Hey Jun,

Yes and we support wild cards for all acl entities principal, hosts and
operation.

Thanks
Parth

On 4/21/15, 9:06 AM, "Jun Rao" <j...@confluent.io> wrote:

>Harsha, Parth,
>
>Thanks for the clarification. This makes sense. Perhaps we can clarify the
>meaning of those rules in the wiki.
>
>Related to this, it seems that we need to support wildcard in cli/request
>protocol for topics?
>
>Jun
>
>On Mon, Apr 20, 2015 at 9:07 PM, Parth Brahmbhatt <
>pbrahmbh...@hortonworks.com> wrote:
>
>> The iptables on unix supports the DENY operator, not that it should
>> matter. The deny operator can also be used to specify ³allow user1 to
>>READ
>> from topic1 from all hosts but host1,host2². Again we could add a host
>> group semantic and extra complexity around that, not sure if its worth
>>it.
>> In addition with DENY operator you are now not forced to create a
>>special
>> group just to support the authorization use case. I am not convinced
>>that
>> the operator it self is really all that confusing. There are 3 practical
>> use cases:
>> - Resource with no acl what so ever -> allow access to everyone ( just
>>for
>> backward compatibility, I would much rather fail close and force users
>>to
>> explicitly grant acls that allows access to all users.)
>> - Resource with some acl attached -> only users that have a matching
>>allow
>> acl are allowed (i.e. ³allow READ access to topic1 to user1 from all
>> hosts², only user1 has READ access and no other user has access of any
>> kind)
>> - Resource with some allow and some deny acl attached -> users are
>>allowed
>> to perform operation only when they satisfy allow acl and do not have
>> conflicting deny acl. Users that have no acl(allow or deny) will still
>>not
>> have any access. (i.e. ³allow READ access to topic1 to user1 from all
>> hosts except host1 and host², only user1 has access but not from host1
>>an
>> host2)
>>
>> I think we need to make a decision on deny primarily because with
>> introduction of acl management API, Acl is now a public class that will
>>be
>> used by Ranger/Santry and other authroization providers. In Current
>>design
>> the acl has a permissionType enum field with possible values of Allow
>>and
>> Deny. If we chose to remove deny we can assume all acls to be of allow
>> type and remove the permissionType field completely.
>>
>> Thanks
>> Parth
>>
>> On 4/20/15, 6:12 PM, "Gwen Shapira" <gshap...@cloudera.com> wrote:
>>
>> >I think thats how its done in pretty much any system I can think of.
>> >
>>
>>

Reply via email to