Codota Logo
AccessControlList.addUser
Code IndexAdd Codota to your IDE (free)

How to use
addUser
method
in
org.apache.hadoop.security.authorize.AccessControlList

Best Java code snippets using org.apache.hadoop.security.authorize.AccessControlList.addUser (Showing top 20 results out of 315)

  • Common ways to obtain AccessControlList
private void myMethod () {
AccessControlList a =
  • Codota IconServletContext servletContext;String name;(AccessControlList) servletContext.getAttribute(name)
  • Codota IconString aclString;new AccessControlList(aclString)
  • Codota IconConfiguration conf;String name;String defaultValue;new AccessControlList(conf.get(name, defaultValue))
  • Smart code suggestions by Codota
}
origin: org.apache.hadoop/hadoop-yarn-server-resourcemanager

private AccessControlList getAdminAclList(Configuration conf) {
 AccessControlList aclList = new AccessControlList(conf.get(
   YarnConfiguration.YARN_ADMIN_ACL,
   YarnConfiguration.DEFAULT_YARN_ADMIN_ACL));
 aclList.addUser(daemonUser.getShortUserName());
 return aclList;
}
origin: ch.cern.hadoop/hadoop-yarn-server-resourcemanager

private AccessControlList getAdminAclList(Configuration conf) {
 AccessControlList aclList =
   new AccessControlList(conf.get(YarnConfiguration.YARN_ADMIN_ACL,
    YarnConfiguration.DEFAULT_YARN_ADMIN_ACL));
 aclList.addUser(daemonUser.getShortUserName());
 return aclList;
}
origin: com.github.jiayuhan-it/hadoop-yarn-server-resourcemanager

private AccessControlList getAdminAclList(Configuration conf) {
 AccessControlList aclList =
   new AccessControlList(conf.get(YarnConfiguration.YARN_ADMIN_ACL,
    YarnConfiguration.DEFAULT_YARN_ADMIN_ACL));
 aclList.addUser(daemonUser.getShortUserName());
 return aclList;
}
origin: org.apache.hadoop/hadoop-mapred

ACLsManager(Configuration conf, JobACLsManager jobACLsManager,
  QueueManager queueManager) throws IOException {
 mrOwner = UserGroupInformation.getCurrentUser();
 adminAcl = new AccessControlList(conf.get(MRConfig.MR_ADMINS, " "));
 adminAcl.addUser(mrOwner.getShortUserName());
 
 String deprecatedSuperGroup = conf.get(MRConfig.MR_SUPERGROUP);
 if (deprecatedSuperGroup != null) {
  LOG.warn(MRConfig.MR_SUPERGROUP + " is deprecated. Use " 
    + MRConfig.MR_ADMINS + " instead");
  adminAcl.addGroup(deprecatedSuperGroup);
 }
 aclsEnabled = conf.getBoolean(MRConfig.MR_ACLS_ENABLED, false);
 this.jobACLsManager = jobACLsManager;
 this.queueManager = queueManager;
}
origin: org.apache.hadoop/hadoop-yarn-common

/**
 * Constructs and initializes this AdminACLsManager
 *
 * @param conf configuration for this object to use
 */
public AdminACLsManager(Configuration conf) {
 this.adminAcl = new AccessControlList(conf.get(
    YarnConfiguration.YARN_ADMIN_ACL,
    YarnConfiguration.DEFAULT_YARN_ADMIN_ACL));
 try {
  owner = UserGroupInformation.getCurrentUser();
  adminAcl.addUser(owner.getShortUserName());
 } catch (IOException e){
  LOG.warn("Could not add current user to admin:" + e);
  throw new YarnRuntimeException(e);
 }
 aclsEnabled = conf.getBoolean(YarnConfiguration.YARN_ACL_ENABLE,
   YarnConfiguration.DEFAULT_YARN_ACL_ENABLE);
}
origin: com.github.jiayuhan-it/hadoop-yarn-common

/**
 * Constructs and initializes this AdminACLsManager
 *
 * @param conf configuration for this object to use
 */
public AdminACLsManager(Configuration conf) {
 this.adminAcl = new AccessControlList(conf.get(
    YarnConfiguration.YARN_ADMIN_ACL,
    YarnConfiguration.DEFAULT_YARN_ADMIN_ACL));
 try {
  owner = UserGroupInformation.getCurrentUser();
  adminAcl.addUser(owner.getShortUserName());
 } catch (IOException e){
  LOG.warn("Could not add current user to admin:" + e);
  throw new YarnRuntimeException(e);
 }
 aclsEnabled = conf.getBoolean(YarnConfiguration.YARN_ACL_ENABLE,
   YarnConfiguration.DEFAULT_YARN_ACL_ENABLE);
}
origin: ch.cern.hadoop/hadoop-yarn-common

/**
 * Constructs and initializes this AdminACLsManager
 *
 * @param conf configuration for this object to use
 */
public AdminACLsManager(Configuration conf) {
 this.adminAcl = new AccessControlList(conf.get(
    YarnConfiguration.YARN_ADMIN_ACL,
    YarnConfiguration.DEFAULT_YARN_ADMIN_ACL));
 try {
  owner = UserGroupInformation.getCurrentUser();
  adminAcl.addUser(owner.getShortUserName());
 } catch (IOException e){
  LOG.warn("Could not add current user to admin:" + e);
  throw new YarnRuntimeException(e);
 }
 aclsEnabled = conf.getBoolean(YarnConfiguration.YARN_ACL_ENABLE,
   YarnConfiguration.DEFAULT_YARN_ACL_ENABLE);
}
origin: ch.cern.hadoop/hadoop-yarn-server-resourcemanager

private Map<ApplicationAccessType, String> createACLs(String submitter,
  boolean setupACLs) {
 AccessControlList viewACL = new AccessControlList("");
 AccessControlList modifyACL = new AccessControlList("");
 if (setupACLs) {
  viewACL.addUser(submitter);
  viewACL.addUser(COMMON_USER);
  modifyACL.addUser(submitter);
  modifyACL.addUser(COMMON_USER);
 }
 Map<ApplicationAccessType, String> acls =
   new HashMap<ApplicationAccessType, String>();
 acls.put(ApplicationAccessType.VIEW_APP, viewACL.getAclString());
 acls.put(ApplicationAccessType.MODIFY_APP, modifyACL.getAclString());
 return acls;
}
origin: org.apache.hadoop/hadoop-yarn-server-resourcemanager

 private Map<ApplicationAccessType, String> createACLs(String submitter,
   boolean setupACLs) {
  AccessControlList viewACL = new AccessControlList("");
  AccessControlList modifyACL = new AccessControlList("");
  if (setupACLs) {
   viewACL.addUser(submitter);
   viewACL.addUser(COMMON_USER);
   modifyACL.addUser(submitter);
   modifyACL.addUser(COMMON_USER);
  }
  Map<ApplicationAccessType, String> acls =
    new HashMap<ApplicationAccessType, String>();
  acls.put(ApplicationAccessType.VIEW_APP, viewACL.getAclString());
  acls.put(ApplicationAccessType.MODIFY_APP, modifyACL.getAclString());
  return acls;
 }
}
origin: org.apache.hadoop/hadoop-common-test

/**
 * Tests adding user/group to an wild card acl.
 */
public void testAddRemoveToWildCardACL() {
 AccessControlList acl = new AccessControlList(" * ");
 assertTrue(acl.isAllAllowed());
 UserGroupInformation drwho =
  UserGroupInformation.createUserForTesting("drwho@APACHE.ORG",
    new String[] { "aliens" });
 UserGroupInformation drwho2 =
  UserGroupInformation.createUserForTesting("drwho2@APACHE.ORG",
    new String[] { "tardis" });
 acl.addUser("drwho");
 assertTrue(acl.isAllAllowed());
 assertFalse(acl.getAclString().contains("drwho"));
 acl.addGroup("tardis");
 assertTrue(acl.isAllAllowed());
 assertFalse(acl.getAclString().contains("tardis"));
  acl.removeUser("drwho");
 assertTrue(acl.isAllAllowed());
 assertUserAllowed(drwho, acl);
 acl.removeGroup("tardis");
 assertTrue(acl.isAllAllowed());
 assertUserAllowed(drwho2, acl);
}
origin: org.apache.hadoop/hadoop-yarn-server-resourcemanager

private void verifyOwnerAccess() throws Exception {
 AccessControlList viewACL = new AccessControlList("");
 viewACL.addGroup(FRIENDLY_GROUP);
 AccessControlList modifyACL = new AccessControlList("");
 modifyACL.addUser(FRIEND);
 ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
 final GetApplicationReportRequest appReportRequest = recordFactory
   .newRecordInstance(GetApplicationReportRequest.class);
 appReportRequest.setApplicationId(applicationId);
 final KillApplicationRequest finishAppRequest = recordFactory
   .newRecordInstance(KillApplicationRequest.class);
 finishAppRequest.setApplicationId(applicationId);
 // View as owner
 rmClient.getApplicationReport(appReportRequest);
 // List apps as owner
 Assert.assertEquals("App view by owner should list the apps!!", 1,
   rmClient.getApplications(
     recordFactory.newRecordInstance(GetApplicationsRequest.class))
     .getApplicationList().size());
 // Kill app as owner
 rmClient.forceKillApplication(finishAppRequest);
 resourceManager.waitForState(applicationId, RMAppState.KILLED);
}
origin: ch.cern.hadoop/hadoop-yarn-server-resourcemanager

private void verifyOwnerAccess() throws Exception {
 AccessControlList viewACL = new AccessControlList("");
 viewACL.addGroup(FRIENDLY_GROUP);
 AccessControlList modifyACL = new AccessControlList("");
 modifyACL.addUser(FRIEND);
 ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
 final GetApplicationReportRequest appReportRequest = recordFactory
   .newRecordInstance(GetApplicationReportRequest.class);
 appReportRequest.setApplicationId(applicationId);
 final KillApplicationRequest finishAppRequest = recordFactory
   .newRecordInstance(KillApplicationRequest.class);
 finishAppRequest.setApplicationId(applicationId);
 // View as owner
 rmClient.getApplicationReport(appReportRequest);
 // List apps as owner
 Assert.assertEquals("App view by owner should list the apps!!", 1,
   rmClient.getApplications(
     recordFactory.newRecordInstance(GetApplicationsRequest.class))
     .getApplicationList().size());
 // Kill app as owner
 rmClient.forceKillApplication(finishAppRequest);
 resourceManager.waitForState(applicationId, RMAppState.KILLED);
}
origin: org.apache.hadoop/hadoop-yarn-server-resourcemanager

private void verifyFriendAccess() throws Exception {
 AccessControlList viewACL = new AccessControlList("");
 viewACL.addGroup(FRIENDLY_GROUP);
 AccessControlList modifyACL = new AccessControlList("");
 modifyACL.addUser(FRIEND);
 ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
 final GetApplicationReportRequest appReportRequest = recordFactory
   .newRecordInstance(GetApplicationReportRequest.class);
 appReportRequest.setApplicationId(applicationId);
 final KillApplicationRequest finishAppRequest = recordFactory
   .newRecordInstance(KillApplicationRequest.class);
 finishAppRequest.setApplicationId(applicationId);
 ApplicationClientProtocol friendClient = getRMClientForUser(FRIEND);
 // View as the friend
 friendClient.getApplicationReport(appReportRequest);
 // List apps as friend
 Assert.assertEquals("App view by a friend should list the apps!!", 3,
   friendClient.getApplications(
     recordFactory.newRecordInstance(GetApplicationsRequest.class))
     .getApplicationList().size());
 // Kill app as the friend
 friendClient.forceKillApplication(finishAppRequest);
 resourceManager.waitForState(applicationId, RMAppState.KILLED);
}
origin: ch.cern.hadoop/hadoop-yarn-server-resourcemanager

private void verifyFriendAccess() throws Exception {
 AccessControlList viewACL = new AccessControlList("");
 viewACL.addGroup(FRIENDLY_GROUP);
 AccessControlList modifyACL = new AccessControlList("");
 modifyACL.addUser(FRIEND);
 ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
 final GetApplicationReportRequest appReportRequest = recordFactory
   .newRecordInstance(GetApplicationReportRequest.class);
 appReportRequest.setApplicationId(applicationId);
 final KillApplicationRequest finishAppRequest = recordFactory
   .newRecordInstance(KillApplicationRequest.class);
 finishAppRequest.setApplicationId(applicationId);
 ApplicationClientProtocol friendClient = getRMClientForUser(FRIEND);
 // View as the friend
 friendClient.getApplicationReport(appReportRequest);
 // List apps as friend
 Assert.assertEquals("App view by a friend should list the apps!!", 3,
   friendClient.getApplications(
     recordFactory.newRecordInstance(GetApplicationsRequest.class))
     .getApplicationList().size());
 // Kill app as the friend
 friendClient.forceKillApplication(finishAppRequest);
 resourceManager.waitForState(applicationId, RMAppState.KILLED);
}
origin: ch.cern.hadoop/hadoop-yarn-server-resourcemanager

private void verifySuperUserAccess() throws Exception {
 AccessControlList viewACL = new AccessControlList("");
 viewACL.addGroup(FRIENDLY_GROUP);
 AccessControlList modifyACL = new AccessControlList("");
 modifyACL.addUser(FRIEND);
 ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
 final GetApplicationReportRequest appReportRequest = recordFactory
   .newRecordInstance(GetApplicationReportRequest.class);
 appReportRequest.setApplicationId(applicationId);
 final KillApplicationRequest finishAppRequest = recordFactory
   .newRecordInstance(KillApplicationRequest.class);
 finishAppRequest.setApplicationId(applicationId);
 ApplicationClientProtocol superUserClient = getRMClientForUser(SUPER_USER);
 // View as the superUser
 superUserClient.getApplicationReport(appReportRequest);
 // List apps as superUser
 Assert.assertEquals("App view by super-user should list the apps!!", 2,
   superUserClient.getApplications(
     recordFactory.newRecordInstance(GetApplicationsRequest.class))
     .getApplicationList().size());
 // Kill app as the superUser
 superUserClient.forceKillApplication(finishAppRequest);
 resourceManager.waitForState(applicationId, RMAppState.KILLED);
}
origin: org.apache.hadoop/hadoop-yarn-server-resourcemanager

private void verifySuperUserAccess() throws Exception {
 AccessControlList viewACL = new AccessControlList("");
 viewACL.addGroup(FRIENDLY_GROUP);
 AccessControlList modifyACL = new AccessControlList("");
 modifyACL.addUser(FRIEND);
 ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
 final GetApplicationReportRequest appReportRequest = recordFactory
   .newRecordInstance(GetApplicationReportRequest.class);
 appReportRequest.setApplicationId(applicationId);
 final KillApplicationRequest finishAppRequest = recordFactory
   .newRecordInstance(KillApplicationRequest.class);
 finishAppRequest.setApplicationId(applicationId);
 ApplicationClientProtocol superUserClient = getRMClientForUser(SUPER_USER);
 // View as the superUser
 superUserClient.getApplicationReport(appReportRequest);
 // List apps as superUser
 Assert.assertEquals("App view by super-user should list the apps!!", 2,
   superUserClient.getApplications(
     recordFactory.newRecordInstance(GetApplicationsRequest.class))
     .getApplicationList().size());
 // Kill app as the superUser
 superUserClient.forceKillApplication(finishAppRequest);
 resourceManager.waitForState(applicationId, RMAppState.KILLED);
}
origin: ch.cern.hadoop/hadoop-yarn-server-resourcemanager

viewACL.addGroup(FRIENDLY_GROUP);
AccessControlList modifyACL = new AccessControlList("");
modifyACL.addUser(FRIEND);
ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
origin: org.apache.hadoop/hadoop-yarn-server-resourcemanager

viewACL.addGroup(FRIENDLY_GROUP);
AccessControlList modifyACL = new AccessControlList("");
modifyACL.addUser(FRIEND);
ApplicationId applicationId = submitAppAndGetAppId(viewACL, modifyACL);
origin: com.github.jiayuhan-it/hadoop-common

/**
 * Tests adding user/group to an wild card acl.
 */
@Test
public void testAddRemoveToWildCardACL() {
 AccessControlList acl = new AccessControlList(" * ");
 assertTrue(acl.isAllAllowed());
 UserGroupInformation drwho =
  UserGroupInformation.createUserForTesting("drwho@APACHE.ORG",
    new String[] { "aliens" });
 UserGroupInformation drwho2 =
  UserGroupInformation.createUserForTesting("drwho2@APACHE.ORG",
    new String[] { "tardis" });
 acl.addUser("drwho");
 assertTrue(acl.isAllAllowed());
 assertFalse(acl.getAclString().contains("drwho"));
 acl.addGroup("tardis");
 assertTrue(acl.isAllAllowed());
 assertFalse(acl.getAclString().contains("tardis"));
  acl.removeUser("drwho");
 assertTrue(acl.isAllAllowed());
 assertUserAllowed(drwho, acl);
 acl.removeGroup("tardis");
 assertTrue(acl.isAllAllowed());
 assertUserAllowed(drwho2, acl);
}
origin: ch.cern.hadoop/hadoop-common

/**
 * Tests adding user/group to an wild card acl.
 */
@Test
public void testAddRemoveToWildCardACL() {
 AccessControlList acl = new AccessControlList(" * ");
 assertTrue(acl.isAllAllowed());
 UserGroupInformation drwho =
  UserGroupInformation.createUserForTesting("drwho@APACHE.ORG",
    new String[] { "aliens" });
 UserGroupInformation drwho2 =
  UserGroupInformation.createUserForTesting("drwho2@APACHE.ORG",
    new String[] { "tardis" });
 acl.addUser("drwho");
 assertTrue(acl.isAllAllowed());
 assertFalse(acl.getAclString().contains("drwho"));
 acl.addGroup("tardis");
 assertTrue(acl.isAllAllowed());
 assertFalse(acl.getAclString().contains("tardis"));
  acl.removeUser("drwho");
 assertTrue(acl.isAllAllowed());
 assertUserAllowed(drwho, acl);
 acl.removeGroup("tardis");
 assertTrue(acl.isAllAllowed());
 assertUserAllowed(drwho2, acl);
}
org.apache.hadoop.security.authorizeAccessControlListaddUser

Javadoc

Add user to the names of users allowed for this service.

Popular methods of AccessControlList

  • <init>
    Construct a new ACL from String representation of users and groups The arguments are comma separated
  • isUserAllowed
  • getAclString
    Returns the access control list as a String that can be used for building a new instance by sending
  • isAllAllowed
  • toString
    Returns descriptive way of users and groups that are part of this ACL. Use #getAclString() to get th
  • getGroups
  • addGroup
    Add group to the names of groups allowed for this service.
  • isUserInList
    Checks if a user represented by the provided UserGroupInformationis a member of the Access Control L
  • buildACL
    Build ACL from the given two Strings. The Strings contain comma separated values.
  • getGroupsString
    Returns comma-separated concatenated single String of the set 'groups'
  • getString
    Returns comma-separated concatenated single String of all strings of the given set
  • getUsersString
    Returns comma-separated concatenated single String of the set 'users'
  • getString,
  • getUsersString,
  • isWildCardACLValue,
  • readFields,
  • write,
  • getUsers,
  • removeGroup,
  • removeUser

Popular in Java

  • Start an intent from android
  • scheduleAtFixedRate (ScheduledExecutorService)
  • setScale (BigDecimal)
    Returns a BigDecimal whose scale is the specified value, and whose value is numerically equal to thi
  • getOriginalFilename (MultipartFile)
    Return the original filename in the client's filesystem.This may contain path information depending
  • Menu (java.awt)
  • Selector (java.nio.channels)
    A controller for the selection of SelectableChannel objects. Selectable channels can be registered w
  • Collections (java.util)
    This class consists exclusively of static methods that operate on or return collections. It contains
  • Queue (java.util)
    A collection designed for holding elements prior to processing. Besides basic java.util.Collection o
  • Semaphore (java.util.concurrent)
    A counting semaphore. Conceptually, a semaphore maintains a set of permits. Each #acquire blocks if
  • Filter (javax.servlet)
    A filter is an object that performs filtering tasks on either the request to a resource (a servlet o
Codota Logo
  • Products

    Search for Java codeSearch for JavaScript codeEnterprise
  • IDE Plugins

    IntelliJ IDEAWebStormAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogCodota Academy Plugin user guide Terms of usePrivacy policyJava Code IndexJavascript Code Index
Get Codota for your IDE now