| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.hadoop.yarn.server.security; |
| |
| import java.util.HashMap; |
| import java.util.Map; |
| import java.util.Map.Entry; |
| import java.util.concurrent.ConcurrentHashMap; |
| import java.util.concurrent.ConcurrentMap; |
| |
| import org.apache.commons.logging.Log; |
| import org.apache.commons.logging.LogFactory; |
| import org.apache.hadoop.classification.InterfaceAudience; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.security.AccessControlException; |
| import org.apache.hadoop.security.UserGroupInformation; |
| import org.apache.hadoop.security.authorize.AccessControlList; |
| import org.apache.hadoop.yarn.api.records.ApplicationId; |
| import org.apache.hadoop.yarn.api.records.ApplicationAccessType; |
| import org.apache.hadoop.yarn.conf.YarnConfiguration; |
| import org.apache.hadoop.yarn.security.AdminACLsManager; |
| |
| @InterfaceAudience.Private |
| public class ApplicationACLsManager { |
| |
| private static final Log LOG = LogFactory |
| .getLog(ApplicationACLsManager.class); |
| |
| private final Configuration conf; |
| private final AdminACLsManager adminAclsManager; |
| private final ConcurrentMap<ApplicationId, Map<ApplicationAccessType, AccessControlList>> applicationACLS |
| = new ConcurrentHashMap<ApplicationId, Map<ApplicationAccessType, AccessControlList>>(); |
| |
| public ApplicationACLsManager(Configuration conf) { |
| this.conf = conf; |
| this.adminAclsManager = new AdminACLsManager(this.conf); |
| } |
| |
| public boolean areACLsEnabled() { |
| return adminAclsManager.areACLsEnabled(); |
| } |
| |
| public void addApplication(ApplicationId appId, |
| Map<ApplicationAccessType, String> acls) { |
| Map<ApplicationAccessType, AccessControlList> finalMap |
| = new HashMap<ApplicationAccessType, AccessControlList>(acls.size()); |
| for (Entry<ApplicationAccessType, String> acl : acls.entrySet()) { |
| finalMap.put(acl.getKey(), new AccessControlList(acl.getValue())); |
| } |
| this.applicationACLS.put(appId, finalMap); |
| } |
| |
| public void removeApplication(ApplicationId appId) { |
| this.applicationACLS.remove(appId); |
| } |
| |
| /** |
| * If authorization is enabled, checks whether the user (in the callerUGI) is |
| * authorized to perform the access specified by 'applicationAccessType' on |
| * the application by checking if the user is applicationOwner or part of |
| * application ACL for the specific access-type. |
| * <ul> |
| * <li>The owner of the application can have all access-types on the |
| * application</li> |
| * <li>For all other users/groups application-acls are checked</li> |
| * </ul> |
| * |
| * @param callerUGI |
| * @param applicationAccessType |
| * @param applicationOwner |
| * @param applicationId |
| * @throws AccessControlException |
| */ |
| public boolean checkAccess(UserGroupInformation callerUGI, |
| ApplicationAccessType applicationAccessType, String applicationOwner, |
| ApplicationId applicationId) { |
| |
| if (LOG.isDebugEnabled()) { |
| LOG.debug("Verifying access-type " + applicationAccessType + " for " |
| + callerUGI + " on application " + applicationId + " owned by " |
| + applicationOwner); |
| } |
| |
| String user = callerUGI.getShortUserName(); |
| if (!areACLsEnabled()) { |
| return true; |
| } |
| |
| AccessControlList applicationACL = this.applicationACLS |
| .get(applicationId).get(applicationAccessType); |
| if (applicationACL == null) { |
| if (LOG.isDebugEnabled()) { |
| LOG.debug("ACL not found for access-type " + applicationAccessType |
| + " for application " + applicationId + " owned by " |
| + applicationOwner + ". Using default [" |
| + YarnConfiguration.DEFAULT_YARN_APP_ACL + "]"); |
| } |
| applicationACL = |
| new AccessControlList(YarnConfiguration.DEFAULT_YARN_APP_ACL); |
| } |
| |
| // Allow application-owner for any type of access on the application |
| if (this.adminAclsManager.isAdmin(callerUGI) |
| || user.equals(applicationOwner) |
| || applicationACL.isUserAllowed(callerUGI)) { |
| return true; |
| } |
| return false; |
| } |
| } |