If there are no other concerns or suggestions, I will start vote on this KIP later today.
Thanks, Rajini On Mon, Feb 18, 2019 at 10:09 AM Rajini Sivaram <rajinisiva...@gmail.com> wrote: > Hi Magnus, > > Have your concerns been addressed in the KIP? > > Thanks, > > Rajini > > On Wed, Feb 13, 2019 at 3:33 PM Satish Duggana <satish.dugg...@gmail.com> > wrote: > >> Hi Rajini, >> That makes sense, thanks for the clarification. >> >> Satish. >> >> On Wed, Feb 13, 2019 at 7:30 PM Rajini Sivaram <rajinisiva...@gmail.com> >> wrote: >> > >> > Thanks for the reviews! >> > >> > Hi Satish, >> > >> > The authorised operations returned will use the same values as the >> > operations returned by the existing DescribeAclsResponse. AdminClient >> will >> > return these using the existing enum AclOperation. >> > >> > Hi Magnus, >> > >> > The MetadataResponse contains these two lines: >> > >> > - Metadata Response => throttle_time_ms [brokers] cluster_id >> > controller_id [topic_metadata] [authorized_operations] <== ADDED >> > authorized_operations >> > - topic_metadata => error_code topic is_internal [partition_metadata] >> > [authorized_operations] <== ADDED authorized_operations >> > >> > The first is for the cluster's authorized operations and the second for >> > each topic. Did I misunderstand your question? The full set of >> operations >> > for each resource type is included in the subsection `AdminClient API >> > Changes`. >> > >> > Under `Rejected Alternatives` I have included addition of a separate >> > request to get this information rather than extend an existing one. The >> > rationale for including all the information in one request is to enable >> > clients to get all relevant metadata using a single API rather than >> have to >> > send multiple requests, get responses and combine the two while >> resource or >> > ACLs may have changed in between. It seems neater to use a single API >> since >> > a user getting authorized operations is almost definitely going to do a >> > Describe first and access control for both of these is controlled using >> > Describe access. If we add new resource types with a corresponding >> > Describe, we would simply need to add `authorized_operations` for their >> > Describe. >> > >> > Hi Manikumar, >> > >> > Added IdempotentWrite for Cluster, thanks for pointing that out! I was >> > thinking that if authorizer is not configured, we could return all >> > supported operations since the user can perform all operations. Added a >> > note to the KIP. >> > >> > Regards, >> > >> > Rajini >> > >> > >> > >> > On Wed, Feb 13, 2019 at 11:07 AM Manikumar <manikumar.re...@gmail.com> >> > wrote: >> > >> > > Hi, >> > > >> > > Thanks for the KIP. >> > > >> > > 1. Can't we include IdempotentWrite/ClusterResource Operations for >> Cluster >> > > resource. >> > > 2. What will be the API behaviour when the authorizer is not >> configured?. I >> > > assume we return empty list. >> > > >> > > Thanks, >> > > Manikumar >> > > >> > > On Wed, Feb 13, 2019 at 12:33 AM Rajini Sivaram < >> rajinisiva...@gmail.com> >> > > wrote: >> > > >> > > > Hi all, >> > > > >> > > > I have created a KIP to optionally request authorised operations on >> > > > resources when describing resources: >> > > > >> > > > >> > > > >> > > >> https://cwiki.apache.org/confluence/display/KAFKA/KIP-430+-+Return+Authorized+Operations+in+Describe+Responses >> > > > >> > > > This includes only information that users with Describe access can >> obtain >> > > > using other means and hence is consistent with our security model. >> It is >> > > > intended to made it easier for clients to obtain this information. >> > > > >> > > > Feedback and suggestions welcome. >> > > > >> > > > Thank you, >> > > > >> > > > Rajini >> > > > >> > > >> >