blob: dab7afe49ef0eb5b251e7ab0b1be1de37b07041e [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.iotdb.db.auth;
import org.apache.iotdb.common.rpc.thrift.TSStatus;
import org.apache.iotdb.commons.auth.AuthException;
import org.apache.iotdb.commons.auth.entity.PrivilegeType;
import org.apache.iotdb.commons.conf.CommonDescriptor;
import org.apache.iotdb.commons.path.PartialPath;
import org.apache.iotdb.commons.utils.AuthUtils;
import org.apache.iotdb.db.conf.OperationType;
import org.apache.iotdb.db.mpp.plan.constant.StatementType;
import org.apache.iotdb.db.mpp.plan.statement.Statement;
import org.apache.iotdb.db.mpp.plan.statement.sys.AuthorStatement;
import org.apache.iotdb.db.qp.logical.Operator;
import org.apache.iotdb.db.query.control.SessionManager;
import org.apache.iotdb.rpc.RpcUtils;
import org.apache.iotdb.rpc.TSStatusCode;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import java.util.ArrayList;
import java.util.List;
import static org.apache.iotdb.db.utils.ErrorHandlingUtils.onNPEOrUnexpectedException;
public class AuthorityChecker {
private static final String SUPER_USER =
CommonDescriptor.getInstance().getConfig().getAdminName();
private static final Logger logger = LoggerFactory.getLogger(AuthorityChecker.class);
private static AuthorizerManager authorizerManager = AuthorizerManager.getInstance();
private static SessionManager sessionManager = SessionManager.getInstance();
private AuthorityChecker() {}
/**
* check permission.
*
* @param username username
* @param paths paths in List structure
* @param type Operator type
* @param targetUser target user
* @return if permission-check is passed
* @throws AuthException Authentication Exception
*/
public static boolean check(
String username,
List<? extends PartialPath> paths,
Operator.OperatorType type,
String targetUser)
throws AuthException {
if (SUPER_USER.equals(username)) {
return true;
}
int permission = translateToPermissionId(type);
if (permission == -1) {
return false;
} else if (permission == PrivilegeType.MODIFY_PASSWORD.ordinal()
&& username.equals(targetUser)) {
// a user can modify his own password
return true;
}
if (paths != null && !paths.isEmpty()) {
for (PartialPath path : paths) {
if (!checkOnePath(username, path, permission)) {
return false;
}
}
} else {
return checkOnePath(username, null, permission);
}
return true;
}
/**
* check permission(datanode to confignode).
*
* @param username username
* @param paths paths in List structure
* @param type Statement Type
* @param targetUser target user
* @return if permission-check is passed
*/
public static boolean checkPermission(
String username, List<? extends PartialPath> paths, StatementType type, String targetUser) {
if (SUPER_USER.equals(username)) {
return true;
}
int permission = translateToPermissionId(type);
if (permission == -1) {
return false;
} else if (permission == PrivilegeType.MODIFY_PASSWORD.ordinal()
&& username.equals(targetUser)) {
// a user can modify his own password
return true;
}
List<String> allPath = new ArrayList<>();
if (paths != null && !paths.isEmpty()) {
for (PartialPath path : paths) {
allPath.add(path == null ? AuthUtils.ROOT_PATH_PRIVILEGE : path.getFullPath());
}
} else {
allPath.add(AuthUtils.ROOT_PATH_PRIVILEGE);
}
TSStatus status = authorizerManager.checkPath(username, allPath, permission);
if (status.getCode() == TSStatusCode.SUCCESS_STATUS.getStatusCode()) {
return true;
} else {
return false;
}
}
private static boolean checkOnePath(String username, PartialPath path, int permission)
throws AuthException {
try {
String fullPath = path == null ? AuthUtils.ROOT_PATH_PRIVILEGE : path.getFullPath();
if (authorizerManager.checkUserPrivileges(username, fullPath, permission)) {
return true;
}
} catch (AuthException e) {
logger.error("Error occurs when checking the seriesPath {} for user {}", path, username, e);
throw new AuthException(e);
}
return false;
}
/** Check whether specific Session has the authorization to given plan. */
public static TSStatus checkAuthority(Statement statement, long sessionId) {
try {
if (!checkAuthorization(statement, sessionManager.getUsername(sessionId))) {
return RpcUtils.getStatus(
TSStatusCode.NO_PERMISSION_ERROR,
"No permissions for this operation " + statement.getType());
}
} catch (AuthException e) {
logger.warn("meet error while checking authorization.", e);
return RpcUtils.getStatus(TSStatusCode.UNINITIALIZED_AUTH_ERROR, e.getMessage());
} catch (Exception e) {
return onNPEOrUnexpectedException(
e, OperationType.CHECK_AUTHORITY, TSStatusCode.EXECUTE_STATEMENT_ERROR);
}
return RpcUtils.getStatus(TSStatusCode.SUCCESS_STATUS);
}
/** Check whether specific user has the authorization to given plan. */
public static boolean checkAuthorization(Statement statement, String username)
throws AuthException {
if (!statement.isAuthenticationRequired()) {
return true;
}
String targetUser = null;
if (statement instanceof AuthorStatement) {
targetUser = ((AuthorStatement) statement).getUserName();
}
return AuthorityChecker.checkPermission(
username, statement.getPaths(), statement.getType(), targetUser);
}
private static int translateToPermissionId(Operator.OperatorType type) {
switch (type) {
case GRANT_ROLE_PRIVILEGE:
return PrivilegeType.GRANT_ROLE_PRIVILEGE.ordinal();
case CREATE_ROLE:
return PrivilegeType.CREATE_ROLE.ordinal();
case CREATE_USER:
return PrivilegeType.CREATE_USER.ordinal();
case MODIFY_PASSWORD:
return PrivilegeType.MODIFY_PASSWORD.ordinal();
case GRANT_USER_PRIVILEGE:
return PrivilegeType.GRANT_USER_PRIVILEGE.ordinal();
case REVOKE_ROLE_PRIVILEGE:
return PrivilegeType.REVOKE_ROLE_PRIVILEGE.ordinal();
case REVOKE_USER_PRIVILEGE:
return PrivilegeType.REVOKE_USER_PRIVILEGE.ordinal();
case GRANT_USER_ROLE:
return PrivilegeType.GRANT_USER_ROLE.ordinal();
case DELETE_USER:
return PrivilegeType.DELETE_USER.ordinal();
case DELETE_ROLE:
return PrivilegeType.DELETE_ROLE.ordinal();
case REVOKE_USER_ROLE:
return PrivilegeType.REVOKE_USER_ROLE.ordinal();
case SET_STORAGE_GROUP:
return PrivilegeType.SET_STORAGE_GROUP.ordinal();
case DELETE_STORAGE_GROUP:
return PrivilegeType.DELETE_STORAGE_GROUP.ordinal();
case CREATE_TIMESERIES:
case CREATE_ALIGNED_TIMESERIES:
return PrivilegeType.CREATE_TIMESERIES.ordinal();
case DELETE_TIMESERIES:
case DELETE:
case DROP_INDEX:
return PrivilegeType.DELETE_TIMESERIES.ordinal();
case ALTER_TIMESERIES:
return PrivilegeType.ALTER_TIMESERIES.ordinal();
case SHOW:
case QUERY:
case GROUP_BY_TIME:
case QUERY_INDEX:
case AGGREGATION:
case UDAF:
case UDTF:
case LAST:
case FILL:
case GROUP_BY_FILL:
case SELECT_INTO:
return PrivilegeType.READ_TIMESERIES.ordinal();
case INSERT:
case LOAD_DATA:
case CREATE_INDEX:
case BATCH_INSERT:
case BATCH_INSERT_ONE_DEVICE:
case BATCH_INSERT_ROWS:
case MULTI_BATCH_INSERT:
return PrivilegeType.INSERT_TIMESERIES.ordinal();
case LIST_ROLE:
case LIST_ROLE_USERS:
case LIST_ROLE_PRIVILEGE:
return PrivilegeType.LIST_ROLE.ordinal();
case LIST_USER:
case LIST_USER_ROLES:
case LIST_USER_PRIVILEGE:
return PrivilegeType.LIST_USER.ordinal();
case CREATE_FUNCTION:
return PrivilegeType.CREATE_FUNCTION.ordinal();
case DROP_FUNCTION:
return PrivilegeType.DROP_FUNCTION.ordinal();
case CREATE_TRIGGER:
return PrivilegeType.CREATE_TRIGGER.ordinal();
case DROP_TRIGGER:
return PrivilegeType.DROP_TRIGGER.ordinal();
case START_TRIGGER:
return PrivilegeType.START_TRIGGER.ordinal();
case STOP_TRIGGER:
return PrivilegeType.STOP_TRIGGER.ordinal();
case CREATE_CONTINUOUS_QUERY:
return PrivilegeType.CREATE_CONTINUOUS_QUERY.ordinal();
case DROP_CONTINUOUS_QUERY:
return PrivilegeType.DROP_CONTINUOUS_QUERY.ordinal();
default:
logger.error("Unrecognizable operator type ({}) for AuthorityChecker.", type);
return -1;
}
}
private static int translateToPermissionId(StatementType type) {
switch (type) {
case GRANT_ROLE_PRIVILEGE:
return PrivilegeType.GRANT_ROLE_PRIVILEGE.ordinal();
case CREATE_ROLE:
return PrivilegeType.CREATE_ROLE.ordinal();
case CREATE_USER:
return PrivilegeType.CREATE_USER.ordinal();
case MODIFY_PASSWORD:
return PrivilegeType.MODIFY_PASSWORD.ordinal();
case GRANT_USER_PRIVILEGE:
return PrivilegeType.GRANT_USER_PRIVILEGE.ordinal();
case REVOKE_ROLE_PRIVILEGE:
return PrivilegeType.REVOKE_ROLE_PRIVILEGE.ordinal();
case REVOKE_USER_PRIVILEGE:
return PrivilegeType.REVOKE_USER_PRIVILEGE.ordinal();
case GRANT_USER_ROLE:
return PrivilegeType.GRANT_USER_ROLE.ordinal();
case DELETE_USER:
return PrivilegeType.DELETE_USER.ordinal();
case DELETE_ROLE:
return PrivilegeType.DELETE_ROLE.ordinal();
case REVOKE_USER_ROLE:
return PrivilegeType.REVOKE_USER_ROLE.ordinal();
case SET_STORAGE_GROUP:
return PrivilegeType.SET_STORAGE_GROUP.ordinal();
case DELETE_STORAGE_GROUP:
return PrivilegeType.DELETE_STORAGE_GROUP.ordinal();
case CREATE_TIMESERIES:
case CREATE_ALIGNED_TIMESERIES:
return PrivilegeType.CREATE_TIMESERIES.ordinal();
case DELETE_TIMESERIES:
case DELETE:
case DROP_INDEX:
return PrivilegeType.DELETE_TIMESERIES.ordinal();
case ALTER_TIMESERIES:
return PrivilegeType.ALTER_TIMESERIES.ordinal();
case SHOW:
case QUERY:
case GROUP_BY_TIME:
case QUERY_INDEX:
case AGGREGATION:
case UDAF:
case UDTF:
case LAST:
case FILL:
case GROUP_BY_FILL:
case SELECT_INTO:
return PrivilegeType.READ_TIMESERIES.ordinal();
case INSERT:
case LOAD_DATA:
case CREATE_INDEX:
case BATCH_INSERT:
case BATCH_INSERT_ONE_DEVICE:
case BATCH_INSERT_ROWS:
case MULTI_BATCH_INSERT:
return PrivilegeType.INSERT_TIMESERIES.ordinal();
case LIST_ROLE:
case LIST_ROLE_USERS:
case LIST_ROLE_PRIVILEGE:
return PrivilegeType.LIST_ROLE.ordinal();
case LIST_USER:
case LIST_USER_ROLES:
case LIST_USER_PRIVILEGE:
return PrivilegeType.LIST_USER.ordinal();
case CREATE_FUNCTION:
return PrivilegeType.CREATE_FUNCTION.ordinal();
case DROP_FUNCTION:
return PrivilegeType.DROP_FUNCTION.ordinal();
case CREATE_TRIGGER:
return PrivilegeType.CREATE_TRIGGER.ordinal();
case DROP_TRIGGER:
return PrivilegeType.DROP_TRIGGER.ordinal();
case START_TRIGGER:
return PrivilegeType.START_TRIGGER.ordinal();
case STOP_TRIGGER:
return PrivilegeType.STOP_TRIGGER.ordinal();
case CREATE_CONTINUOUS_QUERY:
return PrivilegeType.CREATE_CONTINUOUS_QUERY.ordinal();
case DROP_CONTINUOUS_QUERY:
return PrivilegeType.DROP_CONTINUOUS_QUERY.ordinal();
case CREATE_TEMPLATE:
return PrivilegeType.UPDATE_TEMPLATE.ordinal();
case SET_TEMPLATE:
case ACTIVATE_TEMPLATE:
return PrivilegeType.APPLY_TEMPLATE.ordinal();
case SHOW_SCHEMA_TEMPLATE:
case SHOW_NODES_IN_SCHEMA_TEMPLATE:
return PrivilegeType.READ_TEMPLATE.ordinal();
case SHOW_PATH_SET_SCHEMA_TEMPLATE:
case SHOW_PATH_USING_SCHEMA_TEMPLATE:
return PrivilegeType.READ_TEMPLATE_APPLICATION.ordinal();
default:
logger.error("Unrecognizable operator type ({}) for AuthorityChecker.", type);
return -1;
}
}
}