/** * Checks the user's superuser status. * Only a superuser is allowed to perform CREATE USER and DROP USER queries. * Im most cased, though not necessarily, a superuser will have Permission.ALL on every resource * (depends on IAuthorizer implementation). */ public boolean isSuper() { return !isAnonymous() && Roles.hasSuperuserStatus(role); }
/** * Checks the user's superuser status. * Only a superuser is allowed to perform CREATE USER and DROP USER queries. * Im most cased, though not necessarily, a superuser will have Permission.ALL on every resource * (depends on IAuthorizer implementation). */ public boolean isSuper() { return !isAnonymous() && Roles.hasSuperuserStatus(role); }
/** * Checks the user's superuser status. * Only a superuser is allowed to perform CREATE USER and DROP USER queries. * Im most cased, though not necessarily, a superuser will have Permission.ALL on every resource * (depends on IAuthorizer implementation). */ public boolean isSuper() { return !isAnonymous() && Roles.hasSuperuserStatus(role); }
public void checkAccess(ClientState state) throws UnauthorizedException { super.checkPermission(state, Permission.DROP, role); // We only check superuser status for existing roles to avoid // caching info about roles which don't exist (CASSANDRA-9189) if (DatabaseDescriptor.getRoleManager().isExistingRole(role) && Roles.hasSuperuserStatus(role) && !state.getUser().isSuper()) throw new UnauthorizedException("Only superusers can drop a role with superuser status"); }
public void checkAccess(ClientState state) throws UnauthorizedException { super.checkPermission(state, Permission.DROP, role); // We only check superuser status for existing roles to avoid // caching info about roles which don't exist (CASSANDRA-9189) if (DatabaseDescriptor.getRoleManager().isExistingRole(role) && Roles.hasSuperuserStatus(role) && !state.getUser().isSuper()) throw new UnauthorizedException("Only superusers can drop a role with superuser status"); }
public void checkAccess(ClientState state) throws UnauthorizedException { super.checkPermission(state, Permission.DROP, role); // We only check superuser status for existing roles to avoid // caching info about roles which don't exist (CASSANDRA-9189) if (DatabaseDescriptor.getRoleManager().isExistingRole(role) && Roles.hasSuperuserStatus(role) && !state.getUser().isSuper()) throw new UnauthorizedException("Only superusers can drop a role with superuser status"); }
@Override protected ResultMessage formatResults(List<RoleResource> sortedRoles) { ResultSet result = new ResultSet(metadata); IRoleManager roleManager = DatabaseDescriptor.getRoleManager(); for (RoleResource role : sortedRoles) { if (!roleManager.canLogin(role)) continue; result.addColumnValue(UTF8Type.instance.decompose(role.getRoleName())); result.addColumnValue(BooleanType.instance.decompose(Roles.hasSuperuserStatus(role))); } return new ResultMessage.Rows(result); } }
@Override protected ResultMessage formatResults(List<RoleResource> sortedRoles) { ResultSet result = new ResultSet(metadata); IRoleManager roleManager = DatabaseDescriptor.getRoleManager(); for (RoleResource role : sortedRoles) { if (!roleManager.canLogin(role)) continue; result.addColumnValue(UTF8Type.instance.decompose(role.getRoleName())); result.addColumnValue(BooleanType.instance.decompose(Roles.hasSuperuserStatus(role))); } return new ResultMessage.Rows(result); } }
@Override protected ResultMessage formatResults(List<RoleResource> sortedRoles) { ResultSet result = new ResultSet(metadata); IRoleManager roleManager = DatabaseDescriptor.getRoleManager(); for (RoleResource role : sortedRoles) { if (!roleManager.canLogin(role)) continue; result.addColumnValue(UTF8Type.instance.decompose(role.getRoleName())); result.addColumnValue(BooleanType.instance.decompose(Roles.hasSuperuserStatus(role))); } return new ResultMessage.Rows(result); } }