public class AclProvider extends kafka.security.authorizer.AclAuthorizer implements ExtendedAccessRuleProvider
kafka.security.authorizer.AclAuthorizer.AclCacheTuple, kafka.security.authorizer.AclAuthorizer.AclCacheTuple$, kafka.security.authorizer.AclAuthorizer.AclChangedNotificationHandler$, kafka.security.authorizer.AclAuthorizer.AclSeqs, kafka.security.authorizer.AclAuthorizer.ResourceOrdering, kafka.security.authorizer.AclAuthorizer.VersionedAcls, kafka.security.authorizer.AclAuthorizer.VersionedAcls$| Constructor and Description |
|---|
AclProvider() |
| Modifier and Type | Method and Description |
|---|---|
void |
addMatchingRules(io.confluent.security.authorizer.provider.ResourceAuthorizeRules matchingRules,
Set<org.apache.kafka.common.security.auth.KafkaPrincipal> matchingPrincipals,
String host,
io.confluent.security.authorizer.Operation operation,
io.confluent.security.authorizer.Scope resourceScope,
io.confluent.security.authorizer.ResourceType resourceType) |
Optional<org.apache.kafka.server.authorizer.Authorizer> |
asAuthorizer() |
List<org.apache.kafka.server.authorizer.AuthorizationResult> |
authorize(org.apache.kafka.server.authorizer.AuthorizableRequestContext requestContext,
List<org.apache.kafka.server.authorizer.Action> actions) |
io.confluent.security.authorizer.provider.AuthorizeRule |
findRule(Set<org.apache.kafka.common.security.auth.KafkaPrincipal> matchingPrincipals,
String host,
io.confluent.security.authorizer.Action action) |
boolean |
isSuperUser(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
io.confluent.security.authorizer.Scope scope) |
boolean |
mayDeny() |
String |
providerName() |
Map<org.apache.kafka.common.Endpoint,CompletableFuture<Void>> |
start(org.apache.kafka.server.authorizer.AuthorizerServerInfo serverInfo) |
CompletionStage<Void> |
start(org.apache.kafka.server.authorizer.internals.ConfluentAuthorizerServerInfo serverInfo,
Map<String,?> interBrokerListenerConfigs) |
void |
updateCache(org.apache.kafka.common.resource.ResourcePattern resource,
kafka.security.authorizer.AclAuthorizer.VersionedAcls versionedAcls) |
boolean |
usesMetadataFromThisKafkaCluster() |
aclCacheSnapshot, AclCacheTuple, AclChangedNotificationHandler, aclChangeNotificationExpirationMs_$eq, aclChangeNotificationExpirationMs, aclCount, acls, AllowEveryoneIfNoAclIsFoundProp, authorizeByResourceType, authorizerLogger, close, configPrefix, configure, createAcls, createAcls, debug, debug, deleteAcls, deleteAcls, error, error, explicitMetricName, fatal, fatal, findMatchingAclForPrincipal, findMatchingAclFromCacheByPrincipals, hasAclForResource, info, info, isDebugEnabled, isSuperUser, isTraceEnabled, logAuditMessage, logger, loggerName, logIdent_$eq, logIdent, matchingAcls, maxUpdateRetries_$eq, maxUpdateRetries, metricName, msgWithLogIdent, newGauge, newGauge, newGauge$default$3, newHistogram, newHistogram$default$2, newHistogram$default$3, newMeter, newMeter, newMeter$default$4, newTimer, newTimer$default$4, NoAcls, processAclChangeNotification, registerAclUpdateListener, removeMetric, removeMetric, removeMetric$default$2, shouldCheckResourceAclExistence, startZkChangeListeners, SuperUsersProp, trace, trace, validateAclCaches, warn, warn, WildcardHost, ZkConnectionTimeOutProp, ZkMaxInFlightRequests, ZkSessionTimeOutProp, ZkUrlPropclone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, waitaddMatchingRules, findRulepublic String providerName()
providerName in interface io.confluent.security.authorizer.provider.Providerpublic boolean isSuperUser(org.apache.kafka.common.security.auth.KafkaPrincipal principal,
io.confluent.security.authorizer.Scope scope)
isSuperUser in interface io.confluent.security.authorizer.provider.AccessRuleProviderpublic boolean mayDeny()
mayDeny in interface io.confluent.security.authorizer.provider.AccessRuleProviderpublic boolean usesMetadataFromThisKafkaCluster()
usesMetadataFromThisKafkaCluster in interface io.confluent.security.authorizer.provider.Providerpublic io.confluent.security.authorizer.provider.AuthorizeRule findRule(Set<org.apache.kafka.common.security.auth.KafkaPrincipal> matchingPrincipals, String host, io.confluent.security.authorizer.Action action)
findRule in interface ExtendedAccessRuleProviderpublic void addMatchingRules(io.confluent.security.authorizer.provider.ResourceAuthorizeRules matchingRules,
Set<org.apache.kafka.common.security.auth.KafkaPrincipal> matchingPrincipals,
String host,
io.confluent.security.authorizer.Operation operation,
io.confluent.security.authorizer.Scope resourceScope,
io.confluent.security.authorizer.ResourceType resourceType)
addMatchingRules in interface ExtendedAccessRuleProviderpublic CompletionStage<Void> start(org.apache.kafka.server.authorizer.internals.ConfluentAuthorizerServerInfo serverInfo, Map<String,?> interBrokerListenerConfigs)
start in interface io.confluent.security.authorizer.provider.Providerpublic Map<org.apache.kafka.common.Endpoint,CompletableFuture<Void>> start(org.apache.kafka.server.authorizer.AuthorizerServerInfo serverInfo)
start in interface org.apache.kafka.server.authorizer.Authorizerstart in class kafka.security.authorizer.AclAuthorizerpublic List<org.apache.kafka.server.authorizer.AuthorizationResult> authorize(org.apache.kafka.server.authorizer.AuthorizableRequestContext requestContext, List<org.apache.kafka.server.authorizer.Action> actions)
authorize in interface org.apache.kafka.server.authorizer.Authorizerauthorize in class kafka.security.authorizer.AclAuthorizerpublic void updateCache(org.apache.kafka.common.resource.ResourcePattern resource,
kafka.security.authorizer.AclAuthorizer.VersionedAcls versionedAcls)
updateCache in class kafka.security.authorizer.AclAuthorizerpublic Optional<org.apache.kafka.server.authorizer.Authorizer> asAuthorizer()
asAuthorizer in interface io.confluent.security.authorizer.provider.AccessRuleProvider