public interface AuthWriter
Modifier and Type | Method and Description |
---|---|
default CompletionStage<Void> |
addClusterRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope) |
CompletionStage<Void> |
addClusterRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
String reason)
Adds a new cluster-level role binding without any resources.
|
default CompletionStage<Void> |
addResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
Collection<io.confluent.security.authorizer.ResourcePattern> resources) |
CompletionStage<Void> |
addResourceRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
Collection<io.confluent.security.authorizer.ResourcePattern> resources,
String reason)
Adds resources to a role binding.
|
CompletionStage<Void> |
createAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
io.confluent.security.authorizer.Scope scope,
org.apache.kafka.common.acl.AclBinding aclBinding)
Creates ACL rules for a given AclBinding.
|
Map<org.apache.kafka.common.acl.AclBinding,CompletionStage<org.apache.kafka.server.authorizer.AclCreateResult>> |
createAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
io.confluent.security.authorizer.Scope scope,
List<org.apache.kafka.common.acl.AclBinding> aclBindings)
Creates ACLs for the specified scope using the minimal number of batched updates.
|
default CompletionStage<Void> |
createAcls(io.confluent.security.authorizer.Scope scope,
org.apache.kafka.common.acl.AclBinding aclBinding) |
default Map<org.apache.kafka.common.acl.AclBinding,CompletionStage<org.apache.kafka.server.authorizer.AclCreateResult>> |
createAcls(io.confluent.security.authorizer.Scope scope,
List<org.apache.kafka.common.acl.AclBinding> aclBindings) |
CompletionStage<Collection<org.apache.kafka.common.acl.AclBinding>> |
deleteAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
io.confluent.security.authorizer.Scope scope,
org.apache.kafka.common.acl.AclBindingFilter aclBindingFilter,
Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Deletes all ACL rules that match the provided filters.
|
Map<org.apache.kafka.common.acl.AclBindingFilter,CompletionStage<org.apache.kafka.server.authorizer.AclDeleteResult>> |
deleteAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
io.confluent.security.authorizer.Scope scope,
List<org.apache.kafka.common.acl.AclBindingFilter> aclBindingFilters,
Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Deletes ACLs that match any of the provided filters using batched update.
|
default CompletionStage<Collection<org.apache.kafka.common.acl.AclBinding>> |
deleteAcls(io.confluent.security.authorizer.Scope scope,
org.apache.kafka.common.acl.AclBindingFilter aclBindingFilter,
Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess) |
default Map<org.apache.kafka.common.acl.AclBindingFilter,CompletionStage<org.apache.kafka.server.authorizer.AclDeleteResult>> |
deleteAcls(io.confluent.security.authorizer.Scope scope,
List<org.apache.kafka.common.acl.AclBindingFilter> aclBindingFilters,
Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess) |
default CompletionStage<Void> |
removeResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources) |
CompletionStage<Void> |
removeResourceRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources,
String reason)
Removes resources from an existing role binding.
|
default CompletionStage<Void> |
removeRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope) |
CompletionStage<Void> |
removeRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
String reason)
Removes a role binding.
|
default CompletionStage<Void> |
replaceResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
Collection<io.confluent.security.authorizer.ResourcePattern> resources) |
CompletionStage<Void> |
replaceResourceRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal,
org.apache.kafka.common.security.auth.KafkaPrincipal principal,
String role,
io.confluent.security.authorizer.Scope scope,
Collection<io.confluent.security.authorizer.ResourcePattern> resources,
String reason)
Sets resources for an existing role binding.
|
CompletionStage<Void> addClusterRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, String reason)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
requestorPrincipal
- Optional principal of the requestorprincipal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has resource-level scopedefault CompletionStage<Void> addClusterRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope)
CompletionStage<Void> addResourceRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, Collection<io.confluent.security.authorizer.ResourcePattern> resources, String reason)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
requestorPrincipal
- Optional principal of the requestorprincipal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedresources
- Resources to add to role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopedefault CompletionStage<Void> addResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, Collection<io.confluent.security.authorizer.ResourcePattern> resources)
CompletionStage<Void> removeRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, String reason)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
requestorPrincipal
- Optional principal of the requestorprincipal
- User or group principal from which role is removedrole
- Name of rolescope
- Scope at which role is assigneddefault CompletionStage<Void> removeRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope)
CompletionStage<Void> removeResourceRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources, String reason)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
requestorPrincipal
- Optional principal of the requestorprincipal
- User or group principal from which role is removedrole
- Name of rolescope
- Scope at which role is assignedresources
- Filter for resources being removed for the role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopedefault CompletionStage<Void> removeResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, Collection<io.confluent.security.authorizer.ResourcePatternFilter> resources)
CompletionStage<Void> replaceResourceRoleBinding(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, Collection<io.confluent.security.authorizer.ResourcePattern> resources, String reason)
Requestor should have Alter permission for SecurityMetadata to perform this operation.
requestorPrincipal
- Optional principal of the requestorprincipal
- User or group principal to which role is assignedrole
- Name of rolescope
- Scope at which role is assignedresources
- Updated collection of resources for the role bindingorg.apache.kafka.common.errors.InvalidRequestException
- if the specified role has cluster-level scopedefault CompletionStage<Void> replaceResourceRoleBinding(org.apache.kafka.common.security.auth.KafkaPrincipal principal, String role, io.confluent.security.authorizer.Scope scope, Collection<io.confluent.security.authorizer.ResourcePattern> resources)
CompletionStage<Void> createAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, io.confluent.security.authorizer.Scope scope, org.apache.kafka.common.acl.AclBinding aclBinding)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
requestorPrincipal
- Optional principal of the requestorscope
- Scope at which ACL bindings are addedaclBinding
- AclBinding to adddefault CompletionStage<Void> createAcls(io.confluent.security.authorizer.Scope scope, org.apache.kafka.common.acl.AclBinding aclBinding)
Map<org.apache.kafka.common.acl.AclBinding,CompletionStage<org.apache.kafka.server.authorizer.AclCreateResult>> createAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, io.confluent.security.authorizer.Scope scope, List<org.apache.kafka.common.acl.AclBinding> aclBindings)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
requestorPrincipal
- Optional principal of the requestorscope
- Scope at which ACL bindings are addedaclBindings
- List of ACLs to createdefault Map<org.apache.kafka.common.acl.AclBinding,CompletionStage<org.apache.kafka.server.authorizer.AclCreateResult>> createAcls(io.confluent.security.authorizer.Scope scope, List<org.apache.kafka.common.acl.AclBinding> aclBindings)
CompletionStage<Collection<org.apache.kafka.common.acl.AclBinding>> deleteAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, io.confluent.security.authorizer.Scope scope, org.apache.kafka.common.acl.AclBindingFilter aclBindingFilter, Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Requestor should have AlterAccess permission for the specified resources to perform this operation.
requestorPrincipal
- Optional principal of the requestorscope
- Scope at which ACL bindings are deletedaclBindingFilter
- AclBindingFilter to match the rulesresourceAccess
- predicate to check delete permission on resourcesdefault CompletionStage<Collection<org.apache.kafka.common.acl.AclBinding>> deleteAcls(io.confluent.security.authorizer.Scope scope, org.apache.kafka.common.acl.AclBindingFilter aclBindingFilter, Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
Map<org.apache.kafka.common.acl.AclBindingFilter,CompletionStage<org.apache.kafka.server.authorizer.AclDeleteResult>> deleteAcls(Optional<org.apache.kafka.common.security.auth.KafkaPrincipal> requestorPrincipal, io.confluent.security.authorizer.Scope scope, List<org.apache.kafka.common.acl.AclBindingFilter> aclBindingFilters, Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)
requestorPrincipal
- Optional principal of the requestorscope
- Scope at which ACL bindings are addedaclBindingFilters
- Filters whose matching ACLs are deletedresourceAccess
- predicate to check delete permission on resourcesdefault Map<org.apache.kafka.common.acl.AclBindingFilter,CompletionStage<org.apache.kafka.server.authorizer.AclDeleteResult>> deleteAcls(io.confluent.security.authorizer.Scope scope, List<org.apache.kafka.common.acl.AclBindingFilter> aclBindingFilters, Predicate<io.confluent.security.authorizer.ResourcePattern> resourceAccess)