mirror of
https://github.com/scylladb/scylladb.git
synced 2026-04-27 03:45:11 +00:00
A new constructor creates a copy of the current client_status to be used in the context of the handling of a single request. The copy may take place at a shard different from the one where the request has been received. In order to ensure the monotonicity of the timestamps used by the request handled on the same connection the created copy of the client_state is going to use the same timestamp provided by the caller instead of generating it. It's the caller's responsibility to ensure the monotonicity of given timestamps. Signed-off-by: Vlad Zolotarov <vladz@scylladb.com>
242 lines
8.9 KiB
C++
242 lines
8.9 KiB
C++
/*
|
|
* Licensed to the Apache Software Foundation (ASF) under one
|
|
* or more contributor license agreements. See the NOTICE file
|
|
* distributed with this work for additional information
|
|
* regarding copyright ownership. The ASF licenses this file
|
|
* to you under the Apache License, Version 2.0 (the
|
|
* "License"); you may not use this file except in compliance
|
|
* with the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
/*
|
|
* Copyright (C) 2016 ScyllaDB
|
|
*
|
|
* Modified by ScyllaDB
|
|
*/
|
|
|
|
/*
|
|
* This file is part of Scylla.
|
|
*
|
|
* Scylla is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* Scylla is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with Scylla. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "client_state.hh"
|
|
#include "auth/authorizer.hh"
|
|
#include "auth/authenticator.hh"
|
|
#include "auth/common.hh"
|
|
#include "exceptions/exceptions.hh"
|
|
#include "validation.hh"
|
|
#include "db/system_keyspace.hh"
|
|
#include "db/schema_tables.hh"
|
|
#include "tracing/trace_keyspace_helper.hh"
|
|
#include "storage_service.hh"
|
|
|
|
void service::client_state::set_login(::shared_ptr<auth::authenticated_user> user) {
|
|
if (user == nullptr) {
|
|
throw std::invalid_argument("Must provide user");
|
|
}
|
|
_user = std::move(user);
|
|
}
|
|
|
|
future<> service::client_state::check_user_exists() {
|
|
if (_user->is_anonymous()) {
|
|
return make_ready_future();
|
|
}
|
|
|
|
return _auth_service->is_existing_user(_user->name()).then([user = _user](bool exists) mutable {
|
|
if (!exists) {
|
|
throw exceptions::authentication_exception(
|
|
sprint("User %s doesn't exist - create it with CREATE USER query first",
|
|
user->name()));
|
|
}
|
|
return make_ready_future();
|
|
});
|
|
}
|
|
|
|
void service::client_state::validate_login() const {
|
|
if (!_user) {
|
|
throw exceptions::unauthorized_exception("You have not logged in");
|
|
}
|
|
}
|
|
|
|
void service::client_state::ensure_not_anonymous() const {
|
|
validate_login();
|
|
if (_user->is_anonymous()) {
|
|
throw exceptions::unauthorized_exception("You have to be logged in and not anonymous to perform this request");
|
|
}
|
|
}
|
|
|
|
void service::client_state::merge(const client_state& other) {
|
|
if (other._dirty) {
|
|
_keyspace = other._keyspace;
|
|
}
|
|
if (_user == nullptr) {
|
|
_user = other._user;
|
|
}
|
|
_last_timestamp_micros = std::max(_last_timestamp_micros, other._last_timestamp_micros);
|
|
}
|
|
|
|
future<> service::client_state::has_all_keyspaces_access(
|
|
auth::permission p) const {
|
|
if (_is_internal) {
|
|
return make_ready_future();
|
|
}
|
|
validate_login();
|
|
return ensure_has_permission(p, auth::resource::root_of(auth::resource_kind::data));
|
|
}
|
|
|
|
future<> service::client_state::has_keyspace_access(const sstring& ks,
|
|
auth::permission p) const {
|
|
return has_access(ks, p, auth::resource::data(ks));
|
|
}
|
|
|
|
future<> service::client_state::has_column_family_access(const sstring& ks,
|
|
const sstring& cf, auth::permission p) const {
|
|
validation::validate_column_family(ks, cf);
|
|
return has_access(ks, p, auth::resource::data(ks, cf));
|
|
}
|
|
|
|
future<> service::client_state::has_schema_access(const schema& s, auth::permission p) const {
|
|
return has_access(s.ks_name(), p, auth::resource::data(s.ks_name(), s.cf_name()));
|
|
}
|
|
|
|
future<> service::client_state::has_access(const sstring& ks, auth::permission p, auth::resource resource) const {
|
|
if (ks.empty()) {
|
|
throw exceptions::invalid_request_exception("You have not set a keyspace for this session");
|
|
}
|
|
if (_is_internal) {
|
|
return make_ready_future();
|
|
}
|
|
|
|
validate_login();
|
|
|
|
static const auto alteration_permissions = auth::permission_set::of<
|
|
auth::permission::CREATE, auth::permission::ALTER, auth::permission::DROP>();
|
|
|
|
// we only care about schema modification.
|
|
if (alteration_permissions.contains(p)) {
|
|
// prevent system keyspace modification
|
|
auto name = ks;
|
|
std::transform(name.begin(), name.end(), name.begin(), ::tolower);
|
|
if (is_system_keyspace(name)) {
|
|
throw exceptions::unauthorized_exception(ks + " keyspace is not user-modifiable.");
|
|
}
|
|
|
|
// we want to allow altering AUTH_KS and TRACING_KS.
|
|
for (auto& n : { auth::meta::AUTH_KS, tracing::trace_keyspace_helper::KEYSPACE_NAME }) {
|
|
if (name == n && p == auth::permission::DROP) {
|
|
throw exceptions::unauthorized_exception(sprint("Cannot %s %s", auth::permissions::to_string(p), resource));
|
|
}
|
|
}
|
|
}
|
|
|
|
static thread_local std::set<auth::resource> readable_system_resources = [] {
|
|
std::set<auth::resource> tmp;
|
|
for (auto cf : { db::system_keyspace::LOCAL, db::system_keyspace::PEERS }) {
|
|
tmp.insert(auth::resource::data(db::system_keyspace::NAME, cf));
|
|
}
|
|
for (auto cf : db::schema_tables::ALL) {
|
|
tmp.insert(auth::resource::data(db::schema_tables::NAME, cf));
|
|
}
|
|
return tmp;
|
|
}();
|
|
|
|
if (p == auth::permission::SELECT && readable_system_resources.count(resource) != 0) {
|
|
return make_ready_future();
|
|
}
|
|
if (alteration_permissions.contains(p)) {
|
|
for (auto& s : { _auth_service->underlying_authorizer().protected_resources(),
|
|
_auth_service->underlying_authorizer().protected_resources() }) {
|
|
if (s.count(resource)) {
|
|
throw exceptions::unauthorized_exception(
|
|
sprint("%s schema is protected",
|
|
resource));
|
|
}
|
|
}
|
|
}
|
|
|
|
return ensure_has_permission(p, std::move(resource));
|
|
}
|
|
|
|
future<bool> service::client_state::check_has_permission(auth::permission p, auth::resource resource) const {
|
|
if (_is_internal) {
|
|
return make_ready_future<bool>(true);
|
|
}
|
|
|
|
std::experimental::optional<auth::resource> parent = resource.parent();
|
|
|
|
return _auth_service->get_permissions(_user, resource).then([this, p, parent = std::move(parent)](auth::permission_set set) {
|
|
if (set.contains(p)) {
|
|
return make_ready_future<bool>(true);
|
|
}
|
|
if (parent) {
|
|
return check_has_permission(p, std::move(*parent));
|
|
}
|
|
return make_ready_future<bool>(false);
|
|
});
|
|
}
|
|
|
|
future<> service::client_state::ensure_has_permission(auth::permission p, auth::resource resource) const {
|
|
return check_has_permission(p, resource).then([this, p, resource](bool ok) {
|
|
if (!ok) {
|
|
throw exceptions::unauthorized_exception(sprint("User %s has no %s permission on %s or any of its parents",
|
|
_user->name(),
|
|
auth::permissions::to_string(p),
|
|
resource));
|
|
}
|
|
});
|
|
}
|
|
|
|
auth::service* service::client_state::local_auth_service_copy(const service::client_state& orig) const {
|
|
if (orig._auth_service && _cpu_of_origin != orig._cpu_of_origin) {
|
|
// if moved to a different shard - return a pointer to the local auth_service instance
|
|
return &service::get_local_storage_service().get_local_auth_service();
|
|
}
|
|
return orig._auth_service;
|
|
}
|
|
|
|
::shared_ptr<auth::authenticated_user> service::client_state::local_user_copy(const service::client_state& orig) const {
|
|
if (orig._user) {
|
|
if (_cpu_of_origin != orig._cpu_of_origin) {
|
|
// if we moved to another shard create a local copy of authenticated_user
|
|
return ::make_shared<auth::authenticated_user>(*orig._user);
|
|
} else {
|
|
return orig._user;
|
|
}
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
service::client_state::client_state(service::client_state::request_copy_tag, const service::client_state& orig, api::timestamp_type ts)
|
|
: _keyspace(orig._keyspace)
|
|
, _cpu_of_origin(engine().cpu_id())
|
|
, _user(local_user_copy(orig))
|
|
, _is_internal(orig._is_internal)
|
|
, _is_thrift(orig._is_thrift)
|
|
, _remote_address(orig._remote_address)
|
|
, _auth_service(local_auth_service_copy(orig))
|
|
, _request_ts(ts)
|
|
{
|
|
assert(!orig._trace_state_ptr);
|
|
}
|
|
|