Github user HeartSaVioR commented on a diff in the pull request:

    https://github.com/apache/storm/pull/2752#discussion_r204276473
  
    --- Diff: 
storm-core/src/jvm/org/apache/storm/ui/filters/AuthorizedUserFilter.java ---
    @@ -0,0 +1,137 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one
    + * or more contributor license agreements.  See the NOTICE file
    + * distributed with this work for additional information
    + * regarding copyright ownership.  The ASF licenses this file
    + * to you under the Apache License, Version 2.0 (the
    + * "License"); you may not use this file except in compliance
    + * with the License.  You may obtain a copy of the License at
    + *
    + * http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +
    +package org.apache.storm.ui.filters;
    +
    +import java.io.IOException;
    +import java.lang.annotation.Annotation;
    +import java.lang.reflect.Method;
    +import java.net.InetAddress;
    +import java.security.Principal;
    +import java.util.HashMap;
    +import java.util.List;
    +import java.util.Map;
    +import java.util.StringJoiner;
    +import javax.ws.rs.container.ContainerRequestContext;
    +import javax.ws.rs.container.ContainerRequestFilter;
    +import javax.ws.rs.container.ResourceInfo;
    +import javax.ws.rs.core.Context;
    +import javax.ws.rs.core.PathSegment;
    +import javax.ws.rs.ext.Provider;
    +
    +import org.apache.storm.DaemonConfig;
    +import org.apache.storm.daemon.StormCommon;
    +import org.apache.storm.generated.AuthorizationException;
    +import org.apache.storm.security.auth.IAuthorizer;
    +import org.apache.storm.security.auth.ReqContext;
    +import org.apache.storm.thrift.TException;
    +import org.apache.storm.ui.resources.NimbusOp;
    +import org.apache.storm.utils.NimbusClient;
    +import org.apache.storm.utils.Utils;
    +import org.json.simple.JSONValue;
    +import org.slf4j.Logger;
    +import org.slf4j.LoggerFactory;
    +
    +@Provider
    +public class AuthorizedUserFilter implements ContainerRequestFilter {
    +
    +    public static final Logger LOG = 
LoggerFactory.getLogger(AuthorizedUserFilter.class);
    +    public static Map<String, Object> conf = Utils.readStormConfig();
    +    public static IAuthorizer uiImpersonationHandler;
    +    public static IAuthorizer uiAclHandler;
    +
    +    @Context private ResourceInfo resourceInfo;
    +
    +    static {
    +        try {
    +            uiImpersonationHandler = StormCommon.mkAuthorizationHandler(
    +                        (String) 
conf.get(DaemonConfig.NIMBUS_IMPERSONATION_AUTHORIZER), conf);
    +            uiAclHandler = StormCommon.mkAuthorizationHandler(
    +                    (String) conf.get(DaemonConfig.NIMBUS_AUTHORIZER), 
conf);
    +        } catch (IllegalAccessException | InstantiationException | 
ClassNotFoundException e) {
    +            LOG.error("Error initializing AuthorizedUserFilter: ", e);
    +            throw new RuntimeException(e);
    +        }
    +    }
    +
    +    @Override
    +    public void filter(ContainerRequestContext containerRequestContext) 
throws IOException {
    +        NimbusOp annotation = 
resourceInfo.getResourceMethod().getAnnotation(NimbusOp.class);
    +        if (annotation == null) {
    +            return;
    +        }
    +        String op = annotation.value();
    +        if (op == null) {
    +            return;
    +        }
    +
    +        Map topoConf = null;
    +        if 
(containerRequestContext.getUriInfo().getPathParameters().containsKey("id")) {
    +            NimbusClient nimbusClient = 
NimbusClient.getConfiguredClient(Utils.readStormConfig());
    +            try {
    +                topoConf = (Map) 
JSONValue.parse(nimbusClient.getClient().getTopologyConf(
    +                        
containerRequestContext.getUriInfo().getPathParameters().get("id").get(0)));
    +            } catch (TException e) {
    +                e.printStackTrace();
    +            }
    +        }
    +
    +        ReqContext reqContext = ReqContext.context();
    +
    +        if (reqContext.isImpersonating()) {
    +            if (uiImpersonationHandler != null) {
    +                if (!uiImpersonationHandler.permit(reqContext, op, 
topoConf)) {
    +                    Principal realPrincipal = reqContext.realPrincipal();
    +                    Principal principal = reqContext.principal();
    +                    String user = "unknown";
    +                    if (principal != null) {
    +                        user = principal.getName();
    +                    }
    +                    String realUser = "unknown";
    +                    if (realPrincipal != null) {
    +                        realUser = realPrincipal.getName();
    +                    }
    +                    InetAddress remoteAddress = reqContext.remoteAddress();
    +
    +                    throw new IOException(
    +                            "user '" + realUser +  "' is not authorized to 
impersonate user '"
    +                            + user + "' from host '" + 
remoteAddress.toString() + "'. Please"
    +                            + "see SECURITY.MD to learn how to configure 
impersonation ACL."
    +                    );
    +                }
    +
    +            LOG.warn(" principal " + reqContext.realPrincipal().toString() 
+ " is trying to impersonate "
    --- End diff --
    
    Let's use `{}` for logging case.


---

Reply via email to