Hi Parth,

I’m a little confused: why would Kafka need to interpret the JSON?  IIRC
KIP-11 even says that the TopicConfigData will just store the JSON. I’m
not really making a design recommendation here, just trying to understand
what you’re proposing.

On 4/15/15, 11:20 AM, "Parth Brahmbhatt" <pbrahmbh...@hortonworks.com>
wrote:

>Hi Michael,
>
>There is code in kafka codebase that reads and interprets the topic
>config JSON which has acls, owner and logconfig properties. There are 3
>use cases that we are supporting with current proposal:
>
>  *   You use out of box simpleAcl authorizer which is tied to the acl
>stored in topic config and the format is locked down.
>  *   You have a custom authorizer and a custom ACL store.  Ranger/Argus
>falls under this as they have their own acl store and ui that users use
>to configure acls on the cluster and cluster resources  like topic. It is
>upto the custom authorizer to leverage the kafka acl configs or
>completely ignore them as they have set a user expectation that only acls
>configured via their ui/system will be effective.
>  *   You have a custom authorizer but no custom Acl store. You are
>completely tied to Acl structure that we have provided in out of box
>implementation.
>
>Thanks
>Parth
>
>On 4/15/15, 10:31 AM, "Michael Herstine"
><mherst...@linkedin.com.INVALID<mailto:mherst...@linkedin.com.INVALID>>
>wrote:
>
>Hi Parth,
>
>One question that occurred to me at the end of today’s hangout: how tied
>are we to a particular ACL representation under your proposal? I know that
>TopicConfigCache will just contain JSON— if a particular site decides they
>want to represent their ACLs differently, and swap out the authorizer
>implementation, will that work?  I guess what I’m asking is whether
>there’s any code in the Kafka codebase that will interpret that JSON, or
>does that logic live exclusively in the authorizer?
>
>On 4/14/15, 10:56 PM, "Don Bosco Durai"
><bo...@apache.org<mailto:bo...@apache.org>> wrote:
>
>I also feel, having just IP would be more appropriate. Host lookup will
>unnecessary slow things down and would be insecure as you pointed out.
>
>With IP, it will be also able to setup policies (in future if needed) with
>ranges or netmasks and it would be more scalable.
>
>Bosco
>
>
>On 4/14/15, 1:40 PM, "Michael Herstine"
><mherst...@linkedin.com.INVALID<mailto:mherst...@linkedin.com.INVALID>>
>wrote:
>
>Hi Parth,
>
>Sorry to chime in so late, but I’ve got a minor question on the KIP.
>
>Several methods take a parameter named “host” of type String. Is that
>intended to be a hostname, or an IP address? If the former, I’m curious
>as
>to how that’s found (in my experience, when accepting an incoming socket
>connection, you only know the IP address, and there isn’t a way to map
>that to a hostname without a round trip to a DNS server, which is
>insecure
>anyway).
>
>
>On 3/25/15, 1:07 PM, "Parth Brahmbhatt"
><pbrahmbh...@hortonworks.com<mailto:pbrahmbh...@hortonworks.com>>
>wrote:
>
>Hi all,
>
>I have modified the KIP to reflect the recent change request from the
>reviewers. I have been working on the code and I have the server side
>code
>for authorization ready. I am now modifying the command line utilities.
>I
>would really appreciate if some of the committers can spend sometime to
>review the KIP so we can make progress on this.
>
>Thanks
>Parth
>
>On 3/18/15, 2:20 PM, "Michael Herstine"
><mherst...@linkedin.com.INVALID<mailto:mherst...@linkedin.com.INVALID>>
>wrote:
>
>Hi Parth,
>
>Thanks! A few questions:
>
>1. Do you want to permit rules in your ACLs that DENY access as well as
>ALLOW? This can be handy setting up rules that have exceptions. E.g.
>“Allow principal P to READ resource R from all hosts” with “Deny
>principal
>P READ access to resource R from host H1” in combination would allow P
>to
>READ R from all hosts *except* H1.
>
>2. When a topic is newly created, will there be an ACL created for it?
>If
>not, would that not deny subsequent access to it?
>
>(nit) Maybe use Principal instead of String to represent principals?
>
>
>On 3/9/15, 11:48 AM, "Don Bosco Durai"
><bo...@apache.org<mailto:bo...@apache.org>> wrote:
>
>Parth
>
>Overall it is looking good. Couple of questionsŠ
>
>- Can you give an example how the policies will look like in the
>default
>implementation?
>- In the operations, can we support ³CONNECT² also? This can be used
>during Session connection
>- Regarding access control for ³Topic Creation², since we can¹t do it
>on
>the server side, can we de-scope it for? And plan it as a future
>feature
>request?
>
>Thanks
>
>Bosco
>
>
>On 3/6/15, 8:10 AM, "Harsha" <ka...@harsha.io<mailto:ka...@harsha.io>>
>wrote:
>
>Hi Parth,
>            Thanks for putting this together. Overall it looks good
>to
>            me. Although AdminUtils is a concern KIP-4  can probably
>fix
>            that part.
>Thanks,
>Harsha
>
>On Thu, Mar 5, 2015, at 10:39 AM, Parth Brahmbhatt wrote:
>Forgot to add links to wiki and jira.
>Link to wiki:
>https://cwiki.apache.org/confluence/display/KAFKA/KIP-11+-+Authoriza
>t
>i
>o
>n
>+
>Interface
>Link to Jira: https://issues.apache.org/jira/browse/KAFKA-1688
>Thanks
>Parth
>From: Parth Brahmbhatt
><pbrahmbh...@hortonworks.com<mailto:pbrahmbh...@hortonworks.com><mailto:pb
>rahmbh...@hortonworks.com>>
>Date: Thursday, March 5, 2015 at 10:33 AM
>To: 
>"dev@kafka.apache.org<mailto:dev@kafka.apache.org><mailto:dev@kafka.apache
>.org>"
><dev@kafka.apache.org<mailto:dev@kafka.apache.org><mailto:dev@kafka.apache
>.org>>
>Subject: [DISCUSS] KIP-11- Authorization design for kafka security
>Hi,
>KIP-11 is open for discussion , I have updated the wiki with the
>design
>and open questions.
>Thanks
>Parth
>
>
>
>
>
>
>
>
>

Reply via email to