You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@hbase.apache.org by gi...@apache.org on 2018/11/15 14:54:59 UTC

[17/51] [partial] hbase-site git commit: Published site at 130057f13774f6b213cdb06952c805a29d59396e.

http://git-wip-us.apache.org/repos/asf/hbase-site/blob/68eae623/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
----------------------------------------------------------------------
diff --git a/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html b/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
deleted file mode 100644
index 2e68b22..0000000
--- a/devapidocs/src-html/org/apache/hadoop/hbase/security/access/TableAuthManager.PermissionCache.html
+++ /dev/null
@@ -1,859 +0,0 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
-<html lang="en">
-<head>
-<title>Source code</title>
-<link rel="stylesheet" type="text/css" href="../../../../../../../stylesheet.css" title="Style">
-</head>
-<body>
-<div class="sourceContainer">
-<pre><span class="sourceLineNo">001</span>/**<a name="line.1"></a>
-<span class="sourceLineNo">002</span> * Licensed to the Apache Software Foundation (ASF) under one<a name="line.2"></a>
-<span class="sourceLineNo">003</span> * or more contributor license agreements.  See the NOTICE file<a name="line.3"></a>
-<span class="sourceLineNo">004</span> * distributed with this work for additional information<a name="line.4"></a>
-<span class="sourceLineNo">005</span> * regarding copyright ownership.  The ASF licenses this file<a name="line.5"></a>
-<span class="sourceLineNo">006</span> * to you under the Apache License, Version 2.0 (the<a name="line.6"></a>
-<span class="sourceLineNo">007</span> * "License"); you may not use this file except in compliance<a name="line.7"></a>
-<span class="sourceLineNo">008</span> * with the License.  You may obtain a copy of the License at<a name="line.8"></a>
-<span class="sourceLineNo">009</span> *<a name="line.9"></a>
-<span class="sourceLineNo">010</span> *     http://www.apache.org/licenses/LICENSE-2.0<a name="line.10"></a>
-<span class="sourceLineNo">011</span> *<a name="line.11"></a>
-<span class="sourceLineNo">012</span> * Unless required by applicable law or agreed to in writing, software<a name="line.12"></a>
-<span class="sourceLineNo">013</span> * distributed under the License is distributed on an "AS IS" BASIS,<a name="line.13"></a>
-<span class="sourceLineNo">014</span> * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.<a name="line.14"></a>
-<span class="sourceLineNo">015</span> * See the License for the specific language governing permissions and<a name="line.15"></a>
-<span class="sourceLineNo">016</span> * limitations under the License.<a name="line.16"></a>
-<span class="sourceLineNo">017</span> */<a name="line.17"></a>
-<span class="sourceLineNo">018</span><a name="line.18"></a>
-<span class="sourceLineNo">019</span>package org.apache.hadoop.hbase.security.access;<a name="line.19"></a>
-<span class="sourceLineNo">020</span><a name="line.20"></a>
-<span class="sourceLineNo">021</span>import static org.apache.hadoop.hbase.util.CollectionUtils.computeIfAbsent;<a name="line.21"></a>
-<span class="sourceLineNo">022</span><a name="line.22"></a>
-<span class="sourceLineNo">023</span>import org.apache.hbase.thirdparty.com.google.common.annotations.VisibleForTesting;<a name="line.23"></a>
-<span class="sourceLineNo">024</span>import org.apache.hbase.thirdparty.com.google.common.collect.ArrayListMultimap;<a name="line.24"></a>
-<span class="sourceLineNo">025</span>import org.apache.hbase.thirdparty.com.google.common.collect.ListMultimap;<a name="line.25"></a>
-<span class="sourceLineNo">026</span>import org.apache.hbase.thirdparty.com.google.common.collect.Lists;<a name="line.26"></a>
-<span class="sourceLineNo">027</span><a name="line.27"></a>
-<span class="sourceLineNo">028</span>import java.io.Closeable;<a name="line.28"></a>
-<span class="sourceLineNo">029</span>import java.io.IOException;<a name="line.29"></a>
-<span class="sourceLineNo">030</span>import java.util.HashMap;<a name="line.30"></a>
-<span class="sourceLineNo">031</span>import java.util.List;<a name="line.31"></a>
-<span class="sourceLineNo">032</span>import java.util.Map;<a name="line.32"></a>
-<span class="sourceLineNo">033</span>import java.util.concurrent.ConcurrentSkipListMap;<a name="line.33"></a>
-<span class="sourceLineNo">034</span>import java.util.concurrent.atomic.AtomicLong;<a name="line.34"></a>
-<span class="sourceLineNo">035</span><a name="line.35"></a>
-<span class="sourceLineNo">036</span>import org.apache.hadoop.conf.Configuration;<a name="line.36"></a>
-<span class="sourceLineNo">037</span>import org.apache.hadoop.hbase.AuthUtil;<a name="line.37"></a>
-<span class="sourceLineNo">038</span>import org.apache.hadoop.hbase.Cell;<a name="line.38"></a>
-<span class="sourceLineNo">039</span>import org.apache.hadoop.hbase.TableName;<a name="line.39"></a>
-<span class="sourceLineNo">040</span>import org.apache.hadoop.hbase.zookeeper.ZKWatcher;<a name="line.40"></a>
-<span class="sourceLineNo">041</span>import org.apache.yetus.audience.InterfaceAudience;<a name="line.41"></a>
-<span class="sourceLineNo">042</span>import org.apache.hadoop.hbase.exceptions.DeserializationException;<a name="line.42"></a>
-<span class="sourceLineNo">043</span>import org.apache.hadoop.hbase.log.HBaseMarkers;<a name="line.43"></a>
-<span class="sourceLineNo">044</span>import org.apache.hadoop.hbase.security.Superusers;<a name="line.44"></a>
-<span class="sourceLineNo">045</span>import org.apache.hadoop.hbase.security.User;<a name="line.45"></a>
-<span class="sourceLineNo">046</span>import org.apache.hadoop.hbase.security.UserProvider;<a name="line.46"></a>
-<span class="sourceLineNo">047</span>import org.apache.hadoop.hbase.util.Bytes;<a name="line.47"></a>
-<span class="sourceLineNo">048</span>import org.apache.zookeeper.KeeperException;<a name="line.48"></a>
-<span class="sourceLineNo">049</span>import org.slf4j.Logger;<a name="line.49"></a>
-<span class="sourceLineNo">050</span>import org.slf4j.LoggerFactory;<a name="line.50"></a>
-<span class="sourceLineNo">051</span><a name="line.51"></a>
-<span class="sourceLineNo">052</span>/**<a name="line.52"></a>
-<span class="sourceLineNo">053</span> * Performs authorization checks for a given user's assigned permissions<a name="line.53"></a>
-<span class="sourceLineNo">054</span> */<a name="line.54"></a>
-<span class="sourceLineNo">055</span>@InterfaceAudience.Private<a name="line.55"></a>
-<span class="sourceLineNo">056</span>public class TableAuthManager implements Closeable {<a name="line.56"></a>
-<span class="sourceLineNo">057</span>  private static class PermissionCache&lt;T extends Permission&gt; {<a name="line.57"></a>
-<span class="sourceLineNo">058</span>    /** Cache of user permissions */<a name="line.58"></a>
-<span class="sourceLineNo">059</span>    private ListMultimap&lt;String,T&gt; userCache = ArrayListMultimap.create();<a name="line.59"></a>
-<span class="sourceLineNo">060</span>    /** Cache of group permissions */<a name="line.60"></a>
-<span class="sourceLineNo">061</span>    private ListMultimap&lt;String,T&gt; groupCache = ArrayListMultimap.create();<a name="line.61"></a>
-<span class="sourceLineNo">062</span><a name="line.62"></a>
-<span class="sourceLineNo">063</span>    public List&lt;T&gt; getUser(String user) {<a name="line.63"></a>
-<span class="sourceLineNo">064</span>      return userCache.get(user);<a name="line.64"></a>
-<span class="sourceLineNo">065</span>    }<a name="line.65"></a>
-<span class="sourceLineNo">066</span><a name="line.66"></a>
-<span class="sourceLineNo">067</span>    public void putUser(String user, T perm) {<a name="line.67"></a>
-<span class="sourceLineNo">068</span>      userCache.put(user, perm);<a name="line.68"></a>
-<span class="sourceLineNo">069</span>    }<a name="line.69"></a>
-<span class="sourceLineNo">070</span><a name="line.70"></a>
-<span class="sourceLineNo">071</span>    public List&lt;T&gt; replaceUser(String user, Iterable&lt;? extends T&gt; perms) {<a name="line.71"></a>
-<span class="sourceLineNo">072</span>      return userCache.replaceValues(user, perms);<a name="line.72"></a>
-<span class="sourceLineNo">073</span>    }<a name="line.73"></a>
-<span class="sourceLineNo">074</span><a name="line.74"></a>
-<span class="sourceLineNo">075</span>    public List&lt;T&gt; getGroup(String group) {<a name="line.75"></a>
-<span class="sourceLineNo">076</span>      return groupCache.get(group);<a name="line.76"></a>
-<span class="sourceLineNo">077</span>    }<a name="line.77"></a>
-<span class="sourceLineNo">078</span><a name="line.78"></a>
-<span class="sourceLineNo">079</span>    public void putGroup(String group, T perm) {<a name="line.79"></a>
-<span class="sourceLineNo">080</span>      groupCache.put(group, perm);<a name="line.80"></a>
-<span class="sourceLineNo">081</span>    }<a name="line.81"></a>
-<span class="sourceLineNo">082</span><a name="line.82"></a>
-<span class="sourceLineNo">083</span>    public List&lt;T&gt; replaceGroup(String group, Iterable&lt;? extends T&gt; perms) {<a name="line.83"></a>
-<span class="sourceLineNo">084</span>      return groupCache.replaceValues(group, perms);<a name="line.84"></a>
-<span class="sourceLineNo">085</span>    }<a name="line.85"></a>
-<span class="sourceLineNo">086</span><a name="line.86"></a>
-<span class="sourceLineNo">087</span>    /**<a name="line.87"></a>
-<span class="sourceLineNo">088</span>     * Returns a combined map of user and group permissions, with group names<a name="line.88"></a>
-<span class="sourceLineNo">089</span>     * distinguished according to {@link AuthUtil#isGroupPrincipal(String)}.<a name="line.89"></a>
-<span class="sourceLineNo">090</span>     */<a name="line.90"></a>
-<span class="sourceLineNo">091</span>    public ListMultimap&lt;String,T&gt; getAllPermissions() {<a name="line.91"></a>
-<span class="sourceLineNo">092</span>      ListMultimap&lt;String,T&gt; tmp = ArrayListMultimap.create();<a name="line.92"></a>
-<span class="sourceLineNo">093</span>      tmp.putAll(userCache);<a name="line.93"></a>
-<span class="sourceLineNo">094</span>      for (String group : groupCache.keySet()) {<a name="line.94"></a>
-<span class="sourceLineNo">095</span>        tmp.putAll(AuthUtil.toGroupEntry(group), groupCache.get(group));<a name="line.95"></a>
-<span class="sourceLineNo">096</span>      }<a name="line.96"></a>
-<span class="sourceLineNo">097</span>      return tmp;<a name="line.97"></a>
-<span class="sourceLineNo">098</span>    }<a name="line.98"></a>
-<span class="sourceLineNo">099</span>  }<a name="line.99"></a>
-<span class="sourceLineNo">100</span><a name="line.100"></a>
-<span class="sourceLineNo">101</span>  private static final Logger LOG = LoggerFactory.getLogger(TableAuthManager.class);<a name="line.101"></a>
-<span class="sourceLineNo">102</span><a name="line.102"></a>
-<span class="sourceLineNo">103</span>  /** Cache of global permissions */<a name="line.103"></a>
-<span class="sourceLineNo">104</span>  private volatile PermissionCache&lt;Permission&gt; globalCache;<a name="line.104"></a>
-<span class="sourceLineNo">105</span><a name="line.105"></a>
-<span class="sourceLineNo">106</span>  private ConcurrentSkipListMap&lt;TableName, PermissionCache&lt;TablePermission&gt;&gt; tableCache =<a name="line.106"></a>
-<span class="sourceLineNo">107</span>      new ConcurrentSkipListMap&lt;&gt;();<a name="line.107"></a>
-<span class="sourceLineNo">108</span><a name="line.108"></a>
-<span class="sourceLineNo">109</span>  private ConcurrentSkipListMap&lt;String, PermissionCache&lt;TablePermission&gt;&gt; nsCache =<a name="line.109"></a>
-<span class="sourceLineNo">110</span>    new ConcurrentSkipListMap&lt;&gt;();<a name="line.110"></a>
-<span class="sourceLineNo">111</span><a name="line.111"></a>
-<span class="sourceLineNo">112</span>  private Configuration conf;<a name="line.112"></a>
-<span class="sourceLineNo">113</span>  private ZKPermissionWatcher zkperms;<a name="line.113"></a>
-<span class="sourceLineNo">114</span>  private final AtomicLong mtime = new AtomicLong(0L);<a name="line.114"></a>
-<span class="sourceLineNo">115</span><a name="line.115"></a>
-<span class="sourceLineNo">116</span>  private TableAuthManager(ZKWatcher watcher, Configuration conf)<a name="line.116"></a>
-<span class="sourceLineNo">117</span>      throws IOException {<a name="line.117"></a>
-<span class="sourceLineNo">118</span>    this.conf = conf;<a name="line.118"></a>
-<span class="sourceLineNo">119</span><a name="line.119"></a>
-<span class="sourceLineNo">120</span>    // initialize global permissions based on configuration<a name="line.120"></a>
-<span class="sourceLineNo">121</span>    globalCache = initGlobal(conf);<a name="line.121"></a>
-<span class="sourceLineNo">122</span><a name="line.122"></a>
-<span class="sourceLineNo">123</span>    this.zkperms = new ZKPermissionWatcher(watcher, this, conf);<a name="line.123"></a>
-<span class="sourceLineNo">124</span>    try {<a name="line.124"></a>
-<span class="sourceLineNo">125</span>      this.zkperms.start();<a name="line.125"></a>
-<span class="sourceLineNo">126</span>    } catch (KeeperException ke) {<a name="line.126"></a>
-<span class="sourceLineNo">127</span>      LOG.error("ZooKeeper initialization failed", ke);<a name="line.127"></a>
-<span class="sourceLineNo">128</span>    }<a name="line.128"></a>
-<span class="sourceLineNo">129</span>  }<a name="line.129"></a>
-<span class="sourceLineNo">130</span><a name="line.130"></a>
-<span class="sourceLineNo">131</span>  @Override<a name="line.131"></a>
-<span class="sourceLineNo">132</span>  public void close() {<a name="line.132"></a>
-<span class="sourceLineNo">133</span>    this.zkperms.close();<a name="line.133"></a>
-<span class="sourceLineNo">134</span>  }<a name="line.134"></a>
-<span class="sourceLineNo">135</span><a name="line.135"></a>
-<span class="sourceLineNo">136</span>  /**<a name="line.136"></a>
-<span class="sourceLineNo">137</span>   * Returns a new {@code PermissionCache} initialized with permission assignments<a name="line.137"></a>
-<span class="sourceLineNo">138</span>   * from the {@code hbase.superuser} configuration key.<a name="line.138"></a>
-<span class="sourceLineNo">139</span>   */<a name="line.139"></a>
-<span class="sourceLineNo">140</span>  private PermissionCache&lt;Permission&gt; initGlobal(Configuration conf) throws IOException {<a name="line.140"></a>
-<span class="sourceLineNo">141</span>    UserProvider userProvider = UserProvider.instantiate(conf);<a name="line.141"></a>
-<span class="sourceLineNo">142</span>    User user = userProvider.getCurrent();<a name="line.142"></a>
-<span class="sourceLineNo">143</span>    if (user == null) {<a name="line.143"></a>
-<span class="sourceLineNo">144</span>      throw new IOException("Unable to obtain the current user, " +<a name="line.144"></a>
-<span class="sourceLineNo">145</span>          "authorization checks for internal operations will not work correctly!");<a name="line.145"></a>
-<span class="sourceLineNo">146</span>    }<a name="line.146"></a>
-<span class="sourceLineNo">147</span>    PermissionCache&lt;Permission&gt; newCache = new PermissionCache&lt;&gt;();<a name="line.147"></a>
-<span class="sourceLineNo">148</span>    String currentUser = user.getShortName();<a name="line.148"></a>
-<span class="sourceLineNo">149</span><a name="line.149"></a>
-<span class="sourceLineNo">150</span>    // the system user is always included<a name="line.150"></a>
-<span class="sourceLineNo">151</span>    List&lt;String&gt; superusers = Lists.asList(currentUser, conf.getStrings(<a name="line.151"></a>
-<span class="sourceLineNo">152</span>        Superusers.SUPERUSER_CONF_KEY, new String[0]));<a name="line.152"></a>
-<span class="sourceLineNo">153</span>    if (superusers != null) {<a name="line.153"></a>
-<span class="sourceLineNo">154</span>      for (String name : superusers) {<a name="line.154"></a>
-<span class="sourceLineNo">155</span>        if (AuthUtil.isGroupPrincipal(name)) {<a name="line.155"></a>
-<span class="sourceLineNo">156</span>          newCache.putGroup(AuthUtil.getGroupName(name),<a name="line.156"></a>
-<span class="sourceLineNo">157</span>              new Permission(Permission.Action.values()));<a name="line.157"></a>
-<span class="sourceLineNo">158</span>        } else {<a name="line.158"></a>
-<span class="sourceLineNo">159</span>          newCache.putUser(name, new Permission(Permission.Action.values()));<a name="line.159"></a>
-<span class="sourceLineNo">160</span>        }<a name="line.160"></a>
-<span class="sourceLineNo">161</span>      }<a name="line.161"></a>
-<span class="sourceLineNo">162</span>    }<a name="line.162"></a>
-<span class="sourceLineNo">163</span>    return newCache;<a name="line.163"></a>
-<span class="sourceLineNo">164</span>  }<a name="line.164"></a>
-<span class="sourceLineNo">165</span><a name="line.165"></a>
-<span class="sourceLineNo">166</span>  public ZKPermissionWatcher getZKPermissionWatcher() {<a name="line.166"></a>
-<span class="sourceLineNo">167</span>    return this.zkperms;<a name="line.167"></a>
-<span class="sourceLineNo">168</span>  }<a name="line.168"></a>
-<span class="sourceLineNo">169</span><a name="line.169"></a>
-<span class="sourceLineNo">170</span>  public void refreshTableCacheFromWritable(TableName table,<a name="line.170"></a>
-<span class="sourceLineNo">171</span>                                       byte[] data) throws IOException {<a name="line.171"></a>
-<span class="sourceLineNo">172</span>    if (data != null &amp;&amp; data.length &gt; 0) {<a name="line.172"></a>
-<span class="sourceLineNo">173</span>      ListMultimap&lt;String,TablePermission&gt; perms;<a name="line.173"></a>
-<span class="sourceLineNo">174</span>      try {<a name="line.174"></a>
-<span class="sourceLineNo">175</span>        perms = AccessControlLists.readPermissions(data, conf);<a name="line.175"></a>
-<span class="sourceLineNo">176</span>      } catch (DeserializationException e) {<a name="line.176"></a>
-<span class="sourceLineNo">177</span>        throw new IOException(e);<a name="line.177"></a>
-<span class="sourceLineNo">178</span>      }<a name="line.178"></a>
-<span class="sourceLineNo">179</span><a name="line.179"></a>
-<span class="sourceLineNo">180</span>      if (perms != null) {<a name="line.180"></a>
-<span class="sourceLineNo">181</span>        if (Bytes.equals(table.getName(), AccessControlLists.ACL_GLOBAL_NAME)) {<a name="line.181"></a>
-<span class="sourceLineNo">182</span>          updateGlobalCache(perms);<a name="line.182"></a>
-<span class="sourceLineNo">183</span>        } else {<a name="line.183"></a>
-<span class="sourceLineNo">184</span>          updateTableCache(table, perms);<a name="line.184"></a>
-<span class="sourceLineNo">185</span>        }<a name="line.185"></a>
-<span class="sourceLineNo">186</span>      }<a name="line.186"></a>
-<span class="sourceLineNo">187</span>    } else {<a name="line.187"></a>
-<span class="sourceLineNo">188</span>      LOG.debug("Skipping permission cache refresh because writable data is empty");<a name="line.188"></a>
-<span class="sourceLineNo">189</span>    }<a name="line.189"></a>
-<span class="sourceLineNo">190</span>  }<a name="line.190"></a>
-<span class="sourceLineNo">191</span><a name="line.191"></a>
-<span class="sourceLineNo">192</span>  public void refreshNamespaceCacheFromWritable(String namespace, byte[] data) throws IOException {<a name="line.192"></a>
-<span class="sourceLineNo">193</span>    if (data != null &amp;&amp; data.length &gt; 0) {<a name="line.193"></a>
-<span class="sourceLineNo">194</span>      ListMultimap&lt;String,TablePermission&gt; perms;<a name="line.194"></a>
-<span class="sourceLineNo">195</span>      try {<a name="line.195"></a>
-<span class="sourceLineNo">196</span>        perms = AccessControlLists.readPermissions(data, conf);<a name="line.196"></a>
-<span class="sourceLineNo">197</span>      } catch (DeserializationException e) {<a name="line.197"></a>
-<span class="sourceLineNo">198</span>        throw new IOException(e);<a name="line.198"></a>
-<span class="sourceLineNo">199</span>      }<a name="line.199"></a>
-<span class="sourceLineNo">200</span>      if (perms != null) {<a name="line.200"></a>
-<span class="sourceLineNo">201</span>        updateNsCache(namespace, perms);<a name="line.201"></a>
-<span class="sourceLineNo">202</span>      }<a name="line.202"></a>
-<span class="sourceLineNo">203</span>    } else {<a name="line.203"></a>
-<span class="sourceLineNo">204</span>      LOG.debug("Skipping permission cache refresh because writable data is empty");<a name="line.204"></a>
-<span class="sourceLineNo">205</span>    }<a name="line.205"></a>
-<span class="sourceLineNo">206</span>  }<a name="line.206"></a>
-<span class="sourceLineNo">207</span><a name="line.207"></a>
-<span class="sourceLineNo">208</span>  /**<a name="line.208"></a>
-<span class="sourceLineNo">209</span>   * Updates the internal global permissions cache<a name="line.209"></a>
-<span class="sourceLineNo">210</span>   *<a name="line.210"></a>
-<span class="sourceLineNo">211</span>   * @param userPerms<a name="line.211"></a>
-<span class="sourceLineNo">212</span>   */<a name="line.212"></a>
-<span class="sourceLineNo">213</span>  private void updateGlobalCache(ListMultimap&lt;String,TablePermission&gt; userPerms) {<a name="line.213"></a>
-<span class="sourceLineNo">214</span>    PermissionCache&lt;Permission&gt; newCache = null;<a name="line.214"></a>
-<span class="sourceLineNo">215</span>    try {<a name="line.215"></a>
-<span class="sourceLineNo">216</span>      newCache = initGlobal(conf);<a name="line.216"></a>
-<span class="sourceLineNo">217</span>      for (Map.Entry&lt;String,TablePermission&gt; entry : userPerms.entries()) {<a name="line.217"></a>
-<span class="sourceLineNo">218</span>        if (AuthUtil.isGroupPrincipal(entry.getKey())) {<a name="line.218"></a>
-<span class="sourceLineNo">219</span>          newCache.putGroup(AuthUtil.getGroupName(entry.getKey()),<a name="line.219"></a>
-<span class="sourceLineNo">220</span>              new Permission(entry.getValue().getActions()));<a name="line.220"></a>
-<span class="sourceLineNo">221</span>        } else {<a name="line.221"></a>
-<span class="sourceLineNo">222</span>          newCache.putUser(entry.getKey(), new Permission(entry.getValue().getActions()));<a name="line.222"></a>
-<span class="sourceLineNo">223</span>        }<a name="line.223"></a>
-<span class="sourceLineNo">224</span>      }<a name="line.224"></a>
-<span class="sourceLineNo">225</span>      globalCache = newCache;<a name="line.225"></a>
-<span class="sourceLineNo">226</span>      mtime.incrementAndGet();<a name="line.226"></a>
-<span class="sourceLineNo">227</span>    } catch (IOException e) {<a name="line.227"></a>
-<span class="sourceLineNo">228</span>      // Never happens<a name="line.228"></a>
-<span class="sourceLineNo">229</span>      LOG.error("Error occurred while updating the global cache", e);<a name="line.229"></a>
-<span class="sourceLineNo">230</span>    }<a name="line.230"></a>
-<span class="sourceLineNo">231</span>  }<a name="line.231"></a>
-<span class="sourceLineNo">232</span><a name="line.232"></a>
-<span class="sourceLineNo">233</span>  /**<a name="line.233"></a>
-<span class="sourceLineNo">234</span>   * Updates the internal permissions cache for a single table, splitting<a name="line.234"></a>
-<span class="sourceLineNo">235</span>   * the permissions listed into separate caches for users and groups to optimize<a name="line.235"></a>
-<span class="sourceLineNo">236</span>   * group lookups.<a name="line.236"></a>
-<span class="sourceLineNo">237</span>   *<a name="line.237"></a>
-<span class="sourceLineNo">238</span>   * @param table<a name="line.238"></a>
-<span class="sourceLineNo">239</span>   * @param tablePerms<a name="line.239"></a>
-<span class="sourceLineNo">240</span>   */<a name="line.240"></a>
-<span class="sourceLineNo">241</span>  private void updateTableCache(TableName table,<a name="line.241"></a>
-<span class="sourceLineNo">242</span>                                ListMultimap&lt;String,TablePermission&gt; tablePerms) {<a name="line.242"></a>
-<span class="sourceLineNo">243</span>    PermissionCache&lt;TablePermission&gt; newTablePerms = new PermissionCache&lt;&gt;();<a name="line.243"></a>
-<span class="sourceLineNo">244</span><a name="line.244"></a>
-<span class="sourceLineNo">245</span>    for (Map.Entry&lt;String,TablePermission&gt; entry : tablePerms.entries()) {<a name="line.245"></a>
-<span class="sourceLineNo">246</span>      if (AuthUtil.isGroupPrincipal(entry.getKey())) {<a name="line.246"></a>
-<span class="sourceLineNo">247</span>        newTablePerms.putGroup(AuthUtil.getGroupName(entry.getKey()), entry.getValue());<a name="line.247"></a>
-<span class="sourceLineNo">248</span>      } else {<a name="line.248"></a>
-<span class="sourceLineNo">249</span>        newTablePerms.putUser(entry.getKey(), entry.getValue());<a name="line.249"></a>
-<span class="sourceLineNo">250</span>      }<a name="line.250"></a>
-<span class="sourceLineNo">251</span>    }<a name="line.251"></a>
-<span class="sourceLineNo">252</span><a name="line.252"></a>
-<span class="sourceLineNo">253</span>    tableCache.put(table, newTablePerms);<a name="line.253"></a>
-<span class="sourceLineNo">254</span>    mtime.incrementAndGet();<a name="line.254"></a>
-<span class="sourceLineNo">255</span>  }<a name="line.255"></a>
-<span class="sourceLineNo">256</span><a name="line.256"></a>
-<span class="sourceLineNo">257</span>  /**<a name="line.257"></a>
-<span class="sourceLineNo">258</span>   * Updates the internal permissions cache for a single table, splitting<a name="line.258"></a>
-<span class="sourceLineNo">259</span>   * the permissions listed into separate caches for users and groups to optimize<a name="line.259"></a>
-<span class="sourceLineNo">260</span>   * group lookups.<a name="line.260"></a>
-<span class="sourceLineNo">261</span>   *<a name="line.261"></a>
-<span class="sourceLineNo">262</span>   * @param namespace<a name="line.262"></a>
-<span class="sourceLineNo">263</span>   * @param tablePerms<a name="line.263"></a>
-<span class="sourceLineNo">264</span>   */<a name="line.264"></a>
-<span class="sourceLineNo">265</span>  private void updateNsCache(String namespace,<a name="line.265"></a>
-<span class="sourceLineNo">266</span>                             ListMultimap&lt;String, TablePermission&gt; tablePerms) {<a name="line.266"></a>
-<span class="sourceLineNo">267</span>    PermissionCache&lt;TablePermission&gt; newTablePerms = new PermissionCache&lt;&gt;();<a name="line.267"></a>
-<span class="sourceLineNo">268</span><a name="line.268"></a>
-<span class="sourceLineNo">269</span>    for (Map.Entry&lt;String, TablePermission&gt; entry : tablePerms.entries()) {<a name="line.269"></a>
-<span class="sourceLineNo">270</span>      if (AuthUtil.isGroupPrincipal(entry.getKey())) {<a name="line.270"></a>
-<span class="sourceLineNo">271</span>        newTablePerms.putGroup(AuthUtil.getGroupName(entry.getKey()), entry.getValue());<a name="line.271"></a>
-<span class="sourceLineNo">272</span>      } else {<a name="line.272"></a>
-<span class="sourceLineNo">273</span>        newTablePerms.putUser(entry.getKey(), entry.getValue());<a name="line.273"></a>
-<span class="sourceLineNo">274</span>      }<a name="line.274"></a>
-<span class="sourceLineNo">275</span>    }<a name="line.275"></a>
-<span class="sourceLineNo">276</span><a name="line.276"></a>
-<span class="sourceLineNo">277</span>    nsCache.put(namespace, newTablePerms);<a name="line.277"></a>
-<span class="sourceLineNo">278</span>    mtime.incrementAndGet();<a name="line.278"></a>
-<span class="sourceLineNo">279</span>  }<a name="line.279"></a>
-<span class="sourceLineNo">280</span><a name="line.280"></a>
-<span class="sourceLineNo">281</span>  private PermissionCache&lt;TablePermission&gt; getTablePermissions(TableName table) {<a name="line.281"></a>
-<span class="sourceLineNo">282</span>    return computeIfAbsent(tableCache, table, PermissionCache::new);<a name="line.282"></a>
-<span class="sourceLineNo">283</span>  }<a name="line.283"></a>
-<span class="sourceLineNo">284</span><a name="line.284"></a>
-<span class="sourceLineNo">285</span>  private PermissionCache&lt;TablePermission&gt; getNamespacePermissions(String namespace) {<a name="line.285"></a>
-<span class="sourceLineNo">286</span>    return computeIfAbsent(nsCache, namespace, PermissionCache::new);<a name="line.286"></a>
-<span class="sourceLineNo">287</span>  }<a name="line.287"></a>
-<span class="sourceLineNo">288</span><a name="line.288"></a>
-<span class="sourceLineNo">289</span>  /**<a name="line.289"></a>
-<span class="sourceLineNo">290</span>   * Authorizes a global permission<a name="line.290"></a>
-<span class="sourceLineNo">291</span>   * @param perms<a name="line.291"></a>
-<span class="sourceLineNo">292</span>   * @param action<a name="line.292"></a>
-<span class="sourceLineNo">293</span>   * @return true if authorized, false otherwise<a name="line.293"></a>
-<span class="sourceLineNo">294</span>   */<a name="line.294"></a>
-<span class="sourceLineNo">295</span>  private boolean authorize(List&lt;Permission&gt; perms, Permission.Action action) {<a name="line.295"></a>
-<span class="sourceLineNo">296</span>    if (perms != null) {<a name="line.296"></a>
-<span class="sourceLineNo">297</span>      for (Permission p : perms) {<a name="line.297"></a>
-<span class="sourceLineNo">298</span>        if (p.implies(action)) {<a name="line.298"></a>
-<span class="sourceLineNo">299</span>          return true;<a name="line.299"></a>
-<span class="sourceLineNo">300</span>        }<a name="line.300"></a>
-<span class="sourceLineNo">301</span>      }<a name="line.301"></a>
-<span class="sourceLineNo">302</span>    } else if (LOG.isDebugEnabled()) {<a name="line.302"></a>
-<span class="sourceLineNo">303</span>      LOG.debug("No permissions found for " + action);<a name="line.303"></a>
-<span class="sourceLineNo">304</span>    }<a name="line.304"></a>
-<span class="sourceLineNo">305</span><a name="line.305"></a>
-<span class="sourceLineNo">306</span>    return false;<a name="line.306"></a>
-<span class="sourceLineNo">307</span>  }<a name="line.307"></a>
-<span class="sourceLineNo">308</span><a name="line.308"></a>
-<span class="sourceLineNo">309</span>  /**<a name="line.309"></a>
-<span class="sourceLineNo">310</span>   * Authorize a global permission based on ACLs for the given user and the<a name="line.310"></a>
-<span class="sourceLineNo">311</span>   * user's groups.<a name="line.311"></a>
-<span class="sourceLineNo">312</span>   * @param user<a name="line.312"></a>
-<span class="sourceLineNo">313</span>   * @param action<a name="line.313"></a>
-<span class="sourceLineNo">314</span>   * @return true if known and authorized, false otherwise<a name="line.314"></a>
-<span class="sourceLineNo">315</span>   */<a name="line.315"></a>
-<span class="sourceLineNo">316</span>  public boolean authorize(User user, Permission.Action action) {<a name="line.316"></a>
-<span class="sourceLineNo">317</span>    if (user == null) {<a name="line.317"></a>
-<span class="sourceLineNo">318</span>      return false;<a name="line.318"></a>
-<span class="sourceLineNo">319</span>    }<a name="line.319"></a>
-<span class="sourceLineNo">320</span><a name="line.320"></a>
-<span class="sourceLineNo">321</span>    if (authorize(globalCache.getUser(user.getShortName()), action)) {<a name="line.321"></a>
-<span class="sourceLineNo">322</span>      return true;<a name="line.322"></a>
-<span class="sourceLineNo">323</span>    }<a name="line.323"></a>
-<span class="sourceLineNo">324</span><a name="line.324"></a>
-<span class="sourceLineNo">325</span>    String[] groups = user.getGroupNames();<a name="line.325"></a>
-<span class="sourceLineNo">326</span>    if (groups != null) {<a name="line.326"></a>
-<span class="sourceLineNo">327</span>      for (String group : groups) {<a name="line.327"></a>
-<span class="sourceLineNo">328</span>        if (authorize(globalCache.getGroup(group), action)) {<a name="line.328"></a>
-<span class="sourceLineNo">329</span>          return true;<a name="line.329"></a>
-<span class="sourceLineNo">330</span>        }<a name="line.330"></a>
-<span class="sourceLineNo">331</span>      }<a name="line.331"></a>
-<span class="sourceLineNo">332</span>    }<a name="line.332"></a>
-<span class="sourceLineNo">333</span>    return false;<a name="line.333"></a>
-<span class="sourceLineNo">334</span>  }<a name="line.334"></a>
-<span class="sourceLineNo">335</span><a name="line.335"></a>
-<span class="sourceLineNo">336</span>  private boolean authorize(List&lt;TablePermission&gt; perms,<a name="line.336"></a>
-<span class="sourceLineNo">337</span>                            TableName table, byte[] family,<a name="line.337"></a>
-<span class="sourceLineNo">338</span>                            byte[] qualifier, Permission.Action action) {<a name="line.338"></a>
-<span class="sourceLineNo">339</span>    if (perms != null) {<a name="line.339"></a>
-<span class="sourceLineNo">340</span>      for (TablePermission p : perms) {<a name="line.340"></a>
-<span class="sourceLineNo">341</span>        if (p.implies(table, family, qualifier, action)) {<a name="line.341"></a>
-<span class="sourceLineNo">342</span>          return true;<a name="line.342"></a>
-<span class="sourceLineNo">343</span>        }<a name="line.343"></a>
-<span class="sourceLineNo">344</span>      }<a name="line.344"></a>
-<span class="sourceLineNo">345</span>    } else if (LOG.isDebugEnabled()) {<a name="line.345"></a>
-<span class="sourceLineNo">346</span>      LOG.debug("No permissions found for table="+table);<a name="line.346"></a>
-<span class="sourceLineNo">347</span>    }<a name="line.347"></a>
-<span class="sourceLineNo">348</span>    return false;<a name="line.348"></a>
-<span class="sourceLineNo">349</span>  }<a name="line.349"></a>
-<span class="sourceLineNo">350</span><a name="line.350"></a>
-<span class="sourceLineNo">351</span>  private boolean hasAccess(List&lt;TablePermission&gt; perms,<a name="line.351"></a>
-<span class="sourceLineNo">352</span>                            TableName table, Permission.Action action) {<a name="line.352"></a>
-<span class="sourceLineNo">353</span>    if (perms != null) {<a name="line.353"></a>
-<span class="sourceLineNo">354</span>      for (TablePermission p : perms) {<a name="line.354"></a>
-<span class="sourceLineNo">355</span>        if (p.implies(action)) {<a name="line.355"></a>
-<span class="sourceLineNo">356</span>          return true;<a name="line.356"></a>
-<span class="sourceLineNo">357</span>        }<a name="line.357"></a>
-<span class="sourceLineNo">358</span>      }<a name="line.358"></a>
-<span class="sourceLineNo">359</span>    } else if (LOG.isDebugEnabled()) {<a name="line.359"></a>
-<span class="sourceLineNo">360</span>      LOG.debug("No permissions found for table="+table);<a name="line.360"></a>
-<span class="sourceLineNo">361</span>    }<a name="line.361"></a>
-<span class="sourceLineNo">362</span>    return false;<a name="line.362"></a>
-<span class="sourceLineNo">363</span>  }<a name="line.363"></a>
-<span class="sourceLineNo">364</span><a name="line.364"></a>
-<span class="sourceLineNo">365</span>  /**<a name="line.365"></a>
-<span class="sourceLineNo">366</span>   * Authorize a user for a given KV. This is called from AccessControlFilter.<a name="line.366"></a>
-<span class="sourceLineNo">367</span>   */<a name="line.367"></a>
-<span class="sourceLineNo">368</span>  public boolean authorize(User user, TableName table, Cell cell, Permission.Action action) {<a name="line.368"></a>
-<span class="sourceLineNo">369</span>    try {<a name="line.369"></a>
-<span class="sourceLineNo">370</span>      List&lt;Permission&gt; perms = AccessControlLists.getCellPermissionsForUser(user, cell);<a name="line.370"></a>
-<span class="sourceLineNo">371</span>      if (LOG.isTraceEnabled()) {<a name="line.371"></a>
-<span class="sourceLineNo">372</span>        LOG.trace("Perms for user " + user.getShortName() + " in cell " + cell + ": " +<a name="line.372"></a>
-<span class="sourceLineNo">373</span>          (perms != null ? perms : ""));<a name="line.373"></a>
-<span class="sourceLineNo">374</span>      }<a name="line.374"></a>
-<span class="sourceLineNo">375</span>      if (perms != null) {<a name="line.375"></a>
-<span class="sourceLineNo">376</span>        for (Permission p: perms) {<a name="line.376"></a>
-<span class="sourceLineNo">377</span>          if (p.implies(action)) {<a name="line.377"></a>
-<span class="sourceLineNo">378</span>            return true;<a name="line.378"></a>
-<span class="sourceLineNo">379</span>          }<a name="line.379"></a>
-<span class="sourceLineNo">380</span>        }<a name="line.380"></a>
-<span class="sourceLineNo">381</span>      }<a name="line.381"></a>
-<span class="sourceLineNo">382</span>    } catch (IOException e) {<a name="line.382"></a>
-<span class="sourceLineNo">383</span>      // We failed to parse the KV tag<a name="line.383"></a>
-<span class="sourceLineNo">384</span>      LOG.error("Failed parse of ACL tag in cell " + cell);<a name="line.384"></a>
-<span class="sourceLineNo">385</span>      // Fall through to check with the table and CF perms we were able<a name="line.385"></a>
-<span class="sourceLineNo">386</span>      // to collect regardless<a name="line.386"></a>
-<span class="sourceLineNo">387</span>    }<a name="line.387"></a>
-<span class="sourceLineNo">388</span>    return false;<a name="line.388"></a>
-<span class="sourceLineNo">389</span>  }<a name="line.389"></a>
-<span class="sourceLineNo">390</span><a name="line.390"></a>
-<span class="sourceLineNo">391</span>  public boolean authorize(User user, String namespace, Permission.Action action) {<a name="line.391"></a>
-<span class="sourceLineNo">392</span>    // Global authorizations supercede namespace level<a name="line.392"></a>
-<span class="sourceLineNo">393</span>    if (authorize(user, action)) {<a name="line.393"></a>
-<span class="sourceLineNo">394</span>      return true;<a name="line.394"></a>
-<span class="sourceLineNo">395</span>    }<a name="line.395"></a>
-<span class="sourceLineNo">396</span>    // Check namespace permissions<a name="line.396"></a>
-<span class="sourceLineNo">397</span>    PermissionCache&lt;TablePermission&gt; tablePerms = nsCache.get(namespace);<a name="line.397"></a>
-<span class="sourceLineNo">398</span>    if (tablePerms != null) {<a name="line.398"></a>
-<span class="sourceLineNo">399</span>      List&lt;TablePermission&gt; userPerms = tablePerms.getUser(user.getShortName());<a name="line.399"></a>
-<span class="sourceLineNo">400</span>      if (authorize(userPerms, namespace, action)) {<a name="line.400"></a>
-<span class="sourceLineNo">401</span>        return true;<a name="line.401"></a>
-<span class="sourceLineNo">402</span>      }<a name="line.402"></a>
-<span class="sourceLineNo">403</span>      String[] groupNames = user.getGroupNames();<a name="line.403"></a>
-<span class="sourceLineNo">404</span>      if (groupNames != null) {<a name="line.404"></a>
-<span class="sourceLineNo">405</span>        for (String group : groupNames) {<a name="line.405"></a>
-<span class="sourceLineNo">406</span>          List&lt;TablePermission&gt; groupPerms = tablePerms.getGroup(group);<a name="line.406"></a>
-<span class="sourceLineNo">407</span>          if (authorize(groupPerms, namespace, action)) {<a name="line.407"></a>
-<span class="sourceLineNo">408</span>            return true;<a name="line.408"></a>
-<span class="sourceLineNo">409</span>          }<a name="line.409"></a>
-<span class="sourceLineNo">410</span>        }<a name="line.410"></a>
-<span class="sourceLineNo">411</span>      }<a name="line.411"></a>
-<span class="sourceLineNo">412</span>    }<a name="line.412"></a>
-<span class="sourceLineNo">413</span>    return false;<a name="line.413"></a>
-<span class="sourceLineNo">414</span>  }<a name="line.414"></a>
-<span class="sourceLineNo">415</span><a name="line.415"></a>
-<span class="sourceLineNo">416</span>  private boolean authorize(List&lt;TablePermission&gt; perms, String namespace,<a name="line.416"></a>
-<span class="sourceLineNo">417</span>                            Permission.Action action) {<a name="line.417"></a>
-<span class="sourceLineNo">418</span>    if (perms != null) {<a name="line.418"></a>
-<span class="sourceLineNo">419</span>      for (TablePermission p : perms) {<a name="line.419"></a>
-<span class="sourceLineNo">420</span>        if (p.implies(namespace, action)) {<a name="line.420"></a>
-<span class="sourceLineNo">421</span>          return true;<a name="line.421"></a>
-<span class="sourceLineNo">422</span>        }<a name="line.422"></a>
-<span class="sourceLineNo">423</span>      }<a name="line.423"></a>
-<span class="sourceLineNo">424</span>    } else if (LOG.isDebugEnabled()) {<a name="line.424"></a>
-<span class="sourceLineNo">425</span>      LOG.debug("No permissions for authorize() check, table=" + namespace);<a name="line.425"></a>
-<span class="sourceLineNo">426</span>    }<a name="line.426"></a>
-<span class="sourceLineNo">427</span><a name="line.427"></a>
-<span class="sourceLineNo">428</span>    return false;<a name="line.428"></a>
-<span class="sourceLineNo">429</span>  }<a name="line.429"></a>
-<span class="sourceLineNo">430</span><a name="line.430"></a>
-<span class="sourceLineNo">431</span>  /**<a name="line.431"></a>
-<span class="sourceLineNo">432</span>   * Checks authorization to a given table and column family for a user, based on the<a name="line.432"></a>
-<span class="sourceLineNo">433</span>   * stored user permissions.<a name="line.433"></a>
-<span class="sourceLineNo">434</span>   *<a name="line.434"></a>
-<span class="sourceLineNo">435</span>   * @param user<a name="line.435"></a>
-<span class="sourceLineNo">436</span>   * @param table<a name="line.436"></a>
-<span class="sourceLineNo">437</span>   * @param family<a name="line.437"></a>
-<span class="sourceLineNo">438</span>   * @param action<a name="line.438"></a>
-<span class="sourceLineNo">439</span>   * @return true if known and authorized, false otherwise<a name="line.439"></a>
-<span class="sourceLineNo">440</span>   */<a name="line.440"></a>
-<span class="sourceLineNo">441</span>  public boolean authorizeUser(User user, TableName table, byte[] family,<a name="line.441"></a>
-<span class="sourceLineNo">442</span>      Permission.Action action) {<a name="line.442"></a>
-<span class="sourceLineNo">443</span>    return authorizeUser(user, table, family, null, action);<a name="line.443"></a>
-<span class="sourceLineNo">444</span>  }<a name="line.444"></a>
-<span class="sourceLineNo">445</span><a name="line.445"></a>
-<span class="sourceLineNo">446</span>  public boolean authorizeUser(User user, TableName table, byte[] family,<a name="line.446"></a>
-<span class="sourceLineNo">447</span>      byte[] qualifier, Permission.Action action) {<a name="line.447"></a>
-<span class="sourceLineNo">448</span>    if (table == null) table = AccessControlLists.ACL_TABLE_NAME;<a name="line.448"></a>
-<span class="sourceLineNo">449</span>    // Global and namespace authorizations supercede table level<a name="line.449"></a>
-<span class="sourceLineNo">450</span>    if (authorize(user, table.getNamespaceAsString(), action)) {<a name="line.450"></a>
-<span class="sourceLineNo">451</span>      return true;<a name="line.451"></a>
-<span class="sourceLineNo">452</span>    }<a name="line.452"></a>
-<span class="sourceLineNo">453</span>    // Check table permissions<a name="line.453"></a>
-<span class="sourceLineNo">454</span>    return authorize(getTablePermissions(table).getUser(user.getShortName()), table, family,<a name="line.454"></a>
-<span class="sourceLineNo">455</span>        qualifier, action);<a name="line.455"></a>
-<span class="sourceLineNo">456</span>  }<a name="line.456"></a>
-<span class="sourceLineNo">457</span><a name="line.457"></a>
-<span class="sourceLineNo">458</span>  /**<a name="line.458"></a>
-<span class="sourceLineNo">459</span>   * Checks if the user has access to the full table or at least a family/qualifier<a name="line.459"></a>
-<span class="sourceLineNo">460</span>   * for the specified action.<a name="line.460"></a>
-<span class="sourceLineNo">461</span>   *<a name="line.461"></a>
-<span class="sourceLineNo">462</span>   * @param user<a name="line.462"></a>
-<span class="sourceLineNo">463</span>   * @param table<a name="line.463"></a>
-<span class="sourceLineNo">464</span>   * @param action<a name="line.464"></a>
-<span class="sourceLineNo">465</span>   * @return true if the user has access to the table, false otherwise<a name="line.465"></a>
-<span class="sourceLineNo">466</span>   */<a name="line.466"></a>
-<span class="sourceLineNo">467</span>  public boolean userHasAccess(User user, TableName table, Permission.Action action) {<a name="line.467"></a>
-<span class="sourceLineNo">468</span>    if (table == null) table = AccessControlLists.ACL_TABLE_NAME;<a name="line.468"></a>
-<span class="sourceLineNo">469</span>    // Global and namespace authorizations supercede table level<a name="line.469"></a>
-<span class="sourceLineNo">470</span>    if (authorize(user, table.getNamespaceAsString(), action)) {<a name="line.470"></a>
-<span class="sourceLineNo">471</span>      return true;<a name="line.471"></a>
-<span class="sourceLineNo">472</span>    }<a name="line.472"></a>
-<span class="sourceLineNo">473</span>    // Check table permissions<a name="line.473"></a>
-<span class="sourceLineNo">474</span>    return hasAccess(getTablePermissions(table).getUser(user.getShortName()), table, action);<a name="line.474"></a>
-<span class="sourceLineNo">475</span>  }<a name="line.475"></a>
-<span class="sourceLineNo">476</span><a name="line.476"></a>
-<span class="sourceLineNo">477</span>  /**<a name="line.477"></a>
-<span class="sourceLineNo">478</span>   * Checks global authorization for a given action for a group, based on the stored<a name="line.478"></a>
-<span class="sourceLineNo">479</span>   * permissions.<a name="line.479"></a>
-<span class="sourceLineNo">480</span>   */<a name="line.480"></a>
-<span class="sourceLineNo">481</span>  public boolean authorizeGroup(String groupName, Permission.Action action) {<a name="line.481"></a>
-<span class="sourceLineNo">482</span>    List&lt;Permission&gt; perms = globalCache.getGroup(groupName);<a name="line.482"></a>
-<span class="sourceLineNo">483</span>    if (LOG.isDebugEnabled()) {<a name="line.483"></a>
-<span class="sourceLineNo">484</span>      LOG.debug("authorizing " + (perms != null &amp;&amp; !perms.isEmpty() ? perms.get(0) : "") +<a name="line.484"></a>
-<span class="sourceLineNo">485</span>        " for " + action);<a name="line.485"></a>
-<span class="sourceLineNo">486</span>    }<a name="line.486"></a>
-<span class="sourceLineNo">487</span>    return authorize(perms, action);<a name="line.487"></a>
-<span class="sourceLineNo">488</span>  }<a name="line.488"></a>
-<span class="sourceLineNo">489</span><a name="line.489"></a>
-<span class="sourceLineNo">490</span>  /**<a name="line.490"></a>
-<span class="sourceLineNo">491</span>   * Checks authorization to a given table, column family and column for a group, based<a name="line.491"></a>
-<span class="sourceLineNo">492</span>   * on the stored permissions.<a name="line.492"></a>
-<span class="sourceLineNo">493</span>   * @param groupName<a name="line.493"></a>
-<span class="sourceLineNo">494</span>   * @param table<a name="line.494"></a>
-<span class="sourceLineNo">495</span>   * @param family<a name="line.495"></a>
-<span class="sourceLineNo">496</span>   * @param qualifier<a name="line.496"></a>
-<span class="sourceLineNo">497</span>   * @param action<a name="line.497"></a>
-<span class="sourceLineNo">498</span>   * @return true if known and authorized, false otherwise<a name="line.498"></a>
-<span class="sourceLineNo">499</span>   */<a name="line.499"></a>
-<span class="sourceLineNo">500</span>  public boolean authorizeGroup(String groupName, TableName table, byte[] family,<a name="line.500"></a>
-<span class="sourceLineNo">501</span>      byte[] qualifier, Permission.Action action) {<a name="line.501"></a>
-<span class="sourceLineNo">502</span>    // Global authorization supercedes table level<a name="line.502"></a>
-<span class="sourceLineNo">503</span>    if (authorizeGroup(groupName, action)) {<a name="line.503"></a>
-<span class="sourceLineNo">504</span>      return true;<a name="line.504"></a>
-<span class="sourceLineNo">505</span>    }<a name="line.505"></a>
-<span class="sourceLineNo">506</span>    if (table == null) table = AccessControlLists.ACL_TABLE_NAME;<a name="line.506"></a>
-<span class="sourceLineNo">507</span>    // Namespace authorization supercedes table level<a name="line.507"></a>
-<span class="sourceLineNo">508</span>    String namespace = table.getNamespaceAsString();<a name="line.508"></a>
-<span class="sourceLineNo">509</span>    if (authorize(getNamespacePermissions(namespace).getGroup(groupName), namespace, action)) {<a name="line.509"></a>
-<span class="sourceLineNo">510</span>      return true;<a name="line.510"></a>
-<span class="sourceLineNo">511</span>    }<a name="line.511"></a>
-<span class="sourceLineNo">512</span>    // Check table level<a name="line.512"></a>
-<span class="sourceLineNo">513</span>    List&lt;TablePermission&gt; tblPerms = getTablePermissions(table).getGroup(groupName);<a name="line.513"></a>
-<span class="sourceLineNo">514</span>    if (LOG.isDebugEnabled()) {<a name="line.514"></a>
-<span class="sourceLineNo">515</span>      LOG.debug("authorizing " + (tblPerms != null &amp;&amp; !tblPerms.isEmpty() ? tblPerms.get(0) : "") +<a name="line.515"></a>
-<span class="sourceLineNo">516</span>        " for " +groupName + " on " + table + "." + Bytes.toString(family) + "." +<a name="line.516"></a>
-<span class="sourceLineNo">517</span>        Bytes.toString(qualifier) + " with " + action);<a name="line.517"></a>
-<span class="sourceLineNo">518</span>    }<a name="line.518"></a>
-<span class="sourceLineNo">519</span>    return authorize(tblPerms, table, family, qualifier, action);<a name="line.519"></a>
-<span class="sourceLineNo">520</span>  }<a name="line.520"></a>
-<span class="sourceLineNo">521</span><a name="line.521"></a>
-<span class="sourceLineNo">522</span>  /**<a name="line.522"></a>
-<span class="sourceLineNo">523</span>   * Checks if the user has access to the full table or at least a family/qualifier<a name="line.523"></a>
-<span class="sourceLineNo">524</span>   * for the specified action.<a name="line.524"></a>
-<span class="sourceLineNo">525</span>   * @param groupName<a name="line.525"></a>
-<span class="sourceLineNo">526</span>   * @param table<a name="line.526"></a>
-<span class="sourceLineNo">527</span>   * @param action<a name="line.527"></a>
-<span class="sourceLineNo">528</span>   * @return true if the group has access to the table, false otherwise<a name="line.528"></a>
-<span class="sourceLineNo">529</span>   */<a name="line.529"></a>
-<span class="sourceLineNo">530</span>  public boolean groupHasAccess(String groupName, TableName table, Permission.Action action) {<a name="line.530"></a>
-<span class="sourceLineNo">531</span>    // Global authorization supercedes table level<a name="line.531"></a>
-<span class="sourceLineNo">532</span>    if (authorizeGroup(groupName, action)) {<a name="line.532"></a>
-<span class="sourceLineNo">533</span>      return true;<a name="line.533"></a>
-<span class="sourceLineNo">534</span>    }<a name="line.534"></a>
-<span class="sourceLineNo">535</span>    if (table == null) table = AccessControlLists.ACL_TABLE_NAME;<a name="line.535"></a>
-<span class="sourceLineNo">536</span>    // Namespace authorization supercedes table level<a name="line.536"></a>
-<span class="sourceLineNo">537</span>    if (hasAccess(getNamespacePermissions(table.getNamespaceAsString()).getGroup(groupName),<a name="line.537"></a>
-<span class="sourceLineNo">538</span>        table, action)) {<a name="line.538"></a>
-<span class="sourceLineNo">539</span>      return true;<a name="line.539"></a>
-<span class="sourceLineNo">540</span>    }<a name="line.540"></a>
-<span class="sourceLineNo">541</span>    // Check table level<a name="line.541"></a>
-<span class="sourceLineNo">542</span>    return hasAccess(getTablePermissions(table).getGroup(groupName), table, action);<a name="line.542"></a>
-<span class="sourceLineNo">543</span>  }<a name="line.543"></a>
-<span class="sourceLineNo">544</span><a name="line.544"></a>
-<span class="sourceLineNo">545</span>  public boolean authorize(User user, TableName table, byte[] family,<a name="line.545"></a>
-<span class="sourceLineNo">546</span>      byte[] qualifier, Permission.Action action) {<a name="line.546"></a>
-<span class="sourceLineNo">547</span>    if (authorizeUser(user, table, family, qualifier, action)) {<a name="line.547"></a>
-<span class="sourceLineNo">548</span>      return true;<a name="line.548"></a>
-<span class="sourceLineNo">549</span>    }<a name="line.549"></a>
-<span class="sourceLineNo">550</span><a name="line.550"></a>
-<span class="sourceLineNo">551</span>    String[] groups = user.getGroupNames();<a name="line.551"></a>
-<span class="sourceLineNo">552</span>    if (groups != null) {<a name="line.552"></a>
-<span class="sourceLineNo">553</span>      for (String group : groups) {<a name="line.553"></a>
-<span class="sourceLineNo">554</span>        if (authorizeGroup(group, table, family, qualifier, action)) {<a name="line.554"></a>
-<span class="sourceLineNo">555</span>          return true;<a name="line.555"></a>
-<span class="sourceLineNo">556</span>        }<a name="line.556"></a>
-<span class="sourceLineNo">557</span>      }<a name="line.557"></a>
-<span class="sourceLineNo">558</span>    }<a name="line.558"></a>
-<span class="sourceLineNo">559</span>    return false;<a name="line.559"></a>
-<span class="sourceLineNo">560</span>  }<a name="line.560"></a>
-<span class="sourceLineNo">561</span><a name="line.561"></a>
-<span class="sourceLineNo">562</span>  public boolean hasAccess(User user, TableName table, Permission.Action action) {<a name="line.562"></a>
-<span class="sourceLineNo">563</span>    if (userHasAccess(user, table, action)) {<a name="line.563"></a>
-<span class="sourceLineNo">564</span>      return true;<a name="line.564"></a>
-<span class="sourceLineNo">565</span>    }<a name="line.565"></a>
-<span class="sourceLineNo">566</span><a name="line.566"></a>
-<span class="sourceLineNo">567</span>    String[] groups = user.getGroupNames();<a name="line.567"></a>
-<span class="sourceLineNo">568</span>    if (groups != null) {<a name="line.568"></a>
-<span class="sourceLineNo">569</span>      for (String group : groups) {<a name="line.569"></a>
-<span class="sourceLineNo">570</span>        if (groupHasAccess(group, table, action)) {<a name="line.570"></a>
-<span class="sourceLineNo">571</span>          return true;<a name="line.571"></a>
-<span class="sourceLineNo">572</span>        }<a name="line.572"></a>
-<span class="sourceLineNo">573</span>      }<a name="line.573"></a>
-<span class="sourceLineNo">574</span>    }<a name="line.574"></a>
-<span class="sourceLineNo">575</span>    return false;<a name="line.575"></a>
-<span class="sourceLineNo">576</span>  }<a name="line.576"></a>
-<span class="sourceLineNo">577</span><a name="line.577"></a>
-<span class="sourceLineNo">578</span>  public boolean authorize(User user, TableName table, byte[] family,<a name="line.578"></a>
-<span class="sourceLineNo">579</span>      Permission.Action action) {<a name="line.579"></a>
-<span class="sourceLineNo">580</span>    return authorize(user, table, family, null, action);<a name="line.580"></a>
-<span class="sourceLineNo">581</span>  }<a name="line.581"></a>
-<span class="sourceLineNo">582</span><a name="line.582"></a>
-<span class="sourceLineNo">583</span>  /**<a name="line.583"></a>
-<span class="sourceLineNo">584</span>   * Returns true if the given user has a {@link TablePermission} matching up<a name="line.584"></a>
-<span class="sourceLineNo">585</span>   * to the column family portion of a permission.  Note that this permission<a name="line.585"></a>
-<span class="sourceLineNo">586</span>   * may be scoped to a given column qualifier and does not guarantee that<a name="line.586"></a>
-<span class="sourceLineNo">587</span>   * authorize() on the same column family would return true.<a name="line.587"></a>
-<span class="sourceLineNo">588</span>   */<a name="line.588"></a>
-<span class="sourceLineNo">589</span>  public boolean matchPermission(User user,<a name="line.589"></a>
-<span class="sourceLineNo">590</span>      TableName table, byte[] family, Permission.Action action) {<a name="line.590"></a>
-<span class="sourceLineNo">591</span>    PermissionCache&lt;TablePermission&gt; tablePerms = tableCache.get(table);<a name="line.591"></a>
-<span class="sourceLineNo">592</span>    if (tablePerms != null) {<a name="line.592"></a>
-<span class="sourceLineNo">593</span>      List&lt;TablePermission&gt; userPerms = tablePerms.getUser(user.getShortName());<a name="line.593"></a>
-<span class="sourceLineNo">594</span>      if (userPerms != null) {<a name="line.594"></a>
-<span class="sourceLineNo">595</span>        for (TablePermission p : userPerms) {<a name="line.595"></a>
-<span class="sourceLineNo">596</span>          if (p.matchesFamily(table, family, action)) {<a name="line.596"></a>
-<span class="sourceLineNo">597</span>            return true;<a name="line.597"></a>
-<span class="sourceLineNo">598</span>          }<a name="line.598"></a>
-<span class="sourceLineNo">599</span>        }<a name="line.599"></a>
-<span class="sourceLineNo">600</span>      }<a name="line.600"></a>
-<span class="sourceLineNo">601</span><a name="line.601"></a>
-<span class="sourceLineNo">602</span>      String[] groups = user.getGroupNames();<a name="line.602"></a>
-<span class="sourceLineNo">603</span>      if (groups != null) {<a name="line.603"></a>
-<span class="sourceLineNo">604</span>        for (String group : groups) {<a name="line.604"></a>
-<span class="sourceLineNo">605</span>          List&lt;TablePermission&gt; groupPerms = tablePerms.getGroup(group);<a name="line.605"></a>
-<span class="sourceLineNo">606</span>          if (groupPerms != null) {<a name="line.606"></a>
-<span class="sourceLineNo">607</span>            for (TablePermission p : groupPerms) {<a name="line.607"></a>
-<span class="sourceLineNo">608</span>              if (p.matchesFamily(table, family, action)) {<a name="line.608"></a>
-<span class="sourceLineNo">609</span>                return true;<a name="line.609"></a>
-<span class="sourceLineNo">610</span>              }<a name="line.610"></a>
-<span class="sourceLineNo">611</span>            }<a name="line.611"></a>
-<span class="sourceLineNo">612</span>          }<a name="line.612"></a>
-<span class="sourceLineNo">613</span>        }<a name="line.613"></a>
-<span class="sourceLineNo">614</span>      }<a name="line.614"></a>
-<span class="sourceLineNo">615</span>    }<a name="line.615"></a>
-<span class="sourceLineNo">616</span><a name="line.616"></a>
-<span class="sourceLineNo">617</span>    return false;<a name="line.617"></a>
-<span class="sourceLineNo">618</span>  }<a name="line.618"></a>
-<span class="sourceLineNo">619</span><a name="line.619"></a>
-<span class="sourceLineNo">620</span>  public boolean matchPermission(User user,<a name="line.620"></a>
-<span class="sourceLineNo">621</span>      TableName table, byte[] family, byte[] qualifier,<a name="line.621"></a>
-<span class="sourceLineNo">622</span>      Permission.Action action) {<a name="line.622"></a>
-<span class="sourceLineNo">623</span>    PermissionCache&lt;TablePermission&gt; tablePerms = tableCache.get(table);<a name="line.623"></a>
-<span class="sourceLineNo">624</span>    if (tablePerms != null) {<a name="line.624"></a>
-<span class="sourceLineNo">625</span>      List&lt;TablePermission&gt; userPerms = tablePerms.getUser(user.getShortName());<a name="line.625"></a>
-<span class="sourceLineNo">626</span>      if (userPerms != null) {<a name="line.626"></a>
-<span class="sourceLineNo">627</span>        for (TablePermission p : userPerms) {<a name="line.627"></a>
-<span class="sourceLineNo">628</span>          if (p.matchesFamilyQualifier(table, family, qualifier, action)) {<a name="line.628"></a>
-<span class="sourceLineNo">629</span>            return true;<a name="line.629"></a>
-<span class="sourceLineNo">630</span>          }<a name="line.630"></a>
-<span class="sourceLineNo">631</span>        }<a name="line.631"></a>
-<span class="sourceLineNo">632</span>      }<a name="line.632"></a>
-<span class="sourceLineNo">633</span><a name="line.633"></a>
-<span class="sourceLineNo">634</span>      String[] groups = user.getGroupNames();<a name="line.634"></a>
-<span class="sourceLineNo">635</span>      if (groups != null) {<a name="line.635"></a>
-<span class="sourceLineNo">636</span>        for (String group : groups) {<a name="line.636"></a>
-<span class="sourceLineNo">637</span>          List&lt;TablePermission&gt; groupPerms = tablePerms.getGroup(group);<a name="line.637"></a>
-<span class="sourceLineNo">638</span>          if (groupPerms != null) {<a name="line.638"></a>
-<span class="sourceLineNo">639</span>            for (TablePermission p : groupPerms) {<a name="line.639"></a>
-<span class="sourceLineNo">640</span>              if (p.matchesFamilyQualifier(table, family, qualifier, action)) {<a name="line.640"></a>
-<span class="sourceLineNo">641</span>                return true;<a name="line.641"></a>
-<span class="sourceLineNo">642</span>              }<a name="line.642"></a>
-<span class="sourceLineNo">643</span>            }<a name="line.643"></a>
-<span class="sourceLineNo">644</span>          }<a name="line.644"></a>
-<span class="sourceLineNo">645</span>        }<a name="line.645"></a>
-<span class="sourceLineNo">646</span>      }<a name="line.646"></a>
-<span class="sourceLineNo">647</span>    }<a name="line.647"></a>
-<span class="sourceLineNo">648</span>    return false;<a name="line.648"></a>
-<span class="sourceLineNo">649</span>  }<a name="line.649"></a>
-<span class="sourceLineNo">650</span><a name="line.650"></a>
-<span class="sourceLineNo">651</span>  public void removeNamespace(byte[] ns) {<a name="line.651"></a>
-<span class="sourceLineNo">652</span>    nsCache.remove(Bytes.toString(ns));<a name="line.652"></a>
-<span class="sourceLineNo">653</span>  }<a name="line.653"></a>
-<span class="sourceLineNo">654</span><a name="line.654"></a>
-<span class="sourceLineNo">655</span>  public void removeTable(TableName table) {<a name="line.655"></a>
-<span class="sourceLineNo">656</span>    tableCache.remove(table);<a name="line.656"></a>
-<span class="sourceLineNo">657</span>  }<a name="line.657"></a>
-<span class="sourceLineNo">658</span><a name="line.658"></a>
-<span class="sourceLineNo">659</span>  /**<a name="line.659"></a>
-<span class="sourceLineNo">660</span>   * Overwrites the existing permission set for a given user for a table, and<a name="line.660"></a>
-<span class="sourceLineNo">661</span>   * triggers an update for zookeeper synchronization.<a name="line.661"></a>
-<span class="sourceLineNo">662</span>   * @param username<a name="line.662"></a>
-<span class="sourceLineNo">663</span>   * @param table<a name="line.663"></a>
-<span class="sourceLineNo">664</span>   * @param perms<a name="line.664"></a>
-<span class="sourceLineNo">665</span>   */<a name="line.665"></a>
-<span class="sourceLineNo">666</span>  public void setTableUserPermissions(String username, TableName table,<a name="line.666"></a>
-<span class="sourceLineNo">667</span>      List&lt;TablePermission&gt; perms) {<a name="line.667"></a>
-<span class="sourceLineNo">668</span>    PermissionCache&lt;TablePermission&gt; tablePerms = getTablePermissions(table);<a name="line.668"></a>
-<span class="sourceLineNo">669</span>    tablePerms.replaceUser(username, perms);<a name="line.669"></a>
-<span class="sourceLineNo">670</span>    writeTableToZooKeeper(table, tablePerms);<a name="line.670"></a>
-<span class="sourceLineNo">671</span>  }<a name="line.671"></a>
-<span class="sourceLineNo">672</span><a name="line.672"></a>
-<span class="sourceLineNo">673</span>  /**<a name="line.673"></a>
-<span class="sourceLineNo">674</span>   * Overwrites the existing permission set for a group and triggers an update<a name="line.674"></a>
-<span class="sourceLineNo">675</span>   * for zookeeper synchronization.<a name="line.675"></a>
-<span class="sourceLineNo">676</span>   * @param group<a name="line.676"></a>
-<span class="sourceLineNo">677</span>   * @param table<a name="line.677"></a>
-<span class="sourceLineNo">678</span>   * @param perms<a name="line.678"></a>
-<span class="sourceLineNo">679</span>   */<a name="line.679"></a>
-<span class="sourceLineNo">680</span>  public void setTableGroupPermissions(String group, TableName table,<a name="line.680"></a>
-<span class="sourceLineNo">681</span>      List&lt;TablePermission&gt; perms) {<a name="line.681"></a>
-<span class="sourceLineNo">682</span>    PermissionCache&lt;TablePermission&gt; tablePerms = getTablePermissions(table);<a name="line.682"></a>
-<span class="sourceLineNo">683</span>    tablePerms.replaceGroup(group, perms);<a name="line.683"></a>
-<span class="sourceLineNo">684</span>    writeTableToZooKeeper(table, tablePerms);<a name="line.684"></a>
-<span class="sourceLineNo">685</span>  }<a name="line.685"></a>
-<span class="sourceLineNo">686</span><a name="line.686"></a>
-<span class="sourceLineNo">687</span>  /**<a name="line.687"></a>
-<span class="sourceLineNo">688</span>   * Overwrites the existing permission set for a given user for a table, and<a name="line.688"></a>
-<span class="sourceLineNo">689</span>   * triggers an update for zookeeper synchronization.<a name="line.689"></a>
-<span class="sourceLineNo">690</span>   * @param username<a name="line.690"></a>
-<span class="sourceLineNo">691</span>   * @param namespace<a name="line.691"></a>
-<span class="sourceLineNo">692</span>   * @param perms<a name="line.692"></a>
-<span class="sourceLineNo">693</span>   */<a name="line.693"></a>
-<span class="sourceLineNo">694</span>  public void setNamespaceUserPermissions(String username, String namespace,<a name="line.694"></a>
-<span class="sourceLineNo">695</span>      List&lt;TablePermission&gt; perms) {<a name="line.695"></a>
-<span class="sourceLineNo">696</span>    PermissionCache&lt;TablePermission&gt; tablePerms = getNamespacePermissions(namespace);<a name="line.696"></a>
-<span class="sourceLineNo">697</span>    tablePerms.replaceUser(username, perms);<a name="line.697"></a>
-<span class="sourceLineNo">698</span>    writeNamespaceToZooKeeper(namespace, tablePerms);<a name="line.698"></a>
-<span class="sourceLineNo">699</span>  }<a name="line.699"></a>
-<span class="sourceLineNo">700</span><a name="line.700"></a>
-<span class="sourceLineNo">701</span>  /**<a name="line.701"></a>
-<span class="sourceLineNo">702</span>   * Overwrites the existing permission set for a group and triggers an update<a name="line.702"></a>
-<span class="sourceLineNo">703</span>   * for zookeeper synchronization.<a name="line.703"></a>
-<span class="sourceLineNo">704</span>   * @param group<a name="line.704"></a>
-<span class="sourceLineNo">705</span>   * @param namespace<a name="line.705"></a>
-<span class="sourceLineNo">706</span>   * @param perms<a name="line.706"></a>
-<span class="sourceLineNo">707</span>   */<a name="line.707"></a>
-<span class="sourceLineNo">708</span>  public void setNamespaceGroupPermissions(String group, String namespace,<a name="line.708"></a>
-<span class="sourceLineNo">709</span>      List&lt;TablePermission&gt; perms) {<a name="line.709"></a>
-<span class="sourceLineNo">710</span>    PermissionCache&lt;TablePermission&gt; tablePerms = getNamespacePermissions(namespace);<a name="line.710"></a>
-<span class="sourceLineNo">711</span>    tablePerms.replaceGroup(group, perms);<a name="line.711"></a>
-<span class="sourceLineNo">712</span>    writeNamespaceToZooKeeper(namespace, tablePerms);<a name="line.712"></a>
-<span class="sourceLineNo">713</span>  }<a name="line.713"></a>
-<span class="sourceLineNo">714</span><a name="line.714"></a>
-<span class="sourceLineNo">715</span>  public void writeTableToZooKeeper(TableName table,<a name="line.715"></a>
-<span class="sourceLineNo">716</span>      PermissionCache&lt;TablePermission&gt; tablePerms) {<a name="line.716"></a>
-<span class="sourceLineNo">717</span>    byte[] serialized = new byte[0];<a name="line.717"></a>
-<span class="sourceLineNo">718</span>    if (tablePerms != null) {<a name="line.718"></a>
-<span class="sourceLineNo">719</span>      serialized = AccessControlLists.writePermissionsAsBytes(tablePerms.getAllPermissions(), conf);<a name="line.719"></a>
-<span class="sourceLineNo">720</span>    }<a name="line.720"></a>
-<span class="sourceLineNo">721</span>    zkperms.writeToZookeeper(table.getName(), serialized);<a name="line.721"></a>
-<span class="sourceLineNo">722</span>  }<a name="line.722"></a>
-<span class="sourceLineNo">723</span><a name="line.723"></a>
-<span class="sourceLineNo">724</span>  public void writeNamespaceToZooKeeper(String namespace,<a name="line.724"></a>
-<span class="sourceLineNo">725</span>      PermissionCache&lt;TablePermission&gt; tablePerms) {<a name="line.725"></a>
-<span class="sourceLineNo">726</span>    byte[] serialized = new byte[0];<a name="line.726"></a>
-<span class="sourceLineNo">727</span>    if (tablePerms != null) {<a name="line.727"></a>
-<span class="sourceLineNo">728</span>      serialized = AccessControlLists.writePermissionsAsBytes(tablePerms.getAllPermissions(), conf);<a name="line.728"></a>
-<span class="sourceLineNo">729</span>    }<a name="line.729"></a>
-<span class="sourceLineNo">730</span>    zkperms.writeToZookeeper(Bytes.toBytes(AccessControlLists.toNamespaceEntry(namespace)),<a name="line.730"></a>
-<span class="sourceLineNo">731</span>        serialized);<a name="line.731"></a>
-<span class="sourceLineNo">732</span>  }<a name="line.732"></a>
-<span class="sourceLineNo">733</span><a name="line.733"></a>
-<span class="sourceLineNo">734</span>  public long getMTime() {<a name="line.734"></a>
-<span class="sourceLineNo">735</span>    return mtime.get();<a name="line.735"></a>
-<span class="sourceLineNo">736</span>  }<a name="line.736"></a>
-<span class="sourceLineNo">737</span><a name="line.737"></a>
-<span class="sourceLineNo">738</span>  private static Map&lt;ZKWatcher,TableAuthManager&gt; managerMap = new HashMap&lt;&gt;();<a name="line.738"></a>
-<span class="sourceLineNo">739</span><a name="line.739"></a>
-<span class="sourceLineNo">740</span>  private static Map&lt;TableAuthManager, Integer&gt; refCount = new HashMap&lt;&gt;();<a name="line.740"></a>
-<span class="sourceLineNo">741</span><a name="line.741"></a>
-<span class="sourceLineNo">742</span>  /** Returns a TableAuthManager from the cache. If not cached, constructs a new one. Returned<a name="line.742"></a>
-<span class="sourceLineNo">743</span>   * instance should be released back by calling {@link #release(TableAuthManager)}. */<a name="line.743"></a>
-<span class="sourceLineNo">744</span>  public synchronized static TableAuthManager getOrCreate(<a name="line.744"></a>
-<span class="sourceLineNo">745</span>          ZKWatcher watcher, Configuration conf) throws IOException {<a name="line.745"></a>
-<span class="sourceLineNo">746</span>    TableAuthManager instance = managerMap.get(watcher);<a name="line.746"></a>
-<span class="sourceLineNo">747</span>    if (instance == null) {<a name="line.747"></a>
-<span class="sourceLineNo">748</span>      instance = new TableAuthManager(watcher, conf);<a name="line.748"></a>
-<span class="sourceLineNo">749</span>      managerMap.put(watcher, instance);<a name="line.749"></a>
-<span class="sourceLineNo">750</span>    }<a name="line.750"></a>
-<span class="sourceLineNo">751</span>    int ref = refCount.get(instance) == null ? 0 : refCount.get(instance).intValue();<a name="line.751"></a>
-<span class="sourceLineNo">752</span>    refCount.put(instance, ref + 1);<a name="line.752"></a>
-<span class="sourceLineNo">753</span>    return instance;<a name="line.753"></a>
-<span class="sourceLineNo">754</span>  }<a name="line.754"></a>
-<span class="sourceLineNo">755</span><a name="line.755"></a>
-<span class="sourceLineNo">756</span>  @VisibleForTesting<a name="line.756"></a>
-<span class="sourceLineNo">757</span>  public static int getTotalRefCount() {<a name="line.757"></a>
-<span class="sourceLineNo">758</span>    int total = 0;<a name="line.758"></a>
-<span class="sourceLineNo">759</span>    for (int count : refCount.values()) {<a name="line.759"></a>
-<span class="sourceLineNo">760</span>      total += count;<a name="line.760"></a>
-<span class="sourceLineNo">761</span>    }<a name="line.761"></a>
-<span class="sourceLineNo">762</span>    return total;<a name="line.762"></a>
-<span class="sourceLineNo">763</span>  }<a name="line.763"></a>
-<span class="sourceLineNo">764</span><a name="line.764"></a>
-<span class="sourceLineNo">765</span>  /**<a name="line.765"></a>
-<span class="sourceLineNo">766</span>   * Releases the resources for the given TableAuthManager if the reference count is down to 0.<a name="line.766"></a>
-<span class="sourceLineNo">767</span>   * @param instance TableAuthManager to be released<a name="line.767"></a>
-<span class="sourceLineNo">768</span>   */<a name="line.768"></a>
-<span class="sourceLineNo">769</span>  public synchronized static void release(TableAuthManager instance) {<a name="line.769"></a>
-<span class="sourceLineNo">770</span>    if (refCount.get(instance) == null || refCount.get(instance) &lt; 1) {<a name="line.770"></a>
-<span class="sourceLineNo">771</span>      String msg = "Something wrong with the TableAuthManager reference counting: " + instance<a name="line.771"></a>
-<span class="sourceLineNo">772</span>          + " whose count is " + refCount.get(instance);<a name="line.772"></a>
-<span class="sourceLineNo">773</span>      LOG.error(HBaseMarkers.FATAL, msg);<a name="line.773"></a>
-<span class="sourceLineNo">774</span>      instance.close();<a name="line.774"></a>
-<span class="sourceLineNo">775</span>      managerMap.remove(instance.getZKPermissionWatcher().getWatcher());<a name="line.775"></a>
-<span class="sourceLineNo">776</span>      instance.getZKPermissionWatcher().getWatcher().abort(msg, null);<a name="line.776"></a>
-<span class="sourceLineNo">777</span>    } else {<a name="line.777"></a>
-<span class="sourceLineNo">778</span>      int ref = refCount.get(instance);<a name="line.778"></a>
-<span class="sourceLineNo">779</span>      refCount.put(instance, ref-1);<a name="line.779"></a>
-<span class="sourceLineNo">780</span>      if (ref-1 == 0) {<a name="line.780"></a>
-<span class="sourceLineNo">781</span>        instance.close();<a name="line.781"></a>
-<span class="sourceLineNo">782</span>        managerMap.remove(instance.getZKPermissionWatcher().getWatcher());<a name="line.782"></a>
-<span class="sourceLineNo">783</span>        refCount.remove(instance);<a name="line.783"></a>
-<span class="sourceLineNo">784</span>      }<a name="line.784"></a>
-<span class="sourceLineNo">785</span>    }<a name="line.785"></a>
-<span class="sourceLineNo">786</span>  }<a name="line.786"></a>
-<span class="sourceLineNo">787</span>}<a name="line.787"></a>
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-</pre>
-</div>
-</body>
-</html>