001/*
002 * Licensed to the Apache Software Foundation (ASF) under one
003 * or more contributor license agreements.  See the NOTICE file
004 * distributed with this work for additional information
005 * regarding copyright ownership.  The ASF licenses this file
006 * to you under the Apache License, Version 2.0 (the
007 * "License"); you may not use this file except in compliance
008 * with the License.  You may obtain a copy of the License at
009 *
010 *     http://www.apache.org/licenses/LICENSE-2.0
011 *
012 * Unless required by applicable law or agreed to in writing, software
013 * distributed under the License is distributed on an "AS IS" BASIS,
014 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
015 * See the License for the specific language governing permissions and
016 * limitations under the License.
017 */
018package org.apache.hadoop.hbase.security;
019
020import org.apache.hadoop.conf.Configuration;
021import org.apache.hadoop.security.authorize.PolicyProvider;
022import org.apache.hadoop.security.authorize.ProxyUsers;
023import org.apache.hadoop.security.authorize.Service;
024import org.apache.hadoop.security.authorize.ServiceAuthorizationManager;
025import org.apache.yetus.audience.InterfaceAudience;
026
027import org.apache.hadoop.hbase.shaded.protobuf.generated.AdminProtos.AdminService;
028import org.apache.hadoop.hbase.shaded.protobuf.generated.ClientProtos.ClientService;
029import org.apache.hadoop.hbase.shaded.protobuf.generated.MasterProtos;
030import org.apache.hadoop.hbase.shaded.protobuf.generated.MasterProtos.MasterService;
031import org.apache.hadoop.hbase.shaded.protobuf.generated.RegionServerStatusProtos.RegionServerStatusService;
032import org.apache.hadoop.hbase.shaded.protobuf.generated.RegistryProtos;
033
034/**
035 * Implementation of secure Hadoop policy provider for mapping protocol interfaces to
036 * hbase-policy.xml entries.
037 */
038@InterfaceAudience.Private
039public class HBasePolicyProvider extends PolicyProvider {
040  protected final static Service[] services =
041    { new Service("security.client.protocol.acl", ClientService.BlockingInterface.class),
042      new Service("security.client.protocol.acl", AdminService.BlockingInterface.class),
043      new Service("security.client.protocol.acl", MasterProtos.HbckService.BlockingInterface.class),
044      new Service("security.client.protocol.acl",
045        RegistryProtos.ClientMetaService.BlockingInterface.class),
046      new Service("security.admin.protocol.acl", MasterService.BlockingInterface.class),
047      new Service("security.masterregion.protocol.acl",
048        RegionServerStatusService.BlockingInterface.class) };
049
050  @Override
051  public Service[] getServices() {
052    return services;
053  }
054
055  public static void init(Configuration conf, ServiceAuthorizationManager authManager) {
056    // set service-level authorization security policy
057    System.setProperty("hadoop.policy.file", "hbase-policy.xml");
058    if (conf.getBoolean(ServiceAuthorizationManager.SERVICE_AUTHORIZATION_CONFIG, false)) {
059      authManager.refresh(conf, new HBasePolicyProvider());
060      ProxyUsers.refreshSuperUserGroupsConfiguration(conf);
061    }
062  }
063}