/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.hbase.security.access; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertTrue; import java.util.ArrayList; import java.util.List; import java.util.concurrent.atomic.AtomicBoolean; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.hbase.Abortable; import org.apache.hadoop.hbase.TableName; import org.apache.hadoop.hbase.HBaseTestingUtility; import org.apache.hadoop.hbase.Waiter.Predicate; import org.apache.hadoop.hbase.security.User; import org.apache.hadoop.hbase.testclassification.LargeTests; import org.apache.hadoop.hbase.testclassification.SecurityTests; import org.apache.hadoop.hbase.zookeeper.ZooKeeperWatcher; import org.junit.AfterClass; import org.junit.BeforeClass; import org.junit.Test; import org.junit.experimental.categories.Category; /** * Test the reading and writing of access permissions to and from zookeeper. */ @Category({SecurityTests.class, LargeTests.class}) public class TestZKPermissionsWatcher { private static final Log LOG = LogFactory.getLog(TestZKPermissionsWatcher.class); private static final HBaseTestingUtility UTIL = new HBaseTestingUtility(); private static TableAuthManager AUTH_A; private static TableAuthManager AUTH_B; private final static Abortable ABORTABLE = new Abortable() { private final AtomicBoolean abort = new AtomicBoolean(false); @Override public void abort(String why, Throwable e) { LOG.info(why, e); abort.set(true); } @Override public boolean isAborted() { return abort.get(); } }; private static TableName TEST_TABLE = TableName.valueOf("perms_test"); @BeforeClass public static void beforeClass() throws Exception { // setup configuration Configuration conf = UTIL.getConfiguration(); SecureTestUtil.enableSecurity(conf); // start minicluster UTIL.startMiniCluster(); AUTH_A = TableAuthManager.getOrCreate(new ZooKeeperWatcher(conf, "TestZKPermissionsWatcher_1", ABORTABLE), conf); AUTH_B = TableAuthManager.getOrCreate(new ZooKeeperWatcher(conf, "TestZKPermissionsWatcher_2", ABORTABLE), conf); } @AfterClass public static void afterClass() throws Exception { UTIL.shutdownMiniCluster(); } @Test public void testPermissionsWatcher() throws Exception { Configuration conf = UTIL.getConfiguration(); User george = User.createUserForTesting(conf, "george", new String[] { }); User hubert = User.createUserForTesting(conf, "hubert", new String[] { }); assertFalse(AUTH_A.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_A.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.WRITE)); assertFalse(AUTH_A.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_A.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.WRITE)); assertFalse(AUTH_B.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_B.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.WRITE)); assertFalse(AUTH_B.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_B.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.WRITE)); // update ACL: george RW List<TablePermission> acl = new ArrayList<>(1); acl.add(new TablePermission(TEST_TABLE, null, TablePermission.Action.READ, TablePermission.Action.WRITE)); final long mtimeB = AUTH_B.getMTime(); AUTH_A.setTableUserPermissions(george.getShortName(), TEST_TABLE, acl); // Wait for the update to propagate UTIL.waitFor(10000, 100, new Predicate<Exception>() { @Override public boolean evaluate() throws Exception { return AUTH_B.getMTime() > mtimeB; } }); Thread.sleep(1000); // check it assertTrue(AUTH_A.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.READ)); assertTrue(AUTH_A.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.WRITE)); assertTrue(AUTH_B.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.READ)); assertTrue(AUTH_B.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.WRITE)); assertFalse(AUTH_A.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_A.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.WRITE)); assertFalse(AUTH_B.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_B.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.WRITE)); // update ACL: hubert R acl = new ArrayList<>(1); acl.add(new TablePermission(TEST_TABLE, null, TablePermission.Action.READ)); final long mtimeA = AUTH_A.getMTime(); AUTH_B.setTableUserPermissions("hubert", TEST_TABLE, acl); // Wait for the update to propagate UTIL.waitFor(10000, 100, new Predicate<Exception>() { @Override public boolean evaluate() throws Exception { return AUTH_A.getMTime() > mtimeA; } }); Thread.sleep(1000); // check it assertTrue(AUTH_A.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.READ)); assertTrue(AUTH_A.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.WRITE)); assertTrue(AUTH_B.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.READ)); assertTrue(AUTH_B.authorizeUser(george, TEST_TABLE, null, TablePermission.Action.WRITE)); assertTrue(AUTH_A.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_A.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.WRITE)); assertTrue(AUTH_B.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.READ)); assertFalse(AUTH_B.authorizeUser(hubert, TEST_TABLE, null, TablePermission.Action.WRITE)); } }