blob: e34fc3172bd6a61b8ed870ced2b29f33e7b59ef9 [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.hadoop.hdfsproxy;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.CommonConfigurationKeys;
import org.apache.hadoop.security.UserGroupInformation;
import javax.servlet.FilterConfig;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import java.io.IOException;
/**
* This filter is required for hdfsproxies connecting to HDFS
* with kerberos authentication. Keytab file and principal to
* use for proxy user is retrieved from a configuration file.
* If user attribute in ldap doesn't kerberos realm, the
* default realm is picked up from configuration.
*/
public class KerberosAuthorizationFilter
extends AuthorizationFilter {
private String defaultRealm;
@Override
public void init(FilterConfig filterConfig) throws ServletException {
super.init(filterConfig);
Configuration conf = new Configuration(false);
conf.addResource("hdfsproxy-default.xml");
conf.addResource("hdfsproxy-site.xml");
initializeUGI(conf);
initDefaultRealm(conf);
}
private void initializeUGI(Configuration conf) {
try {
conf.set(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION,
"kerberos");
UserGroupInformation.setConfiguration(conf);
UserGroupInformation.loginUserFromKeytab(
conf.get("hdfsproxy.kerberos.principal"),
conf.get("hdfsproxy.kerberos.keytab"));
LOG.info("Logged in user: " +
UserGroupInformation.getLoginUser().getUserName() +
", Current User: " + UserGroupInformation.getCurrentUser().getUserName());
} catch (IOException e) {
throw new RuntimeException("Unable to initialize credentials", e);
}
}
private void initDefaultRealm(Configuration conf) {
defaultRealm = conf.get("hdfsproxy.kerberos.default.realm","");
}
@Override
/** If the userid does not have realm, add the default realm */
protected String getUserId(ServletRequest request) {
String userId = (String) request.
getAttribute("org.apache.hadoop.hdfsproxy.authorized.userID");
return userId +
(userId.indexOf('@') > 0 ? "" : defaultRealm);
}
}