Files
scylladb/cql3/statements/drop_table_statement.cc
Paweł Zakrzewski 98f5e49ea8 audit: Add support to CQL statements
Integrates audit functionality into CQL statement processing to enable tracking of database operations. Key changes:

- Add audit_info and statement_category to all CQL statements
- Implement audit categories for different statement types:
  - DDL: Schema altering statements (CREATE/ALTER/DROP)
  - DML: Data manipulation (INSERT/UPDATE/DELETE/TRUNCATE/USE)
  - DCL: Access control (GRANT/REVOKE/CREATE ROLE)
  - QUERY: SELECT statements
  - ADMIN: Service level operations

- Add audit inspection points in query processing:
  - Before statement execution
  - After access checks
  - After statement completion
  - On execution failures

- Add password sanitization for role management statements
  - Mask plaintext passwords in audit logs
  - Handle both direct password parameters and options maps
  - Preserve query structure while hiding sensitive data

- Modify prepared statement lifecycle to carry audit context
  - Pass audit info during statement preparation
  - Track audit info through statement execution
  - Support batch statement auditing

This change enables comprehensive auditing of CQL operations while ensuring sensitive data is properly masked in audit logs.
2025-01-15 11:10:36 +01:00

77 lines
2.8 KiB
C++

/*
* Copyright (C) 2015-present ScyllaDB
*
* Modified by ScyllaDB
*/
/*
* SPDX-License-Identifier: (LicenseRef-ScyllaDB-Source-Available-1.0 and Apache-2.0)
*/
#include <seastar/core/coroutine.hh>
#include "cql3/statements/drop_table_statement.hh"
#include "cql3/statements/prepared_statement.hh"
#include "cql3/query_processor.hh"
#include "service/migration_manager.hh"
#include "service/storage_proxy.hh"
#include "mutation/mutation.hh"
#include "cdc/log.hh"
namespace cql3 {
namespace statements {
drop_table_statement::drop_table_statement(cf_name cf_name, bool if_exists)
: schema_altering_statement{std::move(cf_name), &timeout_config::truncate_timeout}
, _if_exists{if_exists}
{
}
future<> drop_table_statement::check_access(query_processor& qp, const service::client_state& state) const
{
return state.has_column_family_access(keyspace(), column_family(), auth::permission::DROP);
}
future<std::tuple<::shared_ptr<cql_transport::event::schema_change>, cql3::cql_warnings_vec>> drop_table_statement::prepare_schema_mutations(query_processor& qp, service::query_state& state, const query_options& options, service::group0_batch& mc) const {
::shared_ptr<cql_transport::event::schema_change> ret;
if (cdc::is_log_for_some_table(qp.db().real_database(), keyspace(), column_family())) {
// we should really throw invalid_request_exception but for legacy reasons
// with throw unauthorized_exception here
co_return coroutine::exception(std::make_exception_ptr(exceptions::unauthorized_exception(
format("Cannot DROP cdc log table {}", column_family()))));
}
try {
auto muts = co_await service::prepare_column_family_drop_announcement(qp.proxy(), keyspace(), column_family(), mc.write_timestamp());
mc.add_mutations(std::move(muts));
using namespace cql_transport;
ret = ::make_shared<event::schema_change>(
event::schema_change::change_type::DROPPED,
event::schema_change::target_type::TABLE,
this->keyspace(),
this->column_family());
} catch (const exceptions::configuration_exception& e) {
if (!_if_exists) {
co_return coroutine::exception(std::make_exception_ptr(exceptions::invalid_request_exception(e.get_message())));
}
}
if (!auth::legacy_mode(qp)) {
const auto& as = *state.get_client_state().get_auth_service();
co_await auth::revoke_all(as, auth::make_data_resource(keyspace(), column_family()), mc);
}
co_return std::make_tuple(std::move(ret), std::vector<sstring>());
}
std::unique_ptr<cql3::statements::prepared_statement>
drop_table_statement::prepare(data_dictionary::database db, cql_stats& stats) {
return std::make_unique<prepared_statement>(audit_info(), make_shared<drop_table_statement>(*this));
}
}
}