/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/security/authorize/TestServiceAuthorization.java

http://github.com/apache/hadoop-common · Java · 184 lines · 134 code · 19 blank · 31 comment · 0 complexity · a88c12525c4e1e7f55f62eddc7612ab1 MD5 · raw file

  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. package org.apache.hadoop.security.authorize;
  19. import static org.junit.Assert.assertEquals;
  20. import static org.junit.Assert.fail;
  21. import java.net.InetAddress;
  22. import java.net.UnknownHostException;
  23. import org.apache.hadoop.conf.Configuration;
  24. import org.apache.hadoop.fs.CommonConfigurationKeys;
  25. import org.apache.hadoop.ipc.TestRPC.TestProtocol;
  26. import org.apache.hadoop.security.UserGroupInformation;
  27. import org.junit.Test;
  28. public class TestServiceAuthorization {
  29. private static final String ACL_CONFIG = "test.protocol.acl";
  30. private static final String ACL_CONFIG1 = "test.protocol1.acl";
  31. private static final String ADDRESS = "0.0.0.0";
  32. public interface TestProtocol1 extends TestProtocol {};
  33. private static class TestPolicyProvider extends PolicyProvider {
  34. @Override
  35. public Service[] getServices() {
  36. return new Service[] { new Service(ACL_CONFIG, TestProtocol.class),
  37. new Service(ACL_CONFIG1, TestProtocol1.class),
  38. };
  39. }
  40. }
  41. @Test
  42. public void testDefaultAcl() {
  43. ServiceAuthorizationManager serviceAuthorizationManager =
  44. new ServiceAuthorizationManager();
  45. Configuration conf = new Configuration ();
  46. //test without setting a default acl
  47. conf.set(ACL_CONFIG, "user1 group1");
  48. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  49. AccessControlList acl = serviceAuthorizationManager.getProtocolsAcls(TestProtocol.class);
  50. assertEquals("user1 group1", acl.getAclString());
  51. acl = serviceAuthorizationManager.getProtocolsAcls(TestProtocol1.class);
  52. assertEquals(AccessControlList.WILDCARD_ACL_VALUE, acl.getAclString());
  53. //test with a default acl
  54. conf.set(
  55. CommonConfigurationKeys.HADOOP_SECURITY_SERVICE_AUTHORIZATION_DEFAULT_ACL,
  56. "user2 group2");
  57. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  58. acl = serviceAuthorizationManager.getProtocolsAcls(TestProtocol.class);
  59. assertEquals("user1 group1", acl.getAclString());
  60. acl = serviceAuthorizationManager.getProtocolsAcls(TestProtocol1.class);
  61. assertEquals("user2 group2", acl.getAclString());
  62. }
  63. @Test
  64. public void testBlockedAcl() throws UnknownHostException {
  65. UserGroupInformation drwho =
  66. UserGroupInformation.createUserForTesting("drwho@EXAMPLE.COM",
  67. new String[] { "group1", "group2" });
  68. ServiceAuthorizationManager serviceAuthorizationManager =
  69. new ServiceAuthorizationManager();
  70. Configuration conf = new Configuration ();
  71. //test without setting a blocked acl
  72. conf.set(ACL_CONFIG, "user1 group1");
  73. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  74. try {
  75. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  76. InetAddress.getByName(ADDRESS));
  77. } catch (AuthorizationException e) {
  78. fail();
  79. }
  80. //now set a blocked acl with another user and another group
  81. conf.set(ACL_CONFIG + ServiceAuthorizationManager.BLOCKED, "drwho2 group3");
  82. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  83. try {
  84. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  85. InetAddress.getByName(ADDRESS));
  86. } catch (AuthorizationException e) {
  87. fail();
  88. }
  89. //now set a blocked acl with the user and another group
  90. conf.set(ACL_CONFIG + ServiceAuthorizationManager.BLOCKED, "drwho group3");
  91. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  92. try {
  93. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  94. InetAddress.getByName(ADDRESS));
  95. fail();
  96. } catch (AuthorizationException e) {
  97. }
  98. //now set a blocked acl with another user and another group
  99. conf.set(ACL_CONFIG + ServiceAuthorizationManager.BLOCKED, "drwho2 group3");
  100. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  101. try {
  102. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  103. InetAddress.getByName(ADDRESS));
  104. } catch (AuthorizationException e) {
  105. fail();
  106. }
  107. //now set a blocked acl with another user and group that the user belongs to
  108. conf.set(ACL_CONFIG + ServiceAuthorizationManager.BLOCKED, "drwho2 group2");
  109. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  110. try {
  111. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  112. InetAddress.getByName(ADDRESS));
  113. fail();
  114. } catch (AuthorizationException e) {
  115. //expects Exception
  116. }
  117. //reset blocked acl so that there is no blocked ACL
  118. conf.set(ACL_CONFIG + ServiceAuthorizationManager.BLOCKED, "");
  119. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  120. try {
  121. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  122. InetAddress.getByName(ADDRESS));
  123. } catch (AuthorizationException e) {
  124. fail();
  125. }
  126. }
  127. @Test
  128. public void testDefaultBlockedAcl() throws UnknownHostException {
  129. UserGroupInformation drwho =
  130. UserGroupInformation.createUserForTesting("drwho@EXAMPLE.COM",
  131. new String[] { "group1", "group2" });
  132. ServiceAuthorizationManager serviceAuthorizationManager =
  133. new ServiceAuthorizationManager();
  134. Configuration conf = new Configuration ();
  135. //test without setting a default blocked acl
  136. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  137. try {
  138. serviceAuthorizationManager.authorize(drwho, TestProtocol1.class, conf,
  139. InetAddress.getByName(ADDRESS));
  140. } catch (AuthorizationException e) {
  141. fail();
  142. }
  143. //set a restrictive default blocked acl and an non-restricting blocked acl for TestProtocol
  144. conf.set(
  145. CommonConfigurationKeys.HADOOP_SECURITY_SERVICE_AUTHORIZATION_DEFAULT_BLOCKED_ACL,
  146. "user2 group2");
  147. conf.set(ACL_CONFIG + ServiceAuthorizationManager.BLOCKED, "user2");
  148. serviceAuthorizationManager.refresh(conf, new TestPolicyProvider());
  149. //drwho is authorized to access TestProtocol
  150. try {
  151. serviceAuthorizationManager.authorize(drwho, TestProtocol.class, conf,
  152. InetAddress.getByName(ADDRESS));
  153. } catch (AuthorizationException e) {
  154. fail();
  155. }
  156. //drwho is not authorized to access TestProtocol1 because it uses the default blocked acl.
  157. try {
  158. serviceAuthorizationManager.authorize(drwho, TestProtocol1.class, conf,
  159. InetAddress.getByName(ADDRESS));
  160. fail();
  161. } catch (AuthorizationException e) {
  162. //expects Exception
  163. }
  164. }
  165. }