HADOOP-6864. Provide a JNI-based implementation of ShellBasedUnixGroupsNetgroupMapping (implementation of GroupMappingServiceProvider)
git-svn-id: https://svn.apache.org/repos/asf/hadoop/common/trunk@1052420 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
8de8f431d9
commit
23da8fe75e
@ -243,6 +243,9 @@ Release 0.22.0 - Unreleased
|
|||||||
|
|
||||||
HADOOP-6298. Add copyBytes to Text and BytesWritable. (omalley)
|
HADOOP-6298. Add copyBytes to Text and BytesWritable. (omalley)
|
||||||
|
|
||||||
|
HADOOP-6864. Provide a JNI-based implementation of ShellBasedUnixGroupsNetgroupMapping
|
||||||
|
(implementation of GroupMappingServiceProvider) (Erik Seffl via boryas)
|
||||||
|
|
||||||
OPTIMIZATIONS
|
OPTIMIZATIONS
|
||||||
|
|
||||||
HADOOP-6884. Add LOG.isDebugEnabled() guard for each LOG.debug(..).
|
HADOOP-6884. Add LOG.isDebugEnabled() guard for each LOG.debug(..).
|
||||||
|
13
build.xml
13
build.xml
@ -396,6 +396,15 @@
|
|||||||
<class name="org.apache.hadoop.io.nativeio.NativeIO" />
|
<class name="org.apache.hadoop.io.nativeio.NativeIO" />
|
||||||
</javah>
|
</javah>
|
||||||
|
|
||||||
|
<javah
|
||||||
|
classpath="${build.classes}"
|
||||||
|
destdir="${build.native}/src/org/apache/hadoop/security"
|
||||||
|
force="yes"
|
||||||
|
verbose="yes"
|
||||||
|
>
|
||||||
|
<class name="org.apache.hadoop.security.JniBasedUnixGroupsNetgroupMapping" />
|
||||||
|
</javah>
|
||||||
|
|
||||||
<exec dir="${build.native}" executable="sh" failonerror="true">
|
<exec dir="${build.native}" executable="sh" failonerror="true">
|
||||||
<env key="OS_NAME" value="${os.name}"/>
|
<env key="OS_NAME" value="${os.name}"/>
|
||||||
<env key="OS_ARCH" value="${os.arch}"/>
|
<env key="OS_ARCH" value="${os.arch}"/>
|
||||||
@ -717,6 +726,10 @@
|
|||||||
</syspropertyset>
|
</syspropertyset>
|
||||||
<sysproperty key="test.system.hdrc.deployed.hadoopconfdir"
|
<sysproperty key="test.system.hdrc.deployed.hadoopconfdir"
|
||||||
value="@{hadoop.conf.dir.deployed}" />
|
value="@{hadoop.conf.dir.deployed}" />
|
||||||
|
<!-- user to group mapping class for TestAccessControlList -->
|
||||||
|
<syspropertyset dynamic="no">
|
||||||
|
<propertyref name="TestAccessControlListGroupMapping"/>
|
||||||
|
</syspropertyset>
|
||||||
<formatter type="${test.junit.output.format}" />
|
<formatter type="${test.junit.output.format}" />
|
||||||
<batchtest todir="@{test.dir}" if="tests.notestcase">
|
<batchtest todir="@{test.dir}" if="tests.notestcase">
|
||||||
<fileset dir="@{fileset.dir}/core"
|
<fileset dir="@{fileset.dir}/core"
|
||||||
|
@ -39,4 +39,15 @@ public interface GroupMappingServiceProvider {
|
|||||||
* @throws IOException
|
* @throws IOException
|
||||||
*/
|
*/
|
||||||
public List<String> getGroups(String user) throws IOException;
|
public List<String> getGroups(String user) throws IOException;
|
||||||
|
/**
|
||||||
|
* Refresh the cache of groups and user mapping
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
public void cacheGroupsRefresh() throws IOException;
|
||||||
|
/**
|
||||||
|
* Caches the group user information
|
||||||
|
* @param groups list of groups to add to cache
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
public void cacheGroupsAdd(List<String> groups) throws IOException;
|
||||||
}
|
}
|
||||||
|
@ -98,22 +98,56 @@ public List<String> getGroups(String user) throws IOException {
|
|||||||
*/
|
*/
|
||||||
public void refresh() {
|
public void refresh() {
|
||||||
LOG.info("clearing userToGroupsMap cache");
|
LOG.info("clearing userToGroupsMap cache");
|
||||||
|
try {
|
||||||
|
impl.cacheGroupsRefresh();
|
||||||
|
} catch (IOException e) {
|
||||||
|
LOG.warn("Error refreshing groups cache", e);
|
||||||
|
}
|
||||||
userToGroupsMap.clear();
|
userToGroupsMap.clear();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add groups to cache
|
||||||
|
*
|
||||||
|
* @param groups list of groups to add to cache
|
||||||
|
*/
|
||||||
|
public void cacheGroupsAdd(List<String> groups) {
|
||||||
|
try {
|
||||||
|
impl.cacheGroupsAdd(groups);
|
||||||
|
} catch (IOException e) {
|
||||||
|
LOG.warn("Error caching groups", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Class to hold the cached groups
|
||||||
|
*/
|
||||||
private static class CachedGroups {
|
private static class CachedGroups {
|
||||||
final long timestamp;
|
final long timestamp;
|
||||||
final List<String> groups;
|
final List<String> groups;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Create and initialize group cache
|
||||||
|
*/
|
||||||
CachedGroups(List<String> groups) {
|
CachedGroups(List<String> groups) {
|
||||||
this.groups = groups;
|
this.groups = groups;
|
||||||
this.timestamp = System.currentTimeMillis();
|
this.timestamp = System.currentTimeMillis();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns time of last cache update
|
||||||
|
*
|
||||||
|
* @return time of last cache update
|
||||||
|
*/
|
||||||
public long getTimestamp() {
|
public long getTimestamp() {
|
||||||
return timestamp;
|
return timestamp;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get list of cached groups
|
||||||
|
*
|
||||||
|
* @return cached groups
|
||||||
|
*/
|
||||||
public List<String> getGroups() {
|
public List<String> getGroups() {
|
||||||
return groups;
|
return groups;
|
||||||
}
|
}
|
||||||
@ -134,7 +168,9 @@ public static Groups getUserToGroupsMappingService() {
|
|||||||
* @param conf
|
* @param conf
|
||||||
* @return the groups being used to map user-to-groups.
|
* @return the groups being used to map user-to-groups.
|
||||||
*/
|
*/
|
||||||
public static Groups getUserToGroupsMappingService(Configuration conf) {
|
public static synchronized Groups getUserToGroupsMappingService(
|
||||||
|
Configuration conf) {
|
||||||
|
|
||||||
if(GROUPS == null) {
|
if(GROUPS == null) {
|
||||||
if(LOG.isDebugEnabled()) {
|
if(LOG.isDebugEnabled()) {
|
||||||
LOG.debug(" Creating new Groups object");
|
LOG.debug(" Creating new Groups object");
|
||||||
|
@ -22,6 +22,9 @@
|
|||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
|
|
||||||
import org.apache.commons.logging.Log;
|
import org.apache.commons.logging.Log;
|
||||||
import org.apache.commons.logging.LogFactory;
|
import org.apache.commons.logging.LogFactory;
|
||||||
import org.apache.hadoop.util.NativeCodeLoader;
|
import org.apache.hadoop.util.NativeCodeLoader;
|
||||||
@ -31,10 +34,12 @@
|
|||||||
* that invokes libC calls to get the group
|
* that invokes libC calls to get the group
|
||||||
* memberships of a given user.
|
* memberships of a given user.
|
||||||
*/
|
*/
|
||||||
|
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
||||||
|
@InterfaceStability.Evolving
|
||||||
public class JniBasedUnixGroupsMapping implements GroupMappingServiceProvider {
|
public class JniBasedUnixGroupsMapping implements GroupMappingServiceProvider {
|
||||||
|
|
||||||
private static final Log LOG =
|
private static final Log LOG =
|
||||||
LogFactory.getLog(ShellBasedUnixGroupsMapping.class);
|
LogFactory.getLog(JniBasedUnixGroupsMapping.class);
|
||||||
|
|
||||||
native String[] getGroupForUser(String user);
|
native String[] getGroupForUser(String user);
|
||||||
|
|
||||||
@ -52,9 +57,18 @@ public List<String> getGroups(String user) throws IOException {
|
|||||||
try {
|
try {
|
||||||
groups = getGroupForUser(user);
|
groups = getGroupForUser(user);
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
LOG.warn("Got exception while trying to obtain the groups for user "
|
LOG.warn("Error getting groups for " + user, e);
|
||||||
+ user);
|
|
||||||
}
|
}
|
||||||
return Arrays.asList(groups);
|
return Arrays.asList(groups);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsRefresh() throws IOException {
|
||||||
|
// does nothing in this provider of user to groups mapping
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsAdd(List<String> groups) throws IOException {
|
||||||
|
// does nothing in this provider of user to groups mapping
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,125 @@
|
|||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.apache.hadoop.security;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.LinkedList;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.util.NativeCodeLoader;
|
||||||
|
|
||||||
|
import org.apache.hadoop.security.NetgroupCache;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A JNI-based implementation of {@link GroupMappingServiceProvider}
|
||||||
|
* that invokes libC calls to get the group
|
||||||
|
* memberships of a given user.
|
||||||
|
*/
|
||||||
|
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
||||||
|
@InterfaceStability.Evolving
|
||||||
|
public class JniBasedUnixGroupsNetgroupMapping
|
||||||
|
extends JniBasedUnixGroupsMapping {
|
||||||
|
|
||||||
|
private static final Log LOG = LogFactory.getLog(
|
||||||
|
JniBasedUnixGroupsNetgroupMapping.class);
|
||||||
|
|
||||||
|
native String[] getUsersForNetgroupJNI(String group);
|
||||||
|
|
||||||
|
static {
|
||||||
|
if (!NativeCodeLoader.isNativeCodeLoaded()) {
|
||||||
|
throw new RuntimeException("Bailing out since native library couldn't " +
|
||||||
|
"be loaded");
|
||||||
|
}
|
||||||
|
LOG.info("Using JniBasedUnixGroupsNetgroupMapping for Netgroup resolution");
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets unix groups and netgroups for the user.
|
||||||
|
*
|
||||||
|
* It gets all unix groups as returned by id -Gn but it
|
||||||
|
* only returns netgroups that are used in ACLs (there is
|
||||||
|
* no way to get all netgroups for a given user, see
|
||||||
|
* documentation for getent netgroup)
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public List<String> getGroups(String user) throws IOException {
|
||||||
|
// parent gets unix groups
|
||||||
|
List<String> groups = new LinkedList<String>(super.getGroups(user));
|
||||||
|
NetgroupCache.getNetgroups(user, groups);
|
||||||
|
return groups;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Refresh the netgroup cache
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsRefresh() throws IOException {
|
||||||
|
List<String> groups = NetgroupCache.getNetgroupNames();
|
||||||
|
NetgroupCache.clear();
|
||||||
|
cacheGroupsAdd(groups);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add a group to cache, only netgroups are cached
|
||||||
|
*
|
||||||
|
* @param groups list of group names to add to cache
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsAdd(List<String> groups) throws IOException {
|
||||||
|
for(String group: groups) {
|
||||||
|
if(group.length() == 0) {
|
||||||
|
// better safe than sorry (should never happen)
|
||||||
|
} else if(group.charAt(0) == '@') {
|
||||||
|
if(!NetgroupCache.isCached(group)) {
|
||||||
|
NetgroupCache.add(group, getUsersForNetgroup(group));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// unix group, not caching
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Calls JNI function to get users for a netgroup, since C functions
|
||||||
|
* are not reentrant we need to make this synchronized (see
|
||||||
|
* documentation for setnetgrent, getnetgrent and endnetgrent)
|
||||||
|
*
|
||||||
|
* @param netgroup return users for this netgroup
|
||||||
|
* @return list of users for a given netgroup
|
||||||
|
*/
|
||||||
|
protected synchronized List<String> getUsersForNetgroup(String netgroup) {
|
||||||
|
String[] users = null;
|
||||||
|
try {
|
||||||
|
// JNI code does not expect '@' at the begining of the group name
|
||||||
|
users = getUsersForNetgroupJNI(netgroup.substring(1));
|
||||||
|
} catch (Exception e) {
|
||||||
|
LOG.warn("error getting users for netgroup " + netgroup, e);
|
||||||
|
}
|
||||||
|
if (users != null && users.length != 0) {
|
||||||
|
return Arrays.asList(users);
|
||||||
|
}
|
||||||
|
return new LinkedList<String>();
|
||||||
|
}
|
||||||
|
}
|
122
src/java/org/apache/hadoop/security/NetgroupCache.java
Normal file
122
src/java/org/apache/hadoop/security/NetgroupCache.java
Normal file
@ -0,0 +1,122 @@
|
|||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.security;
|
||||||
|
|
||||||
|
import java.util.LinkedList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Class that caches the netgroups and inverts group-to-user map
|
||||||
|
* to user-to-group map, primarily intented for use with
|
||||||
|
* netgroups (as returned by getent netgrgoup) which only returns
|
||||||
|
* group to user mapping.
|
||||||
|
*/
|
||||||
|
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
||||||
|
@InterfaceStability.Unstable
|
||||||
|
public class NetgroupCache {
|
||||||
|
|
||||||
|
private static final Log LOG = LogFactory.getLog(NetgroupCache.class);
|
||||||
|
|
||||||
|
private static boolean netgroupToUsersMapUpdated = true;
|
||||||
|
private static Map<String, Set<String>> netgroupToUsersMap =
|
||||||
|
new ConcurrentHashMap<String, Set<String>>();
|
||||||
|
|
||||||
|
private static Map<String, Set<String>> userToNetgroupsMap =
|
||||||
|
new ConcurrentHashMap<String, Set<String>>();
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get netgroups for a given user
|
||||||
|
*
|
||||||
|
* @param user get groups for this user
|
||||||
|
* @param groups put groups into this List
|
||||||
|
*/
|
||||||
|
public static void getNetgroups(final String user,
|
||||||
|
List<String> groups) {
|
||||||
|
if(netgroupToUsersMapUpdated) {
|
||||||
|
netgroupToUsersMapUpdated = false; // at the beginning to avoid race
|
||||||
|
//update userToNetgroupsMap
|
||||||
|
for(String netgroup : netgroupToUsersMap.keySet()) {
|
||||||
|
for(String netuser : netgroupToUsersMap.get(netgroup)) {
|
||||||
|
// add to userToNetgroupsMap
|
||||||
|
if(!userToNetgroupsMap.containsKey(netuser)) {
|
||||||
|
userToNetgroupsMap.put(netuser, new HashSet<String>());
|
||||||
|
}
|
||||||
|
userToNetgroupsMap.get(netuser).add(netgroup);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if(userToNetgroupsMap.containsKey(user)) {
|
||||||
|
for(String netgroup : userToNetgroupsMap.get(user)) {
|
||||||
|
groups.add(netgroup);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get the list of cached netgroups
|
||||||
|
*
|
||||||
|
* @return list of cached groups
|
||||||
|
*/
|
||||||
|
public static List<String> getNetgroupNames() {
|
||||||
|
return new LinkedList<String>(netgroupToUsersMap.keySet());
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if a given netgroup is cached
|
||||||
|
*
|
||||||
|
* @param group check if this group is cached
|
||||||
|
* @return true if group is cached, false otherwise
|
||||||
|
*/
|
||||||
|
public static boolean isCached(String group) {
|
||||||
|
return netgroupToUsersMap.containsKey(group);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Clear the cache
|
||||||
|
*/
|
||||||
|
public static void clear() {
|
||||||
|
netgroupToUsersMap.clear();
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add group to cache
|
||||||
|
*
|
||||||
|
* @param group name of the group to add to cache
|
||||||
|
* @param users list of users for a given group
|
||||||
|
*/
|
||||||
|
public static void add(String group, List<String> users) {
|
||||||
|
if(!isCached(group)) {
|
||||||
|
netgroupToUsersMap.put(group, new HashSet<String>());
|
||||||
|
for(String user: users) {
|
||||||
|
netgroupToUsersMap.get(group).add(user);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
netgroupToUsersMapUpdated = true; // at the end to avoid race
|
||||||
|
}
|
||||||
|
}
|
@ -38,15 +38,41 @@
|
|||||||
*/
|
*/
|
||||||
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
||||||
@InterfaceStability.Evolving
|
@InterfaceStability.Evolving
|
||||||
public class ShellBasedUnixGroupsMapping implements GroupMappingServiceProvider {
|
public class ShellBasedUnixGroupsMapping
|
||||||
|
implements GroupMappingServiceProvider {
|
||||||
|
|
||||||
private static final Log LOG = LogFactory.getLog(ShellBasedUnixGroupsMapping.class);
|
private static final Log LOG =
|
||||||
|
LogFactory.getLog(ShellBasedUnixGroupsMapping.class);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns list of groups for a user
|
||||||
|
*
|
||||||
|
* @param user get groups for this user
|
||||||
|
* @return list of groups for a given user
|
||||||
|
*/
|
||||||
@Override
|
@Override
|
||||||
public List<String> getGroups(String user) throws IOException {
|
public List<String> getGroups(String user) throws IOException {
|
||||||
return getUnixGroups(user);
|
return getUnixGroups(user);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Caches groups, no need to do that for this provider
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsRefresh() throws IOException {
|
||||||
|
// does nothing in this provider of user to groups mapping
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds groups to cache, no need to do that for this provider
|
||||||
|
*
|
||||||
|
* @param groups unused
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsAdd(List<String> groups) throws IOException {
|
||||||
|
// does nothing in this provider of user to groups mapping
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Get the current user's group list from Unix by running the command 'groups'
|
* Get the current user's group list from Unix by running the command 'groups'
|
||||||
* NOTE. For non-existing user it will return EMPTY list
|
* NOTE. For non-existing user it will return EMPTY list
|
||||||
|
@ -0,0 +1,151 @@
|
|||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.hadoop.security;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.LinkedList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.StringTokenizer;
|
||||||
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
import org.apache.hadoop.util.Shell;
|
||||||
|
import org.apache.hadoop.util.Shell.ExitCodeException;
|
||||||
|
|
||||||
|
import org.apache.hadoop.security.NetgroupCache;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A simple shell-based implementation of {@link GroupMappingServiceProvider}
|
||||||
|
* that exec's the <code>groups</code> shell command to fetch the group
|
||||||
|
* memberships of a given user.
|
||||||
|
*/
|
||||||
|
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
||||||
|
@InterfaceStability.Evolving
|
||||||
|
public class ShellBasedUnixGroupsNetgroupMapping
|
||||||
|
extends ShellBasedUnixGroupsMapping {
|
||||||
|
|
||||||
|
private static final Log LOG =
|
||||||
|
LogFactory.getLog(ShellBasedUnixGroupsNetgroupMapping.class);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get unix groups (parent) and netgroups for given user
|
||||||
|
*
|
||||||
|
* @param user get groups and netgroups for this user
|
||||||
|
* @return groups and netgroups for user
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public List<String> getGroups(String user) throws IOException {
|
||||||
|
// parent get unix groups
|
||||||
|
List<String> groups = new LinkedList<String>(super.getGroups(user));
|
||||||
|
NetgroupCache.getNetgroups(user, groups);
|
||||||
|
return groups;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Refresh the netgroup cache
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsRefresh() throws IOException {
|
||||||
|
List<String> groups = NetgroupCache.getNetgroupNames();
|
||||||
|
NetgroupCache.clear();
|
||||||
|
cacheGroupsAdd(groups);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add a group to cache, only netgroups are cached
|
||||||
|
*
|
||||||
|
* @param groups list of group names to add to cache
|
||||||
|
*/
|
||||||
|
@Override
|
||||||
|
public void cacheGroupsAdd(List<String> groups) throws IOException {
|
||||||
|
for(String group: groups) {
|
||||||
|
if(group.length() == 0) {
|
||||||
|
// better safe than sorry (should never happen)
|
||||||
|
} else if(group.charAt(0) == '@') {
|
||||||
|
if(!NetgroupCache.isCached(group)) {
|
||||||
|
NetgroupCache.add(group, getUsersForNetgroup(group));
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// unix group, not caching
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Gets users for a netgroup
|
||||||
|
*
|
||||||
|
* @param netgroup return users for this netgroup
|
||||||
|
* @return list of users for a given netgroup
|
||||||
|
*/
|
||||||
|
protected List<String> getUsersForNetgroup(String netgroup)
|
||||||
|
throws IOException {
|
||||||
|
|
||||||
|
List<String> users = new LinkedList<String>();
|
||||||
|
|
||||||
|
// returns a string similar to this:
|
||||||
|
// group ( , user, ) ( domain, user1, host.com )
|
||||||
|
String usersRaw = execShellGetUserForNetgroup(netgroup);
|
||||||
|
// get rid of spaces, makes splitting much easier
|
||||||
|
usersRaw = usersRaw.replaceAll(" +", "");
|
||||||
|
// remove netgroup name at the beginning of the string
|
||||||
|
usersRaw = usersRaw.replaceFirst(
|
||||||
|
netgroup.replaceFirst("@", "") + "[()]+",
|
||||||
|
"");
|
||||||
|
// split string into user infos
|
||||||
|
String[] userInfos = usersRaw.split("[()]+");
|
||||||
|
for(String userInfo : userInfos) {
|
||||||
|
// userInfo: xxx,user,yyy (xxx, yyy can be empty strings)
|
||||||
|
// get rid of everything before first and after last comma
|
||||||
|
String user = userInfo.replaceFirst("[^,]*,", "");
|
||||||
|
user = user.replaceFirst(",.*$", "");
|
||||||
|
// voila! got username!
|
||||||
|
users.add(user);
|
||||||
|
}
|
||||||
|
|
||||||
|
return users;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Calls shell to get users for a netgroup by calling getent
|
||||||
|
* netgroup, this is a low level function that just returns string
|
||||||
|
* that
|
||||||
|
*
|
||||||
|
* @param netgroup get users for this netgroup
|
||||||
|
* @return string of users for a given netgroup in getent netgroups format
|
||||||
|
*/
|
||||||
|
protected String execShellGetUserForNetgroup(final String netgroup)
|
||||||
|
throws IOException {
|
||||||
|
String result = "";
|
||||||
|
try {
|
||||||
|
// shell command does not expect '@' at the begining of the group name
|
||||||
|
result = Shell.execCommand(
|
||||||
|
Shell.getUsersForNetgroupCommand(netgroup.substring(1)));
|
||||||
|
} catch (ExitCodeException e) {
|
||||||
|
// if we didn't get the group - just return empty list;
|
||||||
|
LOG.warn("error getting users for netgroup " + netgroup, e);
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
}
|
@ -22,6 +22,10 @@
|
|||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.TreeSet;
|
import java.util.TreeSet;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.LinkedList;
|
||||||
|
import java.util.ListIterator;
|
||||||
|
|
||||||
import org.apache.hadoop.classification.InterfaceAudience;
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
import org.apache.hadoop.classification.InterfaceStability;
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
@ -30,6 +34,8 @@
|
|||||||
import org.apache.hadoop.io.WritableFactories;
|
import org.apache.hadoop.io.WritableFactories;
|
||||||
import org.apache.hadoop.io.WritableFactory;
|
import org.apache.hadoop.io.WritableFactory;
|
||||||
import org.apache.hadoop.security.UserGroupInformation;
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
|
import org.apache.hadoop.security.Groups;
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Class representing a configured access control list.
|
* Class representing a configured access control list.
|
||||||
@ -57,6 +63,8 @@ public class AccessControlList implements Writable {
|
|||||||
// Whether all users are granted access.
|
// Whether all users are granted access.
|
||||||
private boolean allAllowed;
|
private boolean allAllowed;
|
||||||
|
|
||||||
|
private Groups groupsMapping = Groups.getUserToGroupsMappingService(new Configuration());
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* This constructor exists primarily for AccessControlList to be Writable.
|
* This constructor exists primarily for AccessControlList to be Writable.
|
||||||
*/
|
*/
|
||||||
@ -76,7 +84,12 @@ public AccessControlList(String aclString) {
|
|||||||
buildACL(aclString);
|
buildACL(aclString);
|
||||||
}
|
}
|
||||||
|
|
||||||
// build ACL from the given string
|
/**
|
||||||
|
* Build ACL from the given string, format of the string is
|
||||||
|
* user1,...,userN group1,...,groupN
|
||||||
|
*
|
||||||
|
* @param aclString build ACL from this string
|
||||||
|
*/
|
||||||
private void buildACL(String aclString) {
|
private void buildACL(String aclString) {
|
||||||
users = new TreeSet<String>();
|
users = new TreeSet<String>();
|
||||||
groups = new TreeSet<String>();
|
groups = new TreeSet<String>();
|
||||||
@ -87,21 +100,28 @@ private void buildACL(String aclString) {
|
|||||||
String[] userGroupStrings = aclString.split(" ", 2);
|
String[] userGroupStrings = aclString.split(" ", 2);
|
||||||
|
|
||||||
if (userGroupStrings.length >= 1) {
|
if (userGroupStrings.length >= 1) {
|
||||||
String[] usersStr = userGroupStrings[0].split(",");
|
List<String> usersList = new LinkedList<String>(
|
||||||
if (usersStr.length >= 1) {
|
Arrays.asList(userGroupStrings[0].split(",")));
|
||||||
addToSet(users, usersStr);
|
cleanupList(usersList);
|
||||||
}
|
addToSet(users, usersList);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (userGroupStrings.length == 2) {
|
if (userGroupStrings.length == 2) {
|
||||||
String[] groupsStr = userGroupStrings[1].split(",");
|
List<String> groupsList = new LinkedList<String>(
|
||||||
if (groupsStr.length >= 1) {
|
Arrays.asList(userGroupStrings[1].split(",")));
|
||||||
addToSet(groups, groupsStr);
|
cleanupList(groupsList);
|
||||||
}
|
addToSet(groups, groupsList);
|
||||||
|
groupsMapping.cacheGroupsAdd(groupsList);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks whether ACL string contains wildcard
|
||||||
|
*
|
||||||
|
* @param aclString check this ACL string for wildcard
|
||||||
|
* @return true if ACL string contains wildcard false otherwise
|
||||||
|
*/
|
||||||
private boolean isWildCardACLValue(String aclString) {
|
private boolean isWildCardACLValue(String aclString) {
|
||||||
if (aclString.contains(WILDCARD_ACL_VALUE) &&
|
if (aclString.contains(WILDCARD_ACL_VALUE) &&
|
||||||
aclString.trim().equals(WILDCARD_ACL_VALUE)) {
|
aclString.trim().equals(WILDCARD_ACL_VALUE)) {
|
||||||
@ -140,6 +160,9 @@ public void addGroup(String group) {
|
|||||||
throw new IllegalArgumentException("Group " + group + " can not be added");
|
throw new IllegalArgumentException("Group " + group + " can not be added");
|
||||||
}
|
}
|
||||||
if (!isAllAllowed()) {
|
if (!isAllAllowed()) {
|
||||||
|
List<String> groupsList = new LinkedList<String>();
|
||||||
|
groupsList.add(group);
|
||||||
|
groupsMapping.cacheGroupsAdd(groupsList);
|
||||||
groups.add(group);
|
groups.add(group);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -204,15 +227,36 @@ public boolean isUserAllowed(UserGroupInformation ugi) {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
private static final void addToSet(Set<String> set, String[] strings) {
|
/**
|
||||||
for (String s : strings) {
|
* Cleanup list, remove empty strings, trim leading/trailing spaces
|
||||||
|
*
|
||||||
|
* @param list clean this list
|
||||||
|
*/
|
||||||
|
private static final void cleanupList(List<String> list) {
|
||||||
|
ListIterator<String> i = list.listIterator();
|
||||||
|
while(i.hasNext()) {
|
||||||
|
String s = i.next();
|
||||||
|
if(s.length() == 0) {
|
||||||
|
i.remove();
|
||||||
|
} else {
|
||||||
s = s.trim();
|
s = s.trim();
|
||||||
if (s.length() > 0) {
|
i.set(s);
|
||||||
set.add(s);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add list to a set
|
||||||
|
*
|
||||||
|
* @param set add list to this set
|
||||||
|
* @param list add items of this list to the set
|
||||||
|
*/
|
||||||
|
private static final void addToSet(Set<String> set, List<String> list) {
|
||||||
|
for(String s : list) {
|
||||||
|
set.add(s);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns descriptive way of users and groups that are part of this ACL.
|
* Returns descriptive way of users and groups that are part of this ACL.
|
||||||
* Use {@link #getAclString()} to get the exact String that can be given to
|
* Use {@link #getAclString()} to get the exact String that can be given to
|
||||||
@ -287,18 +331,30 @@ public void readFields(DataInput in) throws IOException {
|
|||||||
buildACL(aclString);
|
buildACL(aclString);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Returns comma-separated concatenated single String of the set 'users'
|
/**
|
||||||
|
* Returns comma-separated concatenated single String of the set 'users'
|
||||||
|
*
|
||||||
|
* @return comma separated list of users
|
||||||
|
*/
|
||||||
private String getUsersString() {
|
private String getUsersString() {
|
||||||
return getString(users);
|
return getString(users);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Returns comma-separated concatenated single String of the set 'groups'
|
/**
|
||||||
|
* Returns comma-separated concatenated single String of the set 'groups'
|
||||||
|
*
|
||||||
|
* @return comma separated list of groups
|
||||||
|
*/
|
||||||
private String getGroupsString() {
|
private String getGroupsString() {
|
||||||
return getString(groups);
|
return getString(groups);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Returns comma-separated concatenated single String of all strings of
|
/**
|
||||||
// the given set
|
* Returns comma-separated concatenated single String of all strings of
|
||||||
|
* the given set
|
||||||
|
*
|
||||||
|
* @param strings set of strings to concatenate
|
||||||
|
*/
|
||||||
private String getString(Set<String> strings) {
|
private String getString(Set<String> strings) {
|
||||||
StringBuilder sb = new StringBuilder(INITIAL_CAPACITY);
|
StringBuilder sb = new StringBuilder(INITIAL_CAPACITY);
|
||||||
boolean first = true;
|
boolean first = true;
|
||||||
|
@ -56,6 +56,11 @@ public static String[] getGroupsForUserCommand(final String user) {
|
|||||||
//'groups username' command return is non-consistent across different unixes
|
//'groups username' command return is non-consistent across different unixes
|
||||||
return new String [] {"bash", "-c", "id -Gn " + user};
|
return new String [] {"bash", "-c", "id -Gn " + user};
|
||||||
}
|
}
|
||||||
|
/** a Unix command to get a given netgroup's user list */
|
||||||
|
public static String[] getUsersForNetgroupCommand(final String netgroup) {
|
||||||
|
//'groups username' command return is non-consistent across different unixes
|
||||||
|
return new String [] {"bash", "-c", "getent netgroup " + netgroup};
|
||||||
|
}
|
||||||
/** a Unix command to set permission */
|
/** a Unix command to set permission */
|
||||||
public static final String SET_PERMISSION_COMMAND = "chmod";
|
public static final String SET_PERMISSION_COMMAND = "chmod";
|
||||||
/** a Unix command to set owner */
|
/** a Unix command to set owner */
|
||||||
|
@ -43,6 +43,7 @@ libhadoop_la_SOURCES = src/org/apache/hadoop/io/compress/zlib/ZlibCompressor.c \
|
|||||||
src/org/apache/hadoop/io/compress/zlib/ZlibDecompressor.c \
|
src/org/apache/hadoop/io/compress/zlib/ZlibDecompressor.c \
|
||||||
src/org/apache/hadoop/security/getGroup.c \
|
src/org/apache/hadoop/security/getGroup.c \
|
||||||
src/org/apache/hadoop/security/JniBasedUnixGroupsMapping.c \
|
src/org/apache/hadoop/security/JniBasedUnixGroupsMapping.c \
|
||||||
|
src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c \
|
||||||
src/org/apache/hadoop/io/nativeio/file_descriptor.c \
|
src/org/apache/hadoop/io/nativeio/file_descriptor.c \
|
||||||
src/org/apache/hadoop/io/nativeio/errno_enum.c \
|
src/org/apache/hadoop/io/nativeio/errno_enum.c \
|
||||||
src/org/apache/hadoop/io/nativeio/NativeIO.c
|
src/org/apache/hadoop/io/nativeio/NativeIO.c
|
||||||
|
@ -92,9 +92,14 @@ am__installdirs = "$(DESTDIR)$(libdir)"
|
|||||||
libLTLIBRARIES_INSTALL = $(INSTALL)
|
libLTLIBRARIES_INSTALL = $(INSTALL)
|
||||||
LTLIBRARIES = $(lib_LTLIBRARIES)
|
LTLIBRARIES = $(lib_LTLIBRARIES)
|
||||||
libhadoop_la_DEPENDENCIES =
|
libhadoop_la_DEPENDENCIES =
|
||||||
am_libhadoop_la_OBJECTS = ZlibCompressor.lo ZlibDecompressor.lo \
|
am_libhadoop_la_OBJECTS = ZlibCompressor.lo \
|
||||||
getGroup.lo JniBasedUnixGroupsMapping.lo file_descriptor.lo \
|
ZlibDecompressor.lo \
|
||||||
errno_enum.lo NativeIO.lo
|
getGroup.lo \
|
||||||
|
JniBasedUnixGroupsMapping.lo \
|
||||||
|
JniBasedUnixGroupsNetgroupMapping.lo \
|
||||||
|
file_descriptor.lo \
|
||||||
|
errno_enum.lo \
|
||||||
|
NativeIO.lo
|
||||||
libhadoop_la_OBJECTS = $(am_libhadoop_la_OBJECTS)
|
libhadoop_la_OBJECTS = $(am_libhadoop_la_OBJECTS)
|
||||||
DEFAULT_INCLUDES = -I. -I$(srcdir) -I.
|
DEFAULT_INCLUDES = -I. -I$(srcdir) -I.
|
||||||
depcomp = $(SHELL) $(top_srcdir)/config/depcomp
|
depcomp = $(SHELL) $(top_srcdir)/config/depcomp
|
||||||
@ -233,6 +238,7 @@ libhadoop_la_SOURCES = src/org/apache/hadoop/io/compress/zlib/ZlibCompressor.c \
|
|||||||
src/org/apache/hadoop/io/compress/zlib/ZlibDecompressor.c \
|
src/org/apache/hadoop/io/compress/zlib/ZlibDecompressor.c \
|
||||||
src/org/apache/hadoop/security/getGroup.c \
|
src/org/apache/hadoop/security/getGroup.c \
|
||||||
src/org/apache/hadoop/security/JniBasedUnixGroupsMapping.c \
|
src/org/apache/hadoop/security/JniBasedUnixGroupsMapping.c \
|
||||||
|
src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c \
|
||||||
src/org/apache/hadoop/io/nativeio/file_descriptor.c \
|
src/org/apache/hadoop/io/nativeio/file_descriptor.c \
|
||||||
src/org/apache/hadoop/io/nativeio/errno_enum.c \
|
src/org/apache/hadoop/io/nativeio/errno_enum.c \
|
||||||
src/org/apache/hadoop/io/nativeio/NativeIO.c
|
src/org/apache/hadoop/io/nativeio/NativeIO.c
|
||||||
@ -331,6 +337,7 @@ distclean-compile:
|
|||||||
-rm -f *.tab.c
|
-rm -f *.tab.c
|
||||||
|
|
||||||
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/JniBasedUnixGroupsMapping.Plo@am__quote@
|
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/JniBasedUnixGroupsMapping.Plo@am__quote@
|
||||||
|
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/JniBasedUnixGroupsNetgroupMapping.Plo@am__quote@
|
||||||
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/NativeIO.Plo@am__quote@
|
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/NativeIO.Plo@am__quote@
|
||||||
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/ZlibCompressor.Plo@am__quote@
|
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/ZlibCompressor.Plo@am__quote@
|
||||||
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/ZlibDecompressor.Plo@am__quote@
|
@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/ZlibDecompressor.Plo@am__quote@
|
||||||
@ -408,6 +415,13 @@ NativeIO.lo: src/org/apache/hadoop/io/nativeio/NativeIO.c
|
|||||||
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
|
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
|
||||||
@am__fastdepCC_FALSE@ $(LIBTOOL) --tag=CC --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) -c -o NativeIO.lo `test -f 'src/org/apache/hadoop/io/nativeio/NativeIO.c' || echo '$(srcdir)/'`src/org/apache/hadoop/io/nativeio/NativeIO.c
|
@am__fastdepCC_FALSE@ $(LIBTOOL) --tag=CC --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) -c -o NativeIO.lo `test -f 'src/org/apache/hadoop/io/nativeio/NativeIO.c' || echo '$(srcdir)/'`src/org/apache/hadoop/io/nativeio/NativeIO.c
|
||||||
|
|
||||||
|
JniBasedUnixGroupsNetgroupMapping.lo: src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c
|
||||||
|
@am__fastdepCC_TRUE@ if $(LIBTOOL) --tag=CC --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) -MT JniBasedUnixGroupsNetgroupMapping.lo -MD -MP -MF "$(DEPDIR)/JniBasedUnixGroupsNetgroupMapping.Tpo" -c -o JniBasedUnixGroupsNetgroupMapping.lo `test -f 'src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c' || echo '$(srcdir)/'`src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c; \
|
||||||
|
@am__fastdepCC_TRUE@ then mv -f "$(DEPDIR)/JniBasedUnixGroupsNetgroupMapping.Tpo" "$(DEPDIR)/JniBasedUnixGroupsNetgroupMapping.Plo"; else rm -f "$(DEPDIR)/JniBasedUnixGroupsNetgroupMapping.Tpo"; exit 1; fi
|
||||||
|
@AMDEP_TRUE@@am__fastdepCC_FALSE@ source='src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c' object='JniBasedUnixGroupsNetgroupMapping.lo' libtool=yes @AMDEPBACKSLASH@
|
||||||
|
@AMDEP_TRUE@@am__fastdepCC_FALSE@ DEPDIR=$(DEPDIR) $(CCDEPMODE) $(depcomp) @AMDEPBACKSLASH@
|
||||||
|
@am__fastdepCC_FALSE@ $(LIBTOOL) --tag=CC --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) -c -o JniBasedUnixGroupsNetgroupMapping.lo `test -f 'src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c' || echo '$(srcdir)/'`src/org/apache/hadoop/security/JniBasedUnixGroupsNetgroupMapping.c
|
||||||
|
|
||||||
mostlyclean-libtool:
|
mostlyclean-libtool:
|
||||||
-rm -f *.lo
|
-rm -f *.lo
|
||||||
|
|
||||||
|
11051
src/native/configure
vendored
11051
src/native/configure
vendored
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,138 @@
|
|||||||
|
/**
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one
|
||||||
|
* or more contributor license agreements. See the NOTICE file
|
||||||
|
* distributed with this work for additional information
|
||||||
|
* regarding copyright ownership. The ASF licenses this file
|
||||||
|
* to you under the Apache License, Version 2.0 (the
|
||||||
|
* "License"); you may not use this file except in compliance
|
||||||
|
* with the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
#include <jni.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <sys/ipc.h>
|
||||||
|
#include <sys/shm.h>
|
||||||
|
#include <sys/mman.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
|
#include <fcntl.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <grp.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <pwd.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
#include <netdb.h>
|
||||||
|
|
||||||
|
#include "org_apache_hadoop_security_JniBasedUnixGroupsNetgroupMapping.h"
|
||||||
|
#include "org_apache_hadoop.h"
|
||||||
|
|
||||||
|
struct listElement {
|
||||||
|
char * string;
|
||||||
|
struct listElement * next;
|
||||||
|
};
|
||||||
|
|
||||||
|
typedef struct listElement UserList;
|
||||||
|
|
||||||
|
JNIEXPORT jobjectArray JNICALL
|
||||||
|
Java_org_apache_hadoop_security_JniBasedUnixGroupsNetgroupMapping_getUsersForNetgroupJNI
|
||||||
|
(JNIEnv *env, jobject jobj, jstring jgroup) {
|
||||||
|
|
||||||
|
// pointers to free at the end
|
||||||
|
const char *cgroup = NULL;
|
||||||
|
jobjectArray jusers = NULL;
|
||||||
|
|
||||||
|
// do we need to end the group lookup?
|
||||||
|
int setnetgrentCalledFlag = 0;
|
||||||
|
|
||||||
|
// if not NULL then THROW exception
|
||||||
|
char *errorMessage = NULL;
|
||||||
|
|
||||||
|
cgroup = (*env)->GetStringUTFChars(env, jgroup, NULL);
|
||||||
|
if (cgroup == NULL) {
|
||||||
|
goto END;
|
||||||
|
}
|
||||||
|
|
||||||
|
//--------------------------------------------------
|
||||||
|
// get users
|
||||||
|
// see man pages for setnetgrent, getnetgrent and endnetgrent
|
||||||
|
|
||||||
|
UserList *userListHead = NULL;
|
||||||
|
int userListSize = 0;
|
||||||
|
|
||||||
|
// set the name of the group for subsequent calls to getnetgrent
|
||||||
|
// note that we want to end group lokup regardless whether setnetgrent
|
||||||
|
// was successfull or not (as long as it was called we need to call
|
||||||
|
// endnetgrent)
|
||||||
|
setnetgrentCalledFlag = 1;
|
||||||
|
if(setnetgrent(cgroup) == 1) {
|
||||||
|
UserList *current = NULL;
|
||||||
|
// three pointers are for host, user, domain, we only care
|
||||||
|
// about user now
|
||||||
|
char *p[3];
|
||||||
|
while(getnetgrent(p, p + 1, p + 2)) {
|
||||||
|
if(p[1]) {
|
||||||
|
current = (UserList *)malloc(sizeof(UserList));
|
||||||
|
current->string = malloc(strlen(p[1]) + 1);
|
||||||
|
strcpy(current->string, p[1]);
|
||||||
|
current->next = userListHead;
|
||||||
|
userListHead = current;
|
||||||
|
userListSize++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
//--------------------------------------------------
|
||||||
|
// build return data (java array)
|
||||||
|
|
||||||
|
jusers = (jobjectArray)(*env)->NewObjectArray(env,
|
||||||
|
userListSize,
|
||||||
|
(*env)->FindClass(env, "java/lang/String"),
|
||||||
|
NULL);
|
||||||
|
if (jusers == NULL) {
|
||||||
|
errorMessage = "java/lang/OutOfMemoryError";
|
||||||
|
goto END;
|
||||||
|
}
|
||||||
|
|
||||||
|
UserList * current = NULL;
|
||||||
|
|
||||||
|
// note that the loop iterates over list but also over array (i)
|
||||||
|
int i = 0;
|
||||||
|
for(current = userListHead; current != NULL; current = current->next) {
|
||||||
|
jstring juser = (*env)->NewStringUTF(env, current->string);
|
||||||
|
if (juser == NULL) {
|
||||||
|
errorMessage = "java/lang/OutOfMemoryError";
|
||||||
|
goto END;
|
||||||
|
}
|
||||||
|
(*env)->SetObjectArrayElement(env, jusers, i++, juser);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
END:
|
||||||
|
|
||||||
|
// cleanup
|
||||||
|
if(cgroup) { (*env)->ReleaseStringUTFChars(env, jgroup, cgroup); }
|
||||||
|
if(setnetgrentCalledFlag) { endnetgrent(); }
|
||||||
|
while(userListHead) {
|
||||||
|
UserList *current = userListHead;
|
||||||
|
userListHead = userListHead->next;
|
||||||
|
if(current->string) { free(current->string); }
|
||||||
|
free(current);
|
||||||
|
}
|
||||||
|
|
||||||
|
// return results or THROW
|
||||||
|
if(errorMessage) {
|
||||||
|
THROW(env, errorMessage, NULL);
|
||||||
|
return NULL;
|
||||||
|
} else {
|
||||||
|
return jusers;
|
||||||
|
}
|
||||||
|
}
|
@ -19,15 +19,152 @@
|
|||||||
|
|
||||||
import java.util.Iterator;
|
import java.util.Iterator;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.junit.Before;
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertFalse;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.junit.Assume.assumeTrue;
|
||||||
|
|
||||||
|
import org.apache.hadoop.classification.InterfaceAudience;
|
||||||
|
import org.apache.hadoop.classification.InterfaceStability;
|
||||||
|
|
||||||
|
import org.apache.commons.logging.Log;
|
||||||
|
import org.apache.commons.logging.LogFactory;
|
||||||
|
|
||||||
|
import org.apache.hadoop.fs.CommonConfigurationKeysPublic;
|
||||||
|
import org.apache.hadoop.util.NativeCodeLoader;
|
||||||
|
import org.apache.hadoop.conf.Configuration;
|
||||||
|
import org.apache.hadoop.security.Groups;
|
||||||
import org.apache.hadoop.security.UserGroupInformation;
|
import org.apache.hadoop.security.UserGroupInformation;
|
||||||
import org.apache.hadoop.security.authorize.AccessControlList;
|
import org.apache.hadoop.security.authorize.AccessControlList;
|
||||||
|
|
||||||
|
@InterfaceAudience.LimitedPrivate({"HDFS", "MapReduce"})
|
||||||
|
@InterfaceStability.Evolving
|
||||||
|
public class TestAccessControlList {
|
||||||
|
|
||||||
import junit.framework.TestCase;
|
private static final Log LOG =
|
||||||
|
LogFactory.getLog(TestAccessControlList.class);
|
||||||
|
|
||||||
public class TestAccessControlList extends TestCase {
|
/**
|
||||||
|
* Test the netgroups (groups in ACL rules that start with @)
|
||||||
|
*
|
||||||
|
* This is a manual test because it requires:
|
||||||
|
* - host setup
|
||||||
|
* - native code compiled
|
||||||
|
* - specify the group mapping class
|
||||||
|
*
|
||||||
|
* Host setup:
|
||||||
|
*
|
||||||
|
* /etc/nsswitch.conf should have a line like this:
|
||||||
|
* netgroup: files
|
||||||
|
*
|
||||||
|
* /etc/netgroup should be (the whole file):
|
||||||
|
* lasVegas (,elvis,)
|
||||||
|
* memphis (,elvis,) (,jerryLeeLewis,)
|
||||||
|
*
|
||||||
|
* To run this test:
|
||||||
|
*
|
||||||
|
* export JAVA_HOME='path/to/java'
|
||||||
|
* ant \
|
||||||
|
* -Dtestcase=TestAccessControlList \
|
||||||
|
* -Dtest.output=yes \
|
||||||
|
* -DTestAccessControlListGroupMapping=$className \
|
||||||
|
* compile-native test
|
||||||
|
*
|
||||||
|
* where $className is one of the classes that provide group
|
||||||
|
* mapping services, i.e. classes that implement
|
||||||
|
* GroupMappingServiceProvider interface, at this time:
|
||||||
|
* - org.apache.hadoop.security.JniBasedUnixGroupsNetgroupMapping
|
||||||
|
* - org.apache.hadoop.security.ShellBasedUnixGroupsNetgroupMapping
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void testNetgroups() throws Exception {
|
||||||
|
|
||||||
|
if(!NativeCodeLoader.isNativeCodeLoaded()) {
|
||||||
|
LOG.info("Not testing netgroups, " +
|
||||||
|
"this test only runs when native code is compiled");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
String groupMappingClassName =
|
||||||
|
System.getProperty("TestAccessControlListGroupMapping");
|
||||||
|
|
||||||
|
if(groupMappingClassName == null) {
|
||||||
|
LOG.info("Not testing netgroups, no group mapping class specified, " +
|
||||||
|
"use -DTestAccessControlListGroupMapping=$className to specify " +
|
||||||
|
"group mapping class (must implement GroupMappingServiceProvider " +
|
||||||
|
"interface and support netgroups)");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
LOG.info("Testing netgroups using: " + groupMappingClassName);
|
||||||
|
|
||||||
|
Configuration conf = new Configuration();
|
||||||
|
conf.set(CommonConfigurationKeysPublic.HADOOP_SECURITY_GROUP_MAPPING,
|
||||||
|
groupMappingClassName);
|
||||||
|
|
||||||
|
Groups groups = Groups.getUserToGroupsMappingService(conf);
|
||||||
|
|
||||||
|
AccessControlList acl;
|
||||||
|
|
||||||
|
// create these ACLs to populate groups cache
|
||||||
|
acl = new AccessControlList("ja my"); // plain
|
||||||
|
acl = new AccessControlList("sinatra ratpack,@lasVegas"); // netgroup
|
||||||
|
acl = new AccessControlList(" somegroup,@someNetgroup"); // no user
|
||||||
|
|
||||||
|
// this ACL will be used for testing ACLs
|
||||||
|
acl = new AccessControlList("carlPerkins ratpack,@lasVegas");
|
||||||
|
acl.addGroup("@memphis");
|
||||||
|
|
||||||
|
// validate the netgroups before and after rehresh to make
|
||||||
|
// sure refresh works correctly
|
||||||
|
validateNetgroups(groups, acl);
|
||||||
|
groups.refresh();
|
||||||
|
validateNetgroups(groups, acl);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validate the netgroups, both group membership and ACL
|
||||||
|
* functionality
|
||||||
|
*
|
||||||
|
* Note: assumes a specific acl setup done by testNetgroups
|
||||||
|
*
|
||||||
|
* @param groups group to user mapping service
|
||||||
|
* @param acl ACL set up in a specific way, see testNetgroups
|
||||||
|
*/
|
||||||
|
private void validateNetgroups(Groups groups,
|
||||||
|
AccessControlList acl) throws Exception {
|
||||||
|
|
||||||
|
// check that the netgroups are working
|
||||||
|
List<String> elvisGroups = groups.getGroups("elvis");
|
||||||
|
assertTrue(elvisGroups.contains("@lasVegas"));
|
||||||
|
assertTrue(elvisGroups.contains("@memphis"));
|
||||||
|
List<String> jerryLeeLewisGroups = groups.getGroups("jerryLeeLewis");
|
||||||
|
assertTrue(jerryLeeLewisGroups.contains("@memphis"));
|
||||||
|
|
||||||
|
// allowed becuase his netgroup is in ACL
|
||||||
|
UserGroupInformation elvis =
|
||||||
|
UserGroupInformation.createRemoteUser("elvis");
|
||||||
|
assertUserAllowed(elvis, acl);
|
||||||
|
|
||||||
|
// allowed because he's in ACL
|
||||||
|
UserGroupInformation carlPerkins =
|
||||||
|
UserGroupInformation.createRemoteUser("carlPerkins");
|
||||||
|
assertUserAllowed(carlPerkins, acl);
|
||||||
|
|
||||||
|
// not allowed because he's not in ACL and has no netgroups
|
||||||
|
UserGroupInformation littleRichard =
|
||||||
|
UserGroupInformation.createRemoteUser("littleRichard");
|
||||||
|
assertUserNotAllowed(littleRichard, acl);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
public void testWildCardAccessControlList() throws Exception {
|
public void testWildCardAccessControlList() throws Exception {
|
||||||
AccessControlList acl;
|
AccessControlList acl;
|
||||||
|
|
||||||
@ -46,6 +183,7 @@ public void testWildCardAccessControlList() throws Exception {
|
|||||||
|
|
||||||
// Check if AccessControlList.toString() works as expected.
|
// Check if AccessControlList.toString() works as expected.
|
||||||
// Also validate if getAclString() for various cases.
|
// Also validate if getAclString() for various cases.
|
||||||
|
@Test
|
||||||
public void testAclString() {
|
public void testAclString() {
|
||||||
AccessControlList acl;
|
AccessControlList acl;
|
||||||
|
|
||||||
@ -83,6 +221,7 @@ private void validateGetAclString(AccessControlList acl) {
|
|||||||
new AccessControlList(acl.getAclString()).toString()));
|
new AccessControlList(acl.getAclString()).toString()));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
public void testAccessControlList() throws Exception {
|
public void testAccessControlList() throws Exception {
|
||||||
AccessControlList acl;
|
AccessControlList acl;
|
||||||
Set<String> users;
|
Set<String> users;
|
||||||
@ -134,6 +273,7 @@ public void testAccessControlList() throws Exception {
|
|||||||
/**
|
/**
|
||||||
* Test addUser/Group and removeUser/Group api.
|
* Test addUser/Group and removeUser/Group api.
|
||||||
*/
|
*/
|
||||||
|
@Test
|
||||||
public void testAddRemoveAPI() {
|
public void testAddRemoveAPI() {
|
||||||
AccessControlList acl;
|
AccessControlList acl;
|
||||||
Set<String> users;
|
Set<String> users;
|
||||||
@ -196,6 +336,7 @@ public void testAddRemoveAPI() {
|
|||||||
/**
|
/**
|
||||||
* Tests adding/removing wild card as the user/group.
|
* Tests adding/removing wild card as the user/group.
|
||||||
*/
|
*/
|
||||||
|
@Test
|
||||||
public void testAddRemoveWildCard() {
|
public void testAddRemoveWildCard() {
|
||||||
AccessControlList acl = new AccessControlList("drwho tardis");
|
AccessControlList acl = new AccessControlList("drwho tardis");
|
||||||
|
|
||||||
@ -237,6 +378,7 @@ public void testAddRemoveWildCard() {
|
|||||||
/**
|
/**
|
||||||
* Tests adding user/group to an wild card acl.
|
* Tests adding user/group to an wild card acl.
|
||||||
*/
|
*/
|
||||||
|
@Test
|
||||||
public void testAddRemoveToWildCardACL() {
|
public void testAddRemoveToWildCardACL() {
|
||||||
AccessControlList acl = new AccessControlList(" * ");
|
AccessControlList acl = new AccessControlList(" * ");
|
||||||
assertTrue(acl.isAllAllowed());
|
assertTrue(acl.isAllAllowed());
|
||||||
@ -266,6 +408,7 @@ public void testAddRemoveToWildCardACL() {
|
|||||||
/**
|
/**
|
||||||
* Verify the method isUserAllowed()
|
* Verify the method isUserAllowed()
|
||||||
*/
|
*/
|
||||||
|
@Test
|
||||||
public void testIsUserAllowed() {
|
public void testIsUserAllowed() {
|
||||||
AccessControlList acl;
|
AccessControlList acl;
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user