org.apache.cassandra.cql3.statements.CreateRoleStatement Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of cassandra-all Show documentation
Show all versions of cassandra-all Show documentation
The Apache Cassandra Project develops a highly scalable second-generation distributed database, bringing together Dynamo's fully distributed design and Bigtable's ColumnFamily-based data model.
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.cassandra.cql3.statements;
import org.apache.cassandra.audit.AuditLogContext;
import org.apache.cassandra.audit.AuditLogEntryType;
import org.apache.cassandra.auth.*;
import org.apache.cassandra.config.DatabaseDescriptor;
import org.apache.cassandra.cql3.PasswordObfuscator;
import org.apache.cassandra.cql3.RoleName;
import org.apache.cassandra.exceptions.*;
import org.apache.cassandra.service.ClientState;
import org.apache.cassandra.transport.messages.ResultMessage;
import org.apache.commons.lang3.builder.ToStringBuilder;
import org.apache.commons.lang3.builder.ToStringStyle;
public class CreateRoleStatement extends AuthenticationStatement
{
private final RoleResource role;
private final RoleOptions opts;
final DCPermissions dcPermissions;
final CIDRPermissions cidrPermissions;
private final boolean ifNotExists;
public CreateRoleStatement(RoleName name, RoleOptions options, DCPermissions dcPermissions,
CIDRPermissions cidrPermissions, boolean ifNotExists)
{
this.role = RoleResource.role(name.getName());
this.opts = options;
this.dcPermissions = dcPermissions;
this.cidrPermissions = cidrPermissions;
this.ifNotExists = ifNotExists;
}
public void authorize(ClientState state) throws UnauthorizedException
{
super.checkPermission(state, Permission.CREATE, RoleResource.root());
if (opts.getSuperuser().isPresent())
{
if (opts.getSuperuser().get() && !state.getUser().isSuper())
throw new UnauthorizedException("Only superusers can create a role with superuser status");
}
}
public void validate(ClientState state) throws RequestValidationException
{
opts.validate();
if (role.getRoleName().isEmpty())
throw new InvalidRequestException("Role name can't be an empty string");
if (dcPermissions != null)
{
dcPermissions.validate();
}
if (cidrPermissions != null)
{
cidrPermissions.validate();
}
// validate login here before authorize to avoid leaking role existence to anonymous users.
state.ensureNotAnonymous();
if (!ifNotExists && DatabaseDescriptor.getRoleManager().isExistingRole(role))
throw new InvalidRequestException(String.format("%s already exists", role.getRoleName()));
}
public ResultMessage execute(ClientState state) throws RequestExecutionException, RequestValidationException
{
// not rejected in validate()
if (ifNotExists && DatabaseDescriptor.getRoleManager().isExistingRole(role))
return null;
DatabaseDescriptor.getRoleManager().createRole(state.getUser(), role, opts);
if (DatabaseDescriptor.getNetworkAuthorizer().requireAuthorization())
{
DatabaseDescriptor.getNetworkAuthorizer().setRoleDatacenters(role, dcPermissions);
}
if (cidrPermissions != null)
DatabaseDescriptor.getCIDRAuthorizer().setCidrGroupsForRole(role, cidrPermissions);
grantPermissionsToCreator(state);
return null;
}
/**
* Grant all applicable permissions on the newly created role to the user performing the request
* see also: AlterTableStatement#createdResources() and the overridden implementations
* of it in subclasses CreateKeyspaceStatement & CreateTableStatement.
* @param state
*/
private void grantPermissionsToCreator(ClientState state)
{
// The creator of a Role automatically gets ALTER/DROP/AUTHORIZE/DESCRIBE permissions on it if:
// * the user is not anonymous
// * the configured IAuthorizer supports granting of permissions (not all do, AllowAllAuthorizer doesn't and
// custom external implementations may not)
if (!state.getUser().isAnonymous())
{
try
{
DatabaseDescriptor.getAuthorizer().grant(AuthenticatedUser.SYSTEM_USER,
role.applicablePermissions(),
role,
RoleResource.role(state.getUser().getName()));
}
catch (UnsupportedOperationException e)
{
// not a problem, grant is an optional method on IAuthorizer
}
}
}
@Override
public String toString()
{
return ToStringBuilder.reflectionToString(this, ToStringStyle.SHORT_PREFIX_STYLE);
}
@Override
public AuditLogContext getAuditLogContext()
{
return new AuditLogContext(AuditLogEntryType.CREATE_ROLE);
}
@Override
public String obfuscatePassword(String query)
{
return PasswordObfuscator.obfuscate(query, opts);
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy