io.druid.server.http.security.RulesResourceFilter.java Source code

Java tutorial

Introduction

Here is the source code for io.druid.server.http.security.RulesResourceFilter.java

Source

/*
 * Licensed to Metamarkets Group Inc. (Metamarkets) under one
 * or more contributor license agreements. See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership. Metamarkets licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */

package io.druid.server.http.security;

import com.google.common.base.Preconditions;
import com.google.common.base.Predicate;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.Iterables;
import com.google.inject.Inject;
import com.sun.jersey.spi.container.ContainerRequest;
import io.druid.server.security.Access;
import io.druid.server.security.AuthConfig;
import io.druid.server.security.AuthorizationInfo;
import io.druid.server.security.Resource;
import io.druid.server.security.ResourceType;

import javax.ws.rs.WebApplicationException;
import javax.ws.rs.core.PathSegment;
import javax.ws.rs.core.Response;
import java.util.List;

/**
 * Use this ResourceFilter when the datasource information is present after "rules" segment in the request Path
 * Here are some example paths where this filter is used -
 *  - druid/coordinator/v1/rules/
 * */

public class RulesResourceFilter extends AbstractResourceFilter {
    @Inject
    public RulesResourceFilter(AuthConfig authConfig) {
        super(authConfig);
    }

    @Override
    public ContainerRequest filter(ContainerRequest request) {
        if (getAuthConfig().isEnabled()) {
            // This is an experimental feature, see - https://github.com/druid-io/druid/pull/2424
            final String dataSourceName = request.getPathSegments()
                    .get(Iterables.indexOf(request.getPathSegments(), new Predicate<PathSegment>() {
                        @Override
                        public boolean apply(PathSegment input) {
                            return input.getPath().equals("rules");
                        }
                    }) + 1).getPath();
            Preconditions.checkNotNull(dataSourceName);
            final AuthorizationInfo authorizationInfo = (AuthorizationInfo) getReq()
                    .getAttribute(AuthConfig.DRUID_AUTH_TOKEN);
            Preconditions.checkNotNull(authorizationInfo,
                    "Security is enabled but no authorization info found in the request");
            final Access authResult = authorizationInfo
                    .isAuthorized(new Resource(dataSourceName, ResourceType.DATASOURCE), getAction(request));
            if (!authResult.isAllowed()) {
                throw new WebApplicationException(Response.status(Response.Status.FORBIDDEN)
                        .entity(String.format("Access-Check-Result: %s", authResult.toString())).build());
            }
        }

        return request;
    }

    @Override
    public boolean isApplicable(String requestPath) {
        List<String> applicablePaths = ImmutableList.of("druid/coordinator/v1/rules/");
        for (String path : applicablePaths) {
            if (requestPath.startsWith(path) && !requestPath.equals(path)) {
                return true;
            }
        }
        return false;
    }
}