public static synchronized Writer getRootTable(ServerContext context) { Credentials credentials = context.getCredentials(); Writer rootTable = root_tables.get(credentials); if (rootTable == null) { rootTable = new Writer(context, RootTable.ID); root_tables.put(credentials, rootTable); } return rootTable; }
public static synchronized Writer getMetadataTable(ServerContext context) { Credentials credentials = context.getCredentials(); Writer metadataTable = metadata_tables.get(credentials); if (metadataTable == null) { metadataTable = new Writer(context, MetadataTable.ID); metadata_tables.put(credentials, metadataTable); } return metadataTable; }
public boolean isSystemUser(TCredentials credentials) { return context.getCredentials().getToken().getClass().getName() .equals(credentials.getTokenClassName()); }
private boolean shouldAudit(TCredentials credentials) { return !context.getCredentials().getToken().getClass().getName() .equals(credentials.getTokenClassName()); }
@Override public SaslServerConnectionParams getSaslParams() { AccumuloConfiguration conf = getServerConfFactory().getSiteConfiguration(); if (!conf.getBoolean(Property.INSTANCE_RPC_SASL_ENABLED)) { return null; } return new SaslServerConnectionParams(conf, getCredentials().getToken(), secretManager); }
if (context.getCredentials().getToken().getClass().getName() .equals(credentials.getTokenClassName())) { log.error("Got message from a service with a mismatched configuration."
log.error("Could not get connection", e); throw new RemoteReplicationException(RemoteReplicationErrorCode.CANNOT_AUTHENTICATE, "Cannot get connection as " + tabletServer.getContext().getCredentials().getPrincipal());
@Override public Repo<Master> call(long tid, Master env) throws Exception { // give all table permissions to the creator SecurityOperation security = AuditedSecurityOperation.getInstance(env.getContext()); if (!tableInfo.getUser().equals(env.getContext().getCredentials().getPrincipal())) { for (TablePermission permission : TablePermission.values()) { try { security.grantTablePermission(env.getContext().rpcCreds(), tableInfo.getUser(), tableInfo.getTableId(), permission, tableInfo.getNamespaceId()); } catch (ThriftSecurityException e) { LoggerFactory.getLogger(SetupPermissions.class).error("{}", e.getMessage(), e); throw e; } } } // setup permissions in zookeeper before table info in zookeeper // this way concurrent users will not get a spurious permission denied // error return new PopulateZookeeper(tableInfo); }
if (!context.getCredentials().getToken().equals(creds.getToken())) { log.debug("With SASL enabled, System AuthenticationTokens did not match."); throw new ThriftSecurityException(creds.getPrincipal(), if (!(context.getCredentials().equals(creds))) { log.debug("Provided credentials did not match server's expected" + " credentials. Expected {} but got {}", context.getCredentials(), creds); throw new ThriftSecurityException(creds.getPrincipal(), SecurityErrorCode.BAD_CREDENTIALS);