HBASE-11639 - [Visibility controller] Replicate the visibility of Cells as
strings (Ram)
This commit is contained in:
parent
c750ada8d6
commit
95de67bd39
|
@ -52,4 +52,10 @@ public final class VisibilityConstants {
|
||||||
public static final String CHECK_AUTHS_FOR_MUTATION =
|
public static final String CHECK_AUTHS_FOR_MUTATION =
|
||||||
"hbase.security.visibility.mutations.checkauths";
|
"hbase.security.visibility.mutations.checkauths";
|
||||||
|
|
||||||
|
public static final String NOT_OPERATOR = "!";
|
||||||
|
public static final String AND_OPERATOR = "&";
|
||||||
|
public static final String OR_OPERATOR = "|";
|
||||||
|
public static final String OPEN_PARAN = "(";
|
||||||
|
public static final String CLOSED_PARAN = ")";
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -35,7 +35,7 @@ public class Tag {
|
||||||
public final static int TYPE_LENGTH_SIZE = Bytes.SIZEOF_BYTE;
|
public final static int TYPE_LENGTH_SIZE = Bytes.SIZEOF_BYTE;
|
||||||
public final static int TAG_LENGTH_SIZE = Bytes.SIZEOF_SHORT;
|
public final static int TAG_LENGTH_SIZE = Bytes.SIZEOF_SHORT;
|
||||||
public final static int INFRASTRUCTURE_SIZE = TYPE_LENGTH_SIZE + TAG_LENGTH_SIZE;
|
public final static int INFRASTRUCTURE_SIZE = TYPE_LENGTH_SIZE + TAG_LENGTH_SIZE;
|
||||||
private static final int MAX_TAG_LENGTH = (2 * Short.MAX_VALUE) + 1 - TAG_LENGTH_SIZE;
|
public static final int MAX_TAG_LENGTH = (2 * Short.MAX_VALUE) + 1 - TAG_LENGTH_SIZE;
|
||||||
|
|
||||||
private final byte type;
|
private final byte type;
|
||||||
private final byte[] bytes;
|
private final byte[] bytes;
|
||||||
|
|
|
@ -28,4 +28,6 @@ public final class TagType {
|
||||||
public static final byte VISIBILITY_TAG_TYPE = (byte) 2;
|
public static final byte VISIBILITY_TAG_TYPE = (byte) 2;
|
||||||
public static final byte LOG_REPLAY_TAG_TYPE = (byte) 3;
|
public static final byte LOG_REPLAY_TAG_TYPE = (byte) 3;
|
||||||
public static final byte VISIBILITY_EXP_SERIALIZATION_FORMAT_TAG_TYPE = (byte)4;
|
public static final byte VISIBILITY_EXP_SERIALIZATION_FORMAT_TAG_TYPE = (byte)4;
|
||||||
|
// String based tag type used in replication
|
||||||
|
public static final byte STRING_VIS_TAG_TYPE = (byte) 7;
|
||||||
}
|
}
|
||||||
|
|
|
@ -126,6 +126,13 @@ public class DefaultVisibilityExpressionResolver implements VisibilityExpression
|
||||||
public int getLabelOrdinal(String label) {
|
public int getLabelOrdinal(String label) {
|
||||||
return labels.get(label);
|
return labels.get(label);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getLabel(int ordinal) {
|
||||||
|
// Unused
|
||||||
|
throw new UnsupportedOperationException(
|
||||||
|
"getLabel should not be used in VisibilityExpressionResolver");
|
||||||
|
}
|
||||||
};
|
};
|
||||||
return VisibilityUtils.createVisibilityExpTags(visExpression, true, false, null, provider);
|
return VisibilityUtils.createVisibilityExpTags(visExpression, true, false, null, provider);
|
||||||
}
|
}
|
||||||
|
|
|
@ -39,12 +39,13 @@ import java.util.concurrent.atomic.AtomicInteger;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hbase.Cell;
|
import org.apache.hadoop.hbase.Cell;
|
||||||
import org.apache.hadoop.hbase.CellUtil;
|
import org.apache.hadoop.hbase.CellUtil;
|
||||||
import org.apache.hadoop.hbase.HConstants.OperationStatusCode;
|
import org.apache.hadoop.hbase.HConstants.OperationStatusCode;
|
||||||
import org.apache.hadoop.hbase.Tag;
|
import org.apache.hadoop.hbase.Tag;
|
||||||
|
import org.apache.hadoop.hbase.TagType;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.hbase.client.Delete;
|
import org.apache.hadoop.hbase.client.Delete;
|
||||||
import org.apache.hadoop.hbase.client.Mutation;
|
import org.apache.hadoop.hbase.client.Mutation;
|
||||||
import org.apache.hadoop.hbase.client.Put;
|
import org.apache.hadoop.hbase.client.Put;
|
||||||
|
@ -598,4 +599,69 @@ public class DefaultVisibilityLabelServiceImpl implements VisibilityLabelService
|
||||||
}
|
}
|
||||||
return matchFound;
|
return matchFound;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] encodeVisibilityForReplication(final List<Tag> tags, final Byte serializationFormat)
|
||||||
|
throws IOException {
|
||||||
|
if (tags.size() > 0
|
||||||
|
&& (serializationFormat == null ||
|
||||||
|
serializationFormat == SORTED_ORDINAL_SERIALIZATION_FORMAT)) {
|
||||||
|
return createModifiedVisExpression(tags);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param tags
|
||||||
|
* - all the visibility tags associated with the current Cell
|
||||||
|
* @return - the modified visibility expression as byte[]
|
||||||
|
*/
|
||||||
|
private byte[] createModifiedVisExpression(final List<Tag> tags)
|
||||||
|
throws IOException {
|
||||||
|
StringBuilder visibilityString = new StringBuilder();
|
||||||
|
for (Tag tag : tags) {
|
||||||
|
if (tag.getType() == TagType.VISIBILITY_TAG_TYPE) {
|
||||||
|
if (visibilityString.length() != 0) {
|
||||||
|
visibilityString.append(VisibilityConstants.CLOSED_PARAN).append(
|
||||||
|
VisibilityConstants.OR_OPERATOR);
|
||||||
|
}
|
||||||
|
int offset = tag.getTagOffset();
|
||||||
|
int endOffset = offset + tag.getTagLength();
|
||||||
|
boolean expressionStart = true;
|
||||||
|
while (offset < endOffset) {
|
||||||
|
Pair<Integer, Integer> result = StreamUtils.readRawVarint32(tag.getBuffer(), offset);
|
||||||
|
int currLabelOrdinal = result.getFirst();
|
||||||
|
if (currLabelOrdinal < 0) {
|
||||||
|
int temp = -currLabelOrdinal;
|
||||||
|
String label = this.labelsCache.getLabel(temp);
|
||||||
|
if (expressionStart) {
|
||||||
|
// Quote every label in case of unicode characters if present
|
||||||
|
visibilityString.append(VisibilityConstants.OPEN_PARAN)
|
||||||
|
.append(VisibilityConstants.NOT_OPERATOR).append(CellVisibility.quote(label));
|
||||||
|
} else {
|
||||||
|
visibilityString.append(VisibilityConstants.AND_OPERATOR)
|
||||||
|
.append(VisibilityConstants.NOT_OPERATOR).append(CellVisibility.quote(label));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
String label = this.labelsCache.getLabel(currLabelOrdinal);
|
||||||
|
if (expressionStart) {
|
||||||
|
visibilityString.append(VisibilityConstants.OPEN_PARAN).append(
|
||||||
|
CellVisibility.quote(label));
|
||||||
|
} else {
|
||||||
|
visibilityString.append(VisibilityConstants.AND_OPERATOR).append(
|
||||||
|
CellVisibility.quote(label));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
expressionStart = false;
|
||||||
|
offset += result.getSecond();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (visibilityString.length() != 0) {
|
||||||
|
visibilityString.append(VisibilityConstants.CLOSED_PARAN);
|
||||||
|
// Return the string formed as byte[]
|
||||||
|
return Bytes.toBytes(visibilityString.toString());
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -32,14 +32,13 @@ import java.util.Map;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hbase.Cell;
|
import org.apache.hadoop.hbase.Cell;
|
||||||
import org.apache.hadoop.hbase.CellScanner;
|
import org.apache.hadoop.hbase.CellScanner;
|
||||||
import org.apache.hadoop.hbase.CellUtil;
|
import org.apache.hadoop.hbase.CellUtil;
|
||||||
import org.apache.hadoop.hbase.CoprocessorEnvironment;
|
import org.apache.hadoop.hbase.CoprocessorEnvironment;
|
||||||
import org.apache.hadoop.hbase.DoNotRetryIOException;
|
import org.apache.hadoop.hbase.DoNotRetryIOException;
|
||||||
import org.apache.hadoop.hbase.HBaseInterfaceAudience;
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.hbase.HColumnDescriptor;
|
import org.apache.hadoop.hbase.HColumnDescriptor;
|
||||||
import org.apache.hadoop.hbase.HConstants;
|
import org.apache.hadoop.hbase.HConstants;
|
||||||
import org.apache.hadoop.hbase.HTableDescriptor;
|
import org.apache.hadoop.hbase.HTableDescriptor;
|
||||||
|
@ -58,6 +57,7 @@ import org.apache.hadoop.hbase.client.Result;
|
||||||
import org.apache.hadoop.hbase.client.Scan;
|
import org.apache.hadoop.hbase.client.Scan;
|
||||||
import org.apache.hadoop.hbase.constraint.ConstraintException;
|
import org.apache.hadoop.hbase.constraint.ConstraintException;
|
||||||
import org.apache.hadoop.hbase.coprocessor.BaseMasterAndRegionObserver;
|
import org.apache.hadoop.hbase.coprocessor.BaseMasterAndRegionObserver;
|
||||||
|
import org.apache.hadoop.hbase.coprocessor.BaseRegionServerObserver;
|
||||||
import org.apache.hadoop.hbase.coprocessor.CoprocessorException;
|
import org.apache.hadoop.hbase.coprocessor.CoprocessorException;
|
||||||
import org.apache.hadoop.hbase.coprocessor.CoprocessorHost;
|
import org.apache.hadoop.hbase.coprocessor.CoprocessorHost;
|
||||||
import org.apache.hadoop.hbase.coprocessor.CoprocessorService;
|
import org.apache.hadoop.hbase.coprocessor.CoprocessorService;
|
||||||
|
@ -91,12 +91,15 @@ import org.apache.hadoop.hbase.regionserver.InternalScanner;
|
||||||
import org.apache.hadoop.hbase.regionserver.MiniBatchOperationInProgress;
|
import org.apache.hadoop.hbase.regionserver.MiniBatchOperationInProgress;
|
||||||
import org.apache.hadoop.hbase.regionserver.OperationStatus;
|
import org.apache.hadoop.hbase.regionserver.OperationStatus;
|
||||||
import org.apache.hadoop.hbase.regionserver.RegionScanner;
|
import org.apache.hadoop.hbase.regionserver.RegionScanner;
|
||||||
|
import org.apache.hadoop.hbase.replication.ReplicationEndpoint;
|
||||||
import org.apache.hadoop.hbase.security.AccessDeniedException;
|
import org.apache.hadoop.hbase.security.AccessDeniedException;
|
||||||
import org.apache.hadoop.hbase.security.User;
|
import org.apache.hadoop.hbase.security.User;
|
||||||
import org.apache.hadoop.hbase.security.access.AccessControlLists;
|
import org.apache.hadoop.hbase.security.access.AccessControlLists;
|
||||||
|
import org.apache.hadoop.hbase.HBaseInterfaceAudience;
|
||||||
import org.apache.hadoop.hbase.security.access.AccessController;
|
import org.apache.hadoop.hbase.security.access.AccessController;
|
||||||
import org.apache.hadoop.hbase.util.ByteStringer;
|
import org.apache.hadoop.hbase.util.ByteStringer;
|
||||||
import org.apache.hadoop.hbase.util.Bytes;
|
import org.apache.hadoop.hbase.util.Bytes;
|
||||||
|
import org.apache.hadoop.hbase.util.Pair;
|
||||||
|
|
||||||
import com.google.common.collect.Lists;
|
import com.google.common.collect.Lists;
|
||||||
import com.google.common.collect.MapMaker;
|
import com.google.common.collect.MapMaker;
|
||||||
|
@ -133,6 +136,7 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
static {
|
static {
|
||||||
RESERVED_VIS_TAG_TYPES.add(TagType.VISIBILITY_TAG_TYPE);
|
RESERVED_VIS_TAG_TYPES.add(TagType.VISIBILITY_TAG_TYPE);
|
||||||
RESERVED_VIS_TAG_TYPES.add(TagType.VISIBILITY_EXP_SERIALIZATION_FORMAT_TAG_TYPE);
|
RESERVED_VIS_TAG_TYPES.add(TagType.VISIBILITY_EXP_SERIALIZATION_FORMAT_TAG_TYPE);
|
||||||
|
RESERVED_VIS_TAG_TYPES.add(TagType.STRING_VIS_TAG_TYPE);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -143,14 +147,13 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
+ " is required to persist visibility labels. Consider setting " + HFile.FORMAT_VERSION_KEY
|
+ " is required to persist visibility labels. Consider setting " + HFile.FORMAT_VERSION_KEY
|
||||||
+ " accordingly.");
|
+ " accordingly.");
|
||||||
}
|
}
|
||||||
if (env instanceof RegionServerCoprocessorEnvironment) {
|
|
||||||
throw new RuntimeException(
|
|
||||||
"Visibility controller should not be configured as " +
|
|
||||||
"'hbase.coprocessor.regionserver.classes'.");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (env instanceof RegionCoprocessorEnvironment) {
|
if (env instanceof RegionServerCoprocessorEnvironment) {
|
||||||
// VisibilityLabelService to be instantiated only with Region Observer.
|
throw new RuntimeException("Visibility controller should not be configured as "
|
||||||
|
+ "'hbase.coprocessor.regionserver.classes'.");
|
||||||
|
}
|
||||||
|
// Do not create for master CPs
|
||||||
|
if (!(env instanceof MasterCoprocessorEnvironment)) {
|
||||||
visibilityLabelService = VisibilityLabelServiceManager.getInstance()
|
visibilityLabelService = VisibilityLabelServiceManager.getInstance()
|
||||||
.getVisibilityLabelService(this.conf);
|
.getVisibilityLabelService(this.conf);
|
||||||
}
|
}
|
||||||
|
@ -281,12 +284,24 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
boolean sanityFailure = false;
|
boolean sanityFailure = false;
|
||||||
|
boolean modifiedTagFound = false;
|
||||||
|
Pair<Boolean, Tag> pair = new Pair<Boolean, Tag>(false, null);
|
||||||
for (CellScanner cellScanner = m.cellScanner(); cellScanner.advance();) {
|
for (CellScanner cellScanner = m.cellScanner(); cellScanner.advance();) {
|
||||||
if (!checkForReservedVisibilityTagPresence(cellScanner.current())) {
|
pair = checkForReservedVisibilityTagPresence(cellScanner.current(), pair);
|
||||||
|
if (!pair.getFirst()) {
|
||||||
miniBatchOp.setOperationStatus(i, new OperationStatus(SANITY_CHECK_FAILURE,
|
miniBatchOp.setOperationStatus(i, new OperationStatus(SANITY_CHECK_FAILURE,
|
||||||
"Mutation contains cell with reserved type tag"));
|
"Mutation contains cell with reserved type tag"));
|
||||||
sanityFailure = true;
|
sanityFailure = true;
|
||||||
break;
|
break;
|
||||||
|
} else {
|
||||||
|
// Indicates that the cell has a the tag which was modified in the src replication cluster
|
||||||
|
Tag tag = pair.getSecond();
|
||||||
|
if (cellVisibility == null && tag != null) {
|
||||||
|
// May need to store only the first one
|
||||||
|
cellVisibility = new CellVisibility(Bytes.toString(tag.getBuffer(), tag.getTagOffset(),
|
||||||
|
tag.getTagLength()));
|
||||||
|
modifiedTagFound = true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (!sanityFailure) {
|
if (!sanityFailure) {
|
||||||
|
@ -313,6 +328,10 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
Cell cell = cellScanner.current();
|
Cell cell = cellScanner.current();
|
||||||
List<Tag> tags = Tag.asList(cell.getTagsArray(), cell.getTagsOffset(),
|
List<Tag> tags = Tag.asList(cell.getTagsArray(), cell.getTagsOffset(),
|
||||||
cell.getTagsLength());
|
cell.getTagsLength());
|
||||||
|
if (modifiedTagFound) {
|
||||||
|
// Rewrite the tags by removing the modified tags.
|
||||||
|
removeReplicationVisibilityTag(tags);
|
||||||
|
}
|
||||||
tags.addAll(visibilityTags);
|
tags.addAll(visibilityTags);
|
||||||
Cell updatedCell = new TagRewriteCell(cell, Tag.fromList(tags));
|
Cell updatedCell = new TagRewriteCell(cell, Tag.fromList(tags));
|
||||||
updatedCells.add(updatedCell);
|
updatedCells.add(updatedCell);
|
||||||
|
@ -380,12 +399,80 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
ctx.bypass();
|
ctx.bypass();
|
||||||
}
|
}
|
||||||
|
|
||||||
// Checks whether cell contains any tag with type as VISIBILITY_TAG_TYPE.
|
/**
|
||||||
// This tag type is reserved and should not be explicitly set by user.
|
* Checks whether cell contains any tag with type as VISIBILITY_TAG_TYPE. This
|
||||||
private boolean checkForReservedVisibilityTagPresence(Cell cell) throws IOException {
|
* tag type is reserved and should not be explicitly set by user.
|
||||||
|
*
|
||||||
|
* @param cell
|
||||||
|
* - the cell under consideration
|
||||||
|
* @param pair - an optional pair of type <Boolean, Tag> which would be reused
|
||||||
|
* if already set and new one will be created if null is passed
|
||||||
|
* @return a pair<Boolean, Tag> - if the boolean is false then it indicates
|
||||||
|
* that the cell has a RESERVERD_VIS_TAG and with boolean as true, not
|
||||||
|
* null tag indicates that a string modified tag was found.
|
||||||
|
*/
|
||||||
|
private Pair<Boolean, Tag> checkForReservedVisibilityTagPresence(Cell cell,
|
||||||
|
Pair<Boolean, Tag> pair) throws IOException {
|
||||||
|
if (pair == null) {
|
||||||
|
pair = new Pair<Boolean, Tag>(false, null);
|
||||||
|
} else {
|
||||||
|
pair.setFirst(false);
|
||||||
|
pair.setSecond(null);
|
||||||
|
}
|
||||||
// Bypass this check when the operation is done by a system/super user.
|
// Bypass this check when the operation is done by a system/super user.
|
||||||
// This is done because, while Replication, the Cells coming to the peer cluster with reserved
|
// This is done because, while Replication, the Cells coming to the peer cluster with reserved
|
||||||
// typed tags and this is fine and should get added to the peer cluster table
|
// typed tags and this is fine and should get added to the peer cluster table
|
||||||
|
if (isSystemOrSuperUser()) {
|
||||||
|
// Does the cell contain special tag which indicates that the replicated
|
||||||
|
// cell visiblilty tags
|
||||||
|
// have been modified
|
||||||
|
Tag modifiedTag = null;
|
||||||
|
if (cell.getTagsLength() > 0) {
|
||||||
|
Iterator<Tag> tagsIterator = CellUtil.tagsIterator(cell.getTagsArray(),
|
||||||
|
cell.getTagsOffset(), cell.getTagsLength());
|
||||||
|
while (tagsIterator.hasNext()) {
|
||||||
|
Tag tag = tagsIterator.next();
|
||||||
|
if (tag.getType() == TagType.STRING_VIS_TAG_TYPE) {
|
||||||
|
modifiedTag = tag;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
pair.setFirst(true);
|
||||||
|
pair.setSecond(modifiedTag);
|
||||||
|
return pair;
|
||||||
|
}
|
||||||
|
if (cell.getTagsLength() > 0) {
|
||||||
|
Iterator<Tag> tagsItr = CellUtil.tagsIterator(cell.getTagsArray(), cell.getTagsOffset(),
|
||||||
|
cell.getTagsLength());
|
||||||
|
while (tagsItr.hasNext()) {
|
||||||
|
if (RESERVED_VIS_TAG_TYPES.contains(tagsItr.next().getType())) {
|
||||||
|
return pair;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
pair.setFirst(true);
|
||||||
|
return pair;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks whether cell contains any tag with type as VISIBILITY_TAG_TYPE. This
|
||||||
|
* tag type is reserved and should not be explicitly set by user. There are
|
||||||
|
* two versions of this method one that accepts pair and other without pair.
|
||||||
|
* In case of preAppend and preIncrement the additional operations are not
|
||||||
|
* needed like checking for STRING_VIS_TAG_TYPE and hence the API without pair
|
||||||
|
* could be used.
|
||||||
|
*
|
||||||
|
* @param cell
|
||||||
|
* @return
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
private boolean checkForReservedVisibilityTagPresence(Cell cell) throws IOException {
|
||||||
|
// Bypass this check when the operation is done by a system/super user.
|
||||||
|
// This is done because, while Replication, the Cells coming to the peer
|
||||||
|
// cluster with reserved
|
||||||
|
// typed tags and this is fine and should get added to the peer cluster
|
||||||
|
// table
|
||||||
if (isSystemOrSuperUser()) {
|
if (isSystemOrSuperUser()) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
@ -401,6 +488,16 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void removeReplicationVisibilityTag(List<Tag> tags) throws IOException {
|
||||||
|
Iterator<Tag> iterator = tags.iterator();
|
||||||
|
while (iterator.hasNext()) {
|
||||||
|
Tag tag = iterator.next();
|
||||||
|
if (tag.getType() == TagType.STRING_VIS_TAG_TYPE) {
|
||||||
|
iterator.remove();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public RegionScanner preScannerOpen(ObserverContext<RegionCoprocessorEnvironment> e, Scan scan,
|
public RegionScanner preScannerOpen(ObserverContext<RegionCoprocessorEnvironment> e, Scan scan,
|
||||||
RegionScanner s) throws IOException {
|
RegionScanner s) throws IOException {
|
||||||
|
@ -824,4 +921,33 @@ public class VisibilityController extends BaseMasterAndRegionObserver implements
|
||||||
return v;
|
return v;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A RegionServerObserver impl that provides the custom
|
||||||
|
* VisibilityReplicationEndpoint. This class should be configured as the
|
||||||
|
* 'hbase.coprocessor.regionserver.classes' for the visibility tags to be
|
||||||
|
* replicated as string. The value for the configuration should be
|
||||||
|
* 'org.apache.hadoop.hbase.security.visibility.VisibilityController$VisibilityReplication'.
|
||||||
|
*/
|
||||||
|
public static class VisibilityReplication extends BaseRegionServerObserver {
|
||||||
|
private Configuration conf;
|
||||||
|
private VisibilityLabelService visibilityLabelService;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void start(CoprocessorEnvironment env) throws IOException {
|
||||||
|
this.conf = env.getConfiguration();
|
||||||
|
visibilityLabelService = VisibilityLabelServiceManager.getInstance()
|
||||||
|
.getVisibilityLabelService(this.conf);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void stop(CoprocessorEnvironment env) throws IOException {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ReplicationEndpoint postCreateReplicationEndPoint(
|
||||||
|
ObserverContext<RegionServerCoprocessorEnvironment> ctx, ReplicationEndpoint endpoint) {
|
||||||
|
return new VisibilityReplicationEndpoint(endpoint, visibilityLabelService);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -28,4 +28,11 @@ public interface VisibilityLabelOrdinalProvider {
|
||||||
* existing label.
|
* existing label.
|
||||||
*/
|
*/
|
||||||
public int getLabelOrdinal(String label);
|
public int getLabelOrdinal(String label);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the string associated with the ordinal. Not be used in MR.
|
||||||
|
* @param ordinal representing the visibility label's ordinal
|
||||||
|
* @return label associated with the string, null if not found
|
||||||
|
*/
|
||||||
|
public String getLabel(int ordinal);
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,10 +20,11 @@ package org.apache.hadoop.hbase.security.visibility;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceStability;
|
|
||||||
import org.apache.hadoop.conf.Configurable;
|
import org.apache.hadoop.conf.Configurable;
|
||||||
import org.apache.hadoop.hbase.Tag;
|
import org.apache.hadoop.hbase.Tag;
|
||||||
|
import org.apache.hadoop.hbase.TagType;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceStability;
|
||||||
import org.apache.hadoop.hbase.coprocessor.RegionCoprocessorEnvironment;
|
import org.apache.hadoop.hbase.coprocessor.RegionCoprocessorEnvironment;
|
||||||
import org.apache.hadoop.hbase.regionserver.OperationStatus;
|
import org.apache.hadoop.hbase.regionserver.OperationStatus;
|
||||||
|
|
||||||
|
@ -139,4 +140,24 @@ public interface VisibilityLabelService extends Configurable {
|
||||||
*/
|
*/
|
||||||
boolean matchVisibility(List<Tag> putVisTags, Byte putVisTagFormat, List<Tag> deleteVisTags,
|
boolean matchVisibility(List<Tag> putVisTags, Byte putVisTagFormat, List<Tag> deleteVisTags,
|
||||||
Byte deleteVisTagFormat) throws IOException;
|
Byte deleteVisTagFormat) throws IOException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Provides a way to modify the visibility tags of type {@link TagType}
|
||||||
|
* .VISIBILITY_TAG_TYPE, that are part of the cell created from the WALEdits
|
||||||
|
* that are prepared for replication while calling
|
||||||
|
* {@link org.apache.hadoop.hbase.replication.ReplicationEndpoint}
|
||||||
|
* .replicate().
|
||||||
|
* {@link org.apache.hadoop.hbase.security.visibility.VisibilityReplicationEndpoint}
|
||||||
|
* calls this API to provide an opportunity to modify the visibility tags
|
||||||
|
* before replicating.
|
||||||
|
*
|
||||||
|
* @param visTags
|
||||||
|
* the visibility tags associated with the cell
|
||||||
|
* @param serializationFormat
|
||||||
|
* the serialization format associated with the tag
|
||||||
|
* @return the modified visibility expression in the form of byte[]
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
byte[] encodeVisibilityForReplication(final List<Tag> visTags,
|
||||||
|
final Byte serializationFormat) throws IOException;
|
||||||
}
|
}
|
||||||
|
|
|
@ -29,8 +29,8 @@ import java.util.concurrent.locks.ReentrantReadWriteLock;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.hbase.exceptions.DeserializationException;
|
import org.apache.hadoop.hbase.exceptions.DeserializationException;
|
||||||
import org.apache.hadoop.hbase.protobuf.generated.VisibilityLabelsProtos.MultiUserAuthorizations;
|
import org.apache.hadoop.hbase.protobuf.generated.VisibilityLabelsProtos.MultiUserAuthorizations;
|
||||||
import org.apache.hadoop.hbase.protobuf.generated.VisibilityLabelsProtos.UserAuthorizations;
|
import org.apache.hadoop.hbase.protobuf.generated.VisibilityLabelsProtos.UserAuthorizations;
|
||||||
|
@ -174,6 +174,7 @@ public class VisibilityLabelsCache implements VisibilityLabelOrdinalProvider {
|
||||||
* @return The label having the given ordinal. Returns <code>null</code> when no label exist in
|
* @return The label having the given ordinal. Returns <code>null</code> when no label exist in
|
||||||
* the system with given ordinal
|
* the system with given ordinal
|
||||||
*/
|
*/
|
||||||
|
@Override
|
||||||
public String getLabel(int ordinal) {
|
public String getLabel(int ordinal) {
|
||||||
this.lock.readLock().lock();
|
this.lock.readLock().lock();
|
||||||
try {
|
try {
|
||||||
|
|
|
@ -0,0 +1,155 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.hbase.security.visibility;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.UUID;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.hbase.Cell;
|
||||||
|
import org.apache.hadoop.hbase.Tag;
|
||||||
|
import org.apache.hadoop.hbase.TagRewriteCell;
|
||||||
|
import org.apache.hadoop.hbase.TagType;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.hbase.regionserver.wal.WALEdit;
|
||||||
|
import org.apache.hadoop.hbase.replication.ReplicationEndpoint;
|
||||||
|
import org.apache.hadoop.hbase.replication.WALEntryFilter;
|
||||||
|
import org.apache.hadoop.hbase.regionserver.wal.HLog.Entry;
|
||||||
|
|
||||||
|
import com.google.common.util.concurrent.ListenableFuture;
|
||||||
|
|
||||||
|
@InterfaceAudience.Private
|
||||||
|
public class VisibilityReplicationEndpoint implements ReplicationEndpoint {
|
||||||
|
|
||||||
|
private static final Log LOG = LogFactory.getLog(VisibilityReplicationEndpoint.class);
|
||||||
|
private ReplicationEndpoint delegator;
|
||||||
|
private VisibilityLabelService visibilityLabelsService;
|
||||||
|
|
||||||
|
public VisibilityReplicationEndpoint(ReplicationEndpoint endpoint,
|
||||||
|
VisibilityLabelService visibilityLabelsService) {
|
||||||
|
this.delegator = endpoint;
|
||||||
|
this.visibilityLabelsService = visibilityLabelsService;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void init(Context context) throws IOException {
|
||||||
|
delegator.init(context);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean replicate(ReplicateContext replicateContext) {
|
||||||
|
if (!delegator.canReplicateToSameCluster()) {
|
||||||
|
// Only when the replication is inter cluster replication we need to covert the visibility tags to
|
||||||
|
// string based tags. But for intra cluster replication like region replicas it is not needed.
|
||||||
|
List<Entry> entries = replicateContext.getEntries();
|
||||||
|
List<Tag> visTags = new ArrayList<Tag>();
|
||||||
|
List<Tag> nonVisTags = new ArrayList<Tag>();
|
||||||
|
List<Entry> newEntries = new ArrayList<Entry>(entries.size());
|
||||||
|
for (Entry entry : entries) {
|
||||||
|
WALEdit newEdit = new WALEdit();
|
||||||
|
ArrayList<Cell> cells = entry.getEdit().getCells();
|
||||||
|
for (Cell cell : cells) {
|
||||||
|
if (cell.getTagsLength() > 0) {
|
||||||
|
visTags.clear();
|
||||||
|
nonVisTags.clear();
|
||||||
|
Byte serializationFormat = VisibilityUtils.extractAndPartitionTags(cell, visTags,
|
||||||
|
nonVisTags);
|
||||||
|
if (!visTags.isEmpty()) {
|
||||||
|
try {
|
||||||
|
byte[] modifiedVisExpression = visibilityLabelsService
|
||||||
|
.encodeVisibilityForReplication(visTags, serializationFormat);
|
||||||
|
if (modifiedVisExpression != null) {
|
||||||
|
nonVisTags.add(new Tag(TagType.STRING_VIS_TAG_TYPE, modifiedVisExpression));
|
||||||
|
}
|
||||||
|
} catch (Exception ioe) {
|
||||||
|
LOG.error(
|
||||||
|
"Exception while reading the visibility labels from the cell. The replication "
|
||||||
|
+ "would happen as per the existing format and not as string type for the cell "
|
||||||
|
+ cell + ".", ioe);
|
||||||
|
// just return the old entries as it is without applying the string type change
|
||||||
|
newEdit.add(cell);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
// Recreate the cell with the new tags and the existing tags
|
||||||
|
Cell newCell = new TagRewriteCell(cell, Tag.fromList(nonVisTags));
|
||||||
|
newEdit.add(newCell);
|
||||||
|
} else {
|
||||||
|
newEdit.add(cell);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
newEdit.add(cell);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
newEntries.add(new Entry(entry.getKey(), newEdit));
|
||||||
|
}
|
||||||
|
replicateContext.setEntries(newEntries);
|
||||||
|
return delegator.replicate(replicateContext);
|
||||||
|
} else {
|
||||||
|
return delegator.replicate(replicateContext);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public synchronized UUID getPeerUUID() {
|
||||||
|
return delegator.getPeerUUID();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean canReplicateToSameCluster() {
|
||||||
|
return delegator.canReplicateToSameCluster();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public WALEntryFilter getWALEntryfilter() {
|
||||||
|
return delegator.getWALEntryfilter();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isRunning() {
|
||||||
|
return delegator.isRunning();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ListenableFuture<State> start() {
|
||||||
|
return delegator.start();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public State startAndWait() {
|
||||||
|
return delegator.startAndWait();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public State state() {
|
||||||
|
return delegator.state();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ListenableFuture<State> stop() {
|
||||||
|
return delegator.stop();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public State stopAndWait() {
|
||||||
|
return delegator.stopAndWait();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -28,19 +28,19 @@ import java.util.HashMap;
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
|
||||||
import java.util.Map.Entry;
|
import java.util.Map.Entry;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
import org.apache.commons.lang.StringUtils;
|
import org.apache.commons.lang.StringUtils;
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hbase.Cell;
|
import org.apache.hadoop.hbase.Cell;
|
||||||
import org.apache.hadoop.hbase.CellUtil;
|
import org.apache.hadoop.hbase.CellUtil;
|
||||||
import org.apache.hadoop.hbase.HColumnDescriptor;
|
import org.apache.hadoop.hbase.HColumnDescriptor;
|
||||||
import org.apache.hadoop.hbase.Tag;
|
import org.apache.hadoop.hbase.Tag;
|
||||||
import org.apache.hadoop.hbase.TagType;
|
import org.apache.hadoop.hbase.TagType;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.hbase.exceptions.DeserializationException;
|
import org.apache.hadoop.hbase.exceptions.DeserializationException;
|
||||||
import org.apache.hadoop.hbase.filter.Filter;
|
import org.apache.hadoop.hbase.filter.Filter;
|
||||||
import org.apache.hadoop.hbase.io.util.StreamUtils;
|
import org.apache.hadoop.hbase.io.util.StreamUtils;
|
||||||
|
@ -226,6 +226,39 @@ public class VisibilityUtils {
|
||||||
return serializationFormat;
|
return serializationFormat;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Extracts and partitions the visibility tags and nonVisibility Tags
|
||||||
|
*
|
||||||
|
* @param cell - the cell for which we would extract and partition the
|
||||||
|
* visibility and non visibility tags
|
||||||
|
* @param visTags
|
||||||
|
* - all the visibilty tags of type TagType.VISIBILITY_TAG_TYPE would
|
||||||
|
* be added to this list
|
||||||
|
* @param nonVisTags - all the non visibility tags would be added to this list
|
||||||
|
* @return - the serailization format of the tag. Can be null if no tags are found or
|
||||||
|
* if there is no visibility tag found
|
||||||
|
*/
|
||||||
|
public static Byte extractAndPartitionTags(Cell cell, List<Tag> visTags,
|
||||||
|
List<Tag> nonVisTags) {
|
||||||
|
Byte serializationFormat = null;
|
||||||
|
if (cell.getTagsLength() > 0) {
|
||||||
|
Iterator<Tag> tagsIterator = CellUtil.tagsIterator(cell.getTagsArray(), cell.getTagsOffset(),
|
||||||
|
cell.getTagsLength());
|
||||||
|
while (tagsIterator.hasNext()) {
|
||||||
|
Tag tag = tagsIterator.next();
|
||||||
|
if (tag.getType() == TagType.VISIBILITY_EXP_SERIALIZATION_FORMAT_TAG_TYPE) {
|
||||||
|
serializationFormat = tag.getBuffer()[tag.getTagOffset()];
|
||||||
|
} else if (tag.getType() == VISIBILITY_TAG_TYPE) {
|
||||||
|
visTags.add(tag);
|
||||||
|
} else {
|
||||||
|
// ignore string encoded visibility expressions, will be added in replication handling
|
||||||
|
nonVisTags.add(tag);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return serializationFormat;
|
||||||
|
}
|
||||||
|
|
||||||
public static boolean isVisibilityTagsPresent(Cell cell) {
|
public static boolean isVisibilityTagsPresent(Cell cell) {
|
||||||
if (cell.getTagsLength() == 0) {
|
if (cell.getTagsLength() == 0) {
|
||||||
return false;
|
return false;
|
||||||
|
|
|
@ -32,13 +32,13 @@ import java.util.List;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hbase.Cell;
|
import org.apache.hadoop.hbase.Cell;
|
||||||
import org.apache.hadoop.hbase.CellUtil;
|
import org.apache.hadoop.hbase.CellUtil;
|
||||||
import org.apache.hadoop.hbase.TagType;
|
|
||||||
import org.apache.hadoop.hbase.HConstants.OperationStatusCode;
|
import org.apache.hadoop.hbase.HConstants.OperationStatusCode;
|
||||||
import org.apache.hadoop.hbase.Tag;
|
import org.apache.hadoop.hbase.Tag;
|
||||||
|
import org.apache.hadoop.hbase.TagType;
|
||||||
|
import org.apache.hadoop.hbase.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.hbase.client.Delete;
|
import org.apache.hadoop.hbase.client.Delete;
|
||||||
import org.apache.hadoop.hbase.client.Get;
|
import org.apache.hadoop.hbase.client.Get;
|
||||||
import org.apache.hadoop.hbase.client.HTable;
|
import org.apache.hadoop.hbase.client.HTable;
|
||||||
|
@ -59,9 +59,10 @@ import org.apache.hadoop.hbase.util.Bytes;
|
||||||
import com.google.common.collect.Lists;
|
import com.google.common.collect.Lists;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This is a VisibilityLabelService where labels in Mutation's visibility expression will be
|
* This is a VisibilityLabelService where labels in Mutation's visibility
|
||||||
* persisted as Strings itself rather than ordinals in 'labels' table. Also there is no need to add
|
* expression will be persisted as Strings itself rather than ordinals in
|
||||||
* labels to the system, prior to using them in Mutations/Authorizations.
|
* 'labels' table. Also there is no need to add labels to the system, prior to
|
||||||
|
* using them in Mutations/Authorizations.
|
||||||
*/
|
*/
|
||||||
@InterfaceAudience.Private
|
@InterfaceAudience.Private
|
||||||
public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelService {
|
public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelService {
|
||||||
|
@ -81,7 +82,8 @@ public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelSer
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public OperationStatus[] addLabels(List<byte[]> labels) throws IOException {
|
public OperationStatus[] addLabels(List<byte[]> labels) throws IOException {
|
||||||
// Not doing specific label add. We will just add labels in Mutation visibility expression as it
|
// Not doing specific label add. We will just add labels in Mutation
|
||||||
|
// visibility expression as it
|
||||||
// is along with every cell.
|
// is along with every cell.
|
||||||
OperationStatus[] status = new OperationStatus[labels.size()];
|
OperationStatus[] status = new OperationStatus[labels.size()];
|
||||||
for (int i = 0; i < labels.size(); i++) {
|
for (int i = 0; i < labels.size(); i++) {
|
||||||
|
@ -252,7 +254,8 @@ public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelSer
|
||||||
offset += len;
|
offset += len;
|
||||||
}
|
}
|
||||||
if (includeKV) {
|
if (includeKV) {
|
||||||
// We got one visibility expression getting evaluated to true. Good to include this
|
// We got one visibility expression getting evaluated to true.
|
||||||
|
// Good to include this
|
||||||
// KV in the result then.
|
// KV in the result then.
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
@ -278,7 +281,8 @@ public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelSer
|
||||||
Collections.sort(labels);
|
Collections.sort(labels);
|
||||||
Collections.sort(notLabels);
|
Collections.sort(notLabels);
|
||||||
// We will write the NOT labels 1st followed by normal labels
|
// We will write the NOT labels 1st followed by normal labels
|
||||||
// Each of the label we will write with label length (as short 1st) followed by the label bytes.
|
// Each of the label we will write with label length (as short 1st) followed
|
||||||
|
// by the label bytes.
|
||||||
// For a NOT node we will write the label length as -ve.
|
// For a NOT node we will write the label length as -ve.
|
||||||
for (String label : notLabels) {
|
for (String label : notLabels) {
|
||||||
byte[] bLabel = Bytes.toBytes(label);
|
byte[] bLabel = Bytes.toBytes(label);
|
||||||
|
@ -377,7 +381,8 @@ public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelSer
|
||||||
private static boolean checkForMatchingVisibilityTagsWithSortedOrder(List<Tag> putVisTags,
|
private static boolean checkForMatchingVisibilityTagsWithSortedOrder(List<Tag> putVisTags,
|
||||||
List<Tag> deleteVisTags) {
|
List<Tag> deleteVisTags) {
|
||||||
boolean matchFound = false;
|
boolean matchFound = false;
|
||||||
// If the size does not match. Definitely we are not comparing the equal tags.
|
// If the size does not match. Definitely we are not comparing the equal
|
||||||
|
// tags.
|
||||||
if ((deleteVisTags.size()) == putVisTags.size()) {
|
if ((deleteVisTags.size()) == putVisTags.size()) {
|
||||||
for (Tag tag : deleteVisTags) {
|
for (Tag tag : deleteVisTags) {
|
||||||
matchFound = false;
|
matchFound = false;
|
||||||
|
@ -388,9 +393,71 @@ public class ExpAsStringVisibilityLabelServiceImpl implements VisibilityLabelSer
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (!matchFound) break;
|
if (!matchFound)
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return matchFound;
|
return matchFound;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public byte[] encodeVisibilityForReplication(final List<Tag> tags, final Byte serializationFormat)
|
||||||
|
throws IOException {
|
||||||
|
if (tags.size() > 0 && (serializationFormat == null
|
||||||
|
|| serializationFormat == STRING_SERIALIZATION_FORMAT)) {
|
||||||
|
return createModifiedVisExpression(tags);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @param tags - all the tags associated with the current Cell
|
||||||
|
* @return - the modified visibility expression as byte[]
|
||||||
|
*/
|
||||||
|
private byte[] createModifiedVisExpression(final List<Tag> tags)
|
||||||
|
throws IOException {
|
||||||
|
StringBuilder visibilityString = new StringBuilder();
|
||||||
|
for (Tag tag : tags) {
|
||||||
|
if (tag.getType() == TagType.VISIBILITY_TAG_TYPE) {
|
||||||
|
if (visibilityString.length() != 0) {
|
||||||
|
visibilityString.append(VisibilityConstants.CLOSED_PARAN
|
||||||
|
+ VisibilityConstants.OR_OPERATOR);
|
||||||
|
}
|
||||||
|
int offset = tag.getTagOffset();
|
||||||
|
int endOffset = offset + tag.getTagLength();
|
||||||
|
boolean expressionStart = true;
|
||||||
|
while (offset < endOffset) {
|
||||||
|
short len = Bytes.toShort(tag.getBuffer(), offset);
|
||||||
|
offset += 2;
|
||||||
|
if (len < 0) {
|
||||||
|
len = (short) (-1 * len);
|
||||||
|
String label = Bytes.toString(tag.getBuffer(), offset, len);
|
||||||
|
if (expressionStart) {
|
||||||
|
visibilityString.append(VisibilityConstants.OPEN_PARAN
|
||||||
|
+ VisibilityConstants.NOT_OPERATOR + CellVisibility.quote(label));
|
||||||
|
} else {
|
||||||
|
visibilityString.append(VisibilityConstants.AND_OPERATOR
|
||||||
|
+ VisibilityConstants.NOT_OPERATOR + CellVisibility.quote(label));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
String label = Bytes.toString(tag.getBuffer(), offset, len);
|
||||||
|
if (expressionStart) {
|
||||||
|
visibilityString.append(VisibilityConstants.OPEN_PARAN + CellVisibility.quote(label));
|
||||||
|
} else {
|
||||||
|
visibilityString.append(VisibilityConstants.AND_OPERATOR
|
||||||
|
+ CellVisibility.quote(label));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
expressionStart = false;
|
||||||
|
offset += len;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (visibilityString.length() != 0) {
|
||||||
|
visibilityString.append(VisibilityConstants.CLOSED_PARAN);
|
||||||
|
// Return the string formed as byte[]
|
||||||
|
return Bytes.toBytes(visibilityString.toString());
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,212 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.hbase.security.visibility;
|
||||||
|
|
||||||
|
import static org.apache.hadoop.hbase.security.visibility.VisibilityConstants.LABELS_TABLE_NAME;
|
||||||
|
import static org.junit.Assert.assertArrayEquals;
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.security.PrivilegedExceptionAction;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.hbase.Cell;
|
||||||
|
import org.apache.hadoop.hbase.CellScanner;
|
||||||
|
import org.apache.hadoop.hbase.CellUtil;
|
||||||
|
import org.apache.hadoop.hbase.HBaseConfiguration;
|
||||||
|
import org.apache.hadoop.hbase.HBaseTestingUtility;
|
||||||
|
import org.apache.hadoop.hbase.HColumnDescriptor;
|
||||||
|
import org.apache.hadoop.hbase.HConstants;
|
||||||
|
import org.apache.hadoop.hbase.HTableDescriptor;
|
||||||
|
import org.apache.hadoop.hbase.MediumTests;
|
||||||
|
import org.apache.hadoop.hbase.TableName;
|
||||||
|
import org.apache.hadoop.hbase.Tag;
|
||||||
|
import org.apache.hadoop.hbase.client.Get;
|
||||||
|
import org.apache.hadoop.hbase.client.HBaseAdmin;
|
||||||
|
import org.apache.hadoop.hbase.client.HTable;
|
||||||
|
import org.apache.hadoop.hbase.client.Result;
|
||||||
|
import org.apache.hadoop.hbase.client.replication.ReplicationAdmin;
|
||||||
|
import org.apache.hadoop.hbase.codec.KeyValueCodecWithTags;
|
||||||
|
import org.apache.hadoop.hbase.coprocessor.CoprocessorHost;
|
||||||
|
import org.apache.hadoop.hbase.security.User;
|
||||||
|
import org.apache.hadoop.hbase.security.visibility.VisibilityController.VisibilityReplication;
|
||||||
|
import org.junit.experimental.categories.Category;
|
||||||
|
import org.apache.hadoop.hbase.util.Bytes;
|
||||||
|
import org.apache.hadoop.hbase.zookeeper.MiniZooKeeperCluster;
|
||||||
|
import org.apache.hadoop.hbase.zookeeper.ZooKeeperWatcher;
|
||||||
|
import org.junit.Before;
|
||||||
|
|
||||||
|
@Category(MediumTests.class)
|
||||||
|
public class TestVisibilityLabelReplicationWithExpAsString extends TestVisibilityLabelsReplication {
|
||||||
|
private static final Log LOG = LogFactory
|
||||||
|
.getLog(TestVisibilityLabelReplicationWithExpAsString.class);
|
||||||
|
|
||||||
|
@Override
|
||||||
|
@Before
|
||||||
|
public void setup() throws Exception {
|
||||||
|
expected[0] = 4;
|
||||||
|
expected[1] = 6;
|
||||||
|
expected[2] = 4;
|
||||||
|
expected[3] = 0;
|
||||||
|
expected[3] = 3;
|
||||||
|
expectedVisString[0] = "(\"public\"&\"secret\"&\"topsecret\")|(\"confidential\"&\"topsecret\")";
|
||||||
|
expectedVisString[1] = "(\"private\"&\"public\")|(\"private\"&\"topsecret\")|"
|
||||||
|
+ "(\"confidential\"&\"public\")|(\"confidential\"&\"topsecret\")";
|
||||||
|
expectedVisString[2] = "(!\"topsecret\"&\"secret\")|(!\"topsecret\"&\"confidential\")";
|
||||||
|
expectedVisString[3] = "(\"secret\"&\"" + COPYRIGHT + "\\\"" + ACCENT + "\\\\" + SECRET
|
||||||
|
+ "\\\"" + "\u0027&\\\\" + "\")";
|
||||||
|
// setup configuration
|
||||||
|
conf = HBaseConfiguration.create();
|
||||||
|
conf.setBoolean(HConstants.DISTRIBUTED_LOG_REPLAY_KEY, false);
|
||||||
|
conf.setBoolean("hbase.online.schema.update.enable", true);
|
||||||
|
conf.setInt("hfile.format.version", 3);
|
||||||
|
conf.set(HConstants.ZOOKEEPER_ZNODE_PARENT, "/1");
|
||||||
|
conf.setInt("replication.source.size.capacity", 10240);
|
||||||
|
conf.setLong("replication.source.sleepforretries", 100);
|
||||||
|
conf.setInt("hbase.regionserver.maxlogs", 10);
|
||||||
|
conf.setLong("hbase.master.logcleaner.ttl", 10);
|
||||||
|
conf.setInt("zookeeper.recovery.retry", 1);
|
||||||
|
conf.setInt("zookeeper.recovery.retry.intervalmill", 10);
|
||||||
|
conf.setBoolean("dfs.support.append", true);
|
||||||
|
conf.setLong(HConstants.THREAD_WAKE_FREQUENCY, 100);
|
||||||
|
conf.setInt("replication.stats.thread.period.seconds", 5);
|
||||||
|
conf.setBoolean("hbase.tests.use.shortcircuit.reads", false);
|
||||||
|
setVisibilityLabelServiceImpl(conf, ExpAsStringVisibilityLabelServiceImpl.class);
|
||||||
|
conf.setBoolean(HConstants.REPLICATION_ENABLE_KEY, HConstants.REPLICATION_ENABLE_DEFAULT);
|
||||||
|
conf.setStrings(HConstants.REPLICATION_CODEC_CONF_KEY, KeyValueCodecWithTags.class.getName());
|
||||||
|
VisibilityTestUtil.enableVisiblityLabels(conf);
|
||||||
|
conf.set(CoprocessorHost.REGIONSERVER_COPROCESSOR_CONF_KEY,
|
||||||
|
VisibilityReplication.class.getName());
|
||||||
|
conf.setStrings(CoprocessorHost.USER_REGION_COPROCESSOR_CONF_KEY,
|
||||||
|
SimpleCP.class.getName());
|
||||||
|
// Have to reset conf1 in case zk cluster location different
|
||||||
|
// than default
|
||||||
|
conf.setClass(VisibilityUtils.VISIBILITY_LABEL_GENERATOR_CLASS, SimpleScanLabelGenerator.class,
|
||||||
|
ScanLabelGenerator.class);
|
||||||
|
conf.set("hbase.superuser", "admin");
|
||||||
|
conf.set("hbase.superuser", User.getCurrent().getShortName());
|
||||||
|
SUPERUSER = User.createUserForTesting(conf, User.getCurrent().getShortName(),
|
||||||
|
new String[] { "supergroup" });
|
||||||
|
User.createUserForTesting(conf,
|
||||||
|
User.getCurrent().getShortName(), new String[] { "supergroup" });
|
||||||
|
USER1 = User.createUserForTesting(conf, "user1", new String[] {});
|
||||||
|
TEST_UTIL = new HBaseTestingUtility(conf);
|
||||||
|
TEST_UTIL.startMiniZKCluster();
|
||||||
|
MiniZooKeeperCluster miniZK = TEST_UTIL.getZkCluster();
|
||||||
|
zkw1 = new ZooKeeperWatcher(conf, "cluster1", null, true);
|
||||||
|
replicationAdmin = new ReplicationAdmin(conf);
|
||||||
|
|
||||||
|
// Base conf2 on conf1 so it gets the right zk cluster.
|
||||||
|
conf1 = HBaseConfiguration.create(conf);
|
||||||
|
conf1.setInt("hfile.format.version", 3);
|
||||||
|
conf1.set(HConstants.ZOOKEEPER_ZNODE_PARENT, "/2");
|
||||||
|
conf1.setInt(HConstants.HBASE_CLIENT_RETRIES_NUMBER, 6);
|
||||||
|
conf1.setBoolean("dfs.support.append", true);
|
||||||
|
conf1.setBoolean("hbase.tests.use.shortcircuit.reads", false);
|
||||||
|
conf.setBoolean(HConstants.REPLICATION_ENABLE_KEY, HConstants.REPLICATION_ENABLE_DEFAULT);
|
||||||
|
conf1.setStrings(HConstants.REPLICATION_CODEC_CONF_KEY, KeyValueCodecWithTags.class.getName());
|
||||||
|
conf1.setStrings(CoprocessorHost.USER_REGION_COPROCESSOR_CONF_KEY,
|
||||||
|
TestCoprocessorForTagsAtSink.class.getName());
|
||||||
|
setVisibilityLabelServiceImpl(conf1, ExpAsStringVisibilityLabelServiceImpl.class);
|
||||||
|
TEST_UTIL1 = new HBaseTestingUtility(conf1);
|
||||||
|
TEST_UTIL1.setZkCluster(miniZK);
|
||||||
|
zkw2 = new ZooKeeperWatcher(conf1, "cluster2", null, true);
|
||||||
|
replicationAdmin.addPeer("2", TEST_UTIL1.getClusterKey());
|
||||||
|
|
||||||
|
TEST_UTIL.startMiniCluster(1);
|
||||||
|
// Wait for the labels table to become available
|
||||||
|
TEST_UTIL.waitTableEnabled(LABELS_TABLE_NAME.getName(), 50000);
|
||||||
|
TEST_UTIL1.startMiniCluster(1);
|
||||||
|
HBaseAdmin hBaseAdmin = TEST_UTIL.getHBaseAdmin();
|
||||||
|
HTableDescriptor table = new HTableDescriptor(TableName.valueOf(TABLE_NAME));
|
||||||
|
HColumnDescriptor desc = new HColumnDescriptor(fam);
|
||||||
|
desc.setScope(HConstants.REPLICATION_SCOPE_GLOBAL);
|
||||||
|
table.addFamily(desc);
|
||||||
|
try {
|
||||||
|
hBaseAdmin.createTable(table);
|
||||||
|
} finally {
|
||||||
|
if (hBaseAdmin != null) {
|
||||||
|
hBaseAdmin.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
HBaseAdmin hBaseAdmin1 = TEST_UTIL1.getHBaseAdmin();
|
||||||
|
try {
|
||||||
|
hBaseAdmin1.createTable(table);
|
||||||
|
} finally {
|
||||||
|
if (hBaseAdmin1 != null) {
|
||||||
|
hBaseAdmin1.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
addLabels();
|
||||||
|
setAuths(conf);
|
||||||
|
setAuths(conf1);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected static void setVisibilityLabelServiceImpl(Configuration conf, Class clazz) {
|
||||||
|
conf.setClass(VisibilityLabelServiceManager.VISIBILITY_LABEL_SERVICE_CLASS,
|
||||||
|
clazz, VisibilityLabelService.class);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void verifyGet(final byte[] row, final String visString, final int expected,
|
||||||
|
final boolean nullExpected, final String... auths) throws IOException,
|
||||||
|
InterruptedException {
|
||||||
|
PrivilegedExceptionAction<Void> scanAction = new PrivilegedExceptionAction<Void>() {
|
||||||
|
HTable table2 = null;
|
||||||
|
|
||||||
|
public Void run() throws Exception {
|
||||||
|
try {
|
||||||
|
table2 = new HTable(conf1, TABLE_NAME_BYTES);
|
||||||
|
CellScanner cellScanner;
|
||||||
|
Cell current;
|
||||||
|
Get get = new Get(row);
|
||||||
|
get.setAuthorizations(new Authorizations(auths));
|
||||||
|
Result result = table2.get(get);
|
||||||
|
cellScanner = result.cellScanner();
|
||||||
|
boolean advance = cellScanner.advance();
|
||||||
|
if (nullExpected) {
|
||||||
|
assertTrue(!advance);
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
current = cellScanner.current();
|
||||||
|
assertArrayEquals(CellUtil.cloneRow(current), row);
|
||||||
|
assertEquals(expected, TestCoprocessorForTagsAtSink.tags.size());
|
||||||
|
boolean foundNonVisTag = false;
|
||||||
|
for(Tag t : TestCoprocessorForTagsAtSink.tags) {
|
||||||
|
if(t.getType() == NON_VIS_TAG_TYPE) {
|
||||||
|
assertEquals(TEMP, Bytes.toString(t.getValue()));
|
||||||
|
foundNonVisTag = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
doAssert(row, visString);
|
||||||
|
assertTrue(foundNonVisTag);
|
||||||
|
return null;
|
||||||
|
} finally {
|
||||||
|
if (table2 != null) {
|
||||||
|
table2.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
USER1.runAs(scanAction);
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,491 @@
|
||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.hbase.security.visibility;
|
||||||
|
|
||||||
|
import static org.apache.hadoop.hbase.security.visibility.VisibilityConstants.LABELS_TABLE_NAME;
|
||||||
|
import static org.junit.Assert.assertArrayEquals;
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.security.PrivilegedExceptionAction;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.concurrent.atomic.AtomicInteger;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.hbase.Cell;
|
||||||
|
import org.apache.hadoop.hbase.CellScanner;
|
||||||
|
import org.apache.hadoop.hbase.CellUtil;
|
||||||
|
import org.apache.hadoop.hbase.HBaseConfiguration;
|
||||||
|
import org.apache.hadoop.hbase.HBaseTestingUtility;
|
||||||
|
import org.apache.hadoop.hbase.HColumnDescriptor;
|
||||||
|
import org.apache.hadoop.hbase.HConstants;
|
||||||
|
import org.apache.hadoop.hbase.HTableDescriptor;
|
||||||
|
import org.apache.hadoop.hbase.KeyValue;
|
||||||
|
import org.apache.hadoop.hbase.KeyValueUtil;
|
||||||
|
import org.apache.hadoop.hbase.MediumTests;
|
||||||
|
import org.apache.hadoop.hbase.TableName;
|
||||||
|
import org.apache.hadoop.hbase.Tag;
|
||||||
|
import org.apache.hadoop.hbase.TagRewriteCell;
|
||||||
|
import org.apache.hadoop.hbase.TagType;
|
||||||
|
import org.apache.hadoop.hbase.client.Durability;
|
||||||
|
import org.apache.hadoop.hbase.client.Get;
|
||||||
|
import org.apache.hadoop.hbase.client.HBaseAdmin;
|
||||||
|
import org.apache.hadoop.hbase.client.HTable;
|
||||||
|
import org.apache.hadoop.hbase.client.Put;
|
||||||
|
import org.apache.hadoop.hbase.client.Result;
|
||||||
|
import org.apache.hadoop.hbase.client.ResultScanner;
|
||||||
|
import org.apache.hadoop.hbase.client.Scan;
|
||||||
|
import org.apache.hadoop.hbase.client.Table;
|
||||||
|
import org.apache.hadoop.hbase.client.replication.ReplicationAdmin;
|
||||||
|
import org.apache.hadoop.hbase.codec.KeyValueCodecWithTags;
|
||||||
|
import org.apache.hadoop.hbase.coprocessor.BaseRegionObserver;
|
||||||
|
import org.apache.hadoop.hbase.coprocessor.CoprocessorHost;
|
||||||
|
import org.apache.hadoop.hbase.coprocessor.ObserverContext;
|
||||||
|
import org.apache.hadoop.hbase.coprocessor.RegionCoprocessorEnvironment;
|
||||||
|
import org.apache.hadoop.hbase.protobuf.generated.VisibilityLabelsProtos.VisibilityLabelsResponse;
|
||||||
|
import org.apache.hadoop.hbase.regionserver.wal.WALEdit;
|
||||||
|
import org.apache.hadoop.hbase.replication.ReplicationEndpoint;
|
||||||
|
import org.apache.hadoop.hbase.security.User;
|
||||||
|
import org.apache.hadoop.hbase.security.visibility.VisibilityController.VisibilityReplication;
|
||||||
|
import org.junit.experimental.categories.Category;
|
||||||
|
import org.apache.hadoop.hbase.util.Bytes;
|
||||||
|
import org.apache.hadoop.hbase.regionserver.wal.HLog.Entry;
|
||||||
|
import org.apache.hadoop.hbase.zookeeper.MiniZooKeeperCluster;
|
||||||
|
import org.apache.hadoop.hbase.zookeeper.ZooKeeperWatcher;
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Rule;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.junit.experimental.categories.Category;
|
||||||
|
import org.junit.rules.TestName;
|
||||||
|
|
||||||
|
@Category(MediumTests.class)
|
||||||
|
public class TestVisibilityLabelsReplication {
|
||||||
|
private static final Log LOG = LogFactory.getLog(TestVisibilityLabelsReplication.class);
|
||||||
|
protected static final int NON_VIS_TAG_TYPE = 100;
|
||||||
|
protected static final String TEMP = "temp";
|
||||||
|
protected static Configuration conf;
|
||||||
|
protected static Configuration conf1;
|
||||||
|
protected static String TABLE_NAME = "TABLE_NAME";
|
||||||
|
protected static byte[] TABLE_NAME_BYTES = Bytes.toBytes(TABLE_NAME);
|
||||||
|
protected static ReplicationAdmin replicationAdmin;
|
||||||
|
public static final String TOPSECRET = "topsecret";
|
||||||
|
public static final String PUBLIC = "public";
|
||||||
|
public static final String PRIVATE = "private";
|
||||||
|
public static final String CONFIDENTIAL = "confidential";
|
||||||
|
public static final String COPYRIGHT = "\u00A9ABC";
|
||||||
|
public static final String ACCENT = "\u0941";
|
||||||
|
public static final String SECRET = "secret";
|
||||||
|
public static final String UNICODE_VIS_TAG = COPYRIGHT + "\"" + ACCENT + "\\" + SECRET + "\""
|
||||||
|
+ "\u0027&\\";
|
||||||
|
public static HBaseTestingUtility TEST_UTIL;
|
||||||
|
public static HBaseTestingUtility TEST_UTIL1;
|
||||||
|
public static final byte[] row1 = Bytes.toBytes("row1");
|
||||||
|
public static final byte[] row2 = Bytes.toBytes("row2");
|
||||||
|
public static final byte[] row3 = Bytes.toBytes("row3");
|
||||||
|
public static final byte[] row4 = Bytes.toBytes("row4");
|
||||||
|
public final static byte[] fam = Bytes.toBytes("info");
|
||||||
|
public final static byte[] qual = Bytes.toBytes("qual");
|
||||||
|
public final static byte[] value = Bytes.toBytes("value");
|
||||||
|
protected static ZooKeeperWatcher zkw1;
|
||||||
|
protected static ZooKeeperWatcher zkw2;
|
||||||
|
protected static int expected[] = { 4, 6, 4, 0, 3 };
|
||||||
|
private static final String NON_VISIBILITY = "non-visibility";
|
||||||
|
protected static String[] expectedVisString = {
|
||||||
|
"(\"secret\"&\"topsecret\"&\"public\")|(\"topsecret\"&\"confidential\")",
|
||||||
|
"(\"public\"&\"private\")|(\"topsecret\"&\"private\")|"
|
||||||
|
+ "(\"confidential\"&\"public\")|(\"topsecret\"&\"confidential\")",
|
||||||
|
"(!\"topsecret\"&\"secret\")|(!\"topsecret\"&\"confidential\")",
|
||||||
|
"(\"secret\"&\"" + COPYRIGHT + "\\\"" + ACCENT + "\\\\" + SECRET + "\\\"" + "\u0027&\\\\"
|
||||||
|
+ "\")" };
|
||||||
|
|
||||||
|
@Rule
|
||||||
|
public final TestName TEST_NAME = new TestName();
|
||||||
|
public static User SUPERUSER, USER1;
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void setup() throws Exception {
|
||||||
|
// setup configuration
|
||||||
|
conf = HBaseConfiguration.create();
|
||||||
|
conf.setBoolean(HConstants.DISTRIBUTED_LOG_REPLAY_KEY, false);
|
||||||
|
conf.setBoolean("hbase.online.schema.update.enable", true);
|
||||||
|
conf.setInt("hfile.format.version", 3);
|
||||||
|
conf.set(HConstants.ZOOKEEPER_ZNODE_PARENT, "/1");
|
||||||
|
conf.setInt("replication.source.size.capacity", 10240);
|
||||||
|
conf.setLong("replication.source.sleepforretries", 100);
|
||||||
|
conf.setInt("hbase.regionserver.maxlogs", 10);
|
||||||
|
conf.setLong("hbase.master.logcleaner.ttl", 10);
|
||||||
|
conf.setInt("zookeeper.recovery.retry", 1);
|
||||||
|
conf.setInt("zookeeper.recovery.retry.intervalmill", 10);
|
||||||
|
conf.setBoolean("dfs.support.append", true);
|
||||||
|
conf.setLong(HConstants.THREAD_WAKE_FREQUENCY, 100);
|
||||||
|
conf.setInt("replication.stats.thread.period.seconds", 5);
|
||||||
|
conf.setBoolean("hbase.tests.use.shortcircuit.reads", false);
|
||||||
|
setVisibilityLabelServiceImpl(conf);
|
||||||
|
conf.setBoolean(HConstants.REPLICATION_ENABLE_KEY, HConstants.REPLICATION_ENABLE_DEFAULT);
|
||||||
|
conf.setStrings(HConstants.REPLICATION_CODEC_CONF_KEY, KeyValueCodecWithTags.class.getName());
|
||||||
|
VisibilityTestUtil.enableVisiblityLabels(conf);
|
||||||
|
conf.set(CoprocessorHost.REGIONSERVER_COPROCESSOR_CONF_KEY,
|
||||||
|
VisibilityReplication.class.getName());
|
||||||
|
conf.setStrings(CoprocessorHost.USER_REGION_COPROCESSOR_CONF_KEY,
|
||||||
|
SimpleCP.class.getName());
|
||||||
|
// Have to reset conf1 in case zk cluster location different
|
||||||
|
// than default
|
||||||
|
conf.setClass(VisibilityUtils.VISIBILITY_LABEL_GENERATOR_CLASS, SimpleScanLabelGenerator.class,
|
||||||
|
ScanLabelGenerator.class);
|
||||||
|
conf.set("hbase.superuser", User.getCurrent().getShortName());
|
||||||
|
SUPERUSER = User.createUserForTesting(conf, User.getCurrent().getShortName(),
|
||||||
|
new String[] { "supergroup" });
|
||||||
|
// User.createUserForTesting(conf, User.getCurrent().getShortName(), new
|
||||||
|
// String[] { "supergroup" });
|
||||||
|
USER1 = User.createUserForTesting(conf, "user1", new String[] {});
|
||||||
|
TEST_UTIL = new HBaseTestingUtility(conf);
|
||||||
|
TEST_UTIL.startMiniZKCluster();
|
||||||
|
MiniZooKeeperCluster miniZK = TEST_UTIL.getZkCluster();
|
||||||
|
zkw1 = new ZooKeeperWatcher(conf, "cluster1", null, true);
|
||||||
|
replicationAdmin = new ReplicationAdmin(conf);
|
||||||
|
|
||||||
|
// Base conf2 on conf1 so it gets the right zk cluster.
|
||||||
|
conf1 = HBaseConfiguration.create(conf);
|
||||||
|
conf1.setInt("hfile.format.version", 3);
|
||||||
|
conf1.set(HConstants.ZOOKEEPER_ZNODE_PARENT, "/2");
|
||||||
|
conf1.setInt(HConstants.HBASE_CLIENT_RETRIES_NUMBER, 6);
|
||||||
|
conf1.setBoolean("dfs.support.append", true);
|
||||||
|
conf1.setBoolean("hbase.tests.use.shortcircuit.reads", false);
|
||||||
|
conf.setBoolean(HConstants.REPLICATION_ENABLE_KEY, HConstants.REPLICATION_ENABLE_DEFAULT);
|
||||||
|
conf1.setStrings(HConstants.REPLICATION_CODEC_CONF_KEY, KeyValueCodecWithTags.class.getName());
|
||||||
|
conf1.setStrings(CoprocessorHost.USER_REGION_COPROCESSOR_CONF_KEY,
|
||||||
|
TestCoprocessorForTagsAtSink.class.getName());
|
||||||
|
// setVisibilityLabelServiceImpl(conf1);
|
||||||
|
USER1 = User.createUserForTesting(conf1, "user1", new String[] {});
|
||||||
|
TEST_UTIL1 = new HBaseTestingUtility(conf1);
|
||||||
|
TEST_UTIL1.setZkCluster(miniZK);
|
||||||
|
zkw2 = new ZooKeeperWatcher(conf1, "cluster2", null, true);
|
||||||
|
replicationAdmin.addPeer("2", TEST_UTIL1.getClusterKey());
|
||||||
|
|
||||||
|
TEST_UTIL.startMiniCluster(1);
|
||||||
|
// Wait for the labels table to become available
|
||||||
|
TEST_UTIL.waitTableEnabled(LABELS_TABLE_NAME.getName(), 50000);
|
||||||
|
TEST_UTIL1.startMiniCluster(1);
|
||||||
|
HBaseAdmin hBaseAdmin = TEST_UTIL.getHBaseAdmin();
|
||||||
|
HTableDescriptor table = new HTableDescriptor(TableName.valueOf(TABLE_NAME));
|
||||||
|
HColumnDescriptor desc = new HColumnDescriptor(fam);
|
||||||
|
desc.setScope(HConstants.REPLICATION_SCOPE_GLOBAL);
|
||||||
|
table.addFamily(desc);
|
||||||
|
try {
|
||||||
|
hBaseAdmin.createTable(table);
|
||||||
|
} finally {
|
||||||
|
if (hBaseAdmin != null) {
|
||||||
|
hBaseAdmin.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
HBaseAdmin hBaseAdmin1 = TEST_UTIL1.getHBaseAdmin();
|
||||||
|
try {
|
||||||
|
hBaseAdmin1.createTable(table);
|
||||||
|
} finally {
|
||||||
|
if (hBaseAdmin1 != null) {
|
||||||
|
hBaseAdmin1.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
addLabels();
|
||||||
|
setAuths(conf);
|
||||||
|
setAuths(conf1);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected static void setVisibilityLabelServiceImpl(Configuration conf) {
|
||||||
|
conf.setClass(VisibilityLabelServiceManager.VISIBILITY_LABEL_SERVICE_CLASS,
|
||||||
|
DefaultVisibilityLabelServiceImpl.class, VisibilityLabelService.class);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testVisibilityReplication() throws Exception {
|
||||||
|
TableName tableName = TableName.valueOf(TABLE_NAME);
|
||||||
|
Table table = writeData(tableName, "(" + SECRET + "&" + PUBLIC + ")" + "|(" + CONFIDENTIAL
|
||||||
|
+ ")&(" + TOPSECRET + ")", "(" + PRIVATE + "|" + CONFIDENTIAL + ")&(" + PUBLIC + "|"
|
||||||
|
+ TOPSECRET + ")", "(" + SECRET + "|" + CONFIDENTIAL + ")" + "&" + "!" + TOPSECRET,
|
||||||
|
CellVisibility.quote(UNICODE_VIS_TAG) + "&" + SECRET);
|
||||||
|
int retry = 0;
|
||||||
|
try {
|
||||||
|
Scan s = new Scan();
|
||||||
|
s.setAuthorizations(new Authorizations(SECRET, CONFIDENTIAL, PRIVATE, TOPSECRET,
|
||||||
|
UNICODE_VIS_TAG));
|
||||||
|
ResultScanner scanner = table.getScanner(s);
|
||||||
|
Result[] next = scanner.next(4);
|
||||||
|
|
||||||
|
assertTrue(next.length == 4);
|
||||||
|
CellScanner cellScanner = next[0].cellScanner();
|
||||||
|
cellScanner.advance();
|
||||||
|
Cell current = cellScanner.current();
|
||||||
|
assertTrue(Bytes.equals(current.getRowArray(), current.getRowOffset(),
|
||||||
|
current.getRowLength(), row1, 0, row1.length));
|
||||||
|
cellScanner = next[1].cellScanner();
|
||||||
|
cellScanner.advance();
|
||||||
|
current = cellScanner.current();
|
||||||
|
assertTrue(Bytes.equals(current.getRowArray(), current.getRowOffset(),
|
||||||
|
current.getRowLength(), row2, 0, row2.length));
|
||||||
|
cellScanner = next[2].cellScanner();
|
||||||
|
cellScanner.advance();
|
||||||
|
current = cellScanner.current();
|
||||||
|
assertTrue(Bytes.equals(current.getRowArray(), current.getRowOffset(),
|
||||||
|
current.getRowLength(), row3, 0, row3.length));
|
||||||
|
cellScanner = next[3].cellScanner();
|
||||||
|
cellScanner.advance();
|
||||||
|
current = cellScanner.current();
|
||||||
|
assertTrue(Bytes.equals(current.getRowArray(), current.getRowOffset(),
|
||||||
|
current.getRowLength(), row4, 0, row4.length));
|
||||||
|
HTable table2 = null;
|
||||||
|
try {
|
||||||
|
table2 = new HTable(TEST_UTIL1.getConfiguration(), TABLE_NAME_BYTES);
|
||||||
|
s = new Scan();
|
||||||
|
// Ensure both rows are replicated
|
||||||
|
scanner = table2.getScanner(s);
|
||||||
|
next = scanner.next(4);
|
||||||
|
while (next.length == 0 && retry <= 10) {
|
||||||
|
scanner = table2.getScanner(s);
|
||||||
|
next = scanner.next(4);
|
||||||
|
Thread.sleep(2000);
|
||||||
|
retry++;
|
||||||
|
}
|
||||||
|
assertTrue(next.length == 4);
|
||||||
|
verifyGet(row1, expectedVisString[0], expected[0], false, TOPSECRET, CONFIDENTIAL);
|
||||||
|
TestCoprocessorForTagsAtSink.tags.clear();
|
||||||
|
verifyGet(row2, expectedVisString[1], expected[1], false, CONFIDENTIAL, PUBLIC);
|
||||||
|
TestCoprocessorForTagsAtSink.tags.clear();
|
||||||
|
verifyGet(row3, expectedVisString[2], expected[2], false, PRIVATE, SECRET);
|
||||||
|
verifyGet(row3, "", expected[3], true, TOPSECRET, SECRET);
|
||||||
|
verifyGet(row4, expectedVisString[3], expected[4], false, UNICODE_VIS_TAG, SECRET);
|
||||||
|
} finally {
|
||||||
|
if (table2 != null) {
|
||||||
|
table2.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} finally {
|
||||||
|
if (table != null) {
|
||||||
|
table.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
protected static void doAssert(byte[] row, String visTag) throws Exception {
|
||||||
|
if (VisibilityReplicationEndPointForTest.lastEntries == null) {
|
||||||
|
return; // first call
|
||||||
|
}
|
||||||
|
Assert.assertEquals(1, VisibilityReplicationEndPointForTest.lastEntries.size());
|
||||||
|
List<Cell> cells = VisibilityReplicationEndPointForTest.lastEntries.get(0).getEdit().getCells();
|
||||||
|
Assert.assertEquals(4, cells.size());
|
||||||
|
boolean tagFound = false;
|
||||||
|
for (Cell cell : cells) {
|
||||||
|
if ((Bytes.equals(cell.getRowArray(), cell.getRowOffset(), cell.getRowLength(), row, 0,
|
||||||
|
row.length))) {
|
||||||
|
List<Tag> tags = Tag
|
||||||
|
.asList(cell.getTagsArray(), cell.getTagsOffset(), cell.getTagsLength());
|
||||||
|
for (Tag tag : tags) {
|
||||||
|
if (tag.getType() == TagType.STRING_VIS_TAG_TYPE) {
|
||||||
|
assertEquals(visTag, Bytes.toString(tag.getValue()));
|
||||||
|
tagFound = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
assertTrue(tagFound);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected void verifyGet(final byte[] row, final String visString, final int expected,
|
||||||
|
final boolean nullExpected, final String... auths) throws IOException,
|
||||||
|
InterruptedException {
|
||||||
|
PrivilegedExceptionAction<Void> scanAction = new PrivilegedExceptionAction<Void>() {
|
||||||
|
HTable table2 = null;
|
||||||
|
|
||||||
|
public Void run() throws Exception {
|
||||||
|
try {
|
||||||
|
table2 = new HTable(conf1, TABLE_NAME_BYTES);
|
||||||
|
CellScanner cellScanner;
|
||||||
|
Cell current;
|
||||||
|
Get get = new Get(row);
|
||||||
|
get.setAuthorizations(new Authorizations(auths));
|
||||||
|
Result result = table2.get(get);
|
||||||
|
cellScanner = result.cellScanner();
|
||||||
|
boolean advance = cellScanner.advance();
|
||||||
|
if (nullExpected) {
|
||||||
|
assertTrue(!advance);
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
current = cellScanner.current();
|
||||||
|
assertArrayEquals(CellUtil.cloneRow(current), row);
|
||||||
|
for (Tag tag : TestCoprocessorForTagsAtSink.tags) {
|
||||||
|
LOG.info("The tag type is " + tag.getType());
|
||||||
|
}
|
||||||
|
assertEquals(expected, TestCoprocessorForTagsAtSink.tags.size());
|
||||||
|
Tag tag = TestCoprocessorForTagsAtSink.tags.get(1);
|
||||||
|
if (tag.getType() != NON_VIS_TAG_TYPE) {
|
||||||
|
assertEquals(TagType.VISIBILITY_EXP_SERIALIZATION_FORMAT_TAG_TYPE, tag.getType());
|
||||||
|
}
|
||||||
|
tag = TestCoprocessorForTagsAtSink.tags.get(0);
|
||||||
|
boolean foundNonVisTag = false;
|
||||||
|
for (Tag t : TestCoprocessorForTagsAtSink.tags) {
|
||||||
|
if (t.getType() == NON_VIS_TAG_TYPE) {
|
||||||
|
assertEquals(TEMP, Bytes.toString(t.getValue()));
|
||||||
|
foundNonVisTag = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
doAssert(row, visString);
|
||||||
|
assertTrue(foundNonVisTag);
|
||||||
|
return null;
|
||||||
|
} finally {
|
||||||
|
if (table2 != null) {
|
||||||
|
table2.close();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
USER1.runAs(scanAction);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void addLabels() throws Exception {
|
||||||
|
PrivilegedExceptionAction<VisibilityLabelsResponse> action =
|
||||||
|
new PrivilegedExceptionAction<VisibilityLabelsResponse>() {
|
||||||
|
public VisibilityLabelsResponse run() throws Exception {
|
||||||
|
String[] labels = { SECRET, TOPSECRET, CONFIDENTIAL, PUBLIC, PRIVATE, UNICODE_VIS_TAG };
|
||||||
|
try {
|
||||||
|
VisibilityClient.addLabels(conf, labels);
|
||||||
|
} catch (Throwable t) {
|
||||||
|
throw new IOException(t);
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
SUPERUSER.runAs(action);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setAuths(final Configuration conf) throws Exception {
|
||||||
|
PrivilegedExceptionAction<VisibilityLabelsResponse> action =
|
||||||
|
new PrivilegedExceptionAction<VisibilityLabelsResponse>() {
|
||||||
|
public VisibilityLabelsResponse run() throws Exception {
|
||||||
|
try {
|
||||||
|
return VisibilityClient.setAuths(conf, new String[] { SECRET, CONFIDENTIAL, PRIVATE,
|
||||||
|
TOPSECRET, UNICODE_VIS_TAG }, "user1");
|
||||||
|
} catch (Throwable e) {
|
||||||
|
throw new Exception(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
VisibilityLabelsResponse response = SUPERUSER.runAs(action);
|
||||||
|
}
|
||||||
|
|
||||||
|
static Table writeData(TableName tableName, String... labelExps) throws Exception {
|
||||||
|
HTable table = null;
|
||||||
|
try {
|
||||||
|
table = new HTable(conf, TABLE_NAME_BYTES);
|
||||||
|
int i = 1;
|
||||||
|
List<Put> puts = new ArrayList<Put>();
|
||||||
|
for (String labelExp : labelExps) {
|
||||||
|
Put put = new Put(Bytes.toBytes("row" + i));
|
||||||
|
put.add(fam, qual, HConstants.LATEST_TIMESTAMP, value);
|
||||||
|
put.setCellVisibility(new CellVisibility(labelExp));
|
||||||
|
put.setAttribute(NON_VISIBILITY, Bytes.toBytes(TEMP));
|
||||||
|
puts.add(put);
|
||||||
|
i++;
|
||||||
|
}
|
||||||
|
table.put(puts);
|
||||||
|
} finally {
|
||||||
|
if (table != null) {
|
||||||
|
table.flushCommits();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return table;
|
||||||
|
}
|
||||||
|
// A simple BaseRegionbserver impl that allows to add a non-visibility tag from the
|
||||||
|
// attributes of the Put mutation. The existing cells in the put mutation is overwritten
|
||||||
|
// with a new cell that has the visibility tags and the non visibility tag
|
||||||
|
public static class SimpleCP extends BaseRegionObserver {
|
||||||
|
@Override
|
||||||
|
public void prePut(ObserverContext<RegionCoprocessorEnvironment> e, Put m, WALEdit edit,
|
||||||
|
Durability durability) throws IOException {
|
||||||
|
byte[] attribute = m.getAttribute(NON_VISIBILITY);
|
||||||
|
byte[] cf = null;
|
||||||
|
List<Cell> updatedCells = new ArrayList<Cell>();
|
||||||
|
if (attribute != null) {
|
||||||
|
for (List<? extends Cell> edits : m.getFamilyCellMap().values()) {
|
||||||
|
for (Cell cell : edits) {
|
||||||
|
KeyValue kv = KeyValueUtil.ensureKeyValue(cell);
|
||||||
|
if (cf == null) {
|
||||||
|
cf = kv.getFamily();
|
||||||
|
}
|
||||||
|
Tag tag = new Tag((byte) NON_VIS_TAG_TYPE, attribute);
|
||||||
|
List<Tag> tagList = new ArrayList<Tag>();
|
||||||
|
tagList.add(tag);
|
||||||
|
tagList.addAll(kv.getTags());
|
||||||
|
byte[] fromList = Tag.fromList(tagList);
|
||||||
|
TagRewriteCell newcell = new TagRewriteCell(kv, fromList);
|
||||||
|
KeyValue newKV = new KeyValue(kv.getRow(), 0, kv.getRowLength(), kv.getFamily(), 0,
|
||||||
|
kv.getFamilyLength(), kv.getQualifier(), 0, kv.getQualifierLength(),
|
||||||
|
kv.getTimestamp(), KeyValue.Type.codeToType(kv.getType()), kv.getValue(), 0,
|
||||||
|
kv.getValueLength(), tagList);
|
||||||
|
((List<Cell>) updatedCells).add(newcell);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
m.getFamilyCellMap().remove(cf);
|
||||||
|
// Update the family map
|
||||||
|
m.getFamilyCellMap().put(cf, updatedCells);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public static class TestCoprocessorForTagsAtSink extends BaseRegionObserver {
|
||||||
|
public static List<Tag> tags = null;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void postGetOp(ObserverContext<RegionCoprocessorEnvironment> e, Get get,
|
||||||
|
List<Cell> results) throws IOException {
|
||||||
|
if (results.size() > 0) {
|
||||||
|
// Check tag presence in the 1st cell in 1st Result
|
||||||
|
if (!results.isEmpty()) {
|
||||||
|
Cell cell = results.get(0);
|
||||||
|
tags = Tag.asList(cell.getTagsArray(), cell.getTagsOffset(), cell.getTagsLength());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An extn of VisibilityReplicationEndpoint to verify the tags that are replicated
|
||||||
|
*/
|
||||||
|
public static class VisibilityReplicationEndPointForTest extends VisibilityReplicationEndpoint {
|
||||||
|
static AtomicInteger replicateCount = new AtomicInteger();
|
||||||
|
static volatile List<Entry> lastEntries = null;
|
||||||
|
|
||||||
|
public VisibilityReplicationEndPointForTest(ReplicationEndpoint endpoint,
|
||||||
|
VisibilityLabelService visibilityLabelsService) {
|
||||||
|
super(endpoint, visibilityLabelsService);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean replicate(ReplicateContext replicateContext) {
|
||||||
|
boolean ret = super.replicate(replicateContext);
|
||||||
|
lastEntries = replicateContext.getEntries();
|
||||||
|
replicateCount.incrementAndGet();
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue