blob: 5726c0e834e6e5ad47f47f3337d9317ee1366955 [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.sentry.hdfs;
import java.util.ArrayList;
import java.util.List;
import java.util.Map;
import java.util.Set;
import java.util.concurrent.atomic.AtomicLong;
import java.util.concurrent.locks.ReadWriteLock;
import com.google.common.collect.ImmutableMap;
import org.apache.hadoop.fs.permission.AclEntry;
import org.apache.hadoop.fs.permission.FsAction;
import org.apache.sentry.hdfs.SentryPermissions.PrivilegeInfo;
import org.apache.sentry.hdfs.SentryPermissions.RoleInfo;
import org.apache.sentry.hdfs.service.thrift.TPrivilegePrincipal;
import org.apache.sentry.hdfs.service.thrift.TPrivilegePrincipalType;
import org.apache.sentry.hdfs.service.thrift.TPrivilegeChanges;
import org.apache.sentry.hdfs.service.thrift.TRoleChanges;
import org.apache.sentry.hdfs.service.thrift.sentry_hdfs_serviceConstants;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import static org.apache.sentry.hdfs.ServiceConstants.SEQUENCE_NUMBER_UPDATE_UNINITIALIZED;
public class UpdateableAuthzPermissions implements AuthzPermissions, Updateable<PermissionsUpdate> {
private static final ImmutableMap<String, FsAction> ACTION_MAPPING = ImmutableMap.<String, FsAction>builder()
.put("ALL", FsAction.ALL)
.put("*", FsAction.ALL)
.put("SELECT", FsAction.READ_EXECUTE)
.put("INSERT", FsAction.WRITE_EXECUTE)
.build();
private static final int MAX_UPDATES_PER_LOCK_USE = 99;
private static final String UPDATABLE_TYPE_NAME = "perm_authz_update";
private static final Logger LOG = LoggerFactory.getLogger(UpdateableAuthzPermissions.class);
private final SentryPermissions perms = new SentryPermissions();
private final AtomicLong seqNum = new AtomicLong(SEQUENCE_NUMBER_UPDATE_UNINITIALIZED);
@Override
public List<AclEntry> getAcls(String authzObj) {
return perms.getAcls(authzObj);
}
@Override
public UpdateableAuthzPermissions updateFull(PermissionsUpdate update) {
UpdateableAuthzPermissions other = new UpdateableAuthzPermissions();
other.applyPartialUpdate(update);
other.seqNum.set(update.getSeqNum());
return other;
}
@Override
public void updatePartial(Iterable<PermissionsUpdate> updates, ReadWriteLock lock) {
lock.writeLock().lock();
try {
int counter = 0;
for (PermissionsUpdate update : updates) {
applyPartialUpdate(update);
if (++counter > MAX_UPDATES_PER_LOCK_USE) {
counter = 0;
lock.writeLock().unlock();
lock.writeLock().lock();
}
seqNum.set(update.getSeqNum());
LOG.debug("##### Updated perms seq Num [" + seqNum.get() + "]");
}
} finally {
lock.writeLock().unlock();
}
}
private void applyPartialUpdate(PermissionsUpdate update) {
applyPrivilegeUpdates(update);
applyRoleUpdates(update);
}
private void applyRoleUpdates(PermissionsUpdate update) {
for (TRoleChanges rUpdate : update.getRoleUpdates()) {
if (rUpdate.getRole().equals(PermissionsUpdate.ALL_ROLES)) {
// Request to remove group from all roles
String groupToRemove = rUpdate.getDelGroups().iterator().next();
for (RoleInfo rInfo : perms.getAllRoles()) {
rInfo.delGroup(groupToRemove);
}
}
RoleInfo rInfo = perms.getRoleInfo(rUpdate.getRole());
for (String group : rUpdate.getAddGroups()) {
if (rInfo == null) {
rInfo = new RoleInfo(rUpdate.getRole());
}
rInfo.addGroup(group);
}
if (rInfo != null) {
perms.addRoleInfo(rInfo);
for (String group : rUpdate.getDelGroups()) {
if (group.equals(PermissionsUpdate.ALL_GROUPS)) {
perms.delRoleInfo(rInfo.getRole());
break;
}
// If there are no groups to remove, rUpdate.getDelGroups() will
// return empty list and this code will not be reached
rInfo.delGroup(group);
}
}
}
}
private void applyPrivilegeUpdates(PermissionsUpdate update) {
TPrivilegePrincipal addPrivEntity, delPrivEntity;
for (TPrivilegeChanges pUpdate : update.getPrivilegeUpdates()) {
if (pUpdate.getAuthzObj().equals(PermissionsUpdate.RENAME_PRIVS)) {
addPrivEntity = pUpdate.getAddPrivileges().keySet().iterator().next();
delPrivEntity = pUpdate.getDelPrivileges().keySet().iterator().next();
if(addPrivEntity.getType() != TPrivilegePrincipalType.AUTHZ_OBJ ||
delPrivEntity.getType() != TPrivilegePrincipalType.AUTHZ_OBJ) {
LOG.warn("Invalid Permission Update, Received Rename update with wrong data, (Add) Type: {}, Value:{} " +
"(Del) Type: {}, Value:{}", addPrivEntity.getType(), addPrivEntity.getValue(),
delPrivEntity.getType(), delPrivEntity.getValue());
continue;
}
String newAuthzObj = addPrivEntity.getValue();
String oldAuthzObj = delPrivEntity.getValue();
PrivilegeInfo privilegeInfo = perms.getPrivilegeInfo(oldAuthzObj);
// The privilegeInfo object can be null if no explicit Privileges
// have been granted on the object. For eg. If grants have been applied on
// Db, but no explicit grants on Table.. then the authzObject associated
// with the table will never exist.
if (privilegeInfo != null) {
Map<TPrivilegePrincipal, FsAction> allPermissions = privilegeInfo.getAllPermissions();
perms.delPrivilegeInfo(oldAuthzObj);
perms.removeParentChildMappings(oldAuthzObj);
PrivilegeInfo newPrivilegeInfo = new PrivilegeInfo(newAuthzObj);
for (Map.Entry<TPrivilegePrincipal, FsAction> e : allPermissions.entrySet()) {
newPrivilegeInfo.setPermission(e.getKey(), e.getValue());
}
perms.addPrivilegeInfo(newPrivilegeInfo);
perms.addParentChildMappings(newAuthzObj);
}
return;
}
if (pUpdate.getAuthzObj().equals(PermissionsUpdate.ALL_AUTHZ_OBJ)) {
// Request to remove role from all Privileges
delPrivEntity = pUpdate.getDelPrivileges().keySet().iterator().next();
for (PrivilegeInfo pInfo : perms.getAllPrivileges()) {
pInfo.removePermission(delPrivEntity);
}
}
PrivilegeInfo pInfo = perms.getPrivilegeInfo(pUpdate.getAuthzObj());
for (Map.Entry<TPrivilegePrincipal, String> aMap : pUpdate.getAddPrivileges().entrySet()) {
if (pInfo == null) {
pInfo = new PrivilegeInfo(pUpdate.getAuthzObj());
}
FsAction fsAction = pInfo.getPermission(aMap.getKey());
if (fsAction == null) {
fsAction = getFAction(aMap.getValue());
} else {
fsAction = fsAction.or(getFAction(aMap.getValue()));
}
pInfo.setPermission(aMap.getKey(), fsAction);
}
if (pInfo != null) {
perms.addPrivilegeInfo(pInfo);
perms.addParentChildMappings(pUpdate.getAuthzObj());
for (Map.Entry<TPrivilegePrincipal, String> dMap : pUpdate.getDelPrivileges().entrySet()) {
if (dMap.getKey().getValue().equals(PermissionsUpdate.ALL_PRIVS)) {
// Remove all privileges
perms.delPrivilegeInfo(pUpdate.getAuthzObj());
perms.removeParentChildMappings(pUpdate.getAuthzObj());
break;
}
List<PrivilegeInfo> parentAndChild = new ArrayList<>();
parentAndChild.add(pInfo);
Set<String> children = perms.getChildren(pInfo.getAuthzObj());
if (children != null) {
for (String child : children) {
parentAndChild.add(perms.getPrivilegeInfo(child));
}
}
// recursive revoke
for (PrivilegeInfo pInfo2 : parentAndChild) {
FsAction fsAction = pInfo2.getPermission(dMap.getKey());
if (fsAction != null) {
fsAction = fsAction.and(getFAction(dMap.getValue()).not());
if (FsAction.NONE == fsAction) {
pInfo2.removePermission(dMap.getKey());
} else {
pInfo2.setPermission(dMap.getKey(), fsAction);
}
}
}
}
}
}
}
private static FsAction getFAction(String sentryPriv) {
String[] strPrivs = sentryPriv.trim().split(",");
FsAction retVal = FsAction.NONE;
for (String strPriv : strPrivs) {
FsAction action = ACTION_MAPPING.get(strPriv.toUpperCase());
if (action == null) {
// Encountered a privilege that is not supported. Since we do not know what
// to do with it we just drop all access.
LOG.warn("Unsupported privilege {}, disabling all access", strPriv);
action = FsAction.NONE;
}
retVal = retVal.or(action);
}
return retVal;
}
@Override
public long getLastUpdatedSeqNum() {
return seqNum.get();
}
@Override
public long getLastUpdatedImgNum() {
return sentry_hdfs_serviceConstants.UNUSED_PATH_UPDATE_IMG_NUM;
}
@Override
public PermissionsUpdate createFullImageUpdate(long currSeqNum) {
// Using in-memory cache perms to create a full permission snapshot.
PermissionsUpdate retVal = new PermissionsUpdate(currSeqNum, true);
for (PrivilegeInfo pInfo : perms.getAllPrivileges()) {
TPrivilegeChanges pUpdate = retVal.addPrivilegeUpdate(pInfo.getAuthzObj());
for (Map.Entry<TPrivilegePrincipal, FsAction> ent : pInfo.getAllPermissions().entrySet()) {
pUpdate.putToAddPrivileges(new TPrivilegePrincipal(ent.getKey()),
ent.getValue().SYMBOL);
}
}
for (RoleInfo rInfo : perms.getAllRoles()) {
TRoleChanges rUpdate = retVal.addRoleUpdate(rInfo.getRole());
for (String group : rInfo.getAllGroups()) {
rUpdate.addToAddGroups(group);
}
}
return retVal;
}
@Override
public String getUpdateableTypeName() {
return UPDATABLE_TYPE_NAME;
}
@Override
public String toString() {
return String.format("%s(%s, %s)", getClass().getSimpleName(), seqNum, perms);
}
public String dumpContent() {
return String.format("%s(%s) ", getClass().getSimpleName(), seqNum) + perms.dumpContent();
}
}