| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.hadoop.security.authorize; |
| |
| import java.net.InetAddress; |
| import java.net.UnknownHostException; |
| import java.util.Collection; |
| import java.util.HashMap; |
| import java.util.Map; |
| import java.util.Map.Entry; |
| |
| import org.apache.hadoop.classification.InterfaceAudience; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.security.UserGroupInformation; |
| import org.apache.hadoop.util.StringUtils; |
| |
| @InterfaceAudience.Private |
| public class ProxyUsers { |
| |
| private static final String CONF_HOSTS = ".hosts"; |
| public static final String CONF_GROUPS = ".groups"; |
| public static final String CONF_HADOOP_PROXYUSER = "hadoop.proxyuser."; |
| public static final String CONF_HADOOP_PROXYUSER_RE = "hadoop\\.proxyuser\\."; |
| private static boolean init = false; |
| // list of groups and hosts per proxyuser |
| private static Map<String, Collection<String>> proxyGroups = |
| new HashMap<String, Collection<String>>(); |
| private static Map<String, Collection<String>> proxyHosts = |
| new HashMap<String, Collection<String>>(); |
| |
| /** |
| * reread the conf and get new values for "hadoop.proxyuser.*.groups/hosts" |
| */ |
| public static void refreshSuperUserGroupsConfiguration() { |
| //load server side configuration; |
| refreshSuperUserGroupsConfiguration(new Configuration()); |
| } |
| |
| /** |
| * refresh configuration |
| * @param conf |
| */ |
| public static synchronized void refreshSuperUserGroupsConfiguration(Configuration conf) { |
| |
| // remove alle existing stuff |
| proxyGroups.clear(); |
| proxyHosts.clear(); |
| |
| // get all the new keys for groups |
| String regex = CONF_HADOOP_PROXYUSER_RE+"[^.]*\\"+CONF_GROUPS; |
| Map<String,String> allMatchKeys = conf.getValByRegex(regex); |
| for(Entry<String, String> entry : allMatchKeys.entrySet()) { |
| proxyGroups.put(entry.getKey(), |
| StringUtils.getStringCollection(entry.getValue())); |
| } |
| |
| // now hosts |
| regex = CONF_HADOOP_PROXYUSER_RE+"[^.]*\\"+CONF_HOSTS; |
| allMatchKeys = conf.getValByRegex(regex); |
| for(Entry<String, String> entry : allMatchKeys.entrySet()) { |
| proxyHosts.put(entry.getKey(), |
| StringUtils.getStringCollection(entry.getValue())); |
| } |
| |
| init = true; |
| } |
| |
| /** |
| * Returns configuration key for effective user groups allowed for a superuser |
| * |
| * @param userName name of the superuser |
| * @return configuration key for superuser groups |
| */ |
| public static String getProxySuperuserGroupConfKey(String userName) { |
| return ProxyUsers.CONF_HADOOP_PROXYUSER+userName+ProxyUsers.CONF_GROUPS; |
| } |
| |
| /** |
| * Return configuration key for superuser ip addresses |
| * |
| * @param userName name of the superuser |
| * @return configuration key for superuser ip-addresses |
| */ |
| public static String getProxySuperuserIpConfKey(String userName) { |
| return ProxyUsers.CONF_HADOOP_PROXYUSER+userName+ProxyUsers.CONF_HOSTS; |
| } |
| |
| /** |
| * Authorize the superuser which is doing doAs |
| * |
| * @param user ugi of the effective or proxy user which contains a real user |
| * @param remoteAddress the ip address of client |
| * @param newConf configuration |
| * @throws AuthorizationException |
| */ |
| public static synchronized void authorize(UserGroupInformation user, |
| String remoteAddress, Configuration newConf) throws AuthorizationException { |
| |
| if(!init) { |
| refreshSuperUserGroupsConfiguration(); |
| } |
| |
| if (user.getRealUser() == null) { |
| return; |
| } |
| boolean groupAuthorized = false; |
| boolean ipAuthorized = false; |
| UserGroupInformation superUser = user.getRealUser(); |
| |
| Collection<String> allowedUserGroups = proxyGroups.get( |
| getProxySuperuserGroupConfKey(superUser.getShortUserName())); |
| |
| if (isWildcardList(allowedUserGroups)) { |
| groupAuthorized = true; |
| } else if (allowedUserGroups != null && !allowedUserGroups.isEmpty()) { |
| for (String group : user.getGroupNames()) { |
| if (allowedUserGroups.contains(group)) { |
| groupAuthorized = true; |
| break; |
| } |
| } |
| } |
| |
| if (!groupAuthorized) { |
| throw new AuthorizationException("User: " + superUser.getUserName() |
| + " is not allowed to impersonate " + user.getUserName()); |
| } |
| |
| Collection<String> ipList = proxyHosts.get( |
| getProxySuperuserIpConfKey(superUser.getShortUserName())); |
| |
| if (isWildcardList(ipList)) { |
| ipAuthorized = true; |
| } else if (ipList != null && !ipList.isEmpty()) { |
| for (String allowedHost : ipList) { |
| InetAddress hostAddr; |
| try { |
| hostAddr = InetAddress.getByName(allowedHost); |
| } catch (UnknownHostException e) { |
| continue; |
| } |
| if (hostAddr.getHostAddress().equals(remoteAddress)) { |
| // Authorization is successful |
| ipAuthorized = true; |
| } |
| } |
| } |
| if(!ipAuthorized) { |
| throw new AuthorizationException("Unauthorized connection for super-user: " |
| + superUser.getUserName() + " from IP " + remoteAddress); |
| } |
| } |
| |
| /** |
| * Return true if the configuration specifies the special configuration value |
| * "*", indicating that any group or host list is allowed to use this configuration. |
| */ |
| private static boolean isWildcardList(Collection<String> list) { |
| return (list != null) && |
| (list.size() == 1) && |
| (list.contains("*")); |
| } |
| |
| } |