| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.hadoop.security.authorize; |
| |
| import java.util.Arrays; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.util.StringUtils; |
| import org.apache.hadoop.security.UserGroupInformation; |
| |
| import org.junit.Test; |
| import static org.junit.Assert.*; |
| |
| public class TestProxyUsers { |
| private static final String REAL_USER_NAME = "proxier"; |
| private static final String PROXY_USER_NAME = "proxied_user"; |
| private static final String[] GROUP_NAMES = |
| new String[] { "foo_group" }; |
| private static final String[] OTHER_GROUP_NAMES = |
| new String[] { "bar_group" }; |
| private static final String PROXY_IP = "1.2.3.4"; |
| |
| @Test |
| public void testProxyUsers() throws Exception { |
| Configuration conf = new Configuration(); |
| conf.set( |
| ProxyUsers.getProxySuperuserGroupConfKey(REAL_USER_NAME), |
| StringUtils.join(",", Arrays.asList(GROUP_NAMES))); |
| conf.set( |
| ProxyUsers.getProxySuperuserIpConfKey(REAL_USER_NAME), |
| PROXY_IP); |
| ProxyUsers.refreshSuperUserGroupsConfiguration(conf); |
| |
| |
| // First try proxying a group that's allowed |
| UserGroupInformation realUserUgi = UserGroupInformation |
| .createRemoteUser(REAL_USER_NAME); |
| UserGroupInformation proxyUserUgi = UserGroupInformation.createProxyUserForTesting( |
| PROXY_USER_NAME, realUserUgi, GROUP_NAMES); |
| |
| // From good IP |
| assertAuthorized(proxyUserUgi, "1.2.3.4"); |
| // From bad IP |
| assertNotAuthorized(proxyUserUgi, "1.2.3.5"); |
| |
| // Now try proxying a group that's not allowed |
| realUserUgi = UserGroupInformation.createRemoteUser(REAL_USER_NAME); |
| proxyUserUgi = UserGroupInformation.createProxyUserForTesting( |
| PROXY_USER_NAME, realUserUgi, OTHER_GROUP_NAMES); |
| |
| // From good IP |
| assertNotAuthorized(proxyUserUgi, "1.2.3.4"); |
| // From bad IP |
| assertNotAuthorized(proxyUserUgi, "1.2.3.5"); |
| } |
| |
| @Test |
| public void testWildcardGroup() { |
| Configuration conf = new Configuration(); |
| conf.set( |
| ProxyUsers.getProxySuperuserGroupConfKey(REAL_USER_NAME), |
| "*"); |
| conf.set( |
| ProxyUsers.getProxySuperuserIpConfKey(REAL_USER_NAME), |
| PROXY_IP); |
| ProxyUsers.refreshSuperUserGroupsConfiguration(conf); |
| |
| // First try proxying a group that's allowed |
| UserGroupInformation realUserUgi = UserGroupInformation |
| .createRemoteUser(REAL_USER_NAME); |
| UserGroupInformation proxyUserUgi = UserGroupInformation.createProxyUserForTesting( |
| PROXY_USER_NAME, realUserUgi, GROUP_NAMES); |
| |
| // From good IP |
| assertAuthorized(proxyUserUgi, "1.2.3.4"); |
| // From bad IP |
| assertNotAuthorized(proxyUserUgi, "1.2.3.5"); |
| |
| // Now try proxying a different group (just to make sure we aren't getting spill over |
| // from the other test case!) |
| realUserUgi = UserGroupInformation.createRemoteUser(REAL_USER_NAME); |
| proxyUserUgi = UserGroupInformation.createProxyUserForTesting( |
| PROXY_USER_NAME, realUserUgi, OTHER_GROUP_NAMES); |
| |
| // From good IP |
| assertAuthorized(proxyUserUgi, "1.2.3.4"); |
| // From bad IP |
| assertNotAuthorized(proxyUserUgi, "1.2.3.5"); |
| } |
| |
| @Test |
| public void testWildcardIP() { |
| Configuration conf = new Configuration(); |
| conf.set( |
| ProxyUsers.getProxySuperuserGroupConfKey(REAL_USER_NAME), |
| StringUtils.join(",", Arrays.asList(GROUP_NAMES))); |
| conf.set( |
| ProxyUsers.getProxySuperuserIpConfKey(REAL_USER_NAME), |
| "*"); |
| ProxyUsers.refreshSuperUserGroupsConfiguration(conf); |
| |
| // First try proxying a group that's allowed |
| UserGroupInformation realUserUgi = UserGroupInformation |
| .createRemoteUser(REAL_USER_NAME); |
| UserGroupInformation proxyUserUgi = UserGroupInformation.createProxyUserForTesting( |
| PROXY_USER_NAME, realUserUgi, GROUP_NAMES); |
| |
| // From either IP should be fine |
| assertAuthorized(proxyUserUgi, "1.2.3.4"); |
| assertAuthorized(proxyUserUgi, "1.2.3.5"); |
| |
| // Now set up an unallowed group |
| realUserUgi = UserGroupInformation.createRemoteUser(REAL_USER_NAME); |
| proxyUserUgi = UserGroupInformation.createProxyUserForTesting( |
| PROXY_USER_NAME, realUserUgi, OTHER_GROUP_NAMES); |
| |
| // Neither IP should be OK |
| assertNotAuthorized(proxyUserUgi, "1.2.3.4"); |
| assertNotAuthorized(proxyUserUgi, "1.2.3.5"); |
| } |
| |
| private void assertNotAuthorized(UserGroupInformation proxyUgi, String host) { |
| try { |
| ProxyUsers.authorize(proxyUgi, host, null); |
| fail("Allowed authorization of " + proxyUgi + " from " + host); |
| } catch (AuthorizationException e) { |
| // Expected |
| } |
| } |
| |
| private void assertAuthorized(UserGroupInformation proxyUgi, String host) { |
| try { |
| ProxyUsers.authorize(proxyUgi, host, null); |
| } catch (AuthorizationException e) { |
| fail("Did not allowed authorization of " + proxyUgi + " from " + host); |
| } |
| } |
| } |