func (self *Permissions) AuthorizeDeleteClusterAdmin(user common.User) (ok bool, err common.AuthorizationError) { if !user.IsClusterAdmin() { return false, common.NewAuthorizationError("Insufficient permissions to delete cluster admin") } return true, "" }
func (self *CoordinatorImpl) ChangeDbUserPermissions(requester common.User, db, username, readPermissions, writePermissions string) error { if !requester.IsClusterAdmin() && !requester.IsDbAdmin(db) { return common.NewAuthorizationError("Insufficient permissions") } return self.raftServer.ChangeDbUserPermissions(db, username, readPermissions, writePermissions) }
func (self *Permissions) AuthorizeDeleteQuery(user common.User, db string) (ok bool, err common.AuthorizationError) { if !user.IsDbAdmin(db) { return false, common.NewAuthorizationError("Insufficient permission to write to %s", db) } return true, "" }
func (self *CoordinatorImpl) ListClusterAdmins(requester common.User) ([]string, error) { if !requester.IsClusterAdmin() { return nil, common.NewAuthorizationError("Insufficient permissions") } return self.clusterConfiguration.GetClusterAdmins(), nil }
func (self *CoordinatorImpl) WriteSeriesData(user common.User, db string, series []*protocol.Series) error { // make sure that the db exist if !self.clusterConfiguration.DatabasesExists(db) { return fmt.Errorf("Database %s doesn't exist", db) } for _, s := range series { seriesName := s.GetName() if user.HasWriteAccess(seriesName) { continue } return common.NewAuthorizationError("User %s doesn't have write permissions for %s", user.GetName(), seriesName) } err := self.CommitSeriesData(db, series, false) if err != nil { return err } for _, s := range series { self.ProcessContinuousQueries(db, s) } return err }
func (self *CoordinatorImpl) DropDatabase(user common.User, db string) error { if !user.IsClusterAdmin() { return common.NewAuthorizationError("Insufficient permission to drop database") } if self.clusterConfiguration.IsSingleServer() { if err := self.datastore.DropDatabase(db); err != nil { return err } } else { servers, _ := self.clusterConfiguration.GetServersToMakeQueryTo(&db) for _, server := range servers { if err := self.handleDropDatabase(server.server, db); err != nil { return err } } } // don't delete the metadata, we need the replication factor to be // able to replicate the request properly if err := self.raftServer.DropDatabase(db); err != nil { return err } return nil }
func (self *CoordinatorImpl) ForceCompaction(user common.User) error { if !user.IsClusterAdmin() { return fmt.Errorf("Insufficient permissions to force a log compaction") } return self.raftServer.ForceLogCompaction() }
func (self *LevelDbDatastore) ExecuteQuery(user common.User, database string, query *parser.SelectQuery, yield func(*protocol.Series) error, ringFilter func(database, series *string, time *int64) bool) error { seriesAndColumns := query.GetReferencedColumns() hasAccess := true for series, columns := range seriesAndColumns { if regex, ok := series.GetCompiledRegex(); ok { seriesNames := self.getSeriesForDbAndRegex(database, regex) for _, name := range seriesNames { if !user.HasReadAccess(name) { hasAccess = false continue } err := self.executeQueryForSeries(database, name, columns, query, yield, ringFilter) if err != nil { return err } } } else { if !user.HasReadAccess(series.Name) { hasAccess = false continue } err := self.executeQueryForSeries(database, series.Name, columns, query, yield, ringFilter) if err != nil { return err } } } if !hasAccess { return fmt.Errorf("You don't have permission to access one or more time series") } return nil }
func (self *Permissions) AuthorizeDropDatabase(user common.User) (ok bool, err common.AuthorizationError) { if !user.IsClusterAdmin() { return false, common.NewAuthorizationError("Insufficient permissions to drop database") } return true, "" }
func (self *CoordinatorImpl) ListDbUsers(requester common.User, db string) ([]common.User, error) { if !requester.IsClusterAdmin() && !requester.IsDbAdmin(db) { return nil, common.NewAuthorizationError("Insufficient permissions") } return self.clusterConfiguration.GetDbUsers(db), nil }
func (self *Permissions) AuthorizeDropSeries(user common.User, db string, seriesName string) (ok bool, err common.AuthorizationError) { if !user.IsDbAdmin(db) && !user.HasWriteAccess(seriesName) { return false, common.NewAuthorizationError("Insufficient permissions to drop series") } return true, "" }
func (self *Permissions) AuthorizeListContinuousQueries(user common.User, db string) (ok bool, err common.AuthorizationError) { if !user.IsDbAdmin(db) { return false, common.NewAuthorizationError("Insufficient permissions to list continuous queries") } return true, "" }
func (self *Permissions) AuthorizeChangeDbUserPermissions(user common.User, db string) (ok bool, err common.AuthorizationError) { if !user.IsDbAdmin(db) { return false, common.NewAuthorizationError("Insufficient permissions to change db user permissions on %s", db) } return true, "" }
func (self *Permissions) AuthorizeGrantDbUserAdmin(user common.User, db string) (ok bool, err common.AuthorizationError) { if !user.IsDbAdmin(db) { return false, common.NewAuthorizationError("Insufficient permissions to grant db user admin privileges on %s", db) } return true, "" }
func (self *CoordinatorImpl) DropDatabase(user common.User, db string) error { if !user.IsClusterAdmin() { return fmt.Errorf("Insufficient permission to drop database") } return self.raftServer.DropDatabase(db) }
func (self *CoordinatorImpl) ListContinuousQueries(user common.User, db string) ([]*protocol.Series, error) { if !user.IsClusterAdmin() && !user.IsDbAdmin(db) { return nil, common.NewAuthorizationError("Insufficient permissions to list continuous queries") } queries := self.clusterConfiguration.GetContinuousQueries(db) points := []*protocol.Point{} for _, query := range queries { queryId := int64(query.Id) queryString := query.Query timestamp := time.Now().Unix() sequenceNumber := uint64(1) points = append(points, &protocol.Point{ Values: []*protocol.FieldValue{ &protocol.FieldValue{Int64Value: &queryId}, &protocol.FieldValue{StringValue: &queryString}, }, Timestamp: ×tamp, SequenceNumber: &sequenceNumber, }) } seriesName := "continuous queries" series := []*protocol.Series{&protocol.Series{ Name: &seriesName, Fields: []string{"id", "query"}, Points: points, }} return series, nil }
func (self *CoordinatorImpl) CreateDbUser(requester common.User, db, username, password string) error { if !requester.IsClusterAdmin() && !requester.IsDbAdmin(db) { return common.NewAuthorizationError("Insufficient permissions") } if username == "" { return fmt.Errorf("Username cannot be empty") } if !isValidName(username) { return fmt.Errorf("%s isn't a valid username", username) } hash, err := cluster.HashPassword(password) if err != nil { return err } self.CreateDatabase(requester, db, uint8(1)) // ignore the error since the db may exist if self.clusterConfiguration.GetDbUser(db, username) != nil { return fmt.Errorf("User %s already exists", username) } matchers := []*cluster.Matcher{&cluster.Matcher{true, ".*"}} log.Debug("(raft:%s) Creating user %s:%s", self.raftServer.(*RaftServer).raftServer.Name(), db, username) return self.raftServer.SaveDbUser(&cluster.DbUser{cluster.CommonUser{ Name: username, Hash: string(hash), CacheKey: db + "%" + username, }, db, matchers, matchers, false}) }
func (self *Permissions) AuthorizeChangeClusterAdminPassword(user common.User) (ok bool, err common.AuthorizationError) { if !user.IsClusterAdmin() { return false, common.NewAuthorizationError("Insufficient permissions to change cluster admin password") } return true, "" }
func (self *CoordinatorImpl) ListDatabases(user common.User) ([]string, error) { if !user.IsClusterAdmin() { return nil, fmt.Errorf("Insufficient permission to list databases") } dbs := self.clusterConfiguration.GetDatabases() return dbs, nil }
func (self *CoordinatorImpl) CreateSubscription(requester common.User, subscription *cluster.Subscription) error { if !requester.IsClusterAdmin() { return common.NewAuthorizationError("Insufficient permissions") } return self.raftServer.SaveSubscription(subscription) return nil }
func (self *CoordinatorImpl) ListDatabases(user common.User) ([]*cluster.Database, error) { if !user.IsClusterAdmin() { return nil, common.NewAuthorizationError("Insufficient permissions to list databases") } dbs := self.clusterConfiguration.GetDatabases() return dbs, nil }
func (self *CoordinatorImpl) CreateClusterAdminUser(requester common.User, username string) error { if !requester.IsClusterAdmin() { return fmt.Errorf("Insufficient permissions") } if self.clusterConfiguration.clusterAdmins[username] != nil { return fmt.Errorf("User %s already exists", username) } return self.raftServer.SaveClusterAdminUser(&clusterAdmin{CommonUser{Name: username}}) }
func (self *CoordinatorImpl) CreateDatabase(user common.User, db string) error { if !user.IsClusterAdmin() { return fmt.Errorf("Insufficient permission to create database") } err := self.raftServer.CreateDatabase(db) if err != nil { return err } return nil }
func (self *CoordinatorImpl) DeleteContinuousQuery(user common.User, db string, id uint32) error { if !user.IsClusterAdmin() && !user.IsDbAdmin(db) { return common.NewAuthorizationError("Insufficient permissions to delete continuous query") } err := self.raftServer.DeleteContinuousQuery(db, id) if err != nil { return err } return nil }
func (self *CoordinatorImpl) DropDatabase(user common.User, db string) error { if !user.IsClusterAdmin() { return common.NewAuthorizationError("Insufficient permission to drop database") } if err := self.raftServer.DropDatabase(db); err != nil { return err } return self.datastore.DropDatabase(db) }
func (self *CoordinatorImpl) SubscribeTimeSeries(user common.User) error /*([]*Subscription, error)*/ { if !user.IsClusterAdmin() { return common.NewAuthorizationError("Insufficient permissions to make a subscription") } fmt.Println("subscribing to a database") //subscriptions := self.clusterConfiguration.GetSubscriptions() //return subscriptions, nil return nil }
func (self *CoordinatorImpl) CreateDatabase(user common.User, db string, replicationFactor uint8) error { if !user.IsClusterAdmin() { return common.NewAuthorizationError("Insufficient permission to create database") } err := self.raftServer.CreateDatabase(db, replicationFactor) if err != nil { return err } return nil }
func (self *CoordinatorImpl) ListSubscriptions(user common.User) error /*([]*Subscription, error)*/ { if !user.IsClusterAdmin() { return common.NewAuthorizationError("Insufficient permissions to list subscriptions") } fmt.Println("I reached coordinator listsubscriptions") subscriptions := self.clusterConfiguration.GetSubscriptions() fmt.Println(subscriptions) return nil //return subscriptions, nil }
func (self *CoordinatorImpl) GetDbUser(requester common.User, db string, username string) (common.User, error) { if !requester.IsClusterAdmin() && !requester.IsDbAdmin(db) { return nil, common.NewAuthorizationError("Insufficient permissions") } dbUser := self.clusterConfiguration.GetDbUser(db, username) if dbUser == nil { return nil, fmt.Errorf("Invalid username %s", username) } return dbUser, nil }
func (self *CoordinatorImpl) DeleteDbUser(requester common.User, db, username string) error { if !requester.IsClusterAdmin() && !requester.IsDbAdmin(db) { return common.NewAuthorizationError("Insufficient permissions") } user := self.clusterConfiguration.GetDbUser(db, username) if user == nil { return fmt.Errorf("User %s doesn't exist", username) } user.CommonUser.IsUserDeleted = true return self.raftServer.SaveDbUser(user) }