public interface AuthWriter
Modifier and Type | Method and Description |
---|---|
java.util.concurrent.CompletionStage<java.lang.Void> |
addClusterRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope)
Adds a new cluster-level role binding without any resources.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
addResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope,
java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Adds resources to a role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
removeResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope,
java.util.Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources)
Removes resources from an existing role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
removeRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope)
Removes a role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
replaceResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope,
java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Sets resources for an existing role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> addClusterRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
principal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has resource-level scopejava.util.concurrent.CompletionStage<java.lang.Void> addResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope, java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
principal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedresources
- Resources to add to role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopejava.util.concurrent.CompletionStage<java.lang.Void> removeRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
principal
- User or group principal from which role is removedrole
- Name of rolescope
- Scope at which role is assignedjava.util.concurrent.CompletionStage<java.lang.Void> removeResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope, java.util.Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
principal
- User or group principal from which role is removedrole
- Name of rolescope
- Scope at which role is assignedresources
- Filter for resources being removed for the role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopejava.util.concurrent.CompletionStage<java.lang.Void> replaceResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope, java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
principal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedresources
- Updated collection of resources for the role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scope