -413,6 +413,9 @@ public class RollingLevelDBTimelineStore extends AbstractService implements
EnumSet<Field> fields) throws IOException {
Long revStartTime = getStartTimeLong(entityId, entityType);
if (revStartTime == null) {
if ( LOG.isDebugEnabled()) {
LOG.debug("Could not find start time for {} {} ", entityType, entityId);
}
return null;
}
byte[] prefix = KeyBuilder.newInstance().add(entityType)
@ -421,6 +424,9 @@ public class RollingLevelDBTimelineStore extends AbstractService implements
DB db = entitydb.getDBForStartTime(revStartTime);
if (db == null) {
if ( LOG.isDebugEnabled()) {
LOG.debug("Could not find db for {} {} ", entityType, entityId);
}
return null;
}
try (DBIterator iterator = db.iterator()) {

View File

@ -219,7 +219,12 @@ public class TimelineDataManager extends AbstractService {
// check ACLs
if (!timelineACLsManager.checkAccess(
callerUGI, ApplicationAccessType.VIEW_APP, entity)) {
entity = null;
final String user = callerUGI != null ? callerUGI.getShortUserName():
null;
throw new YarnException(
user + " is not allowed to get the timeline entity "
+ "{ id: " + entity.getEntityId() + ", type: "
+ entity.getEntityType() + " }.");
}
}
return entity;

View File

@ -162,6 +162,10 @@ public class TimelineWebServices {
parseStr(entityId),
parseFieldsStr(fields, ","),
getUser(req));
} catch (YarnException e) {
// The user doesn't have the access to override the existing domain.
LOG.info(e.getMessage(), e);
throw new ForbiddenException(e);
} catch (IllegalArgumentException e) {
throw new BadRequestException(e);
} catch (Exception e) {

View File

@ -709,7 +709,7 @@ public class TestTimelineWebServices extends JerseyTestBase {
.get(ClientResponse.class);
assertEquals(MediaType.APPLICATION_JSON + "; " + JettyUtils.UTF_8,
response.getType().toString());
assertResponseStatusCode(Status.NOT_FOUND, response.getStatusInfo());
assertResponseStatusCode(Status.FORBIDDEN, response.getStatusInfo());
} finally {
timelineACLsManager.setAdminACLsManager(oldAdminACLsManager);
}