001    /**
002     * Licensed to the Apache Software Foundation (ASF) under one
003     * or more contributor license agreements.  See the NOTICE file
004     * distributed with this work for additional information
005     * regarding copyright ownership.  The ASF licenses this file
006     * to you under the Apache License, Version 2.0 (the
007     * "License"); you may not use this file except in compliance
008     * with the License.  You may obtain a copy of the License at
009     *
010     *     http://www.apache.org/licenses/LICENSE-2.0
011     *
012     * Unless required by applicable law or agreed to in writing, software
013     * distributed under the License is distributed on an "AS IS" BASIS,
014     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
015     * See the License for the specific language governing permissions and
016     * limitations under the License.
017     */
018    package org.apache.hadoop.fs.permission;
019    
020    import java.io.DataInput;
021    import java.io.DataOutput;
022    import java.io.IOException;
023    
024    import org.apache.commons.logging.Log;
025    import org.apache.commons.logging.LogFactory;
026    import org.apache.hadoop.classification.InterfaceAudience;
027    import org.apache.hadoop.classification.InterfaceStability;
028    import org.apache.hadoop.conf.Configuration;
029    import org.apache.hadoop.fs.CommonConfigurationKeys;
030    import org.apache.hadoop.io.Writable;
031    import org.apache.hadoop.io.WritableFactories;
032    import org.apache.hadoop.io.WritableFactory;
033    
034    /**
035     * A class for file/directory permissions.
036     */
037    @InterfaceAudience.Public
038    @InterfaceStability.Stable
039    public class FsPermission implements Writable {
040      private static final Log LOG = LogFactory.getLog(FsPermission.class);
041    
042      static final WritableFactory FACTORY = new WritableFactory() {
043        @Override
044        public Writable newInstance() { return new FsPermission(); }
045      };
046      static {                                      // register a ctor
047        WritableFactories.setFactory(FsPermission.class, FACTORY);
048        WritableFactories.setFactory(ImmutableFsPermission.class, FACTORY);
049      }
050    
051      /** Create an immutable {@link FsPermission} object. */
052      public static FsPermission createImmutable(short permission) {
053        return new ImmutableFsPermission(permission);
054      }
055    
056      //POSIX permission style
057      private FsAction useraction = null;
058      private FsAction groupaction = null;
059      private FsAction otheraction = null;
060      private boolean stickyBit = false;
061    
062      private FsPermission() {}
063    
064      /**
065       * Construct by the given {@link FsAction}.
066       * @param u user action
067       * @param g group action
068       * @param o other action
069       */
070      public FsPermission(FsAction u, FsAction g, FsAction o) {
071        this(u, g, o, false);
072      }
073    
074      public FsPermission(FsAction u, FsAction g, FsAction o, boolean sb) {
075        set(u, g, o, sb);
076      }
077    
078      /**
079       * Construct by the given mode.
080       * @param mode
081       * @see #toShort()
082       */
083      public FsPermission(short mode) { fromShort(mode); }
084    
085      /**
086       * Copy constructor
087       * 
088       * @param other other permission
089       */
090      public FsPermission(FsPermission other) {
091        this.useraction = other.useraction;
092        this.groupaction = other.groupaction;
093        this.otheraction = other.otheraction;
094        this.stickyBit = other.stickyBit;
095      }
096      
097      /**
098       * Construct by given mode, either in octal or symbolic format.
099       * @param mode mode as a string, either in octal or symbolic format
100       * @throws IllegalArgumentException if <code>mode</code> is invalid
101       */
102      public FsPermission(String mode) {
103        this(new UmaskParser(mode).getUMask());
104      }
105    
106      /** Return user {@link FsAction}. */
107      public FsAction getUserAction() {return useraction;}
108    
109      /** Return group {@link FsAction}. */
110      public FsAction getGroupAction() {return groupaction;}
111    
112      /** Return other {@link FsAction}. */
113      public FsAction getOtherAction() {return otheraction;}
114    
115      private void set(FsAction u, FsAction g, FsAction o, boolean sb) {
116        useraction = u;
117        groupaction = g;
118        otheraction = o;
119        stickyBit = sb;
120      }
121    
122      public void fromShort(short n) {
123        FsAction[] v = FSACTION_VALUES;
124        set(v[(n >>> 6) & 7], v[(n >>> 3) & 7], v[n & 7], (((n >>> 9) & 1) == 1) );
125      }
126    
127      @Override
128      public void write(DataOutput out) throws IOException {
129        out.writeShort(toShort());
130      }
131    
132      @Override
133      public void readFields(DataInput in) throws IOException {
134        fromShort(in.readShort());
135      }
136    
137      /**
138       * Create and initialize a {@link FsPermission} from {@link DataInput}.
139       */
140      public static FsPermission read(DataInput in) throws IOException {
141        FsPermission p = new FsPermission();
142        p.readFields(in);
143        return p;
144      }
145    
146      /**
147       * Encode the object to a short.
148       */
149      public short toShort() {
150        int s =  (stickyBit ? 1 << 9 : 0)     |
151                 (useraction.ordinal() << 6)  |
152                 (groupaction.ordinal() << 3) |
153                 otheraction.ordinal();
154    
155        return (short)s;
156      }
157    
158      @Override
159      public boolean equals(Object obj) {
160        if (obj instanceof FsPermission) {
161          FsPermission that = (FsPermission)obj;
162          return this.useraction == that.useraction
163              && this.groupaction == that.groupaction
164              && this.otheraction == that.otheraction
165              && this.stickyBit == that.stickyBit;
166        }
167        return false;
168      }
169    
170      @Override
171      public int hashCode() {return toShort();}
172    
173      @Override
174      public String toString() {
175        String str = useraction.SYMBOL + groupaction.SYMBOL + otheraction.SYMBOL;
176        if(stickyBit) {
177          StringBuilder str2 = new StringBuilder(str);
178          str2.replace(str2.length() - 1, str2.length(),
179               otheraction.implies(FsAction.EXECUTE) ? "t" : "T");
180          str = str2.toString();
181        }
182    
183        return str;
184      }
185    
186      /**
187       * Apply a umask to this permission and return a new one.
188       *
189       * The umask is used by create, mkdir, and other Hadoop filesystem operations.
190       * The mode argument for these operations is modified by removing the bits
191       * which are set in the umask.  Thus, the umask limits the permissions which
192       * newly created files and directories get.
193       *
194       * @param umask              The umask to use
195       * 
196       * @return                   The effective permission
197       */
198      public FsPermission applyUMask(FsPermission umask) {
199        return new FsPermission(useraction.and(umask.useraction.not()),
200            groupaction.and(umask.groupaction.not()),
201            otheraction.and(umask.otheraction.not()));
202      }
203    
204      /** umask property label deprecated key and code in getUMask method
205       *  to accommodate it may be removed in version .23 */
206      public static final String DEPRECATED_UMASK_LABEL = "dfs.umask"; 
207      public static final String UMASK_LABEL = 
208                      CommonConfigurationKeys.FS_PERMISSIONS_UMASK_KEY;
209      public static final int DEFAULT_UMASK = 
210                      CommonConfigurationKeys.FS_PERMISSIONS_UMASK_DEFAULT;
211    
212      private static final FsAction[] FSACTION_VALUES = FsAction.values();
213    
214      /** 
215       * Get the user file creation mask (umask)
216       * 
217       * {@code UMASK_LABEL} config param has umask value that is either symbolic 
218       * or octal.
219       * 
220       * Symbolic umask is applied relative to file mode creation mask; 
221       * the permission op characters '+' clears the corresponding bit in the mask, 
222       * '-' sets bits in the mask.
223       * 
224       * Octal umask, the specified bits are set in the file mode creation mask.
225       * 
226       * {@code DEPRECATED_UMASK_LABEL} config param has umask value set to decimal.
227       */
228      public static FsPermission getUMask(Configuration conf) {
229        int umask = DEFAULT_UMASK;
230        
231        // To ensure backward compatibility first use the deprecated key.
232        // If the deprecated key is not present then check for the new key
233        if(conf != null) {
234          String confUmask = conf.get(UMASK_LABEL);
235          int oldUmask = conf.getInt(DEPRECATED_UMASK_LABEL, Integer.MIN_VALUE);
236          try {
237            if(confUmask != null) {
238              umask = new UmaskParser(confUmask).getUMask();
239            }
240          } catch(IllegalArgumentException iae) {
241            // Provide more explanation for user-facing message
242            String type = iae instanceof NumberFormatException ? "decimal"
243                : "octal or symbolic";
244            String error = "Unable to parse configuration " + UMASK_LABEL
245                + " with value " + confUmask + " as " + type + " umask.";
246            LOG.warn(error);
247            
248            // If oldUmask is not set, then throw the exception
249            if (oldUmask == Integer.MIN_VALUE) {
250              throw new IllegalArgumentException(error);
251            }
252          }
253            
254          if(oldUmask != Integer.MIN_VALUE) { // Property was set with old key
255            if (umask != oldUmask) {
256              LOG.warn(DEPRECATED_UMASK_LABEL
257                  + " configuration key is deprecated. " + "Convert to "
258                  + UMASK_LABEL + ", using octal or symbolic umask "
259                  + "specifications.");
260              // Old and new umask values do not match - Use old umask
261              umask = oldUmask;
262            }
263          }
264        }
265        
266        return new FsPermission((short)umask);
267      }
268    
269      public boolean getStickyBit() {
270        return stickyBit;
271      }
272    
273      /** Set the user file creation mask (umask) */
274      public static void setUMask(Configuration conf, FsPermission umask) {
275        conf.set(UMASK_LABEL, String.format("%1$03o", umask.toShort()));
276        conf.setInt(DEPRECATED_UMASK_LABEL, umask.toShort());
277      }
278    
279      /**
280       * Get the default permission for directory and symlink.
281       * In previous versions, this default permission was also used to
282       * create files, so files created end up with ugo+x permission.
283       * See HADOOP-9155 for detail. 
284       * Two new methods are added to solve this, please use 
285       * {@link FsPermission#getDirDefault()} for directory, and use
286       * {@link FsPermission#getFileDefault()} for file.
287       * This method is kept for compatibility.
288       */
289      public static FsPermission getDefault() {
290        return new FsPermission((short)00777);
291      }
292    
293      /**
294       * Get the default permission for directory.
295       */
296      public static FsPermission getDirDefault() {
297        return new FsPermission((short)00777);
298      }
299    
300      /**
301       * Get the default permission for file.
302       */
303      public static FsPermission getFileDefault() {
304        return new FsPermission((short)00666);
305      }
306    
307      /**
308       * Get the default permission for cache pools.
309       */
310      public static FsPermission getCachePoolDefault() {
311        return new FsPermission((short)00755);
312      }
313    
314      /**
315       * Create a FsPermission from a Unix symbolic permission string
316       * @param unixSymbolicPermission e.g. "-rw-rw-rw-"
317       */
318      public static FsPermission valueOf(String unixSymbolicPermission) {
319        if (unixSymbolicPermission == null) {
320          return null;
321        }
322        else if (unixSymbolicPermission.length() != 10) {
323          throw new IllegalArgumentException("length != 10(unixSymbolicPermission="
324              + unixSymbolicPermission + ")");
325        }
326    
327        int n = 0;
328        for(int i = 1; i < unixSymbolicPermission.length(); i++) {
329          n = n << 1;
330          char c = unixSymbolicPermission.charAt(i);
331          n += (c == '-' || c == 'T' || c == 'S') ? 0: 1;
332        }
333    
334        // Add sticky bit value if set
335        if(unixSymbolicPermission.charAt(9) == 't' ||
336            unixSymbolicPermission.charAt(9) == 'T')
337          n += 01000;
338    
339        return new FsPermission((short)n);
340      }
341      
342      private static class ImmutableFsPermission extends FsPermission {
343        public ImmutableFsPermission(short permission) {
344          super(permission);
345        }
346        @Override
347        public FsPermission applyUMask(FsPermission umask) {
348          throw new UnsupportedOperationException();
349        }
350        @Override
351        public void readFields(DataInput in) throws IOException {
352          throw new UnsupportedOperationException();
353        }    
354      }
355    }