org.apache.cassandra.auth.Permission Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of cassandra-all Show documentation
Show all versions of cassandra-all Show documentation
The Apache Cassandra Project develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model.
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.cassandra.auth;
import java.util.EnumSet;
import java.util.Set;
import com.google.common.collect.ImmutableSet;
import com.google.common.collect.Sets;
/**
* An enum encapsulating the set of possible permissions that an authenticated user can have on a resource.
*
* IAuthorizer implementations may encode permissions using ordinals, so the Enum order must never change order.
* Adding new values is ok.
*/
public enum Permission
{
@Deprecated
READ,
@Deprecated
WRITE,
// schema and role management
// CREATE, ALTER and DROP permissions granted on an appropriate DataResource are required for
// CREATE KEYSPACE and CREATE TABLE.
// ALTER KEYSPACE, ALTER TABLE, CREATE INDEX and DROP INDEX require ALTER permission on the
// relevant DataResource.
// DROP KEYSPACE and DROP TABLE require DROP permission.
//
// In the context of Role management, these permissions may also be granted on a RoleResource.
// CREATE is only granted on the root-level role resource, and is required to create new roles.
// ALTER & DROP may be granted on either the root-level role resource, giving permissions on
// all roles, or on specific role-level resources.
CREATE,
ALTER,
DROP,
// data access
SELECT, // required for SELECT on a table
MODIFY, // required for INSERT, UPDATE, DELETE, TRUNCATE on a DataResource.
// permission management
AUTHORIZE, // required for GRANT and REVOKE of permissions or roles.
DESCRIBE, // required on the root-level RoleResource to list all Roles
// UDF permissions
EXECUTE; // required to invoke any user defined function or aggregate
public static final Set ALL =
Sets.immutableEnumSet(EnumSet.range(Permission.CREATE, Permission.EXECUTE));
public static final Set NONE = ImmutableSet.of();
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy