http://git-wip-us.apache.org/repos/asf/hbase-site/blob/68eae623/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
----------------------------------------------------------------------
diff --git
a/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
b/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
deleted file mode 100644
index 2e68b22..0000000
---
a/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
+++ /dev/null
@@ -1,859 +0,0 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
-<html lang="en">
-<head>
-<title>Source code</title>
-<link rel="stylesheet" type="text/css"
href="../../../../../../../stylesheet.css" title="Style">
-</head>
-<body>
-<div class="sourceContainer">
-<pre><span class="sourceLineNo">001</span>/**<a name="line.1"></a>
-<span class="sourceLineNo">002</span> * Licensed to the Apache Software
Foundation (ASF) under one<a name="line.2"></a>
-<span class="sourceLineNo">003</span> * or more contributor license
agreements. See the NOTICE file<a name="line.3"></a>
-<span class="sourceLineNo">004</span> * distributed with this work for
additional information<a name="line.4"></a>
-<span class="sourceLineNo">005</span> * regarding copyright ownership. The
ASF licenses this file<a name="line.5"></a>
-<span class="sourceLineNo">006</span> * to you under the Apache License,
Version 2.0 (the<a name="line.6"></a>
-<span class="sourceLineNo">007</span> * "License"); you may not use this file
except in compliance<a name="line.7"></a>
-<span class="sourceLineNo">008</span> * with the License. You may obtain a
copy of the License at<a name="line.8"></a>
-<span class="sourceLineNo">009</span> *<a name="line.9"></a>
-<span class="sourceLineNo">010</span> *
http://www.apache.org/licenses/LICENSE-2.0<a name="line.10"></a>
-<span class="sourceLineNo">011</span> *<a name="line.11"></a>
-<span class="sourceLineNo">012</span> * Unless required by applicable law or
agreed to in writing, software<a name="line.12"></a>
-<span class="sourceLineNo">013</span> * distributed under the License is
distributed on an "AS IS" BASIS,<a name="line.13"></a>
-<span class="sourceLineNo">014</span> * WITHOUT WARRANTIES OR CONDITIONS OF
ANY KIND, either express or implied.<a name="line.14"></a>
-<span class="sourceLineNo">015</span> * See the License for the specific
language governing permissions and<a name="line.15"></a>
-<span class="sourceLineNo">016</span> * limitations under the License.<a
name="line.16"></a>
-<span class="sourceLineNo">017</span> */<a name="line.17"></a>
-<span class="sourceLineNo">018</span><a name="line.18"></a>
-<span class="sourceLineNo">019</span>package
org.apache.hadoop.hbase.security.access;<a name="line.19"></a>
-<span class="sourceLineNo">020</span><a name="line.20"></a>
-<span class="sourceLineNo">021</span>import static
org.apache.hadoop.hbase.util.CollectionUtils.computeIfAbsent;<a
name="line.21"></a>
-<span class="sourceLineNo">022</span><a name="line.22"></a>
-<span class="sourceLineNo">023</span>import
org.apache.hbase.thirdparty.com.google.common.annotations.VisibleForTesting;<a
name="line.23"></a>
-<span class="sourceLineNo">024</span>import
org.apache.hbase.thirdparty.com.google.common.collect.ArrayListMultimap;<a
name="line.24"></a>
-<span class="sourceLineNo">025</span>import
org.apache.hbase.thirdparty.com.google.common.collect.ListMultimap;<a
name="line.25"></a>
-<span class="sourceLineNo">026</span>import
org.apache.hbase.thirdparty.com.google.common.collect.Lists;<a
name="line.26"></a>
-<span class="sourceLineNo">027</span><a name="line.27"></a>
-<span class="sourceLineNo">028</span>import java.io.Closeable;<a
name="line.28"></a>
-<span class="sourceLineNo">029</span>import java.io.IOException;<a
name="line.29"></a>
-<span class="sourceLineNo">030</span>import java.util.HashMap;<a
name="line.30"></a>
-<span class="sourceLineNo">031</span>import java.util.List;<a
name="line.31"></a>
-<span class="sourceLineNo">032</span>import java.util.Map;<a
name="line.32"></a>
-<span class="sourceLineNo">033</span>import
java.util.concurrent.ConcurrentSkipListMap;<a name="line.33"></a>
-<span class="sourceLineNo">034</span>import
java.util.concurrent.atomic.AtomicLong;<a name="line.34"></a>
-<span class="sourceLineNo">035</span><a name="line.35"></a>
-<span class="sourceLineNo">036</span>import
org.apache.hadoop.conf.Configuration;<a name="line.36"></a>
-<span class="sourceLineNo">037</span>import
org.apache.hadoop.hbase.AuthUtil;<a name="line.37"></a>
-<span class="sourceLineNo">038</span>import org.apache.hadoop.hbase.Cell;<a
name="line.38"></a>
-<span class="sourceLineNo">039</span>import
org.apache.hadoop.hbase.TableName;<a name="line.39"></a>
-<span class="sourceLineNo">040</span>import
org.apache.hadoop.hbase.zookeeper.ZKWatcher;<a name="line.40"></a>
-<span class="sourceLineNo">041</span>import
org.apache.yetus.audience.InterfaceAudience;<a name="line.41"></a>
-<span class="sourceLineNo">042</span>import
org.apache.hadoop.hbase.exceptions.DeserializationException;<a
name="line.42"></a>
-<span class="sourceLineNo">043</span>import
org.apache.hadoop.hbase.log.HBaseMarkers;<a name="line.43"></a>
-<span class="sourceLineNo">044</span>import
org.apache.hadoop.hbase.security.Superusers;<a name="line.44"></a>
-<span class="sourceLineNo">045</span>import
org.apache.hadoop.hbase.security.User;<a name="line.45"></a>
-<span class="sourceLineNo">046</span>import
org.apache.hadoop.hbase.security.UserProvider;<a name="line.46"></a>
-<span class="sourceLineNo">047</span>import
org.apache.hadoop.hbase.util.Bytes;<a name="line.47"></a>
-<span class="sourceLineNo">048</span>import
org.apache.zookeeper.KeeperException;<a name="line.48"></a>
-<span class="sourceLineNo">049</span>import org.slf4j.Logger;<a
name="line.49"></a>
-<span class="sourceLineNo">050</span>import org.slf4j.LoggerFactory;<a
name="line.50"></a>
-<span class="sourceLineNo">051</span><a name="line.51"></a>
-<span class="sourceLineNo">052</span>/**<a name="line.52"></a>
-<span class="sourceLineNo">053</span> * Performs authorization checks for a
given user's assigned permissions<a name="line.53"></a>
-<span class="sourceLineNo">054</span> */<a name="line.54"></a>
-<span class="sourceLineNo">055</span>@InterfaceAudience.Private<a
name="line.55"></a>
-<span class="sourceLineNo">056</span>public class TableAuthManager implements
Closeable {<a name="line.56"></a>
-<span class="sourceLineNo">057</span> private static class
PermissionCache<T extends Permission> {<a name="line.57"></a>
-<span class="sourceLineNo">058</span> /** Cache of user permissions */<a
name="line.58"></a>
-<span class="sourceLineNo">059</span> private ListMultimap<String,T>
userCache = ArrayListMultimap.create();<a name="line.59"></a>
-<span class="sourceLineNo">060</span> /** Cache of group permissions */<a
name="line.60"></a>
-<span class="sourceLineNo">061</span> private ListMultimap<String,T>
groupCache = ArrayListMultimap.create();<a name="line.61"></a>
-<span class="sourceLineNo">062</span><a name="line.62"></a>
-<span class="sourceLineNo">063</span> public List<T> getUser(String
user) {<a name="line.63"></a>
-<span class="sourceLineNo">064</span> return userCache.get(user);<a
name="line.64"></a>
-<span class="sourceLineNo">065</span> }<a name="line.65"></a>
-<span class="sourceLineNo">066</span><a name="line.66"></a>
-<span class="sourceLineNo">067</span> public void putUser(String user, T
perm) {<a name="line.67"></a>
-<span class="sourceLineNo">068</span> userCache.put(user, perm);<a
name="line.68"></a>
-<span class="sourceLineNo">069</span> }<a name="line.69"></a>
-<span class="sourceLineNo">070</span><a name="line.70"></a>
-<span class="sourceLineNo">071</span> public List<T>
replaceUser(String user, Iterable<? extends T> perms) {<a
name="line.71"></a>
-<span class="sourceLineNo">072</span> return
userCache.replaceValues(user, perms);<a name="line.72"></a>
-<span class="sourceLineNo">073</span> }<a name="line.73"></a>
-<span class="sourceLineNo">074</span><a name="line.74"></a>
-<span class="sourceLineNo">075</span> public List<T> getGroup(String
group) {<a name="line.75"></a>
-<span class="sourceLineNo">076</span> return groupCache.get(group);<a
name="line.76"></a>
-<span class="sourceLineNo">077</span> }<a name="line.77"></a>
-<span class="sourceLineNo">078</span><a name="line.78"></a>
-<span class="sourceLineNo">079</span> public void putGroup(String group, T
perm) {<a name="line.79"></a>
-<span class="sourceLineNo">080</span> groupCache.put(group, perm);<a
name="line.80"></a>
-<span class="sourceLineNo">081</span> }<a name="line.81"></a>
-<span class="sourceLineNo">082</span><a name="line.82"></a>
-<span class="sourceLineNo">083</span> public List<T>
replaceGroup(String group, Iterable<? extends T> perms) {<a
name="line.83"></a>
-<span class="sourceLineNo">084</span> return
groupCache.replaceValues(group, perms);<a name="line.84"></a>
-<span class="sourceLineNo">085</span> }<a name="line.85"></a>
-<span class="sourceLineNo">086</span><a name="line.86"></a>
-<span class="sourceLineNo">087</span> /**<a name="line.87"></a>
-<span class="sourceLineNo">088</span> * Returns a combined map of user and
group permissions, with group names<a name="line.88"></a>
-<span class="sourceLineNo">089</span> * distinguished according to {@link
AuthUtil#isGroupPrincipal(String)}.<a name="line.89"></a>
-<span class="sourceLineNo">090</span> */<a name="line.90"></a>
-<span class="sourceLineNo">091</span> public ListMultimap<String,T>
getAllPermissions() {<a name="line.91"></a>
-<span class="sourceLineNo">092</span> ListMultimap<String,T> tmp =
ArrayListMultimap.create();<a name="line.92"></a>
-<span class="sourceLineNo">093</span> tmp.putAll(userCache);<a
name="line.93"></a>
-<span class="sourceLineNo">094</span> for (String group :
groupCache.keySet()) {<a name="line.94"></a>
-<span class="sourceLineNo">095</span>
tmp.putAll(AuthUtil.toGroupEntry(group), groupCache.get(group));<a
name="line.95"></a>
-<span class="sourceLineNo">096</span> }<a name="line.96"></a>
-<span class="sourceLineNo">097</span> return tmp;<a name="line.97"></a>
-<span class="sourceLineNo">098</span> }<a name="line.98"></a>
-<span class="sourceLineNo">099</span> }<a name="line.99"></a>
-<span class="sourceLineNo">100</span><a name="line.100"></a>
-<span class="sourceLineNo">101</span> private static final Logger LOG =
LoggerFactory.getLogger(TableAuthManager.class);<a name="line.101"></a>
-<span class="sourceLineNo">102</span><a name="line.102"></a>
-<span class="sourceLineNo">103</span> /** Cache of global permissions */<a
name="line.103"></a>
-<span class="sourceLineNo">104</span> private volatile
PermissionCache<Permission> globalCache;<a name="line.104"></a>
-<span class="sourceLineNo">105</span><a name="line.105"></a>
-<span class="sourceLineNo">106</span> private
ConcurrentSkipListMap<TableName, PermissionCache<TablePermission>>
tableCache =<a name="line.106"></a>
-<span class="sourceLineNo">107</span> new
ConcurrentSkipListMap<>();<a name="line.107"></a>
-<span class="sourceLineNo">108</span><a name="line.108"></a>
-<span class="sourceLineNo">109</span> private
ConcurrentSkipListMap<String, PermissionCache<TablePermission>>
nsCache =<a name="line.109"></a>
-<span class="sourceLineNo">110</span> new
ConcurrentSkipListMap<>();<a name="line.110"></a>
-<span class="sourceLineNo">111</span><a name="line.111"></a>
-<span class="sourceLineNo">112</span> private Configuration conf;<a
name="line.112"></a>
-<span class="sourceLineNo">113</span> private ZKPermissionWatcher zkperms;<a
name="line.113"></a>
-<span class="sourceLineNo">114</span> private final AtomicLong mtime = new
AtomicLong(0L);<a name="line.114"></a>
-<span class="sourceLineNo">115</span><a name="line.115"></a>
-<span class="sourceLineNo">116</span> private TableAuthManager(ZKWatcher
watcher, Configuration conf)<a name="line.116"></a>
-<span class="sourceLineNo">117</span> throws IOException {<a
name="line.117"></a>
-<span class="sourceLineNo">118</span> this.conf = conf;<a
name="line.118"></a>
-<span class="sourceLineNo">119</span><a name="line.119"></a>
-<span class="sourceLineNo">120</span> // initialize global permissions
based on configuration<a name="line.120"></a>
-<span class="sourceLineNo">121</span> globalCache = initGlobal(conf);<a
name="line.121"></a>
-<span class="sourceLineNo">122</span><a name="line.122"></a>
-<span class="sourceLineNo">123</span> this.zkperms = new
ZKPermissionWatcher(watcher, this, conf);<a name="line.123"></a>
-<span class="sourceLineNo">124</span> try {<a name="line.124"></a>
-<span class="sourceLineNo">125</span> this.zkperms.start();<a
name="line.125"></a>
-<span class="sourceLineNo">126</span> } catch (KeeperException ke) {<a
name="line.126"></a>
-<span class="sourceLineNo">127</span> LOG.error("ZooKeeper initialization
failed", ke);<a name="line.127"></a>
-<span class="sourceLineNo">128</span> }<a name="line.128"></a>
-<span class="sourceLineNo">129</span> }<a name="line.129"></a>
-<span class="sourceLineNo">130</span><a name="line.130"></a>
-<span class="sourceLineNo">131</span> @Override<a name="line.131"></a>
-<span class="sourceLineNo">132</span> public void close() {<a
name="line.132"></a>
-<span class="sourceLineNo">133</span> this.zkperms.close();<a
name="line.133"></a>
-<span class="sourceLineNo">134</span> }<a name="line.134"></a>
-<span class="sourceLineNo">135</span><a name="line.135"></a>
-<span class="sourceLineNo">136</span> /**<a name="line.136"></a>
-<span class="sourceLineNo">137</span> * Returns a new {@code
PermissionCache} initialized with permission assignments<a name="line.137"></a>
-<span class="sourceLineNo">138</span> * from the {@code hbase.superuser}
configuration key.<a name="line.138"></a>
-<span class="sourceLineNo">139</span> */<a name="line.139"></a>
-<span class="sourceLineNo">140</span> private
PermissionCache<Permission> initGlobal(Configuration conf) throws
IOException {<a name="line.140"></a>
-<span class="sourceLineNo">141</span> UserProvider userProvider =
UserProvider.instantiate(conf);<a name="line.141"></a>
-<span class="sourceLineNo">142</span> User user =
userProvider.getCurrent();<a name="line.142"></a>
-<span class="sourceLineNo">143</span> if (user == null) {<a
name="line.143"></a>
-<span class="sourceLineNo">144</span> throw new IOException("Unable to
obtain the current user, " +<a name="line.144"></a>
-<span class="sourceLineNo">145</span> "authorization checks for
internal operations will not work correctly!");<a name="line.145"></a>
-<span class="sourceLineNo">146</span> }<a name="line.146"></a>
-<span class="sourceLineNo">147</span> PermissionCache<Permission>
newCache = new PermissionCache<>();<a name="line.147"></a>
-<span class="sourceLineNo">148</span> String currentUser =
user.getShortName();<a name="line.148"></a>
-<span class="sourceLineNo">149</span><a name="line.149"></a>
-<span class="sourceLineNo">150</span> // the system user is always
included<a name="line.150"></a>
-<span class="sourceLineNo">151</span> List<String> superusers =
Lists.asList(currentUser, conf.getStrings(<a name="line.151"></a>
-<span class="sourceLineNo">152</span> Superusers.SUPERUSER_CONF_KEY,
new String[0]));<a name="line.152"></a>
-<span class="sourceLineNo">153</span> if (superusers != null) {<a
name="line.153"></a>
-<span class="sourceLineNo">154</span> for (String name : superusers) {<a
name="line.154"></a>
-<span class="sourceLineNo">155</span> if
(AuthUtil.isGroupPrincipal(name)) {<a name="line.155"></a>
-<span class="sourceLineNo">156</span>
newCache.putGroup(AuthUtil.getGroupName(name),<a name="line.156"></a>
-<span class="sourceLineNo">157</span> new
Permission(Permission.Action.values()));<a name="line.157"></a>
-<span class="sourceLineNo">158</span> } else {<a name="line.158"></a>
-<span class="sourceLineNo">159</span> newCache.putUser(name, new
Permission(Permission.Action.values()));<a name="line.159"></a>
-<span class="sourceLineNo">160</span> }<a name="line.160"></a>
-<span class="sourceLineNo">161</span> }<a name="line.161"></a>
-<span class="sourceLineNo">162</span> }<a name="line.162"></a>
-<span class="sourceLineNo">163</span> return newCache;<a
name="line.163"></a>
-<span class="sourceLineNo">164</span> }<a name="line.164"></a>
-<span class="sourceLineNo">165</span><a name="line.165"></a>
-<span class="sourceLineNo">166</span> public ZKPermissionWatcher
getZKPermissionWatcher() {<a name="line.166"></a>
-<span class="sourceLineNo">167</span> return this.zkperms;<a
name="line.167"></a>
-<span class="sourceLineNo">168</span> }<a name="line.168"></a>
-<span class="sourceLineNo">169</span><a name="line.169"></a>
-<span class="sourceLineNo">170</span> public void
refreshTableCacheFromWritable(TableName table,<a name="line.170"></a>
-<span class="sourceLineNo">171</span>
byte[] data) throws IOException {<a name="line.171"></a>
-<span class="sourceLineNo">172</span> if (data != null &&
data.length > 0) {<a name="line.172"></a>
-<span class="sourceLineNo">173</span>
ListMultimap<String,TablePermission> perms;<a name="line.173"></a>
-<span class="sourceLineNo">174</span> try {<a name="line.174"></a>
-<span class="sourceLineNo">175</span> perms =
AccessControlLists.readPermissions(data, conf);<a name="line.175"></a>
-<span class="sourceLineNo">176</span> } catch (DeserializationException
e) {<a name="line.176"></a>
-<span class="sourceLineNo">177</span> throw new IOException(e);<a
name="line.177"></a>
-<span class="sourceLineNo">178</span> }<a name="line.178"></a>
-<span class="sourceLineNo">179</span><a name="line.179"></a>
-<span class="sourceLineNo">180</span> if (perms != null) {<a
name="line.180"></a>
-<span class="sourceLineNo">181</span> if (Bytes.equals(table.getName(),
AccessControlLists.ACL_GLOBAL_NAME)) {<a name="line.181"></a>
-<span class="sourceLineNo">182</span> updateGlobalCache(perms);<a
name="line.182"></a>
-<span class="sourceLineNo">183</span> } else {<a name="line.183"></a>
-<span class="sourceLineNo">184</span> updateTableCache(table,
perms);<a name="line.184"></a>
-<span class="sourceLineNo">185</span> }<a name="line.185"></a>
-<span class="sourceLineNo">186</span> }<a name="line.186"></a>
-<span class="sourceLineNo">187</span> } else {<a name="line.187"></a>
-<span class="sourceLineNo">188</span> LOG.debug("Skipping permission
cache refresh because writable data is empty");<a name="line.188"></a>
-<span class="sourceLineNo">189</span> }<a name="line.189"></a>
-<span class="sourceLineNo">190</span> }<a name="line.190"></a>
-<span class="sourceLineNo">191</span><a name="line.191"></a>
-<span class="sourceLineNo">192</span> public void
refreshNamespaceCacheFromWritable(String namespace, byte[] data) throws
IOException {<a name="line.192"></a>
-<span class="sourceLineNo">193</span> if (data != null &&
data.length > 0) {<a name="line.193"></a>
-<span class="sourceLineNo">194</span>
ListMultimap<String,TablePermission> perms;<a name="line.194"></a>
-<span class="sourceLineNo">195</span> try {<a name="line.195"></a>
-<span class="sourceLineNo">196</span> perms =
AccessControlLists.readPermissions(data, conf);<a name="line.196"></a>
-<span class="sourceLineNo">197</span> } catch (DeserializationException
e) {<a name="line.197"></a>
-<span class="sourceLineNo">198</span> throw new IOException(e);<a
name="line.198"></a>
-<span class="sourceLineNo">199</span> }<a name="line.199"></a>
-<span class="sourceLineNo">200</span> if (perms != null) {<a
name="line.200"></a>
-<span class="sourceLineNo">201</span> updateNsCache(namespace,
perms);<a name="line.201"></a>
-<span class="sourceLineNo">202</span> }<a name="line.202"></a>
-<span class="sourceLineNo">203</span> } else {<a name="line.203"></a>
-<span class="sourceLineNo">204</span> LOG.debug("Skipping permission
cache refresh because writable data is empty");<a name="line.204"></a>
-<span class="sourceLineNo">205</span> }<a name="line.205"></a>
-<span class="sourceLineNo">206</span> }<a name="line.206"></a>
-<span class="sourceLineNo">207</span><a name="line.207"></a>
-<span class="sourceLineNo">208</span> /**<a name="line.208"></a>
-<span class="sourceLineNo">209</span> * Updates the internal global
permissions cache<a name="line.209"></a>
-<span class="sourceLineNo">210</span> *<a name="line.210"></a>
-<span class="sourceLineNo">211</span> * @param userPerms<a
name="line.211"></a>
-<span class="sourceLineNo">212</span> */<a name="line.212"></a>
-<span class="sourceLineNo">213</span> private void
updateGlobalCache(ListMultimap<String,TablePermission> userPerms) {<a
name="line.213"></a>
-<span class="sourceLineNo">214</span> PermissionCache<Permission>
newCache = null;<a name="line.214"></a>
-<span class="sourceLineNo">215</span> try {<a name="line.215"></a>
-<span class="sourceLineNo">216</span> newCache = initGlobal(conf);<a
name="line.216"></a>
-<span class="sourceLineNo">217</span> for
(Map.Entry<String,TablePermission> entry : userPerms.entries()) {<a
name="line.217"></a>
-<span class="sourceLineNo">218</span> if
(AuthUtil.isGroupPrincipal(entry.getKey())) {<a name="line.218"></a>
-<span class="sourceLineNo">219</span>
newCache.putGroup(AuthUtil.getGroupName(entry.getKey()),<a name="line.219"></a>
-<span class="sourceLineNo">220</span> new
Permission(entry.getValue().getActions()));<a name="line.220"></a>
-<span class="sourceLineNo">221</span> } else {<a name="line.221"></a>
-<span class="sourceLineNo">222</span>
newCache.putUser(entry.getKey(), new
Permission(entry.getValue().getActions()));<a name="line.222"></a>
-<span class="sourceLineNo">223</span> }<a name="line.223"></a>
-<span class="sourceLineNo">224</span> }<a name="line.224"></a>
-<span class="sourceLineNo">225</span> globalCache = newCache;<a
name="line.225"></a>
-<span class="sourceLineNo">226</span> mtime.incrementAndGet();<a
name="line.226"></a>
-<span class="sourceLineNo">227</span> } catch (IOException e) {<a
name="line.227"></a>
-<span class="sourceLineNo">228</span> // Never happens<a
name="line.228"></a>
-<span class="sourceLineNo">229</span> LOG.error("Error occurred while
updating the global cache", e);<a name="line.229"></a>
-<span class="sourceLineNo">230</span> }<a name="line.230"></a>
-<span class="sourceLineNo">231</span> }<a name="line.231"></a>
-<span class="sourceLineNo">232</span><a name="line.232"></a>
-<span class="sourceLineNo">233</span> /**<a name="line.233"></a>
-<span class="sourceLineNo">234</span> * Updates the internal permissions
cache for a single table, splitting<a name="line.234"></a>
-<span class="sourceLineNo">235</span> * the permissions listed into separate
caches for users and groups to optimize<a name="line.235"></a>
-<span class="sourceLineNo">236</span> * group lookups.<a name="line.236"></a>
-<span class="sourceLineNo">237</span> *<a name="line.237"></a>
-<span class="sourceLineNo">238</span> * @param table<a name="line.238"></a>
-<span class="sourceLineNo">239</span> * @param tablePerms<a
name="line.239"></a>
-<span class="sourceLineNo">240</span> */<a name="line.240"></a>
-<span class="sourceLineNo">241</span> private void updateTableCache(TableName
table,<a name="line.241"></a>
-<span class="sourceLineNo">242</span>
ListMultimap<String,TablePermission> tablePerms) {<a name="line.242"></a>
-<span class="sourceLineNo">243</span>
PermissionCache<TablePermission> newTablePerms = new
PermissionCache<>();<a name="line.243"></a>
-<span class="sourceLineNo">244</span><a name="line.244"></a>
-<span class="sourceLineNo">245</span> for
(Map.Entry<String,TablePermission> entry : tablePerms.entries()) {<a
name="line.245"></a>
-<span class="sourceLineNo">246</span> if
(AuthUtil.isGroupPrincipal(entry.getKey())) {<a name="line.246"></a>
-<span class="sourceLineNo">247</span>
newTablePerms.putGroup(AuthUtil.getGroupName(entry.getKey()),
entry.getValue());<a name="line.247"></a>
-<span class="sourceLineNo">248</span> } else {<a name="line.248"></a>
-<span class="sourceLineNo">249</span>
newTablePerms.putUser(entry.getKey(), entry.getValue());<a name="line.249"></a>
-<span class="sourceLineNo">250</span> }<a name="line.250"></a>
-<span class="sourceLineNo">251</span> }<a name="line.251"></a>
-<span class="sourceLineNo">252</span><a name="line.252"></a>
-<span class="sourceLineNo">253</span> tableCache.put(table,
newTablePerms);<a name="line.253"></a>
-<span class="sourceLineNo">254</span> mtime.incrementAndGet();<a
name="line.254"></a>
-<span class="sourceLineNo">255</span> }<a name="line.255"></a>
-<span class="sourceLineNo">256</span><a name="line.256"></a>
-<span class="sourceLineNo">257</span> /**<a name="line.257"></a>
-<span class="sourceLineNo">258</span> * Updates the internal permissions
cache for a single table, splitting<a name="line.258"></a>
-<span class="sourceLineNo">259</span> * the permissions listed into separate
caches for users and groups to optimize<a name="line.259"></a>
-<span class="sourceLineNo">260</span> * group lookups.<a name="line.260"></a>
-<span class="sourceLineNo">261</span> *<a name="line.261"></a>
-<span class="sourceLineNo">262</span> * @param namespace<a
name="line.262"></a>
-<span class="sourceLineNo">263</span> * @param tablePerms<a
name="line.263"></a>
-<span class="sourceLineNo">264</span> */<a name="line.264"></a>
-<span class="sourceLineNo">265</span> private void updateNsCache(String
namespace,<a name="line.265"></a>
-<span class="sourceLineNo">266</span>
ListMultimap<String, TablePermission> tablePerms) {<a name="line.266"></a>
-<span class="sourceLineNo">267</span>
PermissionCache<TablePermission> newTablePerms = new
PermissionCache<>();<a name="line.267"></a>
-<span class="sourceLineNo">268</span><a name="line.268"></a>
-<span class="sourceLineNo">269</span> for (Map.Entry<String,
TablePermission> entry : tablePerms.entries()) {<a name="line.269"></a>
-<span class="sourceLineNo">270</span> if
(AuthUtil.isGroupPrincipal(entry.getKey())) {<a name="line.270"></a>
-<span class="sourceLineNo">271</span>
newTablePerms.putGroup(AuthUtil.getGroupName(entry.getKey()),
entry.getValue());<a name="line.271"></a>
-<span class="sourceLineNo">272</span> } else {<a name="line.272"></a>
-<span class="sourceLineNo">273</span>
newTablePerms.putUser(entry.getKey(), entry.getValue());<a name="line.273"></a>
-<span class="sourceLineNo">274</span> }<a name="line.274"></a>
-<span class="sourceLineNo">275</span> }<a name="line.275"></a>
-<span class="sourceLineNo">276</span><a name="line.276"></a>
-<span class="sourceLineNo">277</span> nsCache.put(namespace,
newTablePerms);<a name="line.277"></a>
-<span class="sourceLineNo">278</span> mtime.incrementAndGet();<a
name="line.278"></a>
-<span class="sourceLineNo">279</span> }<a name="line.279"></a>
-<span class="sourceLineNo">280</span><a name="line.280"></a>
-<span class="sourceLineNo">281</span> private
PermissionCache<TablePermission> getTablePermissions(TableName table) {<a
name="line.281"></a>
-<span class="sourceLineNo">282</span> return computeIfAbsent(tableCache,
table, PermissionCache::new);<a name="line.282"></a>
-<span class="sourceLineNo">283</span> }<a name="line.283"></a>
-<span class="sourceLineNo">284</span><a name="line.284"></a>
-<span class="sourceLineNo">285</span> private
PermissionCache<TablePermission> getNamespacePermissions(String
namespace) {<a name="line.285"></a>
-<span class="sourceLineNo">286</span> return computeIfAbsent(nsCache,
namespace, PermissionCache::new);<a name="line.286"></a>
-<span class="sourceLineNo">287</span> }<a name="line.287"></a>
-<span class="sourceLineNo">288</span><a name="line.288"></a>
-<span class="sourceLineNo">289</span> /**<a name="line.289"></a>
-<span class="sourceLineNo">290</span> * Authorizes a global permission<a
name="line.290"></a>
-<span class="sourceLineNo">291</span> * @param perms<a name="line.291"></a>
-<span class="sourceLineNo">292</span> * @param action<a name="line.292"></a>
-<span class="sourceLineNo">293</span> * @return true if authorized, false
otherwise<a name="line.293"></a>
-<span class="sourceLineNo">294</span> */<a name="line.294"></a>
-<span class="sourceLineNo">295</span> private boolean
authorize(List<Permission> perms, Permission.Action action) {<a
name="line.295"></a>
-<span class="sourceLineNo">296</span> if (perms != null) {<a
name="line.296"></a>
-<span class="sourceLineNo">297</span> for (Permission p : perms) {<a
name="line.297"></a>
-<span class="sourceLineNo">298</span> if (p.implies(action)) {<a
name="line.298"></a>
-<span class="sourceLineNo">299</span> return true;<a
name="line.299"></a>
-<span class="sourceLineNo">300</span> }<a name="line.300"></a>
-<span class="sourceLineNo">301</span> }<a name="line.301"></a>
-<span class="sourceLineNo">302</span> } else if (LOG.isDebugEnabled()) {<a
name="line.302"></a>
-<span class="sourceLineNo">303</span> LOG.debug("No permissions found for
" + action);<a name="line.303"></a>
-<span class="sourceLineNo">304</span> }<a name="line.304"></a>
-<span class="sourceLineNo">305</span><a name="line.305"></a>
-<span class="sourceLineNo">306</span> return false;<a name="line.306"></a>
-<span class="sourceLineNo">307</span> }<a name="line.307"></a>
-<span class="sourceLineNo">308</span><a name="line.308"></a>
-<span class="sourceLineNo">309</span> /**<a name="line.309"></a>
-<span class="sourceLineNo">310</span> * Authorize a global permission based
on ACLs for the given user and the<a name="line.310"></a>
-<span class="sourceLineNo">311</span> * user's groups.<a name="line.311"></a>
-<span class="sourceLineNo">312</span> * @param user<a name="line.312"></a>
-<span class="sourceLineNo">313</span> * @param action<a name="line.313"></a>
-<span class="sourceLineNo">314</span> * @return true if known and
authorized, false otherwise<a name="line.314"></a>
-<span class="sourceLineNo">315</span> */<a name="line.315"></a>
-<span class="sourceLineNo">316</span> public boolean authorize(User user,
Permission.Action action) {<a name="line.316"></a>
-<span class="sourceLineNo">317</span> if (user == null) {<a
name="line.317"></a>
-<span class="sourceLineNo">318</span> return false;<a name="line.318"></a>
-<span class="sourceLineNo">319</span> }<a name="line.319"></a>
-<span class="sourceLineNo">320</span><a name="line.320"></a>
-<span class="sourceLineNo">321</span> if
(authorize(globalCache.getUser(user.getShortName()), action)) {<a
name="line.321"></a>
-<span class="sourceLineNo">322</span> return true;<a name="line.322"></a>
-<span class="sourceLineNo">323</span> }<a name="line.323"></a>
-<span class="sourceLineNo">324</span><a name="line.324"></a>
-<span class="sourceLineNo">325</span> String[] groups =
user.getGroupNames();<a name="line.325"></a>
-<span class="sourceLineNo">326</span> if (groups != null) {<a
name="line.326"></a>
-<span class="sourceLineNo">327</span> for (String group : groups) {<a
name="line.327"></a>
-<span class="sourceLineNo">328</span> if
(authorize(globalCache.getGroup(group), action)) {<a name="line.328"></a>
-<span class="sourceLineNo">329</span> return true;<a
name="line.329"></a>
-<span class="sourceLineNo">330</span> }<a name="line.330"></a>
-<span class="sourceLineNo">331</span> }<a name="line.331"></a>
-<span class="sourceLineNo">332</span> }<a name="line.332"></a>
-<span class="sourceLineNo">333</span> return false;<a name="line.333"></a>
-<span class="sourceLineNo">334</span> }<a name="line.334"></a>
-<span class="sourceLineNo">335</span><a name="line.335"></a>
-<span class="sourceLineNo">336</span> private boolean
authorize(List<TablePermission> perms,<a name="line.336"></a>
-<span class="sourceLineNo">337</span> TableName
table, byte[] family,<a name="line.337"></a>
-<span class="sourceLineNo">338</span> byte[]
qualifier, Permission.Action action) {<a name="line.338"></a>
-<span class="sourceLineNo">339</span> if (perms != null) {<a
name="line.339"></a>
-<span class="sourceLineNo">340</span> for (TablePermission p : perms) {<a
name="line.340"></a>
-<span class="sourceLineNo">341</span> if (p.implies(table, family,
qualifier, action)) {<a name="line.341"></a>
-<span class="sourceLineNo">342</span> return true;<a
name="line.342"></a>
-<span class="sourceLineNo">343</span> }<a name="line.343"></a>
-<span class="sourceLineNo">344</span> }<a name="line.344"></a>
-<span class="sourceLineNo">345</span> } else if (LOG.isDebugEnabled()) {<a
name="line.345"></a>
-<span class="sourceLineNo">346</span> LOG.debug("No permissions found for
table="+table);<a name="line.346"></a>
-<span class="sourceLineNo">347</span> }<a name="line.347"></a>
-<span class="sourceLineNo">348</span> return false;<a name="line.348"></a>
-<span class="sourceLineNo">349</span> }<a name="line.349"></a>
-<span class="sourceLineNo">350</span><a name="line.350"></a>
-<span class="sourceLineNo">351</span> private boolean
hasAccess(List<TablePermission> perms,<a name="line.351"></a>
-<span class="sourceLineNo">352</span> TableName
table, Permission.Action action) {<a name="line.352"></a>
-<span class="sourceLineNo">353</span> if (perms != null) {<a
name="line.353"></a>
-<span class="sourceLineNo">354</span> for (TablePermission p : perms) {<a
name="line.354"></a>
-<span class="sourceLineNo">355</span> if (p.implies(action)) {<a
name="line.355"></a>
-<span class="sourceLineNo">356</span> return true;<a
name="line.356"></a>
-<span class="sourceLineNo">357</span> }<a name="line.357"></a>
-<span class="sourceLineNo">358</span> }<a name="line.358"></a>
-<span class="sourceLineNo">359</span> } else if (LOG.isDebugEnabled()) {<a
name="line.359"></a>
-<span class="sourceLineNo">360</span> LOG.debug("No permissions found for
table="+table);<a name="line.360"></a>
-<span class="sourceLineNo">361</span> }<a name="line.361"></a>
-<span class="sourceLineNo">362</span> return false;<a name="line.362"></a>
-<span class="sourceLineNo">363</span> }<a name="line.363"></a>
-<span class="sourceLineNo">364</span><a name="line.364"></a>
-<span class="sourceLineNo">365</span> /**<a name="line.365"></a>
-<span class="sourceLineNo">366</span> * Authorize a user for a given KV.
This is called from AccessControlFilter.<a name="line.366"></a>
-<span class="sourceLineNo">367</span> */<a name="line.367"></a>
-<span class="sourceLineNo">368</span> public boolean authorize(User user,
TableName table, Cell cell, Permission.Action action) {<a name="line.368"></a>
-<span class="sourceLineNo">369</span> try {<a name="line.369"></a>
-<span class="sourceLineNo">370</span> List<Permission> perms =
AccessControlLists.getCellPermissionsForUser(user, cell);<a name="line.370"></a>
-<span class="sourceLineNo">371</span> if (LOG.isTraceEnabled()) {<a
name="line.371"></a>
-<span class="sourceLineNo">372</span> LOG.trace("Perms for user " +
user.getShortName() + " in cell " + cell + ": " +<a name="line.372"></a>
-<span class="sourceLineNo">373</span> (perms != null ? perms :
""));<a name="line.373"></a>
-<span class="sourceLineNo">374</span> }<a name="line.374"></a>
-<span class="sourceLineNo">375</span> if (perms != null) {<a
name="line.375"></a>
-<span class="sourceLineNo">376</span> for (Permission p: perms) {<a
name="line.376"></a>
-<span class="sourceLineNo">377</span> if (p.implies(action)) {<a
name="line.377"></a>
-<span class="sourceLineNo">378</span> return true;<a
name="line.378"></a>
-<span class="sourceLineNo">379</span> }<a name="line.379"></a>
-<span class="sourceLineNo">380</span> }<a name="line.380"></a>
-<span class="sourceLineNo">381</span> }<a name="line.381"></a>
-<span class="sourceLineNo">382</span> } catch (IOException e) {<a
name="line.382"></a>
-<span class="sourceLineNo">383</span> // We failed to parse the KV tag<a
name="line.383"></a>
-<span class="sourceLineNo">384</span> LOG.error("Failed parse of ACL tag
in cell " + cell);<a name="line.384"></a>
-<span class="sourceLineNo">385</span> // Fall through to check with the
table and CF perms we were able<a name="line.385"></a>
-<span class="sourceLineNo">386</span> // to collect regardless<a
name="line.386"></a>
-<span class="sourceLineNo">387</span> }<a name="line.387"></a>
-<span class="sourceLineNo">388</span> return false;<a name="line.388"></a>
-<span class="sourceLineNo">389</span> }<a name="line.389"></a>
-<span class="sourceLineNo">390</span><a name="line.390"></a>
-<span class="sourceLineNo">391</span> public boolean authorize(User user,
String namespace, Permission.Action action) {<a name="line.391"></a>
-<span class="sourceLineNo">392</span> // Global authorizations supercede
namespace level<a name="line.392"></a>
-<span class="sourceLineNo">393</span> if (authorize(user, action)) {<a
name="line.393"></a>
-<span class="sourceLineNo">394</span> return true;<a name="line.394"></a>
-<span class="sourceLineNo">395</span> }<a name="line.395"></a>
-<span class="sourceLineNo">396</span> // Check namespace permissions<a
name="line.396"></a>
-<span class="sourceLineNo">397</span>
PermissionCache<TablePermission> tablePerms = nsCache.get(namespace);<a
name="line.397"></a>
-<span class="sourceLineNo">398</span> if (tablePerms != null) {<a
name="line.398"></a>
-<span class="sourceLineNo">399</span> List<TablePermission>
userPerms = tablePerms.getUser(user.getShortName());<a name="line.399"></a>
-<span class="sourceLineNo">400</span> if (authorize(userPerms, namespace,
action)) {<a name="line.400"></a>
-<span class="sourceLineNo">401</span> return true;<a
name="line.401"></a>
-<span class="sourceLineNo">402</span> }<a name="line.402"></a>
-<span class="sourceLineNo">403</span> String[] groupNames =
user.getGroupNames();<a name="line.403"></a>
-<span class="sourceLineNo">404</span> if (groupNames != null) {<a
name="line.404"></a>
-<span class="sourceLineNo">405</span> for (String group : groupNames)
{<a name="line.405"></a>
-<span class="sourceLineNo">406</span> List<TablePermission>
groupPerms = tablePerms.getGroup(group);<a name="line.406"></a>
-<span class="sourceLineNo">407</span> if (authorize(groupPerms,
namespace, action)) {<a name="line.407"></a>
-<span class="sourceLineNo">408</span> return true;<a
name="line.408"></a>
-<span class="sourceLineNo">409</span> }<a name="line.409"></a>
-<span class="sourceLineNo">410</span> }<a name="line.410"></a>
-<span class="sourceLineNo">411</span> }<a name="line.411"></a>
-<span class="sourceLineNo">412</span> }<a name="line.412"></a>
-<span class="sourceLineNo">413</span> return false;<a name="line.413"></a>
-<span class="sourceLineNo">414</span> }<a name="line.414"></a>
-<span class="sourceLineNo">415</span><a name="line.415"></a>
-<span class="sourceLineNo">416</span> private boolean
authorize(List<TablePermission> perms, String namespace,<a
name="line.416"></a>
-<span class="sourceLineNo">417</span>
Permission.Action action) {<a name="line.417"></a>
-<span class="sourceLineNo">418</span> if (perms != null) {<a
name="line.418"></a>
-<span class="sourceLineNo">419</span> for (TablePermission p : perms) {<a
name="line.419"></a>
-<span class="sourceLineNo">420</span> if (p.implies(namespace, action))
{<a name="line.420"></a>
-<span class="sourceLineNo">421</span> return true;<a
name="line.421"></a>
-<span class="sourceLineNo">422</span> }<a name="line.422"></a>
-<span class="sourceLineNo">423</span> }<a name="line.423"></a>
-<span class="sourceLineNo">424</span> } else if (LOG.isDebugEnabled()) {<a
name="line.424"></a>
-<span class="sourceLineNo">425</span> LOG.debug("No permissions for
authorize() check, table=" + namespace);<a name="line.425"></a>
-<span class="sourceLineNo">426</span> }<a name="line.426"></a>
-<span class="sourceLineNo">427</span><a name="line.427"></a>
-<span class="sourceLineNo">428</span> return false;<a name="line.428"></a>
-<span class="sourceLineNo">429</span> }<a name="line.429"></a>
-<span class="sourceLineNo">430</span><a name="line.430"></a>
-<span class="sourceLineNo">431</span> /**<a name="line.431"></a>
-<span class="sourceLineNo">432</span> * Checks authorization to a given
table and column family for a user, based on the<a name="line.432"></a>
-<span class="sourceLineNo">433</span> * stored user permissions.<a
name="line.433"></a>
-<span class="sourceLineNo">434</span> *<a name="line.434"></a>
-<span class="sourceLineNo">435</span> * @param user<a name="line.435"></a>
-<span class="sourceLineNo">436</span> * @param table<a name="line.436"></a>
-<span class="sourceLineNo">437</span> * @param family<a name="line.437"></a>
-<span class="sourceLineNo">438</span> * @param action<a name="line.438"></a>
-<span class="sourceLineNo">439</span> * @return true if known and
authorized, false otherwise<a name="line.439"></a>
-<span class="sourceLineNo">440</span> */<a name="line.440"></a>
-<span class="sourceLineNo">441</span> public boolean authorizeUser(User user,
TableName table, byte[] family,<a name="line.441"></a>
-<span class="sourceLineNo">442</span> Permission.Action action) {<a
name="line.442"></a>
-<span class="sourceLineNo">443</span> return authorizeUser(user, table,
family, null, action);<a name="line.443"></a>
-<span class="sourceLineNo">444</span> }<a name="line.444"></a>
-<span class="sourceLineNo">445</span><a name="line.445"></a>
-<span class="sourceLineNo">446</span> public boolean authorizeUser(User user,
TableName table, byte[] family,<a name="line.446"></a>
-<span class="sourceLineNo">447</span> byte[] qualifier, Permission.Action
action) {<a name="line.447"></a>
-<span class="sourceLineNo">448</span> if (table == null) table =
AccessControlLists.ACL_TABLE_NAME;<a name="line.448"></a>
-<span class="sourceLineNo">449</span> // Global and namespace
authorizations supercede table level<a name="line.449"></a>
-<span class="sourceLineNo">450</span> if (authorize(user,
table.getNamespaceAsString(), action)) {<a name="line.450"></a>
-<span class="sourceLineNo">451</span> return true;<a name="line.451"></a>
-<span class="sourceLineNo">452</span> }<a name="line.452"></a>
-<span class="sourceLineNo">453</span> // Check table permissions<a
name="line.453"></a>
-<span class="sourceLineNo">454</span> return
authorize(getTablePermissions(table).getUser(user.getShortName()), table,
family,<a name="line.454"></a>
-<span class="sourceLineNo">455</span> qualifier, action);<a
name="line.455"></a>
-<span class="sourceLineNo">456</span> }<a name="line.456"></a>
-<span class="sourceLineNo">457</span><a name="line.457"></a>
-<span class="sourceLineNo">458</span> /**<a name="line.458"></a>
-<span class="sourceLineNo">459</span> * Checks if the user has access to the
full table or at least a family/qualifier<a name="line.459"></a>
-<span class="sourceLineNo">460</span> * for the specified action.<a
name="line.460"></a>
-<span class="sourceLineNo">461</span> *<a name="line.461"></a>
-<span class="sourceLineNo">462</span> * @param user<a name="line.462"></a>
-<span class="sourceLineNo">463</span> * @param table<a name="line.463"></a>
-<span class="sourceLineNo">464</span> * @param action<a name="line.464"></a>
-<span class="sourceLineNo">465</span> * @return true if the user has access
to the table, false otherwise<a name="line.465"></a>
-<span class="sourceLineNo">466</span> */<a name="line.466"></a>
-<span class="sourceLineNo">467</span> public boolean userHasAccess(User user,
TableName table, Permission.Action action) {<a name="line.467"></a>
-<span class="sourceLineNo">468</span> if (table == null) table =
AccessControlLists.ACL_TABLE_NAME;<a name="line.468"></a>
-<span class="sourceLineNo">469</span> // Global and namespace
authorizations supercede table level<a name="line.469"></a>
-<span class="sourceLineNo">470</span> if (authorize(user,
table.getNamespaceAsString(), action)) {<a name="line.470"></a>
-<span class="sourceLineNo">471</span> return true;<a name="line.471"></a>
-<span class="sourceLineNo">472</span> }<a name="line.472"></a>
-<span class="sourceLineNo">473</span> // Check table permissions<a
name="line.473"></a>
-<span class="sourceLineNo">474</span> return
hasAccess(getTablePermissions(table).getUser(user.getShortName()), table,
action);<a name="line.474"></a>
-<span class="sourceLineNo">475</span> }<a name="line.475"></a>
-<span class="sourceLineNo">476</span><a name="line.476"></a>
-<span class="sourceLineNo">477</span> /**<a name="line.477"></a>
-<span class="sourceLineNo">478</span> * Checks global authorization for a
given action for a group, based on the stored<a name="line.478"></a>
-<span class="sourceLineNo">479</span> * permissions.<a name="line.479"></a>
-<span class="sourceLineNo">480</span> */<a name="line.480"></a>
-<span class="sourceLineNo">481</span> public boolean authorizeGroup(String
groupName, Permission.Action action) {<a name="line.481"></a>
-<span class="sourceLineNo">482</span> List<Permission> perms =
globalCache.getGroup(groupName);<a name="line.482"></a>
-<span class="sourceLineNo">483</span> if (LOG.isDebugEnabled()) {<a
name="line.483"></a>
-<span class="sourceLineNo">484</span> LOG.debug("authorizing " + (perms
!= null && !perms.isEmpty() ? perms.get(0) : "") +<a
name="line.484"></a>
-<span class="sourceLineNo">485</span> " for " + action);<a
name="line.485"></a>
-<span class="sourceLineNo">486</span> }<a name="line.486"></a>
-<span class="sourceLineNo">487</span> return authorize(perms, action);<a
name="line.487"></a>
-<span class="sourceLineNo">488</span> }<a name="line.488"></a>
-<span class="sourceLineNo">489</span><a name="line.489"></a>
-<span class="sourceLineNo">490</span> /**<a name="line.490"></a>
-<span class="sourceLineNo">491</span> * Checks authorization to a given
table, column family and column for a group, based<a name="line.491"></a>
-<span class="sourceLineNo">492</span> * on the stored permissions.<a
name="line.492"></a>
-<span class="sourceLineNo">493</span> * @param groupName<a
name="line.493"></a>
-<span class="sourceLineNo">494</span> * @param table<a name="line.494"></a>
-<span class="sourceLineNo">495</span> * @param family<a name="line.495"></a>
-<span class="sourceLineNo">496</span> * @param qualifier<a
name="line.496"></a>
-<span class="sourceLineNo">497</span> * @param action<a name="line.497"></a>
-<span class="sourceLineNo">498</span> * @return true if known and
authorized, false otherwise<a name="line.498"></a>
-<span class="sourceLineNo">499</span> */<a name="line.499"></a>
-<span class="sourceLineNo">500</span> public boolean authorizeGroup(String
groupName, TableName table, byte[] family,<a name="line.500"></a>
-<span class="sourceLineNo">501</span> byte[] qualifier, Permission.Action
action) {<a name="line.501"></a>
-<span class="sourceLineNo">502</span> // Global authorization supercedes
table level<a name="line.502"></a>
-<span class="sourceLineNo">503</span> if (authorizeGroup(groupName,
action)) {<a name="line.503"></a>
-<span class="sourceLineNo">504</span> return true;<a name="line.504"></a>
-<span class="sourceLineNo">505</span> }<a name="line.505"></a>
-<span class="sourceLineNo">506</span> if (table == null) table =
AccessControlLists.ACL_TABLE_NAME;<a name="line.506"></a>
-<span class="sourceLineNo">507</span> // Namespace authorization supercedes
table level<a name="line.507"></a>
-<span class="sourceLineNo">508</span> String namespace =
table.getNamespaceAsString();<a name="line.508"></a>
-<span class="sourceLineNo">509</span> if
(authorize(getNamespacePermissions(namespace).getGroup(groupName), namespace,
action)) {<a name="line.509"></a>
-<span class="sourceLineNo">510</span> return true;<a name="line.510"></a>
-<span class="sourceLineNo">511</span> }<a name="line.511"></a>
-<span class="sourceLineNo">512</span> // Check table level<a
name="line.512"></a>
-<span class="sourceLineNo">513</span> List<TablePermission> tblPerms
= getTablePermissions(table).getGroup(groupName);<a name="line.513"></a>
-<span class="sourceLineNo">514</span> if (LOG.isDebugEnabled()) {<a
name="line.514"></a>
-<span class="sourceLineNo">515</span> LOG.debug("authorizing " +
(tblPerms != null && !tblPerms.isEmpty() ? tblPerms.get(0) : "") +<a
name="line.515"></a>
-<span class="sourceLineNo">516</span> " for " +groupName + " on " +
table + "." + Bytes.toString(family) + "." +<a name="line.516"></a>
-<span class="sourceLineNo">517</span> Bytes.toString(qualifier) + "
with " + action);<a name="line.517"></a>
-<span class="sourceLineNo">518</span> }<a name="line.518"></a>
-<span class="sourceLineNo">519</span> return authorize(tblPerms, table,
family, qualifier, action);<a name="line.519"></a>
-<span class="sourceLineNo">520</span> }<a name="line.520"></a>
-<span class="sourceLineNo">521</span><a name="line.521"></a>
-<span class="sourceLineNo">522</span> /**<a name="line.522"></a>
-<span class="sourceLineNo">523</span> * Checks if the user has access to the
full table or at least a family/qualifier<a name="line.523"></a>
-<span class="sourceLineNo">524</span> * for the specified action.<a
name="line.524"></a>
-<span class="sourceLineNo">525</span> * @param groupName<a
name="line.525"></a>
-<span class="sourceLineNo">526</span> * @param table<a name="line.526"></a>
-<span class="sourceLineNo">527</span> * @param action<a name="line.527"></a>
-<span class="sourceLineNo">528</span> * @return true if the group has access
to the table, false otherwise<a name="line.528"></a>
-<span class="sourceLineNo">529</span> */<a name="line.529"></a>
-<span class="sourceLineNo">530</span> public boolean groupHasAccess(String
groupName, TableName table, Permission.Action action) {<a name="line.530"></a>
-<span class="sourceLineNo">531</span> // Global authorization supercedes
table level<a name="line.531"></a>
-<span class="sourceLineNo">532</span> if (authorizeGroup(groupName,
action)) {<a name="line.532"></a>
-<span class="sourceLineNo">533</span> return true;<a name="line.533"></a>
-<span class="sourceLineNo">534</span> }<a name="line.534"></a>
-<span class="sourceLineNo">535</span> if (table == null) table =
AccessControlLists.ACL_TABLE_NAME;<a name="line.535"></a>
-<span class="sourceLineNo">536</span> // Namespace authorization supercedes
table level<a name="line.536"></a>
-<span class="sourceLineNo">537</span> if
(hasAccess(getNamespacePermissions(table.getNamespaceAsString()).getGroup(groupName),<a
name="line.537"></a>
-<span class="sourceLineNo">538</span> table, action)) {<a
name="line.538"></a>
-<span class="sourceLineNo">539</span> return true;<a name="line.539"></a>
-<span class="sourceLineNo">540</span> }<a name="line.540"></a>
-<span class="sourceLineNo">541</span> // Check table level<a
name="line.541"></a>
-<span class="sourceLineNo">542</span> return
hasAccess(getTablePermissions(table).getGroup(groupName), table, action);<a
name="line.542"></a>
-<span class="sourceLineNo">543</span> }<a name="line.543"></a>
-<span class="sourceLineNo">544</span><a name="line.544"></a>
-<span class="sourceLineNo">545</span> public boolean authorize(User user,
TableName table, byte[] family,<a name="line.545"></a>
-<span class="sourceLineNo">546</span> byte[] qualifier, Permission.Action
action) {<a name="line.546"></a>
-<span class="sourceLineNo">547</span> if (authorizeUser(user, table,
family, qualifier, action)) {<a name="line.547"></a>
-<span class="sourceLineNo">548</span> return true;<a name="line.548"></a>
-<span class="sourceLineNo">549</span> }<a name="line.549"></a>
-<span class="sourceLineNo">550</span><a name="line.550"></a>
-<span class="sourceLineNo">551</span> String[] groups =
user.getGroupNames();<a name="line.551"></a>
-<span class="sourceLineNo">552</span> if (groups != null) {<a
name="line.552"></a>
-<span class="sourceLineNo">553</span> for (String group : groups) {<a
name="line.553"></a>
-<span class="sourceLineNo">554</span> if (authorizeGroup(group, table,
family, qualifier, action)) {<a name="line.554"></a>
-<span class="sourceLineNo">555</span> return true;<a
name="line.555"></a>
-<span class="sourceLineNo">556</span> }<a name="line.556"></a>
-<span class="sourceLineNo">557</span> }<a name="line.557"></a>
-<span class="sourceLineNo">558</span> }<a name="line.558"></a>
-<span class="sourceLineNo">559</span> return false;<a name="line.559"></a>
-<span class="sourceLineNo">560</span> }<a name="line.560"></a>
-<span class="sourceLineNo">561</span><a name="line.561"></a>
-<span class="sourceLineNo">562</span> public boolean hasAccess(User user,
TableName table, Permission.Action action) {<a name="line.562"></a>
-<span class="sourceLineNo">563</span> if (userHasAccess(user, table,
action)) {<a name="line.563"></a>
-<span class="sourceLineNo">564</span> return true;<a name="line.564"></a>
-<span class="sourceLineNo">565</span> }<a name="line.565"></a>
-<span class="sourceLineNo">566</span><a name="line.566"></a>
-<span class="sourceLineNo">567</span> String[] groups =
user.getGroupNames();<a name="line.567"></a>
-<span class="sourceLineNo">568</span> if (groups != null) {<a
name="line.568"></a>
-<span class="sourceLineNo">569</span> for (String group : groups) {<a
name="line.569"></a>
-<span class="sourceLineNo">570</span> if (groupHasAccess(group, table,
action)) {<a name="line.570"></a>
-<span class="sourceLineNo">571</span> return true;<a
name="line.571"></a>
-<span class="sourceLineNo">572</span> }<a name="line.572"></a>
-<span class="sourceLineNo">573</span> }<a name="line.573"></a>
-<span class="sourceLineNo">574</span> }<a name="line.574"></a>
-<span class="sourceLineNo">575</span> return false;<a name="line.575"></a>
-<span class="sourceLineNo">576</span> }<a name="line.576"></a>
-<span class="sourceLineNo">577</span><a name="line.577"></a>
-<span class="sourceLineNo">578</span> public boolean authorize(User user,
TableName table, byte[] family,<a name="line.578"></a>
-<span class="sourceLineNo">579</span> Permission.Action action) {<a
name="line.579"></a>
-<span class="sourceLineNo">580</span> return authorize(user, table, family,
null, action);<a name="line.580"></a>
-<span class="sourceLineNo">581</span> }<a name="line.581"></a>
-<span class="sourceLineNo">582</span><a name="line.582"></a>
-<span class="sourceLineNo">583</span> /**<a name="line.583"></a>
-<span class="sourceLineNo">584</span> * Returns true if the given user has a
{@link TablePermission} matching up<a name="line.584"></a>
-<span class="sourceLineNo">585</span> * to the column family portion of a
permission. Note that this permission<a name="line.585"></a>
-<span class="sourceLineNo">586</span> * may be scoped to a given column
qualifier and does not guarantee that<a name="line.586"></a>
-<span class="sourceLineNo">587</span> * authorize() on the same column
family would return true.<a name="line.587"></a>
-<span class="sourceLineNo">588</span> */<a name="line.588"></a>
-<span class="sourceLineNo">589</span> public boolean matchPermission(User
user,<a name="line.589"></a>
-<span class="sourceLineNo">590</span> TableName table, byte[] family,
Permission.Action action) {<a name="line.590"></a>
-<span class="sourceLineNo">591</span>
PermissionCache<TablePermission> tablePerms = tableCache.get(table);<a
name="line.591"></a>
-<span class="sourceLineNo">592</span> if (tablePerms != null) {<a
name="line.592"></a>
-<span class="sourceLineNo">593</span> List<TablePermission>
userPerms = tablePerms.getUser(user.getShortName());<a name="line.593"></a>
-<span class="sourceLineNo">594</span> if (userPerms != null) {<a
name="line.594"></a>
-<span class="sourceLineNo">595</span> for (TablePermission p :
userPerms) {<a name="line.595"></a>
-<span class="sourceLineNo">596</span> if (p.matchesFamily(table,
family, action)) {<a name="line.596"></a>
-<span class="sourceLineNo">597</span> return true;<a
name="line.597"></a>
-<span class="sourceLineNo">598</span> }<a name="line.598"></a>
-<span class="sourceLineNo">599</span> }<a name="line.599"></a>
-<span class="sourceLineNo">600</span> }<a name="line.600"></a>
-<span class="sourceLineNo">601</span><a name="line.601"></a>
-<span class="sourceLineNo">602</span> String[] groups =
user.getGroupNames();<a name="line.602"></a>
-<span class="sourceLineNo">603</span> if (groups != null) {<a
name="line.603"></a>
-<span class="sourceLineNo">604</span> for (String group : groups) {<a
name="line.604"></a>
-<span class="sourceLineNo">605</span> List<TablePermission>
groupPerms = tablePerms.getGroup(group);<a name="line.605"></a>
-<span class="sourceLineNo">606</span> if (groupPerms != null) {<a
name="line.606"></a>
-<span class="sourceLineNo">607</span> for (TablePermission p :
groupPerms) {<a name="line.607"></a>
-<span class="sourceLineNo">608</span> if (p.matchesFamily(table,
family, action)) {<a name="line.608"></a>
-<span class="sourceLineNo">609</span> return true;<a
name="line.609"></a>
-<span class="sourceLineNo">610</span> }<a name="line.610"></a>
-<span class="sourceLineNo">611</span> }<a name="line.611"></a>
-<span class="sourceLineNo">612</span> }<a name="line.612"></a>
-<span class="sourceLineNo">613</span> }<a name="line.613"></a>
-<span class="sourceLineNo">614</span> }<a name="line.614"></a>
-<span class="sourceLineNo">615</span> }<a name="line.615"></a>
-<span class="sourceLineNo">616</span><a name="line.616"></a>
-<span class="sourceLineNo">617</span> return false;<a name="line.617"></a>
-<span class="sourceLineNo">618</span> }<a name="line.618"></a>
-<span class="sourceLineNo">619</span><a name="line.619"></a>
-<span class="sourceLineNo">620</span> public boolean matchPermission(User
user,<a name="line.620"></a>
-<span class="sourceLineNo">621</span> TableName table, byte[] family,
byte[] qualifier,<a name="line.621"></a>
-<span class="sourceLineNo">622</span> Permission.Action action) {<a
name="line.622"></a>
-<span class="sourceLineNo">623</span>
PermissionCache<TablePermission> tablePerms = tableCache.get(table);<a
name="line.623"></a>
-<span class="sourceLineNo">624</span> if (tablePerms != null) {<a
name="line.624"></a>
-<span class="sourceLineNo">625</span> List<TablePermission>
userPerms = tablePerms.getUser(user.getShortName());<a name="line.625"></a>
-<span class="sourceLineNo">626</span> if (userPerms != null) {<a
name="line.626"></a>
-<span class="sourceLineNo">627</span> for (TablePermission p :
userPerms) {<a name="line.627"></a>
-<span class="sourceLineNo">628</span> if
(p.matchesFamilyQualifier(table, family, qualifier, action)) {<a
name="line.628"></a>
-<span class="sourceLineNo">629</span> return true;<a
name="line.629"></a>
-<span class="sourceLineNo">630</span> }<a name="line.630"></a>
-<span class="sourceLineNo">631</span> }<a name="line.631"></a>
-<span class="sourceLineNo">632</span> }<a name="line.632"></a>
-<span class="sourceLineNo">633</span><a name="line.633"></a>
-<span class="sourceLineNo">634</span> String[] groups =
user.getGroupNames();<a name="line.634"></a>
-<span class="sourceLineNo">635</span> if (groups != null) {<a
name="line.635"></a>
-<span class="sourceLineNo">636</span> for (String group : groups) {<a
name="line.636"></a>
-<span class="sourceLineNo">637</span> List<TablePermission>
groupPerms = tablePerms.getGroup(group);<a name="line.637"></a>
-<span class="sourceLineNo">638</span> if (groupPerms != null) {<a
name="line.638"></a>
-<span class="sourceLineNo">639</span> for (TablePermission p :
groupPerms) {<a name="line.639"></a>
-<span class="sourceLineNo">640</span> if
(p.matchesFamilyQualifier(table, family, qualifier, action)) {<a
name="line.640"></a>
-<span class="sourceLineNo">641</span> return true;<a
name="line.641"></a>
-<span class="sourceLineNo">642</span> }<a name="line.642"></a>
-<span class="sourceLineNo">643</span> }<a name="line.643"></a>
-<span class="sourceLineNo">644</span> }<a name="line.644"></a>
-<span class="sourceLineNo">645</span> }<a name="line.645"></a>
-<span class="sourceLineNo">646</span> }<a name="line.646"></a>
-<span class="sourceLineNo">647</span> }<a name="line.647"></a>
-<span class="sourceLineNo">648</span> return false;<a name="line.648"></a>
-<span class="sourceLineNo">649</span> }<a name="line.649"></a>
-<span class="sourceLineNo">650</span><a name="line.650"></a>
-<span class="sourceLineNo">651</span> public void removeNamespace(byte[] ns)
{<a name="line.651"></a>
-<span class="sourceLineNo">652</span> nsCache.remove(Bytes.toString(ns));<a
name="line.652"></a>
-<span class="sourceLineNo">653</span> }<a name="line.653"></a>
-<span class="sourceLineNo">654</span><a name="line.654"></a>
-<span class="sourceLineNo">655</span> public void removeTable(TableName
table) {<a name="line.655"></a>
-<span class="sourceLineNo">656</span> tableCache.remove(table);<a
name="line.656"></a>
-<span class="sourceLineNo">657</span> }<a name="line.657"></a>
-<span class="sourceLineNo">658</span><a name="line.658"></a>
-<span class="sourceLineNo">659</span> /**<a name="line.659"></a>
-<span class="sourceLineNo">660</span> * Overwrites the existing permission
set for a given user for a table, and<a name="line.660"></a>
-<span class="sourceLineNo">661</span> * triggers an update for zookeeper
synchronization.<a name="line.661"></a>
-<span class="sourceLineNo">662</span> * @param username<a
name="line.662"></a>
-<span class="sourceLineNo">663</span> * @param table<a name="line.663"></a>
-<span class="sourceLineNo">664</span> * @param perms<a name="line.664"></a>
-<span class="sourceLineNo">665</span> */<a name="line.665"></a>
-<span class="sourceLineNo">666</span> public void
setTableUserPermissions(String username, TableName table,<a name="line.666"></a>
-<span class="sourceLineNo">667</span> List<TablePermission> perms)
{<a name="line.667"></a>
-<span class="sourceLineNo">668</span>
PermissionCache<TablePermission> tablePerms =
getTablePermissions(table);<a name="line.668"></a>
-<span class="sourceLineNo">669</span> tablePerms.replaceUser(username,
perms);<a name="line.669"></a>
-<span class="sourceLineNo">670</span> writeTableToZooKeeper(table,
tablePerms);<a name="line.670"></a>
-<span class="sourceLineNo">671</span> }<a name="line.671"></a>
-<span class="sourceLineNo">672</span><a name="line.672"></a>
-<span class="sourceLineNo">673</span> /**<a name="line.673"></a>
-<span class="sourceLineNo">674</span> * Overwrites the existing permission
set for a group and triggers an update<a name="line.674"></a>
-<span class="sourceLineNo">675</span> * for zookeeper synchronization.<a
name="line.675"></a>
-<span class="sourceLineNo">676</span> * @param group<a name="line.676"></a>
-<span class="sourceLineNo">677</span> * @param table<a name="line.677"></a>
-<span class="sourceLineNo">678</span> * @param perms<a name="line.678"></a>
-<span class="sourceLineNo">679</span> */<a name="line.679"></a>
-<span class="sourceLineNo">680</span> public void
setTableGroupPermissions(String group, TableName table,<a name="line.680"></a>
-<span class="sourceLineNo">681</span> List<TablePermission> perms)
{<a name="line.681"></a>
-<span class="sourceLineNo">682</span>
PermissionCache<TablePermission> tablePerms =
getTablePermissions(table);<a name="line.682"></a>
-<span class="sourceLineNo">683</span> tablePerms.replaceGroup(group,
perms);<a name="line.683"></a>
-<span class="sourceLineNo">684</span> writeTableToZooKeeper(table,
tablePerms);<a name="line.684"></a>
-<span class="sourceLineNo">685</span> }<a name="line.685"></a>
-<span class="sourceLineNo">686</span><a name="line.686"></a>
-<span class="sourceLineNo">687</span> /**<a name="line.687"></a>
-<span class="sourceLineNo">688</span> * Overwrites the existing permission
set for a given user for a table, and<a name="line.688"></a>
-<span class="sourceLineNo">689</span> * triggers an update for zookeeper
synchronization.<a name="line.689"></a>
-<span class="sourceLineNo">690</span> * @param username<a
name="line.690"></a>
-<span class="sourceLineNo">691</span> * @param namespace<a
name="line.691"></a>
-<span class="sourceLineNo">692</span> * @param perms<a name="line.692"></a>
-<span class="sourceLineNo">693</span> */<a name="line.693"></a>
-<span class="sourceLineNo">694</span> public void
setNamespaceUserPermissions(String username, String namespace,<a
name="line.694"></a>
-<span class="sourceLineNo">695</span> List<TablePermission> perms)
{<a name="line.695"></a>
-<span class="sourceLineNo">696</span>
PermissionCache<TablePermission> tablePerms =
getNamespacePermissions(namespace);<a name="line.696"></a>
-<span class="sourceLineNo">697</span> tablePerms.replaceUser(username,
perms);<a name="line.697"></a>
-<span class="sourceLineNo">698</span> writeNamespaceToZooKeeper(namespace,
tablePerms);<a name="line.698"></a>
-<span class="sourceLineNo">699</span> }<a name="line.699"></a>
-<span class="sourceLineNo">700</span><a name="line.700"></a>
-<span class="sourceLineNo">701</span> /**<a name="line.701"></a>
-<span class="sourceLineNo">702</span> * Overwrites the existing permission
set for a group and triggers an update<a name="line.702"></a>
-<span class="sourceLineNo">703</span> * for zookeeper synchronization.<a
name="line.703"></a>
-<span class="sourceLineNo">704</span> * @param group<a name="line.704"></a>
-<span class="sourceLineNo">705</span> * @param namespace<a
name="line.705"></a>
-<span class="sourceLineNo">706</span> * @param perms<a name="line.706"></a>
-<span class="sourceLineNo">707</span> */<a name="line.707"></a>
-<span class="sourceLineNo">708</span> public void
setNamespaceGroupPermissions(String group, String namespace,<a
name="line.708"></a>
-<span class="sourceLineNo">709</span> List<TablePermission> perms)
{<a name="line.709"></a>
-<span class="sourceLineNo">710</span>
PermissionCache<TablePermission> tablePerms =
getNamespacePermissions(namespace);<a name="line.710"></a>
-<span class="sourceLineNo">711</span> tablePerms.replaceGroup(group,
perms);<a name="line.711"></a>
-<span class="sourceLineNo">712</span> writeNamespaceToZooKeeper(namespace,
tablePerms);<a name="line.712"></a>
-<span class="sourceLineNo">713</span> }<a name="line.713"></a>
-<span class="sourceLineNo">714</span><a name="line.714"></a>
-<span class="sourceLineNo">715</span> public void
writeTableToZooKeeper(TableName table,<a name="line.715"></a>
-<span class="sourceLineNo">716</span>
PermissionCache<TablePermission> tablePerms) {<a name="line.716"></a>
-<span class="sourceLineNo">717</span> byte[] serialized = new byte[0];<a
name="line.717"></a>
-<span class="sourceLineNo">718</span> if (tablePerms != null) {<a
name="line.718"></a>
-<span class="sourceLineNo">719</span> serialized =
AccessControlLists.writePermissionsAsBytes(tablePerms.getAllPermissions(),
conf);<a name="line.719"></a>
-<span class="sourceLineNo">720</span> }<a name="line.720"></a>
-<span class="sourceLineNo">721</span>
zkperms.writeToZookeeper(table.getName(), serialized);<a name="line.721"></a>
-<span class="sourceLineNo">722</span> }<a name="line.722"></a>
-<span class="sourceLineNo">723</span><a name="line.723"></a>
-<span class="sourceLineNo">724</span> public void
writeNamespaceToZooKeeper(String namespace,<a name="line.724"></a>
-<span class="sourceLineNo">725</span>
PermissionCache<TablePermission> tablePerms) {<a name="line.725"></a>
-<span class="sourceLineNo">726</span> byte[] serialized = new byte[0];<a
name="line.726"></a>
-<span class="sourceLineNo">727</span> if (tablePerms != null) {<a
name="line.727"></a>
-<span class="sourceLineNo">728</span> serialized =
AccessControlLists.writePermissionsAsBytes(tablePerms.getAllPermissions(),
conf);<a name="line.728"></a>
-<span class="sourceLineNo">729</span> }<a name="line.729"></a>
-<span class="sourceLineNo">730</span>
zkperms.writeToZookeeper(Bytes.toBytes(AccessControlLists.toNamespaceEntry(namespace)),<a
name="line.730"></a>
-<span class="sourceLineNo">731</span> serialized);<a
name="line.731"></a>
-<span class="sourceLineNo">732</span> }<a name="line.732"></a>
-<span class="sourceLineNo">733</span><a name="line.733"></a>
-<span class="sourceLineNo">734</span> public long getMTime() {<a
name="line.734"></a>
-<span class="sourceLineNo">735</span> return mtime.get();<a
name="line.735"></a>
-<span class="sourceLineNo">736</span> }<a name="line.736"></a>
-<span class="sourceLineNo">737</span><a name="line.737"></a>
-<span class="sourceLineNo">738</span> private static
Map<ZKWatcher,TableAuthManager> managerMap = new HashMap<>();<a
name="line.738"></a>
-<span class="sourceLineNo">739</span><a name="line.739"></a>
-<span class="sourceLineNo">740</span> private static Map<TableAuthManager,
Integer> refCount = new HashMap<>();<a name="line.740"></a>
-<span class="sourceLineNo">741</span><a name="line.741"></a>
-<span class="sourceLineNo">742</span> /** Returns a TableAuthManager from the
cache. If not cached, constructs a new one. Returned<a name="line.742"></a>
-<span class="sourceLineNo">743</span> * instance should be released back by
calling {@link #release(TableAuthManager)}. */<a name="line.743"></a>
-<span class="sourceLineNo">744</span> public synchronized static
TableAuthManager getOrCreate(<a name="line.744"></a>
-<span class="sourceLineNo">745</span> ZKWatcher watcher,
Configuration conf) throws IOException {<a name="line.745"></a>
-<span class="sourceLineNo">746</span> TableAuthManager instance =
managerMap.get(watcher);<a name="line.746"></a>
-<span class="sourceLineNo">747</span> if (instance == null) {<a
name="line.747"></a>
-<span class="sourceLineNo">748</span> instance = new
TableAuthManager(watcher, conf);<a name="line.748"></a>
-<span class="sourceLineNo">749</span> managerMap.put(watcher,
instance);<a name="line.749"></a>
-<span class="sourceLineNo">750</span> }<a name="line.750"></a>
-<span class="sourceLineNo">751</span> int ref = refCount.get(instance) ==
null ? 0 : refCount.get(instance).intValue();<a name="line.751"></a>
-<span class="sourceLineNo">752</span> refCount.put(instance, ref + 1);<a
name="line.752"></a>
-<span class="sourceLineNo">753</span> return instance;<a
name="line.753"></a>
-<span class="sourceLineNo">754</span> }<a name="line.754"></a>
-<span class="sourceLineNo">755</span><a name="line.755"></a>
-<span class="sourceLineNo">756</span> @VisibleForTesting<a
name="line.756"></a>
-<span class="sourceLineNo">757</span> public static int getTotalRefCount()
{<a name="line.757"></a>
-<span class="sourceLineNo">758</span> int total = 0;<a name="line.758"></a>
-<span class="sourceLineNo">759</span> for (int count : refCount.values())
{<a name="line.759"></a>
-<span class="sourceLineNo">760</span> total += count;<a
name="line.760"></a>
-<span class="sourceLineNo">761</span> }<a name="line.761"></a>
-<span class="sourceLineNo">762</span> return total;<a name="line.762"></a>
-<span class="sourceLineNo">763</span> }<a name="line.763"></a>
-<span class="sourceLineNo">764</span><a name="line.764"></a>
-<span class="sourceLineNo">765</span> /**<a name="line.765"></a>
-<span class="sourceLineNo">766</span> * Releases the resources for the given
TableAuthManager if the reference count is down to 0.<a name="line.766"></a>
-<span class="sourceLineNo">767</span> * @param instance TableAuthManager to
be released<a name="line.767"></a>
-<span class="sourceLineNo">768</span> */<a name="line.768"></a>
-<span class="sourceLineNo">769</span> public synchronized static void
release(TableAuthManager instance) {<a name="line.769"></a>
-<span class="sourceLineNo">770</span> if (refCount.get(instance) == null ||
refCount.get(instance) < 1) {<a name="line.770"></a>
-<span class="sourceLineNo">771</span> String msg = "Something wrong with
the TableAuthManager reference counting: " + instance<a name="line.771"></a>
-<span class="sourceLineNo">772</span> + " whose count is " +
refCount.get(instance);<a name="line.772"></a>
-<span class="sourceLineNo">773</span> LOG.error(HBaseMarkers.FATAL,
msg);<a name="line.773"></a>
-<span class="sourceLineNo">774</span> instance.close();<a
name="line.774"></a>
-<span class="sourceLineNo">775</span>
managerMap.remove(instance.getZKPermissionWatcher().getWatcher());<a
name="line.775"></a>
-<span class="sourceLineNo">776</span>
instance.getZKPermissionWatcher().getWatcher().abort(msg, null);<a
name="line.776"></a>
-<span class="sourceLineNo">777</span> } else {<a name="line.777"></a>
-<span class="sourceLineNo">778</span> int ref = refCount.get(instance);<a
name="line.778"></a>
-<span class="sourceLineNo">779</span> refCount.put(instance, ref-1);<a
name="line.779"></a>
-<span class="sourceLineNo">780</span> if (ref-1 == 0) {<a
name="line.780"></a>
-<span class="sourceLineNo">781</span> instance.close();<a
name="line.781"></a>
-<span class="sourceLineNo">782</span>
managerMap.remove(instance.getZKPermissionWatcher().getWatcher());<a
name="line.782"></a>
-<span class="sourceLineNo">783</span> refCount.remove(instance);<a
name="line.783"></a>
-<span class="sourceLineNo">784</span> }<a name="line.784"></a>
-<span class="sourceLineNo">785</span> }<a name="line.785"></a>
-<span class="sourceLineNo">786</span> }<a name="line.786"></a>
-<span class="sourceLineNo">787</span>}<a name="line.787"></a>
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-</pre>
-</div>
-</body>
-</html>