zookeeper的ACL权限控制 | 您所在的位置:网站首页 › acls怎么读 › zookeeper的ACL权限控制 |
ACL:Access Control List 访问控制列表 1. 简介 0.概述ACL 权限控制,使用:scheme:id:perm 来标识,主要涵盖 3 个方面: 权限模式(Scheme):授权的策略 授权对象(ID):授权的对象 权限(Permission):授予的权限 其特性如下: ZooKeeper的权限控制是基于每个znode节点的,需要对每个节点设置权限 每个znode支持设置多种权限控制方案和多个权限 子节点不会继承父节点的权限,客户端无权访问某节点,但可能可以访问它的子节点 例如: setAcl /test2 ip:128.0.0.1:crwda1. scheme 采用何种方式授权 world:默认方式,相当于全部都能访问 auth:代表已经认证通过的用户(cli中可以通过addauth digest user:pwd 来添加当前上下文中的授权用户) digest:即用户名:密码这种方式认证,这也是业务系统中最常用的。用 username:password 字符串来产生一个MD5串,然后该串被用来作为ACL ID。认证是通过明文发送username:password 来进行的,当用在ACL时,表达式为username:base64 ,base64是password的SHA1摘要的编码。 ip:使用客户端的主机IP作为ACL ID 。这个ACL表达式的格式为addr/bits ,此时addr中的有效位与客户端addr中的有效位进行比对。 2. ID 给谁授予权限授权对象ID是指,权限赋予的用户或者一个实体,例如:IP 地址或者机器。授权模式 schema 与 授权对象 ID 之间 CREATE、READ、WRITE、DELETE、ADMIN 也就是 增、删、改、查、管理权限,这5种权限简写为crwda 注意: 这5种权限中,delete是指对子节点的删除权限,其它4种权限指对自身节点的操作权限 更详细的如下: CREATE c 可以创建子节点 DELETE d 可以删除子节点(仅下一级节点) READ r 可以读取节点数据及显示子节点列表 WRITE w 可以设置节点数据 ADMIN a 可以设置节点访问控制列表权限 2.ACL 相关命令 getAcl getAcl 读取ACL权限setAcl setAcl 设置ACL权限addauth addauth 添加认证用户 3.测试zkCli设置权限 1.word方式 [zk: localhost:2181(CONNECTED) 9] create /test1 test1-value Created /test1 [zk: localhost:2181(CONNECTED) 10] getAcl /test1 #创建的默认是所有用户都可以进行cdrwa 'world,'anyone : cdrwa [zk: localhost:2181(CONNECTED) 11] setAcl /test1 world:anyone:acd #修改为所有人可以acd cZxid = 0x400000007 ctime = Tue Mar 12 14:46:55 CST 2019 mZxid = 0x400000007 mtime = Tue Mar 12 14:46:55 CST 2019 pZxid = 0x400000007 cversion = 0 dataVersion = 0 aclVersion = 1 ephemeralOwner = 0x0 dataLength = 11 numChildren = 0 [zk: localhost:2181(CONNECTED) 12] getAcl /test1 'world,'anyone : cda 2.IP的方式 [zk: localhost:2181(CONNECTED) 13] create /test2 test2-value Created /test2 [zk: localhost:2181(CONNECTED) 14] setAcl /test2 ip:127.0.0.1:crwda #修改此IP具有所有权限 cZxid = 0x400000009 ctime = Tue Mar 12 14:51:58 CST 2019 mZxid = 0x400000009 mtime = Tue Mar 12 14:51:58 CST 2019 pZxid = 0x400000009 cversion = 0 dataVersion = 0 aclVersion = 1 ephemeralOwner = 0x0 dataLength = 11 numChildren = 0 [zk: localhost:2181(CONNECTED) 15] getAcl /test2 'ip,'127.0.0.1 : cdrwa
当然可以设置IP的时候使用多个ip的方式,比如: [zk: localhost:2181(CONNECTED) 42] setAcl /t3 ip:192.168.0.164:cdwra,ip:127.0.0.1:cdwra cZxid = 0x400000018 ctime = Tue Mar 12 15:12:59 CST 2019 mZxid = 0x400000018 mtime = Tue Mar 12 15:12:59 CST 2019 pZxid = 0x400000018 cversion = 0 dataVersion = 0 aclVersion = 1 ephemeralOwner = 0x0 dataLength = 2 numChildren = 0 [zk: localhost:2181(CONNECTED) 43] getAcl /t3 'ip,'192.168.0.164 : cdrwa 'ip,'127.0.0.1 : cdrwa 3. Auth [zk: localhost:2181(CONNECTED) 44] create /t4 44 Created /t4 [zk: localhost:2181(CONNECTED) 45] addauth digest qlq:111222 #增加授权用户,明文用户名和密码 [zk: localhost:2181(CONNECTED) 46] setAcl /t4 auth:qlq:cdwra #授予权限 cZxid = 0x40000001d ctime = Tue Mar 12 15:16:56 CST 2019 mZxid = 0x40000001d mtime = Tue Mar 12 15:16:56 CST 2019 pZxid = 0x40000001d cversion = 0 dataVersion = 0 aclVersion = 1 ephemeralOwner = 0x0 dataLength = 2 numChildren = 0 [zk: localhost:2181(CONNECTED) 48] getAcl /t4 'digest,'qlq:JWNEexxIoeVompjU7O5pZzTU+VQ= : cdrwa如果重新连接之后获取会报没权限,需要添加授权用户: [zk: localhost:2181(CONNECTED) 4] get /t4 Authentication is not valid : /t4 [zk: localhost:2181(CONNECTED) 6] addauth digest qlq:111222 [zk: localhost:2181(CONNECTED) 7] get /t4 44 cZxid = 0x40000001d ctime = Tue Mar 12 15:16:56 CST 2019 mZxid = 0x40000001d mtime = Tue Mar 12 15:16:56 CST 2019 pZxid = 0x40000001d cversion = 0 dataVersion = 0 aclVersion = 1 ephemeralOwner = 0x0 dataLength = 2 numChildren = 0 4. Digest etAcl /test digest:用户名:密码:权限密码是用户名和密码加密后的字符串。 (1)生成密码:sha1加密之后base64编码 package zd.dms.test; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import org.apache.commons.codec.binary.Base64; public class Test { public static void main(String[] args) throws NoSuchAlgorithmException { String usernameAndPassword = "user:123456"; byte digest[] = MessageDigest.getInstance("SHA1").digest(usernameAndPassword.getBytes()); Base64 base64 = new Base64(); String encodeToString = base64.encodeToString(digest); System.out.println(encodeToString); } }6DY5WhzOfGsWQ1XFuIyzxkpwdPo= (2)设置权限 [zk: localhost:2181(CONNECTED) 7] setAcl /t6 digest:user:6DY5WhzOfGsWQ1XFuIyzxkpwdPo=:crwda #授权 cZxid = 0x400000028 ctime = Tue Mar 12 15:50:02 CST 2019 mZxid = 0x400000028 mtime = Tue Mar 12 15:50:02 CST 2019 pZxid = 0x400000028 cversion = 0 dataVersion = 0 aclVersion = 1 ephemeralOwner = 0x0 dataLength = 4 numChildren = 0 [zk: localhost:2181(CONNECTED) 8] getAcl /t6 'digest,'user:6DY5WhzOfGsWQ1XFuIyzxkpwdPo= : cdrwa
直接删除会不允许,也必须增加摘要之后才能删除 [zk: localhost:2181(CONNECTED) 1] rmr /t6 #直接删除没权限 Authentication is not valid : /t6 [zk: localhost:2181(CONNECTED) 2] addauth digest user:123456 #增加认证用户 [zk: localhost:2181(CONNECTED) 3] rmr /t6 [zk: localhost:2181(CONNECTED) 4] ls / [t4, curator, test2, zookeeper, test1, t3]5.Java原生的zookeperAPI的ACL 1.创建节点回顾 原来我们创建节点的时候如下: package zookeper; import java.io.IOException; import java.util.concurrent.CountDownLatch; import org.apache.zookeeper.CreateMode; import org.apache.zookeeper.KeeperException; import org.apache.zookeeper.WatchedEvent; import org.apache.zookeeper.Watcher; import org.apache.zookeeper.Watcher.Event.KeeperState; import org.apache.zookeeper.ZooDefs; import org.apache.zookeeper.ZooKeeper; public class BaseAPI { private static ZooKeeper zoo; final static CountDownLatch connectedSignal = new CountDownLatch(1); public static ZooKeeper connect(String host) throws IOException, InterruptedException { zoo = new ZooKeeper(host, 5000, new Watcher() { public void process(WatchedEvent event) { if (event.getState() == KeeperState.SyncConnected) { connectedSignal.countDown(); } } }); connectedSignal.await(); return zoo; } public void close() throws InterruptedException { zoo.close(); } public static void create(String path, byte[] data) throws KeeperException, InterruptedException { zoo.create(path, data, ZooDefs.Ids.OPEN_ACL_UNSAFE, CreateMode.PERSISTENT); } public static void main(String[] args) throws IOException, InterruptedException, KeeperException { final String path = "/t7"; final ZooKeeper connect = connect("127.0.0.1:2181,127.0.0.1:2182,127.0.0.1:2183"); connect.create(path, "777".getBytes(), ZooDefs.Ids.OPEN_ACL_UNSAFE, CreateMode.PERSISTENT); Thread.sleep(10 * 1000); } }可以看到create方法的第三个参数就是ACL集合,使用的是与zkCli方式一样的word:anyone:crwda 默认方式 如下: /** * This is a completely open ACL . */ public final ArrayList OPEN_ACL_UNSAFE = new ArrayList( Collections.singletonList(new ACL(Perms.ALL, ANYONE_ID_UNSAFE))); public interface Perms { int READ = 1 |
CopyRight 2018-2019 实验室设备网 版权所有 |