private void fixEmptyNameACLForUsers(List<AccessControl> acls, Set<String> users, int mask) { List<AccessControl> aclsToAdd = new ArrayList<>(); List<AccessControl> aclsToRemove = new ArrayList<>(); for (AccessControl control : acls) { if (control.get_type() == AccessControlType.USER && !control.is_set_name()) { aclsToRemove.add(control); int currentAccess = control.get_access(); if ((currentAccess & mask) != mask) { control.set_access(currentAccess | mask); } for (String user : users) { AccessControl copiedControl = new AccessControl(control); copiedControl.set_name(user); aclsToAdd.add(copiedControl); } } } acls.removeAll(aclsToRemove); acls.addAll(aclsToAdd); }
private void fixACLsForUser(List<AccessControl> acls, String user, int mask) { boolean foundUserACL = false; List<AccessControl> emptyUserACLs = new ArrayList<>(); for (AccessControl control : acls) { if (control.get_type() == AccessControlType.USER) { if (!control.is_set_name()) { emptyUserACLs.add(control); } else if (control.get_name().equals(user)) { int currentAccess = control.get_access(); if ((currentAccess & mask) != mask) { control.set_access(currentAccess | mask); } foundUserACL = true; } } } // if ACLs have two user ACLs for empty user and principal, discard empty user ACL if (!emptyUserACLs.isEmpty() && foundUserACL) { acls.removeAll(emptyUserACLs); } // add default user ACL when only empty user ACL is not present if (emptyUserACLs.isEmpty() && !foundUserACL) { AccessControl userACL = new AccessControl(); userACL.set_type(AccessControlType.USER); userACL.set_name(user); userACL.set_access(mask); acls.add(userACL); } }
public static AccessControl parseAccessControl(String str) { String[] parts = str.split(":"); String type = "other"; String name = ""; String access = "-"; if (parts.length > 3) { throw new IllegalArgumentException("Don't know how to parse " + str + " into an ACL value"); } else if (parts.length == 1) { type = "other"; name = ""; access = parts[0]; } else if (parts.length == 2) { type = "user"; name = parts[0]; access = parts[1]; } else if (parts.length == 3) { type = parts[0]; name = parts[1]; access = parts[2]; } AccessControl ret = new AccessControl(); ret.set_type(parseACLType(type)); ret.set_name(name); ret.set_access(parseAccess(access)); return ret; }
public void setFieldValue(_Fields field, java.lang.Object value) { switch (field) { case TYPE: if (value == null) { unset_type(); } else { set_type((AccessControlType)value); } break; case NAME: if (value == null) { unset_name(); } else { set_name((java.lang.String)value); } break; case ACCESS: if (value == null) { unset_access(); } else { set_access((java.lang.Integer)value); } break; } }
@Test(expected = AuthorizationException.class) public void testFailAcls() throws Exception { Map<String, Object> conf = new HashMap(); // set clean time really high so doesn't kick in conf.put(DaemonConfig.SUPERVISOR_LOCALIZER_CACHE_CLEANUP_INTERVAL_MS, 60 * 60 * 1000); // enable blobstore acl validation conf.put(Config.STORM_BLOBSTORE_ACL_VALIDATION_ENABLED, true); String topo1 = "topo1"; String key1 = "key1"; TestLocalizer localizer = new TestLocalizer(conf, baseDir.toString()); ReadableBlobMeta rbm = new ReadableBlobMeta(); // set acl so user doesn't have read access AccessControl acl = new AccessControl(AccessControlType.USER, BlobStoreAclHandler.ADMIN); acl.set_name(user1); rbm.set_settable(new SettableBlobMeta(Arrays.asList(acl))); when(mockblobstore.getBlobMeta(anyString())).thenReturn(rbm); when(mockblobstore.getBlob(key1)).thenReturn(new TestInputStreamWithMeta(1)); File user1Dir = localizer.getLocalUserFileCacheDir(user1); assertTrue("failed to create user dir", user1Dir.mkdirs()); LocalAssignment topo1Assignment = new LocalAssignment(topo1, Collections.emptyList()); topo1Assignment.set_owner(user1); PortAndAssignment topo1Pna = new PortAndAssignmentImpl(1, topo1Assignment); // This should throw AuthorizationException because auth failed localizer.getBlob(new LocalResource(key1, false, false), topo1Pna, null); }
AccessControl writeAccess = new AccessControl(AccessControlType.USER, READ); AccessControl adminAccess = new AccessControl(AccessControlType.USER, ADMIN); writeAccess.set_name(writeSubject); adminAccess.set_name(adminSubject); List<AccessControl> acl = Arrays.asList(writeAccess, adminAccess); metadata = new SettableBlobMeta(acl);
private void fixEmptyNameACLForUsers(List<AccessControl> acls, Set<String> users, int mask) { List<AccessControl> aclsToAdd = new ArrayList<>(); List<AccessControl> aclsToRemove = new ArrayList<>(); for (AccessControl control : acls) { if (control.get_type() == AccessControlType.USER && !control.is_set_name()) { aclsToRemove.add(control); int currentAccess = control.get_access(); if ((currentAccess & mask) != mask) { control.set_access(currentAccess | mask); } for (String user : users) { AccessControl copiedControl = new AccessControl(control); copiedControl.set_name(user); aclsToAdd.add(copiedControl); } } } acls.removeAll(aclsToRemove); acls.addAll(aclsToAdd); }
public static AccessControl parseAccessControl(String str) { String[] parts = str.split(":"); String type = "other"; String name = ""; String access = "-"; if (parts.length > 3) { throw new IllegalArgumentException("Don't know how to parse "+str+" into an ACL value"); } else if (parts.length == 1) { type = "other"; name = ""; access = parts[0]; } else if (parts.length == 2) { type = "user"; name = parts[0]; access = parts[1]; } else if (parts.length == 3) { type = parts[0]; name = parts[1]; access = parts[2]; } AccessControl ret = new AccessControl(); ret.set_type(parseACLType(type)); ret.set_name(name); ret.set_access(parseAccess(access)); return ret; }
private void fixACLsForUser(List<AccessControl> acls, String user, int mask) { boolean foundUserACL = false; List<AccessControl> emptyUserACLs = new ArrayList<>(); for (AccessControl control : acls) { if (control.get_type() == AccessControlType.USER) { if (!control.is_set_name()) { emptyUserACLs.add(control); } else if (control.get_name().equals(user)) { int currentAccess = control.get_access(); if ((currentAccess & mask) != mask) { control.set_access(currentAccess | mask); } foundUserACL = true; } } } // if ACLs have two user ACLs for empty user and principal, discard empty user ACL if (!emptyUserACLs.isEmpty() && foundUserACL) { acls.removeAll(emptyUserACLs); } // add default user ACL when only empty user ACL is not present if (emptyUserACLs.isEmpty() && !foundUserACL) { AccessControl userACL = new AccessControl(); userACL.set_type(AccessControlType.USER); userACL.set_name(user); userACL.set_access(mask); acls.add(userACL); } }
public void setFieldValue(_Fields field, Object value) { switch (field) { case TYPE: if (value == null) { unset_type(); } else { set_type((AccessControlType)value); } break; case NAME: if (value == null) { unset_name(); } else { set_name((String)value); } break; case ACCESS: if (value == null) { unset_access(); } else { set_access((Integer)value); } break; } }