HBASE-10918 [VisibilityController] System table backed ScanLabelGenerator
git-svn-id: https://svn.apache.org/repos/asf/hbase/trunk@1590180 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
4d1fc21500
commit
071b916775
|
@ -61,6 +61,14 @@ public class Authorizations {
|
|||
|
||||
@Override
|
||||
public String toString() {
|
||||
return this.labels.toString();
|
||||
StringBuilder sb = new StringBuilder();
|
||||
sb.append("[ ");
|
||||
for (String label: labels) {
|
||||
sb.append(label);
|
||||
sb.append(' ');
|
||||
}
|
||||
sb.append(']');
|
||||
return sb.toString();
|
||||
}
|
||||
|
||||
}
|
|
@ -77,10 +77,16 @@ public class DefaultScanLabelGenerator implements ScanLabelGenerator {
|
|||
}
|
||||
}
|
||||
if (!droppedLabels.isEmpty()) {
|
||||
if (LOG.isDebugEnabled()) {
|
||||
LOG.debug("Labels " + droppedLabels + " in Scan/Get visibility attributes dropped as user "
|
||||
+ userName + " having no auth set for those.");
|
||||
StringBuilder sb = new StringBuilder();
|
||||
sb.append("Dropping invalid authorizations requested by user ");
|
||||
sb.append(userName);
|
||||
sb.append(": [ ");
|
||||
for (String label: droppedLabels) {
|
||||
sb.append(label);
|
||||
sb.append(' ');
|
||||
}
|
||||
sb.append(']');
|
||||
LOG.warn(sb.toString());
|
||||
}
|
||||
return passedLabels;
|
||||
}
|
||||
|
|
|
@ -0,0 +1,65 @@
|
|||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.apache.hadoop.hbase.security.visibility;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import org.apache.commons.logging.Log;
|
||||
import org.apache.commons.logging.LogFactory;
|
||||
import org.apache.hadoop.classification.InterfaceAudience;
|
||||
import org.apache.hadoop.conf.Configuration;
|
||||
import org.apache.hadoop.hbase.security.User;
|
||||
|
||||
/**
|
||||
* This ScanLabelGenerator enforces a set of predefined authorizations for a
|
||||
* given user, the set defined by the admin using the VisibilityClient admin
|
||||
* interface or the set_auths shell command. Any authorizations requested with
|
||||
* Scan#authorizations will be ignored.
|
||||
*/
|
||||
@InterfaceAudience.Private
|
||||
public class EnforcingScanLabelGenerator implements ScanLabelGenerator {
|
||||
|
||||
private static final Log LOG = LogFactory.getLog(EnforcingScanLabelGenerator.class);
|
||||
|
||||
private Configuration conf;
|
||||
private VisibilityLabelsManager labelsManager;
|
||||
|
||||
public EnforcingScanLabelGenerator() {
|
||||
this.labelsManager = VisibilityLabelsManager.get();
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setConf(Configuration conf) {
|
||||
this.conf = conf;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Configuration getConf() {
|
||||
return this.conf;
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<String> getLabels(User user, Authorizations authorizations) {
|
||||
String userName = user.getShortName();
|
||||
if (authorizations != null) {
|
||||
LOG.warn("Dropping authorizations requested by user " + userName + ": " + authorizations);
|
||||
}
|
||||
return this.labelsManager.getAuths(userName);
|
||||
}
|
||||
|
||||
}
|
|
@ -0,0 +1,152 @@
|
|||
/**
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.apache.hadoop.hbase.security.visibility;
|
||||
|
||||
import static org.apache.hadoop.hbase.security.visibility.VisibilityConstants.LABELS_TABLE_NAME;
|
||||
import static org.junit.Assert.*;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.security.PrivilegedExceptionAction;
|
||||
|
||||
import org.apache.hadoop.conf.Configuration;
|
||||
import org.apache.hadoop.hbase.HBaseTestingUtility;
|
||||
import org.apache.hadoop.hbase.HConstants;
|
||||
import org.apache.hadoop.hbase.MediumTests;
|
||||
import org.apache.hadoop.hbase.TableName;
|
||||
import org.apache.hadoop.hbase.client.HTable;
|
||||
import org.apache.hadoop.hbase.client.Get;
|
||||
import org.apache.hadoop.hbase.client.Put;
|
||||
import org.apache.hadoop.hbase.client.Result;
|
||||
import org.apache.hadoop.hbase.security.User;
|
||||
import org.apache.hadoop.hbase.util.Bytes;
|
||||
|
||||
import org.junit.AfterClass;
|
||||
import org.junit.BeforeClass;
|
||||
import org.junit.Rule;
|
||||
import org.junit.Test;
|
||||
import org.junit.experimental.categories.Category;
|
||||
import org.junit.rules.TestName;
|
||||
|
||||
@Category(MediumTests.class)
|
||||
public class TestEnforcingScanLabelGenerator {
|
||||
|
||||
public static final String CONFIDENTIAL = "confidential";
|
||||
private static final String SECRET = "secret";
|
||||
public static final HBaseTestingUtility TEST_UTIL = new HBaseTestingUtility();
|
||||
private static final byte[] ROW_1 = Bytes.toBytes("row1");
|
||||
private final static byte[] CF = Bytes.toBytes("f");
|
||||
private final static byte[] Q1 = Bytes.toBytes("q1");
|
||||
private final static byte[] Q2 = Bytes.toBytes("q2");
|
||||
private final static byte[] Q3 = Bytes.toBytes("q3");
|
||||
private final static byte[] value = Bytes.toBytes("value");
|
||||
public static Configuration conf;
|
||||
|
||||
@Rule
|
||||
public final TestName TEST_NAME = new TestName();
|
||||
public static User SUPERUSER;
|
||||
public static User TESTUSER;
|
||||
|
||||
@BeforeClass
|
||||
public static void setupBeforeClass() throws Exception {
|
||||
// setup configuration
|
||||
conf = TEST_UTIL.getConfiguration();
|
||||
conf.setInt("hfile.format.version", 3);
|
||||
conf.set("hbase.coprocessor.master.classes", VisibilityController.class.getName());
|
||||
conf.set("hbase.coprocessor.region.classes", VisibilityController.class.getName());
|
||||
String classes = DefaultScanLabelGenerator.class.getCanonicalName() + " , "
|
||||
+ EnforcingScanLabelGenerator.class.getCanonicalName();
|
||||
conf.setStrings(VisibilityUtils.VISIBILITY_LABEL_GENERATOR_CLASS, classes);
|
||||
conf.set("hbase.superuser", "admin");
|
||||
TEST_UTIL.startMiniCluster(1);
|
||||
SUPERUSER = User.createUserForTesting(conf, "admin", new String[] { "supergroup" });
|
||||
TESTUSER = User.createUserForTesting(conf, "test", new String[] { });
|
||||
|
||||
// Wait for the labels table to become available
|
||||
TEST_UTIL.waitTableEnabled(LABELS_TABLE_NAME.getName(), 50000);
|
||||
|
||||
// Set up for the test
|
||||
SUPERUSER.runAs(new PrivilegedExceptionAction<Void>() {
|
||||
public Void run() throws Exception {
|
||||
try {
|
||||
VisibilityClient.addLabels(conf, new String[] { SECRET, CONFIDENTIAL });
|
||||
VisibilityClient.setAuths(conf, new String[] { CONFIDENTIAL, }, TESTUSER.getShortName());
|
||||
} catch (Throwable t) {
|
||||
throw new IOException(t);
|
||||
}
|
||||
return null;
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testEnforcingScanLabelGenerator() throws Exception {
|
||||
final TableName tableName = TableName.valueOf(TEST_NAME.getMethodName());
|
||||
|
||||
SUPERUSER.runAs(new PrivilegedExceptionAction<Void>() {
|
||||
public Void run() throws Exception {
|
||||
HTable table = TEST_UTIL.createTable(tableName, CF);
|
||||
try {
|
||||
Put put = new Put(ROW_1);
|
||||
put.add(CF, Q1, HConstants.LATEST_TIMESTAMP, value);
|
||||
put.setCellVisibility(new CellVisibility(SECRET));
|
||||
table.put(put);
|
||||
put = new Put(ROW_1);
|
||||
put.add(CF, Q2, HConstants.LATEST_TIMESTAMP, value);
|
||||
put.setCellVisibility(new CellVisibility(CONFIDENTIAL));
|
||||
table.put(put);
|
||||
put = new Put(ROW_1);
|
||||
put.add(CF, Q3, HConstants.LATEST_TIMESTAMP, value);
|
||||
table.put(put);
|
||||
return null;
|
||||
} finally {
|
||||
table.close();
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
TESTUSER.runAs(new PrivilegedExceptionAction<Void>() {
|
||||
public Void run() throws Exception {
|
||||
HTable table = new HTable(conf, tableName);
|
||||
try {
|
||||
// Test that we enforce the defined set
|
||||
Get get = new Get(ROW_1);
|
||||
get.setAuthorizations(new Authorizations(new String[] { SECRET, CONFIDENTIAL }));
|
||||
Result result = table.get(get);
|
||||
assertFalse("Inappropriate authorization", result.containsColumn(CF, Q1));
|
||||
assertTrue("Missing authorization", result.containsColumn(CF, Q2));
|
||||
assertTrue("Inappropriate filtering", result.containsColumn(CF, Q3));
|
||||
// Test that we also enforce the defined set for the user if no auths are provided
|
||||
get = new Get(ROW_1);
|
||||
result = table.get(get);
|
||||
assertFalse("Inappropriate authorization", result.containsColumn(CF, Q1));
|
||||
assertTrue("Missing authorization", result.containsColumn(CF, Q2));
|
||||
assertTrue("Inappropriate filtering", result.containsColumn(CF, Q3));
|
||||
return null;
|
||||
} finally {
|
||||
table.close();
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
}
|
||||
|
||||
@AfterClass
|
||||
public static void tearDownAfterClass() throws Exception {
|
||||
TEST_UTIL.shutdownMiniCluster();
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue