001/* 002 * Licensed to the Apache Software Foundation (ASF) under one 003 * or more contributor license agreements. See the NOTICE file 004 * distributed with this work for additional information 005 * regarding copyright ownership. The ASF licenses this file 006 * to you under the Apache License, Version 2.0 (the 007 * "License"); you may not use this file except in compliance 008 * with the License. You may obtain a copy of the License at 009 * 010 * http://www.apache.org/licenses/LICENSE-2.0 011 * 012 * Unless required by applicable law or agreed to in writing, software 013 * distributed under the License is distributed on an "AS IS" BASIS, 014 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 015 * See the License for the specific language governing permissions and 016 * limitations under the License. 017 */ 018package org.apache.hadoop.hbase.security; 019 020import org.apache.hadoop.hbase.shaded.protobuf.generated.MasterProtos; 021import org.apache.hadoop.conf.Configuration; 022import org.apache.hadoop.hbase.shaded.protobuf.generated.AdminProtos.AdminService; 023import org.apache.hadoop.hbase.shaded.protobuf.generated.ClientProtos.ClientService; 024import org.apache.hadoop.hbase.shaded.protobuf.generated.MasterProtos.MasterService; 025import org.apache.hadoop.hbase.shaded.protobuf.generated.RegionServerStatusProtos.RegionServerStatusService; 026import org.apache.hadoop.security.authorize.PolicyProvider; 027import org.apache.hadoop.security.authorize.ProxyUsers; 028import org.apache.hadoop.security.authorize.Service; 029import org.apache.hadoop.security.authorize.ServiceAuthorizationManager; 030import org.apache.yetus.audience.InterfaceAudience; 031 032/** 033 * Implementation of secure Hadoop policy provider for mapping 034 * protocol interfaces to hbase-policy.xml entries. 035 */ 036@InterfaceAudience.Private 037public class HBasePolicyProvider extends PolicyProvider { 038 protected final static Service[] services = { 039 new Service("security.client.protocol.acl", ClientService.BlockingInterface.class), 040 new Service("security.client.protocol.acl", AdminService.BlockingInterface.class), 041 new Service("security.client.protocol.acl", 042 MasterProtos.HbckService.BlockingInterface.class), 043 new Service("security.client.protocol.acl", 044 MasterProtos.ClientMetaService.BlockingInterface.class), 045 new Service("security.admin.protocol.acl", MasterService.BlockingInterface.class), 046 new Service("security.masterregion.protocol.acl", 047 RegionServerStatusService.BlockingInterface.class) 048 }; 049 050 @Override 051 public Service[] getServices() { 052 return services; 053 } 054 055 public static void init(Configuration conf, ServiceAuthorizationManager authManager) { 056 // set service-level authorization security policy 057 System.setProperty("hadoop.policy.file", "hbase-policy.xml"); 058 if (conf.getBoolean(ServiceAuthorizationManager.SERVICE_AUTHORIZATION_CONFIG, false)) { 059 authManager.refresh(conf, new HBasePolicyProvider()); 060 ProxyUsers.refreshSuperUserGroupsConfiguration(conf); 061 } 062 } 063}