/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.cassandra.cql3.statements; import java.util.*; import org.apache.cassandra.auth.*; import org.apache.cassandra.config.DatabaseDescriptor; import org.apache.cassandra.cql3.ColumnIdentifier; import org.apache.cassandra.cql3.ColumnSpecification; import org.apache.cassandra.cql3.ResultSet; import org.apache.cassandra.db.marshal.UTF8Type; import org.apache.cassandra.exceptions.InvalidRequestException; import org.apache.cassandra.exceptions.RequestExecutionException; import org.apache.cassandra.exceptions.RequestValidationException; import org.apache.cassandra.service.ClientState; import org.apache.cassandra.transport.messages.ResultMessage; public class ListPermissionsStatement extends AuthorizationStatement { private static final String KS = Auth.AUTH_KS; private static final String CF = "permissions"; // virtual cf to use for now. private static final List<ColumnSpecification> metadata; static { List<ColumnSpecification> columns = new ArrayList<ColumnSpecification>(4); columns.add(new ColumnSpecification(KS, CF, new ColumnIdentifier("username", true), UTF8Type.instance)); columns.add(new ColumnSpecification(KS, CF, new ColumnIdentifier("resource", true), UTF8Type.instance)); columns.add(new ColumnSpecification(KS, CF, new ColumnIdentifier("permission", true), UTF8Type.instance)); metadata = Collections.unmodifiableList(columns); } private final Set<Permission> permissions; private DataResource resource; private final String username; private final boolean recursive; public ListPermissionsStatement(Set<Permission> permissions, IResource resource, String username, boolean recursive) { this.permissions = permissions; this.resource = (DataResource) resource; this.username = username; this.recursive = recursive; } public void validate(ClientState state) throws RequestValidationException { // a check to ensure the existence of the user isn't being leaked by user existence check. state.ensureNotAnonymous(); if (username != null && !Auth.isExistingUser(username)) throw new InvalidRequestException(String.format("User %s doesn't exist", username)); if (resource != null) { resource = maybeCorrectResource(resource, state); if (!resource.exists()) throw new InvalidRequestException(String.format("%s doesn't exist", resource)); } } public void checkAccess(ClientState state) { // checked in validate } // TODO: Create a new ResultMessage type (?). Rows will do for now. public ResultMessage execute(ClientState state) throws RequestValidationException, RequestExecutionException { List<PermissionDetails> details = new ArrayList<PermissionDetails>(); if (resource != null && recursive) { for (IResource r : Resources.chain(resource)) details.addAll(list(state, r)); } else { details.addAll(list(state, resource)); } Collections.sort(details); return resultMessage(details); } private ResultMessage resultMessage(List<PermissionDetails> details) { if (details.isEmpty()) return new ResultMessage.Void(); ResultSet result = new ResultSet(metadata); for (PermissionDetails pd : details) { result.addColumnValue(UTF8Type.instance.decompose(pd.username)); result.addColumnValue(UTF8Type.instance.decompose(pd.resource.toString())); result.addColumnValue(UTF8Type.instance.decompose(pd.permission.toString())); } return new ResultMessage.Rows(result); } private Set<PermissionDetails> list(ClientState state, IResource resource) throws RequestValidationException, RequestExecutionException { return DatabaseDescriptor.getAuthorizer().list(state.getUser(), permissions, resource, username); } }