001/*
002 * Licensed to the Apache Software Foundation (ASF) under one
003 * or more contributor license agreements.  See the NOTICE file
004 * distributed with this work for additional information
005 * regarding copyright ownership.  The ASF licenses this file
006 * to you under the Apache License, Version 2.0 (the
007 * "License"); you may not use this file except in compliance
008 * with the License.  You may obtain a copy of the License at
009 *
010 *     http://www.apache.org/licenses/LICENSE-2.0
011 *
012 * Unless required by applicable law or agreed to in writing, software
013 * distributed under the License is distributed on an "AS IS" BASIS,
014 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
015 * See the License for the specific language governing permissions and
016 * limitations under the License.
017 */
018package org.apache.hadoop.hbase.security;
019
020import org.apache.hadoop.hbase.shaded.protobuf.generated.MasterProtos;
021import org.apache.hadoop.conf.Configuration;
022import org.apache.hadoop.hbase.shaded.protobuf.generated.AdminProtos.AdminService;
023import org.apache.hadoop.hbase.shaded.protobuf.generated.ClientProtos.ClientService;
024import org.apache.hadoop.hbase.shaded.protobuf.generated.MasterProtos.MasterService;
025import org.apache.hadoop.hbase.shaded.protobuf.generated.RegionServerStatusProtos.RegionServerStatusService;
026import org.apache.hadoop.security.authorize.PolicyProvider;
027import org.apache.hadoop.security.authorize.ProxyUsers;
028import org.apache.hadoop.security.authorize.Service;
029import org.apache.hadoop.security.authorize.ServiceAuthorizationManager;
030import org.apache.yetus.audience.InterfaceAudience;
031
032/**
033 * Implementation of secure Hadoop policy provider for mapping
034 * protocol interfaces to hbase-policy.xml entries.
035 */
036@InterfaceAudience.Private
037public class HBasePolicyProvider extends PolicyProvider {
038  protected final static Service[] services = {
039    new Service("security.client.protocol.acl", ClientService.BlockingInterface.class),
040    new Service("security.client.protocol.acl", AdminService.BlockingInterface.class),
041    new Service("security.client.protocol.acl",
042      MasterProtos.HbckService.BlockingInterface.class),
043    new Service("security.client.protocol.acl",
044      MasterProtos.ClientMetaService.BlockingInterface.class),
045    new Service("security.admin.protocol.acl", MasterService.BlockingInterface.class),
046    new Service("security.masterregion.protocol.acl",
047      RegionServerStatusService.BlockingInterface.class)
048  };
049
050  @Override
051  public Service[] getServices() {
052    return services;
053  }
054
055  public static void init(Configuration conf, ServiceAuthorizationManager authManager) {
056    // set service-level authorization security policy
057    System.setProperty("hadoop.policy.file", "hbase-policy.xml");
058    if (conf.getBoolean(ServiceAuthorizationManager.SERVICE_AUTHORIZATION_CONFIG, false)) {
059      authManager.refresh(conf, new HBasePolicyProvider());
060      ProxyUsers.refreshSuperUserGroupsConfiguration(conf);
061    }
062  }
063}