Tabnine Logo
PrivilegeObject$Builder.setAuthorizables
Code IndexAdd Tabnine to your IDE (free)

How to use
setAuthorizables
method
in
org.apache.sentry.provider.db.generic.service.persistent.PrivilegeObject$Builder

Best Java code snippets using org.apache.sentry.provider.db.generic.service.persistent.PrivilegeObject$Builder.setAuthorizables (Showing top 20 results out of 315)

origin: apache/incubator-sentry

.setService(mPrivilege.getServiceName())
.setAction(mPrivilege.getAction())
.setAuthorizables(mPrivilege.getAuthorizables())
.withGrantOption(mPrivilege.getGrantOption())
.build());
origin: apache/sentry

Set<PrivilegeObject> getPrivilegesByProvider(String component,
                       String service, Set<MSentryRole> roles,
                       List<? extends Authorizable> authorizables, PersistenceManager pm) {
 Set<PrivilegeObject> privileges = Sets.newHashSet();
 if (roles == null || roles.isEmpty()) {
  return privileges;
 }
 MSentryGMPrivilege parentPrivilege = new MSentryGMPrivilege(component, service, authorizables, null, null);
 Set<MSentryGMPrivilege> privilegeGraph = Sets.newHashSet();
 privilegeGraph.addAll(populateIncludePrivileges(roles, parentPrivilege, pm));
 for (MSentryGMPrivilege mPrivilege : privilegeGraph) {
  privileges.add(new Builder()
               .setComponent(mPrivilege.getComponentName())
               .setService(mPrivilege.getServiceName())
               .setAction(mPrivilege.getAction())
               .setAuthorizables(mPrivilege.getAuthorizables())
               .withGrantOption(mPrivilege.getGrantOption())
               .build());
 }
 return privileges;
}
origin: apache/incubator-sentry

public Set<PrivilegeObject> getPrivilegesByProvider(String component,
  String service, Set<MSentryRole> roles,
  List<? extends Authorizable> authorizables, PersistenceManager pm) {
 Set<PrivilegeObject> privileges = Sets.newHashSet();
 if (roles == null || roles.isEmpty()) {
  return privileges;
 }
 MSentryGMPrivilege parentPrivilege = new MSentryGMPrivilege(component, service, authorizables, null, null);
 Set<MSentryGMPrivilege> privilegeGraph = Sets.newHashSet();
 privilegeGraph.addAll(populateIncludePrivileges(roles, parentPrivilege, pm));
 for (MSentryGMPrivilege mPrivilege : privilegeGraph) {
  privileges.add(new Builder()
               .setComponent(mPrivilege.getComponentName())
               .setService(mPrivilege.getServiceName())
               .setAction(mPrivilege.getAction())
               .setAuthorizables(mPrivilege.getAuthorizables())
               .withGrantOption(mPrivilege.getGrantOption())
               .build());
 }
 return privileges;
}
origin: apache/sentry

.setAction(SolrConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
.withGrantOption(true)
.build();
origin: apache/sentry

.setAction(SolrConstants.ALL)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
.build();
origin: apache/incubator-sentry

.setAction(SearchConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Collections.singletonList(new Collection(COLLECTION_NAME)))
.withGrantOption(null)
.build();
.setAction(SearchConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Collections.singletonList(new Collection(COLLECTION_NAME)))
.withGrantOption(true)
.build();
.setAction(SearchConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Collections.singletonList(new Collection(COLLECTION_NAME)))
.withGrantOption(false)
.build();
origin: apache/sentry

.setAction(SolrConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Collections.singletonList(new Collection(COLLECTION_NAME)))
.withGrantOption(null)
.build();
.setAction(SolrConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Collections.singletonList(new Collection(COLLECTION_NAME)))
.withGrantOption(true)
.build();
.setAction(SolrConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Collections.singletonList(new Collection(COLLECTION_NAME)))
.withGrantOption(false)
.build();
origin: apache/sentry

.setAction(SolrConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME),new Field(FIELD_NAME)))
.build();
origin: apache/incubator-sentry

.setAction(SearchConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME),new Field(FIELD_NAME)))
.build();
origin: apache/sentry

.setService(mPrivilege.getServiceName())
.setAction(mPrivilege.getAction())
.setAuthorizables(mPrivilege.getAuthorizables())
.withGrantOption(mPrivilege.getGrantOption())
.build());
origin: apache/sentry

.setAction(SolrConstants.ALL)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME), new Field(FIELD_NAME)))
.build();
origin: apache/incubator-sentry

.setAction(SearchConstants.ALL)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME), new Field(FIELD_NAME)))
.build();
origin: apache/sentry

@Test
public void testGrantWithGrantOption() throws Exception {
 addGroupsToUser(GRANT_OPTION_USER, GRANT_OPTION_GROUP);
 addGroupsToUser(NO_GRANT_OPTION_USER, NO_GRANT_OPTION_GROUP);
 writePolicyFile();
 String roleName1 = "r1";
 String grantor = "g1";
 sentryStore.createRole(SEARCH, roleName1, grantor);
 /**
  * grant query privilege to role r1 with grant option
  */
 PrivilegeObject queryPrivilege = new Builder()
   .setComponent(SEARCH)
   .setAction(SolrConstants.QUERY)
   .setService(SERVICE)
   .setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
   .withGrantOption(true)
   .build();
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName1, queryPrivilege,ADMIN_USER);
 sentryStore.alterRoleAddGroups(SEARCH, roleName1,
   Sets.newHashSet(GRANT_OPTION_GROUP), grantor);
 /**
  * the user with grant option grant query privilege to rolr r2
  */
 String roleName2 = "r2";
 sentryStore.createRole(SEARCH, roleName2, grantor);
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName2, queryPrivilege, GRANT_OPTION_USER);
 assertEquals(Sets.newHashSet(queryPrivilege),
   sentryStore.getPrivilegesByRole(SEARCH, Sets.newHashSet(roleName2)));
}
origin: apache/incubator-sentry

.setAction(SearchConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME), new Field(FIELD_NAME)))
.build();
origin: apache/sentry

.setAction(SolrConstants.QUERY)
.setService(SERVICE)
.setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME), new Field(FIELD_NAME)))
.build();
origin: apache/incubator-sentry

@Test
public void testGrantWithGrantOption() throws Exception {
 addGroupsToUser(GRANT_OPTION_USER, GRANT_OPTION_GROUP);
 addGroupsToUser(NO_GRANT_OPTION_USER, NO_GRANT_OPTION_GROUP);
 writePolicyFile();
 String roleName1 = "r1";
 String grantor = "g1";
 sentryStore.createRole(SEARCH, roleName1, grantor);
 /**
  * grant query privilege to role r1 with grant option
  */
 PrivilegeObject queryPrivilege = new Builder()
   .setComponent(SEARCH)
   .setAction(SearchConstants.QUERY)
   .setService(SERVICE)
   .setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
   .withGrantOption(true)
   .build();
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName1, queryPrivilege,ADMIN_USER);
 sentryStore.alterRoleAddGroups(SEARCH, roleName1,
   Sets.newHashSet(GRANT_OPTION_GROUP), grantor);
 /**
  * the user with grant option grant query privilege to rolr r2
  */
 String roleName2 = "r2";
 sentryStore.createRole(SEARCH, roleName2, grantor);
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName2, queryPrivilege, GRANT_OPTION_USER);
 assertEquals(Sets.newHashSet(queryPrivilege),
   sentryStore.getPrivilegesByRole(SEARCH, Sets.newHashSet(roleName2)));
}
origin: apache/incubator-sentry

@Test
public void testGetPrivilegesByRoleName() throws Exception {
 String roleName1 = "r1";
 String roleName2 = "r2";
 String grantor = "g1";
 PrivilegeObject queryPrivilege = new Builder()
   .setComponent(SEARCH)
   .setAction(SearchConstants.QUERY)
   .setService(SERVICE)
   .setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
   .build();
 sentryStore.createRole(SEARCH, roleName1, grantor);
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName1, queryPrivilege,
   ADMIN_USER);
 PrivilegeObject updatePrivilege = new Builder()
   .setComponent(SEARCH)
   .setAction(SearchConstants.QUERY)
   .setService(SERVICE)
   .setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
   .build();
 sentryStore.createRole(SEARCH, roleName2, grantor);
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName2, updatePrivilege,
   ADMIN_USER);
 assertEquals(Sets.newHashSet(queryPrivilege,updatePrivilege),
   sentryStore.getPrivilegesByRole(SEARCH, Sets.newHashSet(roleName1,roleName2)));
}
origin: apache/sentry

@Test
public void testGetPrivilegesByRoleName() throws Exception {
 String roleName1 = "r1";
 String roleName2 = "r2";
 String grantor = "g1";
 PrivilegeObject queryPrivilege = new Builder()
   .setComponent(SEARCH)
   .setAction(SolrConstants.QUERY)
   .setService(SERVICE)
   .setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
   .build();
 sentryStore.createRole(SEARCH, roleName1, grantor);
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName1, queryPrivilege,
   ADMIN_USER);
 PrivilegeObject updatePrivilege = new Builder()
   .setComponent(SEARCH)
   .setAction(SolrConstants.QUERY)
   .setService(SERVICE)
   .setAuthorizables(Arrays.asList(new Collection(COLLECTION_NAME)))
   .build();
 sentryStore.createRole(SEARCH, roleName2, grantor);
 sentryStore.alterRoleGrantPrivilege(SEARCH, roleName2, updatePrivilege,
   ADMIN_USER);
 assertEquals(Sets.newHashSet(queryPrivilege,updatePrivilege),
   sentryStore.getPrivilegesByRole(SEARCH, Sets.newHashSet(roleName1,roleName2)));
}
origin: apache/incubator-sentry

private PrivilegeObject toPrivilegeObject(TSentryPrivilege tSentryPrivilege) {
 Boolean grantOption;
 if (tSentryPrivilege.getGrantOption().equals(TSentryGrantOption.TRUE)) {
  grantOption = true;
 } else if (tSentryPrivilege.getGrantOption().equals(TSentryGrantOption.FALSE)) {
  grantOption = false;
 } else {
  grantOption = null;
 }
 return new Builder().setComponent(tSentryPrivilege.getComponent())
                      .setService(tSentryPrivilege.getServiceName())
                      .setAuthorizables(toAuthorizables(tSentryPrivilege.getAuthorizables()))
                      .setAction(tSentryPrivilege.getAction())
                      .withGrantOption(grantOption)
                      .build();
}
origin: apache/sentry

private PrivilegeObject toPrivilegeObject(TSentryPrivilege tSentryPrivilege) {
 Boolean grantOption;
 if (tSentryPrivilege.getGrantOption().equals(TSentryGrantOption.TRUE)) {
  grantOption = true;
 } else if (tSentryPrivilege.getGrantOption().equals(TSentryGrantOption.FALSE)) {
  grantOption = false;
 } else {
  grantOption = null;
 }
 return new Builder().setComponent(tSentryPrivilege.getComponent())
                      .setService(tSentryPrivilege.getServiceName())
                      .setAuthorizables(toAuthorizables(tSentryPrivilege.getAuthorizables()))
                      .setAction(tSentryPrivilege.getAction())
                      .withGrantOption(grantOption)
                      .build();
}
org.apache.sentry.provider.db.generic.service.persistentPrivilegeObject$BuildersetAuthorizables

Popular methods of PrivilegeObject$Builder

  • <init>
  • build
  • setAction
  • setComponent
  • setService
  • withGrantOption
  • toLowerAuthorizableName
    TolowerCase the authorizable name, the authorizable type is define when it was created. Take the Sol

Popular in Java

  • Start an intent from android
  • getSystemService (Context)
  • getResourceAsStream (ClassLoader)
  • scheduleAtFixedRate (Timer)
  • File (java.io)
    An "abstract" representation of a file system entity identified by a pathname. The pathname may be a
  • BigDecimal (java.math)
    An immutable arbitrary-precision signed decimal.A value is represented by an arbitrary-precision "un
  • BlockingQueue (java.util.concurrent)
    A java.util.Queue that additionally supports operations that wait for the queue to become non-empty
  • ConcurrentHashMap (java.util.concurrent)
    A plug-in replacement for JDK1.5 java.util.concurrent.ConcurrentHashMap. This version is based on or
  • Logger (org.apache.log4j)
    This is the central class in the log4j package. Most logging operations, except configuration, are d
  • Runner (org.openjdk.jmh.runner)
  • CodeWhisperer alternatives
Tabnine Logo
  • Products

    Search for Java codeSearch for JavaScript code
  • IDE Plugins

    IntelliJ IDEAWebStormVisual StudioAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimGoLandRubyMineEmacsJupyter NotebookJupyter LabRiderDataGripAppCode
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogTabnine AcademyTerms of usePrivacy policyJava Code IndexJavascript Code Index
Get Tabnine for your IDE now