com.facebook.presto.jdbc.internal.spi.security.SystemAccessControl Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.facebook.presto.jdbc.internal.spi.security;
import com.facebook.presto.jdbc.internal.common.CatalogSchemaName;
import com.facebook.presto.jdbc.internal.spi.CatalogSchemaTableName;
import com.facebook.presto.jdbc.internal.spi.SchemaTableName;
import java.security.Principal;
import java.security.cert.X509Certificate;
import java.util.Collections;
import java.util.List;
import java.util.Optional;
import java.util.Set;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyAddColumn;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyCatalogAccess;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyCreateSchema;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyCreateTable;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyCreateView;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyCreateViewWithSelect;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyDeleteTable;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyDropColumn;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyDropSchema;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyDropTable;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyDropView;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyGrantTablePrivilege;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyInsertTable;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyRenameColumn;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyRenameSchema;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyRenameTable;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyRevokeTablePrivilege;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denySelectColumns;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denySetCatalogSessionProperty;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyShowSchemas;
import static com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException.denyShowTablesMetadata;
public interface SystemAccessControl
{
/**
* Check if the principal is allowed to be the specified user.
*
* @throws AccessDeniedException if not allowed
*/
void checkCanSetUser(Identity identity, AccessControlContext context, Optional principal, String userName);
default AuthorizedIdentity selectAuthorizedIdentity(Identity identity, AccessControlContext context, String userName, List certificates)
{
return new AuthorizedIdentity(userName, "", true);
}
/**
* Check if the query is unexpectedly modified using the credentials passed in the identity.
*
* @throws AccessDeniedException if query is modified.
*/
void checkQueryIntegrity(Identity identity, AccessControlContext context, String query);
/**
* Check if identity is allowed to set the specified system property.
*
* @throws AccessDeniedException if not allowed
*/
void checkCanSetSystemSessionProperty(Identity identity, AccessControlContext context, String propertyName);
/**
* Check if identity is allowed to access the specified catalog
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanAccessCatalog(Identity identity, AccessControlContext context, String catalogName)
{
denyCatalogAccess(catalogName);
}
/**
* Filter the list of catalogs to those visible to the identity.
*/
default Set filterCatalogs(Identity identity, AccessControlContext context, Set catalogs)
{
return Collections.emptySet();
}
/**
* Check if identity is allowed to create the specified schema in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanCreateSchema(Identity identity, AccessControlContext context, CatalogSchemaName schema)
{
denyCreateSchema(schema.toString());
}
/**
* Check if identity is allowed to drop the specified schema in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanDropSchema(Identity identity, AccessControlContext context, CatalogSchemaName schema)
{
denyDropSchema(schema.toString());
}
/**
* Check if identity is allowed to rename the specified schema in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanRenameSchema(Identity identity, AccessControlContext context, CatalogSchemaName schema, String newSchemaName)
{
denyRenameSchema(schema.toString(), newSchemaName);
}
/**
* Check if identity is allowed to execute SHOW SCHEMAS in a catalog.
*
* NOTE: This method is only present to give users an error message when listing is not allowed.
* The {@link #filterSchemas} method must filter all results for unauthorized users,
* since there are multiple ways to list schemas.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanShowSchemas(Identity identity, AccessControlContext context, String catalogName)
{
denyShowSchemas();
}
/**
* Filter the list of schemas in a catalog to those visible to the identity.
*/
default Set filterSchemas(Identity identity, AccessControlContext context, String catalogName, Set schemaNames)
{
return Collections.emptySet();
}
/**
* Check if identity is allowed to create the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanCreateTable(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyCreateTable(table.toString());
}
/**
* Check if identity is allowed to drop the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanDropTable(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyDropTable(table.toString());
}
/**
* Check if identity is allowed to rename the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanRenameTable(Identity identity, AccessControlContext context, CatalogSchemaTableName table, CatalogSchemaTableName newTable)
{
denyRenameTable(table.toString(), newTable.toString());
}
/**
* Check if identity is allowed to show metadata of tables by executing SHOW TABLES, SHOW GRANTS etc. in a catalog.
*
* NOTE: This method is only present to give users an error message when listing is not allowed.
* The {@link #filterTables} method must filter all results for unauthorized users,
* since there are multiple ways to list tables.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanShowTablesMetadata(Identity identity, AccessControlContext context, CatalogSchemaName schema)
{
denyShowTablesMetadata(schema.toString());
}
/**
* Filter the list of tables and views to those visible to the identity.
*/
default Set filterTables(Identity identity, AccessControlContext context, String catalogName, Set tableNames)
{
return Collections.emptySet();
}
/**
* Check if identity is allowed to add columns to the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanAddColumn(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyAddColumn(table.toString());
}
/**
* Check if identity is allowed to drop columns from the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanDropColumn(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyDropColumn(table.toString());
}
/**
* Check if identity is allowed to rename a column in the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanRenameColumn(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyRenameColumn(table.toString());
}
/**
* Check if identity is allowed to select from the specified columns in a relation. The column set can be empty.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanSelectFromColumns(Identity identity, AccessControlContext context, CatalogSchemaTableName table, Set columns)
{
denySelectColumns(table.toString(), columns);
}
/**
* Check if identity is allowed to insert into the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanInsertIntoTable(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyInsertTable(table.toString());
}
/**
* Check if identity is allowed to delete from the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanDeleteFromTable(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyDeleteTable(table.toString());
}
/**
* Check if identity is allowed to truncate the specified table in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanTruncateTable(Identity identity, AccessControlContext context, CatalogSchemaTableName table)
{
denyDeleteTable(table.toString());
}
/**
* Check if identity is allowed to create the specified view in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanCreateView(Identity identity, AccessControlContext context, CatalogSchemaTableName view)
{
denyCreateView(view.toString());
}
/**
* Check if identity is allowed to drop the specified view in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanDropView(Identity identity, AccessControlContext context, CatalogSchemaTableName view)
{
denyDropView(view.toString());
}
/**
* Check if identity is allowed to create a view that selects from the specified columns in a relation.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanCreateViewWithSelectFromColumns(Identity identity, AccessControlContext context, CatalogSchemaTableName table, Set columns)
{
denyCreateViewWithSelect(table.toString(), identity);
}
/**
* Check if identity is allowed to set the specified property in a catalog.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanSetCatalogSessionProperty(Identity identity, AccessControlContext context, String catalogName, String propertyName)
{
denySetCatalogSessionProperty(propertyName);
}
/**
* Check if identity is allowed to grant the specified privilege to the grantee on the specified table.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanGrantTablePrivilege(Identity identity, AccessControlContext context, Privilege privilege, CatalogSchemaTableName table, PrestoPrincipal grantee, boolean withGrantOption)
{
denyGrantTablePrivilege(privilege.toString(), table.toString());
}
/**
* Check if identity is allowed to revoke the specified privilege on the specified table from the revokee.
*
* @throws com.facebook.presto.jdbc.internal.spi.security.AccessDeniedException if not allowed
*/
default void checkCanRevokeTablePrivilege(Identity identity, AccessControlContext context, Privilege privilege, CatalogSchemaTableName table, PrestoPrincipal revokee, boolean grantOptionFor)
{
denyRevokeTablePrivilege(privilege.toString(), table.toString());
}
}