mirror of
https://github.com/scylladb/scylladb.git
synced 2026-04-27 20:05:10 +00:00
So far the only way of returing a result of a CQL query was to build a result_set. An alternative lazy result generator is going to be introduced for the simple cases when no transformations at CQL layer are needed. To do that we need to hide the fact that there are going to be multiple representations of a cql results from the users.
180 lines
7.0 KiB
C++
180 lines
7.0 KiB
C++
/*
|
|
* Licensed to the Apache Software Foundation (ASF) under one
|
|
* or more contributor license agreements. See the NOTICE file
|
|
* distributed with this work for additional information
|
|
* regarding copyright ownership. The ASF licenses this file
|
|
* to you under the Apache License, Version 2.0 (the
|
|
* "License"); you may not use this file except in compliance
|
|
* with the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
/*
|
|
* Copyright 2016 ScyllaDB
|
|
*
|
|
* Modified by ScyllaDB
|
|
*/
|
|
|
|
/*
|
|
* This file is part of Scylla.
|
|
*
|
|
* Scylla is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Scylla is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with Scylla. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <vector>
|
|
#include <seastar/core/future-util.hh>
|
|
|
|
#include "list_permissions_statement.hh"
|
|
#include "auth/authorizer.hh"
|
|
#include "auth/common.hh"
|
|
#include "cql3/result_set.hh"
|
|
#include "transport/messages/result_message.hh"
|
|
|
|
cql3::statements::list_permissions_statement::list_permissions_statement(
|
|
auth::permission_set permissions,
|
|
std::optional<auth::resource> resource,
|
|
std::optional<sstring> role_name, bool recursive)
|
|
: _permissions(permissions)
|
|
, _resource(std::move(resource))
|
|
, _role_name(std::move(role_name))
|
|
, _recursive(recursive) {
|
|
}
|
|
|
|
void cql3::statements::list_permissions_statement::validate(
|
|
service::storage_proxy& proxy,
|
|
const service::client_state& state) {
|
|
// a check to ensure the existence of the user isn't being leaked by user existence check.
|
|
state.ensure_not_anonymous();
|
|
}
|
|
|
|
future<> cql3::statements::list_permissions_statement::check_access(const service::client_state& state) {
|
|
if (_resource) {
|
|
maybe_correct_resource(*_resource, state);
|
|
return state.ensure_exists(*_resource);
|
|
}
|
|
|
|
const auto& as = *state.get_auth_service();
|
|
const auto user = state.user();
|
|
|
|
return auth::has_superuser(as, *user).then([this, &state, &as, user](bool has_super) {
|
|
if (has_super) {
|
|
return make_ready_future<>();
|
|
}
|
|
|
|
if (!_role_name) {
|
|
return make_exception_future<>(
|
|
exceptions::unauthorized_exception("You are not authorized to view everyone's permissions"));
|
|
}
|
|
|
|
return auth::has_role(as, *user, *_role_name).then([this](bool has_role) {
|
|
if (!has_role) {
|
|
return make_exception_future<>(
|
|
exceptions::unauthorized_exception(
|
|
sprint("You are not authorized to view %s's permissions", *_role_name)));
|
|
}
|
|
|
|
return make_ready_future<>();
|
|
}).handle_exception_type([](const auth::nonexistant_role& e) {
|
|
return make_exception_future<>(exceptions::invalid_request_exception(e.what()));
|
|
});
|
|
});
|
|
}
|
|
|
|
|
|
future<::shared_ptr<cql_transport::messages::result_message>>
|
|
cql3::statements::list_permissions_statement::execute(
|
|
service::storage_proxy& proxy,
|
|
service::query_state& state,
|
|
const query_options& options) {
|
|
static auto make_column = [](sstring name) {
|
|
return ::make_shared<column_specification>(
|
|
auth::meta::AUTH_KS,
|
|
"permissions",
|
|
::make_shared<column_identifier>(std::move(name), true),
|
|
utf8_type);
|
|
};
|
|
|
|
static thread_local const std::vector<::shared_ptr<column_specification>> metadata({
|
|
make_column("role"), make_column("username"), make_column("resource"), make_column("permission")
|
|
});
|
|
|
|
const auto make_resource_filter = [this]()
|
|
-> std::optional<std::pair<auth::resource, auth::recursive_permissions>> {
|
|
if (!_resource) {
|
|
return {};
|
|
}
|
|
|
|
return std::make_pair(
|
|
*_resource,
|
|
_recursive ? auth::recursive_permissions::yes : auth::recursive_permissions::no);
|
|
};
|
|
|
|
const auto& as = *state.get_client_state().get_auth_service();
|
|
|
|
return do_with(make_resource_filter(), [this, &as](const auto& resource_filter) {
|
|
return auth::list_filtered_permissions(
|
|
as,
|
|
_permissions,
|
|
_role_name,
|
|
resource_filter).then([this](std::vector<auth::permission_details> all_details) {
|
|
std::sort(all_details.begin(), all_details.end());
|
|
|
|
auto rs = std::make_unique<result_set>(metadata);
|
|
|
|
for (const auto& pd : all_details) {
|
|
const std::vector<sstring> sorted_permission_names = [&pd] {
|
|
std::vector<sstring> names;
|
|
|
|
std::transform(
|
|
pd.permissions.begin(),
|
|
pd.permissions.end(),
|
|
std::back_inserter(names),
|
|
&auth::permissions::to_string);
|
|
|
|
std::sort(names.begin(), names.end());
|
|
return names;
|
|
}();
|
|
|
|
const auto decomposed_role_name = utf8_type->decompose(pd.role_name);
|
|
const auto decomposed_resource = utf8_type->decompose(sstring(sprint("%s", pd.resource)));
|
|
|
|
for (const auto& ps : sorted_permission_names) {
|
|
rs->add_row(
|
|
std::vector<bytes_opt>{
|
|
decomposed_role_name,
|
|
decomposed_role_name,
|
|
decomposed_resource,
|
|
utf8_type->decompose(ps)});
|
|
}
|
|
}
|
|
|
|
auto rows = ::make_shared<cql_transport::messages::result_message::rows>(result(std::move(std::move(rs))));
|
|
return ::shared_ptr<cql_transport::messages::result_message>(rows);
|
|
}).handle_exception_type([](const auth::nonexistant_role& e) {
|
|
return make_exception_future<::shared_ptr<cql_transport::messages::result_message>>(
|
|
exceptions::invalid_request_exception(e.what()));
|
|
}).handle_exception_type([](const auth::unsupported_authorization_operation& e) {
|
|
return make_exception_future<::shared_ptr<cql_transport::messages::result_message>>(
|
|
exceptions::invalid_request_exception(e.what()));
|
|
});
|
|
});
|
|
}
|