org.apache.cassandra.auth.IAuthorizer Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of cassandra-unit-shaded Show documentation
Show all versions of cassandra-unit-shaded Show documentation
Shaded version of cassandra-unit
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.cassandra.auth;
import java.util.Set;
import org.apache.cassandra.exceptions.ConfigurationException;
import org.apache.cassandra.exceptions.RequestExecutionException;
import org.apache.cassandra.exceptions.RequestValidationException;
/**
* Primary Cassandra authorization interface.
*/
public interface IAuthorizer
{
/**
* Whether or not the authorizer will attempt authorization.
* If false the authorizer will not be called for authorization of resources.
*/
default boolean requireAuthorization()
{
return true;
}
/**
* Returns a set of permissions of a user on a resource.
* Since Roles were introduced in version 2.2, Cassandra does not distinguish in any
* meaningful way between users and roles. A role may or may not have login privileges
* and roles may be granted to other roles. In fact, Cassandra does not really have the
* concept of a user, except to link a client session to role. AuthenticatedUser can be
* thought of as a manifestation of a role, linked to a specific client connection.
*
* @param user Authenticated user requesting authorization.
* @param resource Resource for which the authorization is being requested. @see DataResource.
* @return Set of permissions of the user on the resource. Should never return null. Use Permission.NONE instead.
*/
Set authorize(AuthenticatedUser user, IResource resource);
/**
* Grants a set of permissions on a resource to a role.
* The opposite of revoke().
* This method is optional and may be called internally, so implementations which do
* not support it should be sure to throw UnsupportedOperationException.
*
* @param performer User who grants the permissions.
* @param permissions Set of permissions to grant.
* @param resource Resource on which to grant the permissions.
* @param grantee Role to which the permissions are to be granted.
*
* @throws RequestValidationException
* @throws RequestExecutionException
* @throws java.lang.UnsupportedOperationException
*/
void grant(AuthenticatedUser performer, Set permissions, IResource resource, RoleResource grantee)
throws RequestValidationException, RequestExecutionException;
/**
* Revokes a set of permissions on a resource from a user.
* The opposite of grant().
* This method is optional and may be called internally, so implementations which do
* not support it should be sure to throw UnsupportedOperationException.
*
* @param performer User who revokes the permissions.
* @param permissions Set of permissions to revoke.
* @param revokee Role from which to the permissions are to be revoked.
* @param resource Resource on which to revoke the permissions.
*
* @throws RequestValidationException
* @throws RequestExecutionException
* @throws java.lang.UnsupportedOperationException
*/
void revoke(AuthenticatedUser performer, Set permissions, IResource resource, RoleResource revokee)
throws RequestValidationException, RequestExecutionException;
/**
* Returns a list of permissions on a resource granted to a role.
* This method is optional and may be called internally, so implementations which do
* not support it should be sure to throw UnsupportedOperationException.
*
* @param performer User who wants to see the permissions.
* @param permissions Set of Permission values the user is interested in. The result should only include the
* matching ones.
* @param resource The resource on which permissions are requested. Can be null, in which case permissions on all
* resources should be returned.
* @param grantee The role whose permissions are requested. Can be null, in which case permissions of every
* role should be returned.
*
* @return All of the matching permission that the requesting user is authorized to know about.
*
* @throws RequestValidationException
* @throws RequestExecutionException
* @throws java.lang.UnsupportedOperationException
*/
Set list(AuthenticatedUser performer, Set permissions, IResource resource, RoleResource grantee)
throws RequestValidationException, RequestExecutionException;
/**
* Called before deleting a role with DROP ROLE statement (or the alias provided for compatibility,
* DROP USER) so that a new role with the same name wouldn't inherit permissions of the deleted one in the future.
* This removes all permissions granted to the Role in question.
* This method is optional and may be called internally, so implementations which do
* not support it should be sure to throw UnsupportedOperationException.
*
* @param revokee The role to revoke all permissions from.
* @throws java.lang.UnsupportedOperationException
*/
void revokeAllFrom(RoleResource revokee);
/**
* This method is called after a resource is removed (i.e. keyspace, table or role is dropped) and revokes all
* permissions granted on the IResource in question.
* This method is optional and may be called internally, so implementations which do
* not support it should be sure to throw UnsupportedOperationException.
*
* @param droppedResource The resource to revoke all permissions on.
* @throws java.lang.UnsupportedOperationException
*/
void revokeAllOn(IResource droppedResource);
/**
* Set of resources that should be made inaccessible to users and only accessible internally.
*
* @return Keyspaces, column families that will be unmodifiable by users; other resources.
*/
Set extends IResource> protectedResources();
/**
* Validates configuration of IAuthorizer implementation (if configurable).
*
* @throws ConfigurationException when there is a configuration error.
*/
void validateConfiguration() throws ConfigurationException;
/**
* Setup is called once upon system startup to initialize the IAuthorizer.
*
* For example, use this method to create any required keyspaces/column families.
*/
void setup();
}