Uploaded image for project: 'Cassandra'
  1. Cassandra
  2. CASSANDRA-1271

Improve permissions to allow control over creation/removal/listing of Keyspaces

    XMLWordPrintableJSON

Details

    • Improvement
    • Status: Resolved
    • Low
    • Resolution: Fixed
    • 0.7 beta 3
    • None
    • None

    Description

      We'd like to improve resources/permissions so that they can be applied to the global scope, instead of just individual keyspaces.

      IAuthority currently only has one concept of a resource that it can authorize for: a keyspace. At the very least, this ticket needs to deal with one additional resource: "the keyspace list". These resources should be mapped into a hierarchy, and an object representing the path to the resource will be passed to IAuthority.

      A resource hierarchy to represent all possible resources in Cassandra might look like: /cassandra/<cluster_name>/keyspaces/<ks_name>/...
      In table form:

      resource checked perms explanation
      /cassandra/ n/a Separates Cassandra-internal resources from resources that might be provided by plugins.
      <cluster_name>/ n/a Organizations might have many clusters
      keyspaces/ READ, WRITE The list of keyspaces: READ/WRITE for this resource mean the ability to view/modify the list of keyspaces.
      <ks_name>/ READ, WRITE, READ_VALUE, WRITE_VALUE An individual keyspace: READ/WRITE mean the ability to view/modify the list of column families. Since this is the last entry in the current hierarchy, READ/WRITE_VALUE apply recursively to ancestor data of this keyspace.

      Over time Cassandra may add additional authorize calls for resources higher or lower in the chain, which IAuthority backends can choose to ignore, but this initial patch will only make authorize calls for the keyspaces list, and individual keyspaces. As authorize calls are added for child resources like <cf_name>/, the READ/WRITE_VALUE permissions will move to the lowest checked level, and will be deprecated at higher levels.

      (Note that /cassandra/ and <cluster_name>/ will not yet be checked for permissions via a call to IAuthority.authorize, so while it would be possible for an IAuthority backend to store permissions for these top level resources, they will only be able to deny access when a user attempts to access an ancestor resource.)

      Attachments

        1. 1271-v3.tgz
          15 kB
          Stu Hood

        Issue Links

          Activity

            People

              urandom Eric Evans
              stuhood Stu Hood
              Eric Evans
              Eric Evans
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: