TestRegistrySecurityHelper.java

/*
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.apache.hadoop.registry.secure;

import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.security.UserGroupInformation;
import org.apache.hadoop.registry.client.api.RegistryConstants;
import org.apache.hadoop.registry.client.impl.zk.RegistrySecurity;
import org.apache.zookeeper.ZooDefs;
import org.apache.zookeeper.data.ACL;
import org.junit.jupiter.api.Assertions;
import org.junit.jupiter.api.BeforeAll;
import org.junit.jupiter.api.Test;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import java.io.IOException;
import java.util.List;

import static org.apache.hadoop.registry.client.api.RegistryConstants.*;

/**
 * Test for registry security operations
 */
public class TestRegistrySecurityHelper extends Assertions {
  private static final Logger LOG =
      LoggerFactory.getLogger(TestRegistrySecurityHelper.class);

  public static final String YARN_EXAMPLE_COM = "yarn@example.com";
  public static final String SASL_YARN_EXAMPLE_COM =
      "sasl:" + YARN_EXAMPLE_COM;
  public static final String MAPRED_EXAMPLE_COM = "mapred@example.com";
  public static final String SASL_MAPRED_EXAMPLE_COM =
      "sasl:" + MAPRED_EXAMPLE_COM;
  public static final String SASL_MAPRED_APACHE = "sasl:mapred@APACHE";
  public static final String DIGEST_F0AF = "digest:f0afbeeb00baa";
  public static final String SASL_YARN_SHORT = "sasl:yarn@";
  public static final String SASL_MAPRED_SHORT = "sasl:mapred@";
  public static final String REALM_EXAMPLE_COM = "example.com";
  private static RegistrySecurity registrySecurity;

  @BeforeAll
  public static void setupTestRegistrySecurityHelper() throws IOException {
    Configuration conf = new Configuration();
    conf.setBoolean(KEY_REGISTRY_SECURE, true);
    conf.set(KEY_REGISTRY_KERBEROS_REALM, "KERBEROS");
    registrySecurity = new RegistrySecurity("");
    // init the ACLs OUTSIDE A KERBEROS CLUSTER
    registrySecurity.init(conf);
  }

  @Test
  public void testACLSplitRealmed() throws Throwable {
    List<String> pairs =
        registrySecurity.splitAclPairs(
            SASL_YARN_EXAMPLE_COM +
            ", " +
            SASL_MAPRED_EXAMPLE_COM,
            "");

    assertEquals(SASL_YARN_EXAMPLE_COM, pairs.get(0));
    assertEquals(SASL_MAPRED_EXAMPLE_COM, pairs.get(1));
  }


  @Test
  public void testBuildAclsRealmed() throws Throwable {
    List<ACL> acls = registrySecurity.buildACLs(
        SASL_YARN_EXAMPLE_COM +
        ", " +
        SASL_MAPRED_EXAMPLE_COM,
        "",
        ZooDefs.Perms.ALL);
    assertEquals(YARN_EXAMPLE_COM, acls.get(0).getId().getId());
    assertEquals(MAPRED_EXAMPLE_COM, acls.get(1).getId().getId());
  }

  @Test
  public void testACLDefaultRealm() throws Throwable {
    List<String> pairs =
        registrySecurity.splitAclPairs(
            SASL_YARN_SHORT +
            ", " +
            SASL_MAPRED_SHORT,
            REALM_EXAMPLE_COM);

    assertEquals(SASL_YARN_EXAMPLE_COM, pairs.get(0));
    assertEquals(SASL_MAPRED_EXAMPLE_COM, pairs.get(1));
  }

  @Test
  public void testBuildAclsDefaultRealm() throws Throwable {
    List<ACL> acls = registrySecurity.buildACLs(
        SASL_YARN_SHORT +
        ", " +
        SASL_MAPRED_SHORT,
        REALM_EXAMPLE_COM, ZooDefs.Perms.ALL);

    assertEquals(YARN_EXAMPLE_COM, acls.get(0).getId().getId());
    assertEquals(MAPRED_EXAMPLE_COM, acls.get(1).getId().getId());
  }

  @Test
  public void testACLSplitNullRealm() throws Throwable {
    List<String> pairs =
        registrySecurity.splitAclPairs(
            SASL_YARN_SHORT +
            ", " +
            SASL_MAPRED_SHORT,
            "");

    assertEquals(SASL_YARN_SHORT, pairs.get(0));
    assertEquals(SASL_MAPRED_SHORT, pairs.get(1));
  }

  @Test
  public void testBuildAclsNullRealm() throws Throwable {
    assertThrows(IllegalArgumentException.class, () -> {
      registrySecurity.buildACLs(
          SASL_YARN_SHORT +
          ", " +
          SASL_MAPRED_SHORT,
          "", ZooDefs.Perms.ALL);
      fail("");
    });
  }

  @Test
  public void testACLDefaultRealmOnlySASL() throws Throwable {
    List<String> pairs =
        registrySecurity.splitAclPairs(
            SASL_YARN_SHORT +
            ", " +
            DIGEST_F0AF,
            REALM_EXAMPLE_COM);

    assertEquals(SASL_YARN_EXAMPLE_COM, pairs.get(0));
    assertEquals(DIGEST_F0AF, pairs.get(1));
  }

  @Test
  public void testACLSplitMixed() throws Throwable {
    List<String> pairs =
        registrySecurity.splitAclPairs(
            SASL_YARN_SHORT +
            ", " +
            SASL_MAPRED_APACHE +
            ", ,," +
            DIGEST_F0AF,
            REALM_EXAMPLE_COM);

    assertEquals(SASL_YARN_EXAMPLE_COM, pairs.get(0));
    assertEquals(SASL_MAPRED_APACHE, pairs.get(1));
    assertEquals(DIGEST_F0AF, pairs.get(2));
  }

  @Test
  public void testDefaultAClsValid() throws Throwable {
    registrySecurity.buildACLs(
        RegistryConstants.DEFAULT_REGISTRY_SYSTEM_ACCOUNTS,
        REALM_EXAMPLE_COM, ZooDefs.Perms.ALL);
  }

  @Test
  public void testDefaultRealm() throws Throwable {
    String realm = RegistrySecurity.getDefaultRealmInJVM();
    LOG.info("Realm {}", realm);
  }

  @Test
  public void testUGIProperties() throws Throwable {
    UserGroupInformation user = UserGroupInformation.getCurrentUser();
    ACL acl = registrySecurity.createACLForUser(user, ZooDefs.Perms.ALL);
    assertFalse(RegistrySecurity.ALL_READWRITE_ACCESS.equals(acl));
    LOG.info("User {} has ACL {}", user, acl);
  }


  @Test
  public void testSecurityImpliesKerberos() throws Throwable {
    Configuration conf = new Configuration();
    conf.setBoolean("hadoop.security.authentication", true);
    conf.setBoolean(KEY_REGISTRY_SECURE, true);
    conf.set(KEY_REGISTRY_KERBEROS_REALM, "KERBEROS");
    RegistrySecurity security = new RegistrySecurity("registry security");
    try {
      security.init(conf);
    } catch (Exception e) {
      assertTrue(e.toString().contains(RegistrySecurity.E_NO_KERBEROS),
          "did not find "+ RegistrySecurity.E_NO_KERBEROS + " in " + e);
    }
  }


}