Files
scylladb/cql3/statements/attach_service_level_statement.cc
Paweł Zakrzewski 98f5e49ea8 audit: Add support to CQL statements
Integrates audit functionality into CQL statement processing to enable tracking of database operations. Key changes:

- Add audit_info and statement_category to all CQL statements
- Implement audit categories for different statement types:
  - DDL: Schema altering statements (CREATE/ALTER/DROP)
  - DML: Data manipulation (INSERT/UPDATE/DELETE/TRUNCATE/USE)
  - DCL: Access control (GRANT/REVOKE/CREATE ROLE)
  - QUERY: SELECT statements
  - ADMIN: Service level operations

- Add audit inspection points in query processing:
  - Before statement execution
  - After access checks
  - After statement completion
  - On execution failures

- Add password sanitization for role management statements
  - Mask plaintext passwords in audit logs
  - Handle both direct password parameters and options maps
  - Preserve query structure while hiding sensitive data

- Modify prepared statement lifecycle to carry audit context
  - Pass audit info during statement preparation
  - Track audit info through statement execution
  - Support batch statement auditing

This change enables comprehensive auditing of CQL operations while ensuring sensitive data is properly masked in audit logs.
2025-01-15 11:10:36 +01:00

63 lines
2.4 KiB
C++

/*
* Copyright (C) 2021-present ScyllaDB
*/
/*
* SPDX-License-Identifier: LicenseRef-ScyllaDB-Source-Available-1.0
*/
#include "seastarx.hh"
#include "auth/service.hh"
#include "cql3/statements/attach_service_level_statement.hh"
#include "service/qos/service_level_controller.hh"
#include "exceptions/exceptions.hh"
#include "transport/messages/result_message.hh"
#include "service/client_state.hh"
#include "service/query_state.hh"
#include "cql3/query_processor.hh"
namespace cql3 {
namespace statements {
attach_service_level_statement::attach_service_level_statement(sstring service_level, sstring role_name) :
_service_level(service_level), _role_name(role_name) {
}
bool attach_service_level_statement::needs_guard(query_processor& qp, service::query_state& state) const {
return !auth::legacy_mode(qp) || state.get_service_level_controller().is_v2();
}
std::unique_ptr<cql3::statements::prepared_statement>
cql3::statements::attach_service_level_statement::prepare(
data_dictionary::database db, cql_stats &stats) {
return std::make_unique<prepared_statement>(audit_info(), ::make_shared<attach_service_level_statement>(*this));
}
future<> attach_service_level_statement::check_access(query_processor& qp, const service::client_state &state) const {
return state.ensure_has_permission(auth::command_desc{.permission = auth::permission::AUTHORIZE, .resource = auth::root_service_level_resource()});
}
future<::shared_ptr<cql_transport::messages::result_message>>
attach_service_level_statement::execute(query_processor& qp,
service::query_state &state,
const query_options &,
std::optional<service::group0_guard> guard) const {
auto sli = co_await state.get_service_level_controller().get_distributed_service_level(_service_level);
if (sli.empty()) {
throw qos::nonexistant_service_level_exception(_service_level);
}
auto& as = *state.get_client_state().get_auth_service();
auto& sl = state.get_service_level_controller();
service::group0_batch mc{std::move(guard)};
co_await auth::set_attribute(as, _role_name, "service_level", _service_level, mc);
co_await sl.commit_mutations(std::move(mc));
using void_result_msg = cql_transport::messages::result_message::void_message;
using result_msg = cql_transport::messages::result_message;
co_return ::static_pointer_cast<result_msg>(make_shared<void_result_msg>());
}
}
}