001/* 002 * Licensed to the Apache Software Foundation (ASF) under one 003 * or more contributor license agreements. See the NOTICE file 004 * distributed with this work for additional information 005 * regarding copyright ownership. The ASF licenses this file 006 * to you under the Apache License, Version 2.0 (the 007 * "License"); you may not use this file except in compliance 008 * with the License. You may obtain a copy of the License at 009 * 010 * http://www.apache.org/licenses/LICENSE-2.0 011 * 012 * Unless required by applicable law or agreed to in writing, software 013 * distributed under the License is distributed on an "AS IS" BASIS, 014 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 015 * See the License for the specific language governing permissions and 016 * limitations under the License. 017 */ 018package org.apache.hadoop.hbase.security.access; 019 020import java.io.IOException; 021import java.net.InetAddress; 022import java.security.PrivilegedAction; 023import java.security.PrivilegedExceptionAction; 024import java.util.ArrayList; 025import java.util.Collection; 026import java.util.List; 027import java.util.Map; 028import java.util.Set; 029import java.util.TreeMap; 030import org.apache.hadoop.conf.Configuration; 031import org.apache.hadoop.hbase.AuthUtil; 032import org.apache.hadoop.hbase.Cell; 033import org.apache.hadoop.hbase.CellUtil; 034import org.apache.hadoop.hbase.DoNotRetryIOException; 035import org.apache.hadoop.hbase.HBaseInterfaceAudience; 036import org.apache.hadoop.hbase.NamespaceDescriptor; 037import org.apache.hadoop.hbase.TableName; 038import org.apache.hadoop.hbase.client.RegionInfo; 039import org.apache.hadoop.hbase.ipc.RpcServer; 040import org.apache.hadoop.hbase.security.AccessDeniedException; 041import org.apache.hadoop.hbase.security.Superusers; 042import org.apache.hadoop.hbase.security.User; 043import org.apache.hadoop.hbase.security.UserProvider; 044import org.apache.hadoop.hbase.security.access.Permission.Action; 045import org.apache.hadoop.hbase.util.Bytes; 046import org.apache.hadoop.security.Groups; 047import org.apache.hadoop.security.HadoopKerberosName; 048import org.apache.hadoop.security.UserGroupInformation; 049import org.apache.yetus.audience.InterfaceAudience; 050import org.apache.yetus.audience.InterfaceStability; 051import org.slf4j.Logger; 052import org.slf4j.LoggerFactory; 053 054import org.apache.hbase.thirdparty.com.google.common.collect.ImmutableSet; 055 056@InterfaceAudience.LimitedPrivate(HBaseInterfaceAudience.COPROC) 057@InterfaceStability.Evolving 058public class AccessChecker { 059 private static final Logger LOG = LoggerFactory.getLogger(AccessChecker.class); 060 private static final Logger AUDITLOG = 061 LoggerFactory.getLogger("SecurityLogger." + AccessChecker.class.getName()); 062 private final AuthManager authManager; 063 064 /** Group service to retrieve the user group information */ 065 private static Groups groupService; 066 067 public static boolean isAuthorizationSupported(Configuration conf) { 068 return conf.getBoolean(User.HBASE_SECURITY_AUTHORIZATION_CONF_KEY, false); 069 } 070 071 /** 072 * Constructor with existing configuration 073 * @param conf Existing configuration to use 074 */ 075 public AccessChecker(final Configuration conf) { 076 this.authManager = new AuthManager(conf); 077 initGroupService(conf); 078 } 079 080 public AuthManager getAuthManager() { 081 return authManager; 082 } 083 084 /** 085 * Authorizes that the current user has any of the given permissions to access the table. 086 * @param user Active user to which authorization checks should be applied 087 * @param request Request type. 088 * @param tableName Table requested 089 * @param permissions Actions being requested 090 * @throws IOException if obtaining the current user fails 091 * @throws AccessDeniedException if user has no authorization 092 */ 093 public void requireAccess(User user, String request, TableName tableName, Action... permissions) 094 throws IOException { 095 AuthResult result = null; 096 097 for (Action permission : permissions) { 098 if (authManager.accessUserTable(user, tableName, permission)) { 099 result = AuthResult.allow(request, "Table permission granted", user, permission, tableName, 100 null, null); 101 break; 102 } else { 103 // rest of the world 104 result = AuthResult.deny(request, "Insufficient permissions", user, permission, tableName, 105 null, null); 106 } 107 } 108 logResult(result); 109 if (!result.isAllowed()) { 110 throw new AccessDeniedException("Insufficient permissions " + result.toContextString()); 111 } 112 } 113 114 /** 115 * Authorizes that the current user has global privileges for the given action. 116 * @param user Active user to which authorization checks should be applied 117 * @param request Request type 118 * @param filterUser User name to be filtered from permission as requested 119 * @param perm The action being requested 120 * @throws IOException if obtaining the current user fails 121 * @throws AccessDeniedException if authorization is denied 122 */ 123 public void requirePermission(User user, String request, String filterUser, Action perm) 124 throws IOException { 125 requireGlobalPermission(user, request, perm, null, null, filterUser); 126 } 127 128 /** 129 * Checks that the user has the given global permission. The generated audit log message will 130 * contain context information for the operation being authorized, based on the given parameters. 131 * @param user Active user to which authorization checks should be applied 132 * @param request Request type 133 * @param perm Action being requested 134 * @param tableName Affected table name. 135 * @param familyMap Affected column families. 136 * @param filterUser User name to be filtered from permission as requested 137 */ 138 public void requireGlobalPermission(User user, String request, Action perm, TableName tableName, 139 Map<byte[], ? extends Collection<byte[]>> familyMap, String filterUser) throws IOException { 140 AuthResult result; 141 if (authManager.authorizeUserGlobal(user, perm)) { 142 result = AuthResult.allow(request, "Global check allowed", user, perm, tableName, familyMap); 143 } else { 144 result = AuthResult.deny(request, "Global check failed", user, perm, tableName, familyMap); 145 } 146 result.getParams().setTableName(tableName).setFamilies(familyMap); 147 result.getParams().addExtraParam("filterUser", filterUser); 148 logResult(result); 149 if (!result.isAllowed()) { 150 throw new AccessDeniedException( 151 "Insufficient permissions for user '" + (user != null ? user.getShortName() : "null") 152 + "' (global, action=" + perm.toString() + ")"); 153 } 154 } 155 156 /** 157 * Checks that the user has the given global permission. The generated audit log message will 158 * contain context information for the operation being authorized, based on the given parameters. 159 * @param user Active user to which authorization checks should be applied 160 * @param request Request type 161 * @param perm Action being requested 162 * @param namespace The given namespace 163 */ 164 public void requireGlobalPermission(User user, String request, Action perm, String namespace) 165 throws IOException { 166 AuthResult authResult; 167 if (authManager.authorizeUserGlobal(user, perm)) { 168 authResult = AuthResult.allow(request, "Global check allowed", user, perm, null); 169 authResult.getParams().setNamespace(namespace); 170 logResult(authResult); 171 } else { 172 authResult = AuthResult.deny(request, "Global check failed", user, perm, null); 173 authResult.getParams().setNamespace(namespace); 174 logResult(authResult); 175 throw new AccessDeniedException( 176 "Insufficient permissions for user '" + (user != null ? user.getShortName() : "null") 177 + "' (global, action=" + perm.toString() + ")"); 178 } 179 } 180 181 /** 182 * Checks that the user has the given global or namespace permission. 183 * @param user Active user to which authorization checks should be applied 184 * @param request Request type 185 * @param namespace Name space as requested 186 * @param filterUser User name to be filtered from permission as requested 187 * @param permissions Actions being requested 188 */ 189 public void requireNamespacePermission(User user, String request, String namespace, 190 String filterUser, Action... permissions) throws IOException { 191 AuthResult result = null; 192 193 for (Action permission : permissions) { 194 if (authManager.authorizeUserNamespace(user, namespace, permission)) { 195 result = 196 AuthResult.allow(request, "Namespace permission granted", user, permission, namespace); 197 break; 198 } else { 199 // rest of the world 200 result = AuthResult.deny(request, "Insufficient permissions", user, permission, namespace); 201 } 202 } 203 result.getParams().addExtraParam("filterUser", filterUser); 204 logResult(result); 205 if (!result.isAllowed()) { 206 throw new AccessDeniedException("Insufficient permissions " + result.toContextString()); 207 } 208 } 209 210 /** 211 * Checks that the user has the given global or namespace permission. 212 * @param user Active user to which authorization checks should be applied 213 * @param request Request type 214 * @param namespace The given namespace 215 * @param tableName Table requested 216 * @param familyMap Column family map requested 217 * @param permissions Actions being requested 218 */ 219 public void requireNamespacePermission(User user, String request, String namespace, 220 TableName tableName, Map<byte[], ? extends Collection<byte[]>> familyMap, Action... permissions) 221 throws IOException { 222 AuthResult result = null; 223 224 for (Action permission : permissions) { 225 if (authManager.authorizeUserNamespace(user, namespace, permission)) { 226 result = 227 AuthResult.allow(request, "Namespace permission granted", user, permission, namespace); 228 result.getParams().setTableName(tableName).setFamilies(familyMap); 229 break; 230 } else { 231 // rest of the world 232 result = AuthResult.deny(request, "Insufficient permissions", user, permission, namespace); 233 result.getParams().setTableName(tableName).setFamilies(familyMap); 234 } 235 } 236 logResult(result); 237 if (!result.isAllowed()) { 238 throw new AccessDeniedException("Insufficient permissions " + result.toContextString()); 239 } 240 } 241 242 /** 243 * Authorizes that the current user has any of the given permissions for the given table, column 244 * family and column qualifier. 245 * @param user Active user to which authorization checks should be applied 246 * @param request Request type 247 * @param tableName Table requested 248 * @param family Column family requested 249 * @param qualifier Column qualifier requested 250 * @param filterUser User name to be filtered from permission as requested 251 * @param permissions Actions being requested 252 * @throws IOException if obtaining the current user fails 253 * @throws AccessDeniedException if user has no authorization 254 */ 255 public void requirePermission(User user, String request, TableName tableName, byte[] family, 256 byte[] qualifier, String filterUser, Action... permissions) throws IOException { 257 AuthResult result = null; 258 259 for (Action permission : permissions) { 260 if (authManager.authorizeUserTable(user, tableName, family, qualifier, permission)) { 261 result = AuthResult.allow(request, "Table permission granted", user, permission, tableName, 262 family, qualifier); 263 break; 264 } else { 265 // rest of the world 266 result = AuthResult.deny(request, "Insufficient permissions", user, permission, tableName, 267 family, qualifier); 268 } 269 } 270 result.getParams().addExtraParam("filterUser", filterUser); 271 logResult(result); 272 if (!result.isAllowed()) { 273 throw new AccessDeniedException("Insufficient permissions " + result.toContextString()); 274 } 275 } 276 277 /** 278 * Authorizes that the current user has any of the given permissions for the given table, column 279 * family and column qualifier. 280 * @param user Active user to which authorization checks should be applied 281 * @param request Request type 282 * @param tableName Table requested 283 * @param family Column family param 284 * @param qualifier Column qualifier param 285 * @throws IOException if obtaining the current user fails 286 * @throws AccessDeniedException if user has no authorization 287 */ 288 public void requireTablePermission(User user, String request, TableName tableName, byte[] family, 289 byte[] qualifier, Action... permissions) throws IOException { 290 AuthResult result = null; 291 292 for (Action permission : permissions) { 293 if (authManager.authorizeUserTable(user, tableName, permission)) { 294 result = AuthResult.allow(request, "Table permission granted", user, permission, tableName, 295 null, null); 296 result.getParams().setFamily(family).setQualifier(qualifier); 297 break; 298 } else { 299 // rest of the world 300 result = AuthResult.deny(request, "Insufficient permissions", user, permission, tableName, 301 family, qualifier); 302 result.getParams().setFamily(family).setQualifier(qualifier); 303 } 304 } 305 logResult(result); 306 if (!result.isAllowed()) { 307 throw new AccessDeniedException("Insufficient permissions " + result.toContextString()); 308 } 309 } 310 311 /** 312 * Check if caller is granting or revoking superusers's or supergroups's permissions. 313 * @param request request name 314 * @param caller caller 315 * @param userToBeChecked target user or group 316 * @throws IOException AccessDeniedException if target user is superuser 317 */ 318 public void performOnSuperuser(String request, User caller, String userToBeChecked) 319 throws IOException { 320 List<String> userGroups = new ArrayList<>(); 321 userGroups.add(userToBeChecked); 322 if (!AuthUtil.isGroupPrincipal(userToBeChecked)) { 323 for (String group : getUserGroups(userToBeChecked)) { 324 userGroups.add(AuthUtil.toGroupEntry(group)); 325 } 326 } 327 for (String name : userGroups) { 328 if (Superusers.isSuperUser(name)) { 329 AuthResult result = AuthResult.deny(request, 330 "Granting or revoking superusers's or supergroups's permissions is not allowed", caller, 331 Action.ADMIN, NamespaceDescriptor.SYSTEM_NAMESPACE_NAME_STR); 332 logResult(result); 333 throw new AccessDeniedException(result.getReason()); 334 } 335 } 336 } 337 338 public void checkLockPermissions(User user, String namespace, TableName tableName, 339 RegionInfo[] regionInfos, String reason) throws IOException { 340 if (namespace != null && !namespace.isEmpty()) { 341 requireNamespacePermission(user, reason, namespace, null, Action.ADMIN, Action.CREATE); 342 } else if (tableName != null || (regionInfos != null && regionInfos.length > 0)) { 343 // So, either a table or regions op. If latter, check perms ons table. 344 TableName tn = tableName != null ? tableName : regionInfos[0].getTable(); 345 requireTablePermission(user, reason, tn, null, null, Action.ADMIN, Action.CREATE); 346 } else { 347 throw new DoNotRetryIOException("Invalid lock level when requesting permissions."); 348 } 349 } 350 351 public static void logResult(AuthResult result) { 352 if (AUDITLOG.isTraceEnabled()) { 353 User user = result.getUser(); 354 UserGroupInformation ugi = user != null ? user.getUGI() : null; 355 AUDITLOG.trace( 356 "Access {} for user {}; reason: {}; remote address: {}; request: {}; context: {};" 357 + "auth method: {}", 358 (result.isAllowed() ? "allowed" : "denied"), 359 (user != null ? user.getShortName() : "UNKNOWN"), result.getReason(), 360 RpcServer.getRemoteAddress().map(InetAddress::toString).orElse(""), result.getRequest(), 361 result.toContextString(), ugi != null ? ugi.getAuthenticationMethod() : "UNKNOWN"); 362 } 363 } 364 365 /* 366 * Validate the hasPermission operation caller with the filter user. Self check doesn't require 367 * any privilege but for others caller must have ADMIN privilege. 368 */ 369 public User validateCallerWithFilterUser(User caller, TablePermission tPerm, String inputUserName) 370 throws IOException { 371 User filterUser = null; 372 if (!caller.getShortName().equals(inputUserName)) { 373 // User should have admin privilege if checking permission for other users 374 requirePermission(caller, "hasPermission", tPerm.getTableName(), tPerm.getFamily(), 375 tPerm.getQualifier(), inputUserName, Action.ADMIN); 376 // Initialize user instance for the input user name 377 List<String> groups = getUserGroups(inputUserName); 378 filterUser = new InputUser(inputUserName, groups.toArray(new String[groups.size()])); 379 } else { 380 // User don't need ADMIN privilege for self check. 381 // Setting action as null in AuthResult to display empty action in audit log 382 AuthResult result = AuthResult.allow("hasPermission", "Self user validation allowed", caller, 383 null, tPerm.getTableName(), tPerm.getFamily(), tPerm.getQualifier()); 384 logResult(result); 385 filterUser = caller; 386 } 387 return filterUser; 388 } 389 390 /** 391 * A temporary user class to instantiate User instance based on the name and groups. 392 */ 393 public static class InputUser extends User { 394 private String name; 395 private String shortName = null; 396 private String[] groups; 397 398 public InputUser(String name, String[] groups) { 399 this.name = name; 400 this.groups = groups; 401 } 402 403 @Override 404 public String getShortName() { 405 if (this.shortName == null) { 406 try { 407 this.shortName = new HadoopKerberosName(this.name).getShortName(); 408 } catch (IOException ioe) { 409 throw new IllegalArgumentException( 410 "Illegal principal name " + this.name + ": " + ioe.toString(), ioe); 411 } 412 } 413 return shortName; 414 } 415 416 @Override 417 public String getName() { 418 return this.name; 419 } 420 421 @Override 422 public String[] getGroupNames() { 423 return this.groups; 424 } 425 426 @Override 427 public <T> T runAs(PrivilegedAction<T> action) { 428 throw new UnsupportedOperationException( 429 "Method not supported, this class has limited implementation"); 430 } 431 432 @Override 433 public <T> T runAs(PrivilegedExceptionAction<T> action) 434 throws IOException, InterruptedException { 435 throw new UnsupportedOperationException( 436 "Method not supported, this class has limited implementation"); 437 } 438 439 @Override 440 public String toString() { 441 return this.name; 442 } 443 } 444 445 /* 446 * Initialize the group service. 447 */ 448 private void initGroupService(Configuration conf) { 449 if (groupService == null) { 450 if (conf.getBoolean(User.TestingGroups.TEST_CONF, false)) { 451 UserProvider.setGroups(new User.TestingGroups(UserProvider.getGroups())); 452 groupService = UserProvider.getGroups(); 453 } else { 454 groupService = Groups.getUserToGroupsMappingService(conf); 455 } 456 } 457 } 458 459 /** 460 * Retrieve the groups of the given user. 461 * @param user User name 462 */ 463 public static List<String> getUserGroups(String user) { 464 try { 465 return groupService.getGroups(user); 466 } catch (IOException e) { 467 LOG.error("Error occurred while retrieving group for " + user, e); 468 return new ArrayList<>(); 469 } 470 } 471 472 /** 473 * Authorizes that if the current user has the given permissions. 474 * @param user Active user to which authorization checks should be applied 475 * @param request Request type 476 * @param permission Actions being requested 477 * @return True if the user has the specific permission 478 */ 479 public boolean hasUserPermission(User user, String request, Permission permission) { 480 if (permission instanceof TablePermission) { 481 TablePermission tPerm = (TablePermission) permission; 482 for (Permission.Action action : permission.getActions()) { 483 AuthResult authResult = permissionGranted(request, user, action, tPerm.getTableName(), 484 tPerm.getFamily(), tPerm.getQualifier()); 485 AccessChecker.logResult(authResult); 486 if (!authResult.isAllowed()) { 487 return false; 488 } 489 } 490 } else if (permission instanceof NamespacePermission) { 491 NamespacePermission nsPerm = (NamespacePermission) permission; 492 AuthResult authResult; 493 for (Action action : nsPerm.getActions()) { 494 if (getAuthManager().authorizeUserNamespace(user, nsPerm.getNamespace(), action)) { 495 authResult = 496 AuthResult.allow(request, "Namespace action allowed", user, action, null, null); 497 } else { 498 authResult = 499 AuthResult.deny(request, "Namespace action denied", user, action, null, null); 500 } 501 AccessChecker.logResult(authResult); 502 if (!authResult.isAllowed()) { 503 return false; 504 } 505 } 506 } else { 507 AuthResult authResult; 508 for (Permission.Action action : permission.getActions()) { 509 if (getAuthManager().authorizeUserGlobal(user, action)) { 510 authResult = AuthResult.allow(request, "Global action allowed", user, action, null, null); 511 } else { 512 authResult = AuthResult.deny(request, "Global action denied", user, action, null, null); 513 } 514 AccessChecker.logResult(authResult); 515 if (!authResult.isAllowed()) { 516 return false; 517 } 518 } 519 } 520 return true; 521 } 522 523 private AuthResult permissionGranted(String request, User user, Action permRequest, 524 TableName tableName, byte[] family, byte[] qualifier) { 525 Map<byte[], ? extends Collection<byte[]>> map = makeFamilyMap(family, qualifier); 526 return permissionGranted(request, user, permRequest, tableName, map); 527 } 528 529 /** 530 * Check the current user for authorization to perform a specific action against the given set of 531 * row data. 532 * <p> 533 * Note: Ordering of the authorization checks has been carefully optimized to short-circuit the 534 * most common requests and minimize the amount of processing required. 535 * </p> 536 * @param request User request 537 * @param user User name 538 * @param permRequest the action being requested 539 * @param tableName Table name 540 * @param families the map of column families to qualifiers present in the request 541 * @return an authorization result 542 */ 543 public AuthResult permissionGranted(String request, User user, Action permRequest, 544 TableName tableName, Map<byte[], ? extends Collection<?>> families) { 545 // 1. All users need read access to hbase:meta table. 546 // this is a very common operation, so deal with it quickly. 547 if (TableName.META_TABLE_NAME.equals(tableName)) { 548 if (permRequest == Action.READ) { 549 return AuthResult.allow(request, "All users allowed", user, permRequest, tableName, 550 families); 551 } 552 } 553 554 if (user == null) { 555 return AuthResult.deny(request, "No user associated with request!", null, permRequest, 556 tableName, families); 557 } 558 559 // 2. check for the table-level, if successful we can short-circuit 560 if (getAuthManager().authorizeUserTable(user, tableName, permRequest)) { 561 return AuthResult.allow(request, "Table permission granted", user, permRequest, tableName, 562 families); 563 } 564 565 // 3. check permissions against the requested families 566 if (families != null && families.size() > 0) { 567 // all families must pass 568 for (Map.Entry<byte[], ? extends Collection<?>> family : families.entrySet()) { 569 // a) check for family level access 570 if (getAuthManager().authorizeUserTable(user, tableName, family.getKey(), permRequest)) { 571 continue; // family-level permission overrides per-qualifier 572 } 573 574 // b) qualifier level access can still succeed 575 if ((family.getValue() != null) && (family.getValue().size() > 0)) { 576 if (family.getValue() instanceof Set) { 577 // for each qualifier of the family 578 Set<byte[]> familySet = (Set<byte[]>) family.getValue(); 579 for (byte[] qualifier : familySet) { 580 if ( 581 !getAuthManager().authorizeUserTable(user, tableName, family.getKey(), qualifier, 582 permRequest) 583 ) { 584 return AuthResult.deny(request, "Failed qualifier check", user, permRequest, 585 tableName, makeFamilyMap(family.getKey(), qualifier)); 586 } 587 } 588 } else if (family.getValue() instanceof List) { // List<Cell> 589 List<Cell> cellList = (List<Cell>) family.getValue(); 590 for (Cell cell : cellList) { 591 if ( 592 !getAuthManager().authorizeUserTable(user, tableName, family.getKey(), 593 CellUtil.cloneQualifier(cell), permRequest) 594 ) { 595 return AuthResult.deny(request, "Failed qualifier check", user, permRequest, 596 tableName, makeFamilyMap(family.getKey(), CellUtil.cloneQualifier(cell))); 597 } 598 } 599 } 600 } else { 601 // no qualifiers and family-level check already failed 602 return AuthResult.deny(request, "Failed family check", user, permRequest, tableName, 603 makeFamilyMap(family.getKey(), null)); 604 } 605 } 606 607 // all family checks passed 608 return AuthResult.allow(request, "All family checks passed", user, permRequest, tableName, 609 families); 610 } 611 612 // 4. no families to check and table level access failed 613 return AuthResult.deny(request, "No families to check and table permission failed", user, 614 permRequest, tableName, families); 615 } 616 617 private Map<byte[], ? extends Collection<byte[]>> makeFamilyMap(byte[] family, byte[] qualifier) { 618 if (family == null) { 619 return null; 620 } 621 622 Map<byte[], Collection<byte[]>> familyMap = new TreeMap<>(Bytes.BYTES_COMPARATOR); 623 familyMap.put(family, qualifier != null ? ImmutableSet.of(qualifier) : null); 624 return familyMap; 625 } 626}