@Override public ResourceAction apply(String input) { return new ResourceAction( new Resource(input, ResourceType.DATASOURCE), Action.READ ); } };
private boolean permissionCheck(Resource resource, Action action, BasicAuthorizerPermission permission) { if (action != permission.getResourceAction().getAction()) { return false; } Resource permissionResource = permission.getResourceAction().getResource(); if (permissionResource.getType() != resource.getType()) { return false; } Pattern resourceNamePattern = permission.getResourceNamePattern(); Matcher resourceNameMatcher = resourceNamePattern.matcher(resource.getName()); return resourceNameMatcher.matches(); }
@Override public boolean equals(Object o) { if (this == o) { return true; } if (o == null || getClass() != o.getClass()) { return false; } ResourceAction that = (ResourceAction) o; if (!getResource().equals(that.getResource())) { return false; } return getAction() == that.getAction(); }
public BasicAuthorizerPermission( ResourceAction resourceAction ) { this.resourceAction = resourceAction; try { this.resourceNamePattern = Pattern.compile(resourceAction.getResource().getName()); } catch (PatternSyntaxException pse) { throw new BasicSecurityDBResourceException( pse, "Invalid permission, resource name regex[%s] does not compile.", resourceAction.getResource().getName() ); } }
@Override public int hashCode() { int result = getResource().hashCode(); result = 31 * result + getAction().hashCode(); return result; }
@Override public Authorizer getAuthorizer(String name) { return (authenticationResult, resource, action) -> { if (authenticationResult.getIdentity().equals("druid")) { return Access.OK; } else { if (resource.getName().equals("datasource2")) { return new Access(false, "not authorized."); } else { return Access.OK; } } }; } }
@Override public int hashCode() { int result = getResource().hashCode(); result = 31 * result + getAction().hashCode(); return result; }
@Override public ResourceAction apply(String input) { return new ResourceAction( new Resource(input, ResourceType.DATASOURCE), Action.WRITE ); } };
@Override public Authorizer getAuthorizer(String name) { return (authenticationResult, resource, action) -> { if (authenticationResult.getIdentity().equals(TEST_SUPERUSER_NAME)) { return Access.OK; } if (resource.getType() == ResourceType.DATASOURCE && resource.getName().equals(FORBIDDEN_DATASOURCE)) { return new Access(false); } else { return Access.OK; } }; } };
public BasicAuthorizerPermission( ResourceAction resourceAction ) { this.resourceAction = resourceAction; try { this.resourceNamePattern = Pattern.compile(resourceAction.getResource().getName()); } catch (PatternSyntaxException pse) { throw new BasicSecurityDBResourceException( pse, "Invalid permission, resource name regex[%s] does not compile.", resourceAction.getResource().getName() ); } }
@Override public boolean equals(Object o) { if (this == o) { return true; } if (o == null || getClass() != o.getClass()) { return false; } ResourceAction that = (ResourceAction) o; if (!getResource().equals(that.getResource())) { return false; } return getAction() == that.getAction(); }
private static List<ResourceAction> makeSuperUserPermissions() new Resource(".*", ResourceType.DATASOURCE), Action.READ ); new Resource(".*", ResourceType.DATASOURCE), Action.WRITE ); new Resource(".*", ResourceType.CONFIG), Action.READ ); new Resource(".*", ResourceType.CONFIG), Action.WRITE ); new Resource(".*", ResourceType.STATE), Action.READ ); new Resource(".*", ResourceType.STATE), Action.WRITE );
private boolean permissionCheck(Resource resource, Action action, BasicAuthorizerPermission permission) { if (action != permission.getResourceAction().getAction()) { return false; } Resource permissionResource = permission.getResourceAction().getResource(); if (permissionResource.getType() != resource.getType()) { return false; } Pattern resourceNamePattern = permission.getResourceNamePattern(); Matcher resourceNameMatcher = resourceNamePattern.matcher(resource.getName()); return resourceNameMatcher.matches(); }
req, new ResourceAction( new Resource("STATE", ResourceType.STATE), Action.WRITE ),
@DELETE @Path("/pendingSegments/{dataSource}") @Produces(MediaType.APPLICATION_JSON) public Response killPendingSegments( @PathParam("dataSource") String dataSource, @QueryParam("interval") String deleteIntervalString, @Context HttpServletRequest request ) { final Interval deleteInterval = Intervals.of(deleteIntervalString); // check auth for dataSource final Access authResult = AuthorizationUtils.authorizeAllResourceActions( request, ImmutableList.of( new ResourceAction(new Resource(dataSource, ResourceType.DATASOURCE), Action.READ), new ResourceAction(new Resource(dataSource, ResourceType.DATASOURCE), Action.WRITE) ), authorizerMapper ); if (!authResult.isAllowed()) { throw new ForbiddenException(authResult.getMessage()); } if (taskMaster.isLeader()) { final int numDeleted = indexerMetadataStorageAdapter.deletePendingSegments(dataSource, deleteInterval); return Response.ok().entity(ImmutableMap.of("numDeleted", numDeleted)).build(); } else { return Response.status(Status.SERVICE_UNAVAILABLE).build(); } }
new ResourceAction(new Resource(taskDatasource, ResourceType.DATASOURCE), Action.READ) ); };
req, new ResourceAction( new Resource("STATE", ResourceType.STATE), Action.WRITE ),
@Override public ContainerRequest filter(ContainerRequest request) { final ResourceAction resourceAction = new ResourceAction( new Resource(SECURITY_RESOURCE_NAME, ResourceType.CONFIG), getAction(request) ); final Access authResult = AuthorizationUtils.authorizeResourceAction( getReq(), resourceAction, getAuthorizerMapper() ); if (!authResult.isAllowed()) { throw new WebApplicationException( Response.status(Response.Status.FORBIDDEN) .entity(StringUtils.format("Access-Check-Result: %s", authResult.toString())) .build() ); } return request; } }
/** * Authorizes action to be performed on a task's datasource * * @return authorization result */ public static Access datasourceAuthorizationCheck( final HttpServletRequest req, Action action, String datasource, AuthorizerMapper authorizerMapper ) { ResourceAction resourceAction = new ResourceAction( new Resource(datasource, ResourceType.DATASOURCE), action ); Access access = AuthorizationUtils.authorizeResourceAction(req, resourceAction, authorizerMapper); if (!access.isAllowed()) { throw new ForbiddenException(access.toString()); } return access; }
/** * Check authorization for the given action and dataSource. * * @return authorization result */ public static Access authorizationCheck( HttpServletRequest req, Action action, String dataSource, AuthorizerMapper authorizerMapper ) { ResourceAction resourceAction = new ResourceAction( new Resource(dataSource, ResourceType.DATASOURCE), action ); Access access = AuthorizationUtils.authorizeResourceAction(req, resourceAction, authorizerMapper); if (!access.isAllowed()) { throw new ForbiddenException(access.toString()); } return access; } }