public interface AuthWriter
Modifier and Type | Method and Description |
---|---|
java.util.concurrent.CompletionStage<java.lang.Void> |
addClusterRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope)
Adds a new cluster-level role binding without any resources.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
addResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope,
java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Adds resources to a role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
createAcls(io.confluent.security.authorizer.Scope scope,
org.apache.kafka.common.acl.AclBinding aclBinding)
Creates ACL rules for a given AclBinding.
|
java.util.Map<org.apache.kafka.common.acl.AclBinding,java.util.concurrent.CompletionStage<org.apache.kafka.server.authorizer.AclCreateResult>> |
createAcls(io.confluent.security.authorizer.Scope scope,
java.util.List<org.apache.kafka.common.acl.AclBinding> aclBindings)
Creates ACLs for the specified scope using the minimal number of batched updates.
|
java.util.concurrent.CompletionStage<java.util.Collection<org.apache.kafka.common.acl.AclBinding>> |
deleteAcls(io.confluent.security.authorizer.Scope scope,
org.apache.kafka.common.acl.AclBindingFilter aclBindingFilter,
java.util.function.Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Deletes all ACL rules that match the provided filters.
|
java.util.Map<org.apache.kafka.common.acl.AclBindingFilter,java.util.concurrent.CompletionStage<org.apache.kafka.server.authorizer.AclDeleteResult>> |
deleteAcls(io.confluent.security.authorizer.Scope scope,
java.util.List<org.apache.kafka.common.acl.AclBindingFilter> aclBindingFilters,
java.util.function.Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Deletes ACLs that match any of the provided filters using batched update.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
removeResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope,
java.util.Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources)
Removes resources from an existing role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
removeRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope)
Removes a role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> |
replaceResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
java.lang.String role,
io.confluent.security.authorizer.Scope scope,
java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Sets resources for an existing role binding.
|
java.util.concurrent.CompletionStage<java.lang.Void> addClusterRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
principal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has resource-level scopejava.util.concurrent.CompletionStage<java.lang.Void> addResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope, java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
principal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedresources
- Resources to add to role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopejava.util.concurrent.CompletionStage<java.lang.Void> removeRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
principal
- User or group principal from which role is removedrole
- Name of rolescope
- Scope at which role is assignedjava.util.concurrent.CompletionStage<java.lang.Void> removeResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope, java.util.Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
principal
- User or group principal from which role is removedrole
- Name of rolescope
- Scope at which role is assignedresources
- Filter for resources being removed for the role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopejava.util.concurrent.CompletionStage<java.lang.Void> replaceResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, java.lang.String role, io.confluent.security.authorizer.Scope scope, java.util.Collection<io.confluent.security.authorizer.ResourcePattern> resources)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
principal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedresources
- Updated collection of resources for the role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopejava.util.concurrent.CompletionStage<java.lang.Void> createAcls(io.confluent.security.authorizer.Scope scope, org.apache.kafka.common.acl.AclBinding aclBinding)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
scope
- Scope at which ACL bindings are addedaclBinding
- AclBinding to addjava.util.Map<org.apache.kafka.common.acl.AclBinding,java.util.concurrent.CompletionStage<org.apache.kafka.server.authorizer.AclCreateResult>> createAcls(io.confluent.security.authorizer.Scope scope, java.util.List<org.apache.kafka.common.acl.AclBinding> aclBindings)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
scope
- Scope at which ACL bindings are addedaclBindings
- List of ACLs to createjava.util.concurrent.CompletionStage<java.util.Collection<org.apache.kafka.common.acl.AclBinding>> deleteAcls(io.confluent.security.authorizer.Scope scope, org.apache.kafka.common.acl.AclBindingFilter aclBindingFilter, java.util.function.Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
scope
- Scope at which ACL bindings are deletedaclBindingFilter
- AclBindingFilter to match the rulesresourceAccess
- predicate to check delete permission on resourcesjava.util.Map<org.apache.kafka.common.acl.AclBindingFilter,java.util.concurrent.CompletionStage<org.apache.kafka.server.authorizer.AclDeleteResult>> deleteAcls(io.confluent.security.authorizer.Scope scope, java.util.List<org.apache.kafka.common.acl.AclBindingFilter> aclBindingFilters, java.util.function.Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
scope
- Scope at which ACL bindings are addedaclBindingFilters
- Filters whose matching ACLs are deletedresourceAccess
- predicate to check delete permission on resources