Hi Magnus, Have your concerns been addressed in the KIP?
Thanks, Rajini On Wed, Feb 13, 2019 at 3:33 PM Satish Duggana <satish.dugg...@gmail.com> wrote: > Hi Rajini, > That makes sense, thanks for the clarification. > > Satish. > > On Wed, Feb 13, 2019 at 7:30 PM Rajini Sivaram <rajinisiva...@gmail.com> > wrote: > > > > Thanks for the reviews! > > > > Hi Satish, > > > > The authorised operations returned will use the same values as the > > operations returned by the existing DescribeAclsResponse. AdminClient > will > > return these using the existing enum AclOperation. > > > > Hi Magnus, > > > > The MetadataResponse contains these two lines: > > > > - Metadata Response => throttle_time_ms [brokers] cluster_id > > controller_id [topic_metadata] [authorized_operations] <== ADDED > > authorized_operations > > - topic_metadata => error_code topic is_internal [partition_metadata] > > [authorized_operations] <== ADDED authorized_operations > > > > The first is for the cluster's authorized operations and the second for > > each topic. Did I misunderstand your question? The full set of operations > > for each resource type is included in the subsection `AdminClient API > > Changes`. > > > > Under `Rejected Alternatives` I have included addition of a separate > > request to get this information rather than extend an existing one. The > > rationale for including all the information in one request is to enable > > clients to get all relevant metadata using a single API rather than have > to > > send multiple requests, get responses and combine the two while resource > or > > ACLs may have changed in between. It seems neater to use a single API > since > > a user getting authorized operations is almost definitely going to do a > > Describe first and access control for both of these is controlled using > > Describe access. If we add new resource types with a corresponding > > Describe, we would simply need to add `authorized_operations` for their > > Describe. > > > > Hi Manikumar, > > > > Added IdempotentWrite for Cluster, thanks for pointing that out! I was > > thinking that if authorizer is not configured, we could return all > > supported operations since the user can perform all operations. Added a > > note to the KIP. > > > > Regards, > > > > Rajini > > > > > > > > On Wed, Feb 13, 2019 at 11:07 AM Manikumar <manikumar.re...@gmail.com> > > wrote: > > > > > Hi, > > > > > > Thanks for the KIP. > > > > > > 1. Can't we include IdempotentWrite/ClusterResource Operations for > Cluster > > > resource. > > > 2. What will be the API behaviour when the authorizer is not > configured?. I > > > assume we return empty list. > > > > > > Thanks, > > > Manikumar > > > > > > On Wed, Feb 13, 2019 at 12:33 AM Rajini Sivaram < > rajinisiva...@gmail.com> > > > wrote: > > > > > > > Hi all, > > > > > > > > I have created a KIP to optionally request authorised operations on > > > > resources when describing resources: > > > > > > > > > > > > > > > > https://cwiki.apache.org/confluence/display/KAFKA/KIP-430+-+Return+Authorized+Operations+in+Describe+Responses > > > > > > > > This includes only information that users with Describe access can > obtain > > > > using other means and hence is consistent with our security model. > It is > > > > intended to made it easier for clients to obtain this information. > > > > > > > > Feedback and suggestions welcome. > > > > > > > > Thank you, > > > > > > > > Rajini > > > > > > > >