blob: bdf1d51bae01144e6c6e5b729edfc65c412d1b9e [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.sentry.tests.e2e.sqoop;
import static org.junit.Assert.assertTrue;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.fail;
import org.apache.sentry.core.model.sqoop.SqoopActionConstant;
import org.apache.sqoop.client.SqoopClient;
import org.apache.sqoop.model.MJob;
import org.apache.sqoop.model.MLink;
import org.apache.sqoop.model.MPrincipal;
import org.apache.sqoop.model.MPrivilege;
import org.apache.sqoop.model.MResource;
import org.apache.sqoop.model.MRole;
import org.apache.sqoop.security.SecurityError;
import org.junit.Test;
import com.google.common.collect.Lists;
public class TestOwnerPrivilege extends AbstractSqoopSentryTestBase {
@Test
public void testLinkOwner() throws Exception {
// USER1 at firstly has no privilege on any Sqoop resource
SqoopClient client = sqoopServerRunner.getSqoopClient(USER1);
assertTrue(client.getConnectors().size() == 0);
/**
* ADMIN_USER grant read action privilege on connector HDFS_CONNECTOR_NAME to role ROLE1
* ADMIN_USER grant role ROLE1 to group GROUP1
*/
client = sqoopServerRunner.getSqoopClient(ADMIN_USER);
MRole role1 = new MRole(ROLE1);
MPrincipal group1 = new MPrincipal(GROUP1, MPrincipal.TYPE.GROUP);
MResource hdfsConnector = new MResource(HDFS_CONNECTOR_NAME, MResource.TYPE.CONNECTOR);
MPrivilege readPriv = new MPrivilege(hdfsConnector, SqoopActionConstant.READ, false);
client.createRole(role1);
client.grantRole(Lists.newArrayList(role1), Lists.newArrayList(group1));
client.grantPrivilege(Lists.newArrayList(new MPrincipal(role1.getName(), MPrincipal.TYPE.ROLE)),
Lists.newArrayList(readPriv));
// check USER1 has the read privilege on HDFS_CONNECTOR_NAME connector
client = sqoopServerRunner.getSqoopClient(USER1);
assertEquals(client.getConnectors().size(), 1);
// USER1 create a new HDFS link
MLink hdfsLink = client.createLink(HDFS_CONNECTOR_NAME);
hdfsLink.setName("HDFS_link1");
sqoopServerRunner.fillHdfsLink(hdfsLink);
sqoopServerRunner.saveLink(client, hdfsLink);
// USER1 is the owner of HDFS link, so he can show and update HDFS link
assertEquals(client.getLink(hdfsLink.getName()).getName(), hdfsLink.getName());
// USER1 update the name of HDFS link
String oldLinkName = hdfsLink.getName();
hdfsLink.setName("HDFS_update1");
sqoopServerRunner.updateLink(client, hdfsLink, oldLinkName);
// USER2 has no privilege on HDFS link
client = sqoopServerRunner.getSqoopClient(USER2);
assertTrue(client.getLinks().size() == 0);
//delete the HDFS link
client = sqoopServerRunner.getSqoopClient(USER1);
client.deleteLink(hdfsLink.getName());
}
@Test
public void testJobOwner() throws Exception {
// USER3 at firstly has no privilege on any Sqoop resource
SqoopClient client = sqoopServerRunner.getSqoopClient(USER3);
assertTrue(client.getConnectors().size() == 0);
/**
* ADMIN_USER grant read action privilege on connector HDFS_CONNECTOR_NAME and JDBC_CONNECTOR_NAME to role ROLE3
* ADMIN_USER grant role ROLE3 to group GROUP3
*/
client = sqoopServerRunner.getSqoopClient(ADMIN_USER);
MRole role3 = new MRole(ROLE3);
MPrincipal group3 = new MPrincipal(GROUP3, MPrincipal.TYPE.GROUP);
MResource hdfsConnector = new MResource(HDFS_CONNECTOR_NAME, MResource.TYPE.CONNECTOR);
MResource jdbcConnector = new MResource(JDBC_CONNECTOR_NAME, MResource.TYPE.CONNECTOR);
MPrivilege readPriv = new MPrivilege(hdfsConnector, SqoopActionConstant.READ, false);
MPrivilege readPriv2 = new MPrivilege(jdbcConnector, SqoopActionConstant.READ, false);
client.createRole(role3);
client.grantRole(Lists.newArrayList(role3), Lists.newArrayList(group3));
client.grantPrivilege(Lists.newArrayList(new MPrincipal(ROLE3, MPrincipal.TYPE.ROLE)),
Lists.newArrayList(readPriv, readPriv2));
// check USER3 has the read privilege on the connectors
client = sqoopServerRunner.getSqoopClient(USER3);
assertEquals(client.getConnectors().size(), 2);
// USER3 create two links: hdfs link and rdbm link
MLink rdbmsLink = client.createLink(JDBC_CONNECTOR_NAME);
rdbmsLink.setName("JDBC_link1");
sqoopServerRunner.fillRdbmsLinkConfig(rdbmsLink);
sqoopServerRunner.saveLink(client, rdbmsLink);
MLink hdfsLink = client.createLink(HDFS_CONNECTOR_NAME);
hdfsLink.setName("HDFS_link1");
sqoopServerRunner.fillHdfsLink(hdfsLink);
sqoopServerRunner.saveLink(client, hdfsLink);
// USER3 is the owner of hdfs and link, so he can show and update hdfs link
assertTrue(client.getLinks().size() == 2);
String oldLinkName = hdfsLink.getName();
hdfsLink.setName("HDFS_update2");
client.updateLink(hdfsLink, oldLinkName);
oldLinkName = rdbmsLink.getName();
rdbmsLink.setName("RDBM_update");
client.updateLink(rdbmsLink, oldLinkName);
// USER_3 create a job: transfer date from HDFS to RDBM
MJob job1 = client.createJob(hdfsLink.getName(), rdbmsLink.getName());
// set HDFS "FROM" config for the job, since the connector test case base class only has utilities for HDFS!
sqoopServerRunner.fillHdfsFromConfig(job1);
// set the RDBM "TO" config here
sqoopServerRunner.fillRdbmsToConfig(job1);
// create job
job1.setName("HDFS_RDBM_job1");
sqoopServerRunner.saveJob(client, job1);
/**
* USER3 is the owner of job1 , so he can show and delete job1.
* USER4 has no privilege on job1
*/
client = sqoopServerRunner.getSqoopClient(USER4);
assertTrue(client.getJobs().size() == 0);
try {
client.deleteJob(job1.getName());
fail("expected Authorization exception happend");
} catch (Exception e) {
assertCausedMessage(e, SecurityError.AUTH_0014.getMessage());
}
client = sqoopServerRunner.getSqoopClient(USER3);
assertEquals(client.getJob(job1.getName()).getName(), job1.getName());
client.deleteJob(job1.getName());
// delete the HDFS and RDBM links
client.deleteLink(hdfsLink.getName());
client.deleteLink(rdbmsLink.getName());
}
}