|
@@ -0,0 +1,180 @@
|
|
|
+/**
|
|
|
+ * Licensed to the Apache Software Foundation (ASF) under one
|
|
|
+ * or more contributor license agreements. See the NOTICE file
|
|
|
+ * distributed with this work for additional information
|
|
|
+ * regarding copyright ownership. The ASF licenses this file
|
|
|
+ * to you under the Apache License, Version 2.0 (the
|
|
|
+ * "License"); you may not use this file except in compliance
|
|
|
+ * with the License. You may obtain a copy of the License at
|
|
|
+ *
|
|
|
+ * http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+ *
|
|
|
+ * Unless required by applicable law or agreed to in writing, software
|
|
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ * See the License for the specific language governing permissions and
|
|
|
+ * limitations under the License.
|
|
|
+ */
|
|
|
+package org.apache.hadoop.yarn.server.security;
|
|
|
+
|
|
|
+import static org.junit.Assert.assertFalse;
|
|
|
+import static org.junit.Assert.assertTrue;
|
|
|
+
|
|
|
+import java.util.HashMap;
|
|
|
+import java.util.Map;
|
|
|
+
|
|
|
+import org.apache.hadoop.conf.Configuration;
|
|
|
+import org.apache.hadoop.security.UserGroupInformation;
|
|
|
+import org.apache.hadoop.yarn.api.records.ApplicationAccessType;
|
|
|
+import org.apache.hadoop.yarn.api.records.ApplicationId;
|
|
|
+import org.apache.hadoop.yarn.conf.YarnConfiguration;
|
|
|
+import org.junit.Test;
|
|
|
+
|
|
|
+public class TestApplicationACLsManager {
|
|
|
+
|
|
|
+ private static final String ADMIN_USER = "adminuser";
|
|
|
+ private static final String APP_OWNER = "appuser";
|
|
|
+ private static final String TESTUSER1 = "testuser1";
|
|
|
+ private static final String TESTUSER2 = "testuser2";
|
|
|
+ private static final String TESTUSER3 = "testuser3";
|
|
|
+
|
|
|
+ @Test
|
|
|
+ public void testCheckAccess() {
|
|
|
+ Configuration conf = new Configuration();
|
|
|
+ conf.setBoolean(YarnConfiguration.YARN_ACL_ENABLE,
|
|
|
+ true);
|
|
|
+ conf.set(YarnConfiguration.YARN_ADMIN_ACL,
|
|
|
+ ADMIN_USER);
|
|
|
+ ApplicationACLsManager aclManager = new ApplicationACLsManager(conf);
|
|
|
+ Map<ApplicationAccessType, String> aclMap =
|
|
|
+ new HashMap<ApplicationAccessType, String>();
|
|
|
+ aclMap.put(ApplicationAccessType.VIEW_APP, TESTUSER1 + "," + TESTUSER3);
|
|
|
+ aclMap.put(ApplicationAccessType.MODIFY_APP, TESTUSER1);
|
|
|
+ ApplicationId appId = ApplicationId.newInstance(1, 1);
|
|
|
+ aclManager.addApplication(appId, aclMap);
|
|
|
+
|
|
|
+ //User in ACL, should be allowed access
|
|
|
+ UserGroupInformation testUser1 = UserGroupInformation
|
|
|
+ .createRemoteUser(TESTUSER1);
|
|
|
+ assertTrue(aclManager.checkAccess(testUser1, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(testUser1, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ //User NOT in ACL, should not be allowed access
|
|
|
+ UserGroupInformation testUser2 = UserGroupInformation
|
|
|
+ .createRemoteUser(TESTUSER2);
|
|
|
+ assertFalse(aclManager.checkAccess(testUser2, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertFalse(aclManager.checkAccess(testUser2, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ //User has View access, but not modify access
|
|
|
+ UserGroupInformation testUser3 = UserGroupInformation
|
|
|
+ .createRemoteUser(TESTUSER3);
|
|
|
+ assertTrue(aclManager.checkAccess(testUser3, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertFalse(aclManager.checkAccess(testUser3, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ //Application Owner should have all access
|
|
|
+ UserGroupInformation appOwner = UserGroupInformation
|
|
|
+ .createRemoteUser(APP_OWNER);
|
|
|
+ assertTrue(aclManager.checkAccess(appOwner, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(appOwner, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ //Admin should have all access
|
|
|
+ UserGroupInformation adminUser = UserGroupInformation
|
|
|
+ .createRemoteUser(ADMIN_USER);
|
|
|
+ assertTrue(aclManager.checkAccess(adminUser, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(adminUser, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ public void testCheckAccessWithNullACLS() {
|
|
|
+ Configuration conf = new Configuration();
|
|
|
+ conf.setBoolean(YarnConfiguration.YARN_ACL_ENABLE,
|
|
|
+ true);
|
|
|
+ conf.set(YarnConfiguration.YARN_ADMIN_ACL,
|
|
|
+ ADMIN_USER);
|
|
|
+ ApplicationACLsManager aclManager = new ApplicationACLsManager(conf);
|
|
|
+ UserGroupInformation appOwner = UserGroupInformation
|
|
|
+ .createRemoteUser(APP_OWNER);
|
|
|
+ ApplicationId appId = ApplicationId.newInstance(1, 1);
|
|
|
+ //Application ACL is not added
|
|
|
+
|
|
|
+ //Application Owner should have all access even if Application ACL is not added
|
|
|
+ assertTrue(aclManager.checkAccess(appOwner, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(appOwner, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ //Admin should have all access
|
|
|
+ UserGroupInformation adminUser = UserGroupInformation
|
|
|
+ .createRemoteUser(ADMIN_USER);
|
|
|
+ assertTrue(aclManager.checkAccess(adminUser, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(adminUser, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ // A regular user should Not have access
|
|
|
+ UserGroupInformation testUser1 = UserGroupInformation
|
|
|
+ .createRemoteUser(TESTUSER1);
|
|
|
+ assertFalse(aclManager.checkAccess(testUser1, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertFalse(aclManager.checkAccess(testUser1, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ public void testCheckAccessWithPartialACLS() {
|
|
|
+ Configuration conf = new Configuration();
|
|
|
+ conf.setBoolean(YarnConfiguration.YARN_ACL_ENABLE,
|
|
|
+ true);
|
|
|
+ conf.set(YarnConfiguration.YARN_ADMIN_ACL,
|
|
|
+ ADMIN_USER);
|
|
|
+ ApplicationACLsManager aclManager = new ApplicationACLsManager(conf);
|
|
|
+ UserGroupInformation appOwner = UserGroupInformation
|
|
|
+ .createRemoteUser(APP_OWNER);
|
|
|
+ // Add only the VIEW ACLS
|
|
|
+ Map<ApplicationAccessType, String> aclMap =
|
|
|
+ new HashMap<ApplicationAccessType, String>();
|
|
|
+ aclMap.put(ApplicationAccessType.VIEW_APP, TESTUSER1 );
|
|
|
+ ApplicationId appId = ApplicationId.newInstance(1, 1);
|
|
|
+ aclManager.addApplication(appId, aclMap);
|
|
|
+
|
|
|
+ //Application Owner should have all access even if Application ACL is not added
|
|
|
+ assertTrue(aclManager.checkAccess(appOwner, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(appOwner, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ //Admin should have all access
|
|
|
+ UserGroupInformation adminUser = UserGroupInformation
|
|
|
+ .createRemoteUser(ADMIN_USER);
|
|
|
+ assertTrue(aclManager.checkAccess(adminUser, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertTrue(aclManager.checkAccess(adminUser, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ // testuser1 should have view access only
|
|
|
+ UserGroupInformation testUser1 = UserGroupInformation
|
|
|
+ .createRemoteUser(TESTUSER1);
|
|
|
+ assertTrue(aclManager.checkAccess(testUser1, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertFalse(aclManager.checkAccess(testUser1, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+
|
|
|
+ // A testuser2 should Not have access
|
|
|
+ UserGroupInformation testUser2 = UserGroupInformation
|
|
|
+ .createRemoteUser(TESTUSER2);
|
|
|
+ assertFalse(aclManager.checkAccess(testUser2, ApplicationAccessType.VIEW_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ assertFalse(aclManager.checkAccess(testUser2, ApplicationAccessType.MODIFY_APP,
|
|
|
+ APP_OWNER, appId));
|
|
|
+ }
|
|
|
+}
|