void |
AccessControl.checkCanAddColumns(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to add columns to the specified table.
|
void |
AccessControlManager.checkCanAddColumns(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanAddColumns(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanAddColumns(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanAddColumns(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanCreateMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
Check if identity is allowed to create the specified materialized view.
|
void |
AccessControlManager.checkCanCreateMaterializedView(SecurityContext securityContext,
QualifiedObjectName materializedViewName) |
|
void |
AllowAllAccessControl.checkCanCreateMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
DenyAllAccessControl.checkCanCreateMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
ForwardingAccessControl.checkCanCreateMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
AccessControl.checkCanCreateRole(SecurityContext context,
String role,
Optional<TrinoPrincipal> grantor,
String catalogName) |
Check if identity is allowed to create the specified role.
|
void |
AccessControlManager.checkCanCreateRole(SecurityContext securityContext,
String role,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanCreateRole(SecurityContext context,
String role,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanCreateRole(SecurityContext context,
String role,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanCreateRole(SecurityContext context,
String role,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
AccessControl.checkCanCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
Check if identity is allowed to create the specified schema.
|
void |
AccessControlManager.checkCanCreateSchema(SecurityContext securityContext,
CatalogSchemaName schemaName) |
|
void |
AllowAllAccessControl.checkCanCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
DenyAllAccessControl.checkCanCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
ForwardingAccessControl.checkCanCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
AccessControl.checkCanCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to create the specified table.
|
void |
AccessControlManager.checkCanCreateTable(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanCreateView(SecurityContext context,
QualifiedObjectName viewName) |
Check if identity is allowed to create the specified view.
|
void |
AccessControlManager.checkCanCreateView(SecurityContext securityContext,
QualifiedObjectName viewName) |
|
void |
AllowAllAccessControl.checkCanCreateView(SecurityContext context,
QualifiedObjectName viewName) |
|
void |
DenyAllAccessControl.checkCanCreateView(SecurityContext context,
QualifiedObjectName viewName) |
|
void |
ForwardingAccessControl.checkCanCreateView(SecurityContext context,
QualifiedObjectName viewName) |
|
void |
AccessControl.checkCanCreateViewWithSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
Check if identity is allowed to create a view that selects from the specified columns.
|
void |
AccessControlManager.checkCanCreateViewWithSelectFromColumns(SecurityContext securityContext,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
AllowAllAccessControl.checkCanCreateViewWithSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
DenyAllAccessControl.checkCanCreateViewWithSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
ForwardingAccessControl.checkCanCreateViewWithSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
ViewAccessControl.checkCanCreateViewWithSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
AccessControl.checkCanDeleteFromTable(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to delete from the specified table.
|
void |
AccessControlManager.checkCanDeleteFromTable(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanDeleteFromTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanDeleteFromTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanDeleteFromTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanDropColumn(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to drop columns from the specified table.
|
void |
AccessControlManager.checkCanDropColumn(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanDropColumn(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanDropColumn(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanDropColumn(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanDropMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
Check if identity is allowed to drop the specified materialized view.
|
void |
AccessControlManager.checkCanDropMaterializedView(SecurityContext securityContext,
QualifiedObjectName materializedViewName) |
|
void |
AllowAllAccessControl.checkCanDropMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
DenyAllAccessControl.checkCanDropMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
ForwardingAccessControl.checkCanDropMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
AccessControl.checkCanDropRole(SecurityContext context,
String role,
String catalogName) |
Check if identity is allowed to drop the specified role.
|
void |
AccessControlManager.checkCanDropRole(SecurityContext securityContext,
String role,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanDropRole(SecurityContext context,
String role,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanDropRole(SecurityContext context,
String role,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanDropRole(SecurityContext context,
String role,
String catalogName) |
|
void |
AccessControl.checkCanDropSchema(SecurityContext context,
CatalogSchemaName schemaName) |
Check if identity is allowed to drop the specified schema.
|
void |
AccessControlManager.checkCanDropSchema(SecurityContext securityContext,
CatalogSchemaName schemaName) |
|
void |
AllowAllAccessControl.checkCanDropSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
DenyAllAccessControl.checkCanDropSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
ForwardingAccessControl.checkCanDropSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
AccessControl.checkCanDropTable(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to drop the specified table.
|
void |
AccessControlManager.checkCanDropTable(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanDropTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanDropTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanDropTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanDropView(SecurityContext context,
QualifiedObjectName viewName) |
Check if identity is allowed to drop the specified view.
|
void |
AccessControlManager.checkCanDropView(SecurityContext securityContext,
QualifiedObjectName viewName) |
|
void |
AllowAllAccessControl.checkCanDropView(SecurityContext context,
QualifiedObjectName viewName) |
|
void |
DenyAllAccessControl.checkCanDropView(SecurityContext context,
QualifiedObjectName viewName) |
|
void |
ForwardingAccessControl.checkCanDropView(SecurityContext context,
QualifiedObjectName viewName) |
|
void |
AccessControl.checkCanExecuteFunction(SecurityContext context,
String functionName) |
Check if identity is allowed to execute function
|
void |
AccessControlManager.checkCanExecuteFunction(SecurityContext context,
String functionName) |
|
void |
AllowAllAccessControl.checkCanExecuteFunction(SecurityContext context,
String functionName) |
|
void |
DenyAllAccessControl.checkCanExecuteFunction(SecurityContext context,
String functionName) |
|
void |
ForwardingAccessControl.checkCanExecuteFunction(SecurityContext context,
String functionName) |
|
void |
ViewAccessControl.checkCanExecuteFunction(SecurityContext context,
String functionName) |
|
void |
AccessControl.checkCanExecuteProcedure(SecurityContext context,
QualifiedObjectName procedureName) |
Check if identity is allowed to execute procedure
|
void |
AccessControlManager.checkCanExecuteProcedure(SecurityContext securityContext,
QualifiedObjectName procedureName) |
|
void |
AllowAllAccessControl.checkCanExecuteProcedure(SecurityContext context,
QualifiedObjectName procedureName) |
|
void |
DenyAllAccessControl.checkCanExecuteProcedure(SecurityContext context,
QualifiedObjectName procedureName) |
|
void |
ForwardingAccessControl.checkCanExecuteProcedure(SecurityContext context,
QualifiedObjectName procedureName) |
|
void |
AccessControl.checkCanGrantExecuteFunctionPrivilege(SecurityContext context,
String functionName,
Identity grantee,
boolean grantOption) |
Check if identity is allowed to create a view that executes the function.
|
void |
AccessControlManager.checkCanGrantExecuteFunctionPrivilege(SecurityContext securityContext,
String functionName,
Identity grantee,
boolean grantOption) |
|
void |
AllowAllAccessControl.checkCanGrantExecuteFunctionPrivilege(SecurityContext context,
String functionName,
Identity grantee,
boolean grantOption) |
|
void |
DenyAllAccessControl.checkCanGrantExecuteFunctionPrivilege(SecurityContext context,
String functionName,
Identity grantee,
boolean grantOption) |
|
void |
ForwardingAccessControl.checkCanGrantExecuteFunctionPrivilege(SecurityContext context,
String functionName,
Identity grantee,
boolean grantOption) |
|
void |
ViewAccessControl.checkCanGrantExecuteFunctionPrivilege(SecurityContext context,
String functionName,
Identity grantee,
boolean grantOption) |
|
void |
AccessControl.checkCanGrantRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
Check if identity is allowed to grant the specified roles to the specified principals.
|
void |
AccessControlManager.checkCanGrantRoles(SecurityContext securityContext,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanGrantRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanGrantRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanGrantRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
AccessControl.checkCanGrantSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal grantee,
boolean grantOption) |
Check if identity is allowed to grant a privilege to the grantee on the specified schema.
|
void |
AccessControlManager.checkCanGrantSchemaPrivilege(SecurityContext securityContext,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
AllowAllAccessControl.checkCanGrantSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
DenyAllAccessControl.checkCanGrantSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
ForwardingAccessControl.checkCanGrantSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
AccessControl.checkCanGrantTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal grantee,
boolean grantOption) |
Check if identity is allowed to grant a privilege to the grantee on the specified table.
|
void |
AccessControlManager.checkCanGrantTablePrivilege(SecurityContext securityContext,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
AllowAllAccessControl.checkCanGrantTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
DenyAllAccessControl.checkCanGrantTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
ForwardingAccessControl.checkCanGrantTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal grantee,
boolean grantOption) |
|
void |
AccessControl.checkCanInsertIntoTable(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to insert into the specified table.
|
void |
AccessControlManager.checkCanInsertIntoTable(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanInsertIntoTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanInsertIntoTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanInsertIntoTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanRefreshMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
Check if identity is allowed to refresh the specified materialized view.
|
void |
AccessControlManager.checkCanRefreshMaterializedView(SecurityContext securityContext,
QualifiedObjectName materializedViewName) |
|
void |
AllowAllAccessControl.checkCanRefreshMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
DenyAllAccessControl.checkCanRefreshMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
ForwardingAccessControl.checkCanRefreshMaterializedView(SecurityContext context,
QualifiedObjectName materializedViewName) |
|
void |
AccessControl.checkCanRenameColumn(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to rename a column in the specified table.
|
void |
AccessControlManager.checkCanRenameColumn(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanRenameColumn(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanRenameColumn(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanRenameColumn(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanRenameSchema(SecurityContext context,
CatalogSchemaName schemaName,
String newSchemaName) |
Check if identity is allowed to rename the specified schema.
|
void |
AccessControlManager.checkCanRenameSchema(SecurityContext securityContext,
CatalogSchemaName schemaName,
String newSchemaName) |
|
void |
AllowAllAccessControl.checkCanRenameSchema(SecurityContext context,
CatalogSchemaName schemaName,
String newSchemaName) |
|
void |
DenyAllAccessControl.checkCanRenameSchema(SecurityContext context,
CatalogSchemaName schemaName,
String newSchemaName) |
|
void |
ForwardingAccessControl.checkCanRenameSchema(SecurityContext context,
CatalogSchemaName schemaName,
String newSchemaName) |
|
void |
AccessControl.checkCanRenameTable(SecurityContext context,
QualifiedObjectName tableName,
QualifiedObjectName newTableName) |
Check if identity is allowed to rename the specified table.
|
void |
AccessControlManager.checkCanRenameTable(SecurityContext securityContext,
QualifiedObjectName tableName,
QualifiedObjectName newTableName) |
|
void |
AllowAllAccessControl.checkCanRenameTable(SecurityContext context,
QualifiedObjectName tableName,
QualifiedObjectName newTableName) |
|
void |
DenyAllAccessControl.checkCanRenameTable(SecurityContext context,
QualifiedObjectName tableName,
QualifiedObjectName newTableName) |
|
void |
ForwardingAccessControl.checkCanRenameTable(SecurityContext context,
QualifiedObjectName tableName,
QualifiedObjectName newTableName) |
|
void |
AccessControl.checkCanRenameView(SecurityContext context,
QualifiedObjectName viewName,
QualifiedObjectName newViewName) |
Check if identity is allowed to rename the specified view.
|
void |
AccessControlManager.checkCanRenameView(SecurityContext securityContext,
QualifiedObjectName viewName,
QualifiedObjectName newViewName) |
|
void |
AllowAllAccessControl.checkCanRenameView(SecurityContext context,
QualifiedObjectName viewName,
QualifiedObjectName newViewName) |
|
void |
DenyAllAccessControl.checkCanRenameView(SecurityContext context,
QualifiedObjectName viewName,
QualifiedObjectName newViewName) |
|
void |
ForwardingAccessControl.checkCanRenameView(SecurityContext context,
QualifiedObjectName viewName,
QualifiedObjectName newViewName) |
|
void |
AccessControl.checkCanRevokeRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
Check if identity is allowed to revoke the specified roles from the specified principals.
|
void |
AccessControlManager.checkCanRevokeRoles(SecurityContext securityContext,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanRevokeRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanRevokeRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanRevokeRoles(SecurityContext context,
Set<String> roles,
Set<TrinoPrincipal> grantees,
boolean adminOption,
Optional<TrinoPrincipal> grantor,
String catalogName) |
|
void |
AccessControl.checkCanRevokeSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal revokee,
boolean grantOption) |
Check if identity is allowed to revoke a privilege from the revokee on the specified schema.
|
void |
AccessControlManager.checkCanRevokeSchemaPrivilege(SecurityContext securityContext,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
AllowAllAccessControl.checkCanRevokeSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
DenyAllAccessControl.checkCanRevokeSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
ForwardingAccessControl.checkCanRevokeSchemaPrivilege(SecurityContext context,
Privilege privilege,
CatalogSchemaName schemaName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
AccessControl.checkCanRevokeTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal revokee,
boolean grantOption) |
Check if identity is allowed to revoke a privilege from the revokee on the specified table.
|
void |
AccessControlManager.checkCanRevokeTablePrivilege(SecurityContext securityContext,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
AllowAllAccessControl.checkCanRevokeTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
DenyAllAccessControl.checkCanRevokeTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
ForwardingAccessControl.checkCanRevokeTablePrivilege(SecurityContext context,
Privilege privilege,
QualifiedObjectName tableName,
TrinoPrincipal revokee,
boolean grantOption) |
|
void |
AccessControl.checkCanSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
Check if identity is allowed to select from the specified columns.
|
void |
AccessControlManager.checkCanSelectFromColumns(SecurityContext securityContext,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
AllowAllAccessControl.checkCanSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
DenyAllAccessControl.checkCanSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
ForwardingAccessControl.checkCanSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
ViewAccessControl.checkCanSelectFromColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> columnNames) |
|
void |
AccessControl.checkCanSetCatalogSessionProperty(SecurityContext context,
String catalogName,
String propertyName) |
Check if identity is allowed to set the specified catalog property.
|
void |
AccessControlManager.checkCanSetCatalogSessionProperty(SecurityContext securityContext,
String catalogName,
String propertyName) |
|
void |
AllowAllAccessControl.checkCanSetCatalogSessionProperty(SecurityContext context,
String catalogName,
String propertyName) |
|
void |
DenyAllAccessControl.checkCanSetCatalogSessionProperty(SecurityContext context,
String catalogName,
String propertyName) |
|
void |
ForwardingAccessControl.checkCanSetCatalogSessionProperty(SecurityContext context,
String catalogName,
String propertyName) |
|
void |
AccessControl.checkCanSetColumnComment(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to comment the specified column.
|
void |
AccessControlManager.checkCanSetColumnComment(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanSetColumnComment(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanSetColumnComment(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanSetColumnComment(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanSetRole(SecurityContext context,
String role,
String catalogName) |
Check if identity is allowed to set role for specified catalog.
|
void |
AccessControlManager.checkCanSetRole(SecurityContext securityContext,
String role,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanSetRole(SecurityContext context,
String role,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanSetRole(SecurityContext context,
String role,
String catalog) |
|
void |
ForwardingAccessControl.checkCanSetRole(SecurityContext context,
String role,
String catalogName) |
|
void |
AccessControl.checkCanSetSchemaAuthorization(SecurityContext context,
CatalogSchemaName schemaName,
TrinoPrincipal principal) |
Check if identity is allowed to change the specified schema's user/role.
|
void |
AccessControlManager.checkCanSetSchemaAuthorization(SecurityContext securityContext,
CatalogSchemaName schemaName,
TrinoPrincipal principal) |
|
void |
AllowAllAccessControl.checkCanSetSchemaAuthorization(SecurityContext context,
CatalogSchemaName schemaName,
TrinoPrincipal principal) |
|
void |
DenyAllAccessControl.checkCanSetSchemaAuthorization(SecurityContext context,
CatalogSchemaName schemaName,
TrinoPrincipal principal) |
|
void |
ForwardingAccessControl.checkCanSetSchemaAuthorization(SecurityContext context,
CatalogSchemaName schemaName,
TrinoPrincipal principal) |
|
void |
AccessControl.checkCanSetTableAuthorization(SecurityContext context,
QualifiedObjectName tableName,
TrinoPrincipal principal) |
Check if identity is allowed to change the specified table's user/role.
|
void |
AccessControlManager.checkCanSetTableAuthorization(SecurityContext securityContext,
QualifiedObjectName tableName,
TrinoPrincipal principal) |
|
void |
AllowAllAccessControl.checkCanSetTableAuthorization(SecurityContext context,
QualifiedObjectName tableName,
TrinoPrincipal principal) |
|
void |
DenyAllAccessControl.checkCanSetTableAuthorization(SecurityContext context,
QualifiedObjectName tableName,
TrinoPrincipal principal) |
|
void |
ForwardingAccessControl.checkCanSetTableAuthorization(SecurityContext context,
QualifiedObjectName tableName,
TrinoPrincipal principal) |
|
void |
AccessControl.checkCanSetTableComment(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to comment the specified table.
|
void |
AccessControlManager.checkCanSetTableComment(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanSetTableComment(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanSetTableComment(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanSetTableComment(SecurityContext context,
QualifiedObjectName tableName) |
|
default void |
AccessControl.checkCanSetViewAuthorization(SecurityContext context,
QualifiedObjectName view,
TrinoPrincipal principal) |
Check if identity is allowed to change the specified view's user/role.
|
void |
AccessControlManager.checkCanSetViewAuthorization(SecurityContext securityContext,
QualifiedObjectName viewName,
TrinoPrincipal principal) |
|
void |
AllowAllAccessControl.checkCanSetViewAuthorization(SecurityContext context,
QualifiedObjectName view,
TrinoPrincipal principal) |
|
void |
DenyAllAccessControl.checkCanSetViewAuthorization(SecurityContext context,
QualifiedObjectName view,
TrinoPrincipal principal) |
|
void |
ForwardingAccessControl.checkCanSetViewAuthorization(SecurityContext context,
QualifiedObjectName view,
TrinoPrincipal principal) |
|
void |
AccessControl.checkCanShowColumns(SecurityContext context,
CatalogSchemaTableName table) |
Check if identity is allowed to show columns of tables by executing SHOW COLUMNS, DESCRIBE etc.
|
void |
AccessControlManager.checkCanShowColumns(SecurityContext securityContext,
CatalogSchemaTableName table) |
|
void |
AllowAllAccessControl.checkCanShowColumns(SecurityContext context,
CatalogSchemaTableName tableName) |
|
void |
DenyAllAccessControl.checkCanShowColumns(SecurityContext context,
CatalogSchemaTableName table) |
|
void |
ForwardingAccessControl.checkCanShowColumns(SecurityContext context,
CatalogSchemaTableName table) |
|
void |
AccessControl.checkCanShowCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
Check if identity is allowed to execute SHOW CREATE SCHEMA.
|
void |
AccessControlManager.checkCanShowCreateSchema(SecurityContext securityContext,
CatalogSchemaName schemaName) |
|
void |
AllowAllAccessControl.checkCanShowCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
DenyAllAccessControl.checkCanShowCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
ForwardingAccessControl.checkCanShowCreateSchema(SecurityContext context,
CatalogSchemaName schemaName) |
|
void |
AccessControl.checkCanShowCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
Check if identity is allowed to execute SHOW CREATE TABLE, SHOW CREATE VIEW or SHOW CREATE MATERIALIZED VIEW
|
void |
AccessControlManager.checkCanShowCreateTable(SecurityContext securityContext,
QualifiedObjectName tableName) |
|
void |
AllowAllAccessControl.checkCanShowCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
DenyAllAccessControl.checkCanShowCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
ForwardingAccessControl.checkCanShowCreateTable(SecurityContext context,
QualifiedObjectName tableName) |
|
void |
AccessControl.checkCanShowCurrentRoles(SecurityContext context,
String catalogName) |
Check if identity is allowed to show current roles on the specified catalog.
|
void |
AccessControlManager.checkCanShowCurrentRoles(SecurityContext securityContext,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanShowCurrentRoles(SecurityContext context,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanShowCurrentRoles(SecurityContext context,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanShowCurrentRoles(SecurityContext context,
String catalogName) |
|
void |
AccessControl.checkCanShowRoleAuthorizationDescriptors(SecurityContext context,
String catalogName) |
Check if identity is allowed to show role authorization descriptors (i.e.
|
void |
AccessControlManager.checkCanShowRoleAuthorizationDescriptors(SecurityContext securityContext,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanShowRoleAuthorizationDescriptors(SecurityContext context,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanShowRoleAuthorizationDescriptors(SecurityContext context,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanShowRoleAuthorizationDescriptors(SecurityContext context,
String catalogName) |
|
void |
AccessControl.checkCanShowRoleGrants(SecurityContext context,
String catalogName) |
Check if identity is allowed to show its own role grants on the specified catalog.
|
void |
AccessControlManager.checkCanShowRoleGrants(SecurityContext securityContext,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanShowRoleGrants(SecurityContext context,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanShowRoleGrants(SecurityContext context,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanShowRoleGrants(SecurityContext context,
String catalogName) |
|
void |
AccessControl.checkCanShowRoles(SecurityContext context,
String catalogName) |
Check if identity is allowed to show roles on the specified catalog.
|
void |
AccessControlManager.checkCanShowRoles(SecurityContext securityContext,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanShowRoles(SecurityContext context,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanShowRoles(SecurityContext context,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanShowRoles(SecurityContext context,
String catalogName) |
|
void |
AccessControl.checkCanShowSchemas(SecurityContext context,
String catalogName) |
Check if identity is allowed to execute SHOW SCHEMAS in a catalog.
|
void |
AccessControlManager.checkCanShowSchemas(SecurityContext securityContext,
String catalogName) |
|
void |
AllowAllAccessControl.checkCanShowSchemas(SecurityContext context,
String catalogName) |
|
void |
DenyAllAccessControl.checkCanShowSchemas(SecurityContext context,
String catalogName) |
|
void |
ForwardingAccessControl.checkCanShowSchemas(SecurityContext context,
String catalogName) |
|
void |
AccessControl.checkCanShowTables(SecurityContext context,
CatalogSchemaName schema) |
Check if identity is allowed to show tables by executing SHOW TABLES, SHOW GRANTS etc.
|
void |
AccessControlManager.checkCanShowTables(SecurityContext securityContext,
CatalogSchemaName schema) |
|
void |
AllowAllAccessControl.checkCanShowTables(SecurityContext context,
CatalogSchemaName schema) |
|
void |
DenyAllAccessControl.checkCanShowTables(SecurityContext context,
CatalogSchemaName schema) |
|
void |
ForwardingAccessControl.checkCanShowTables(SecurityContext context,
CatalogSchemaName schema) |
|
void |
AccessControl.checkCanUpdateTableColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> updatedColumnNames) |
Check if identity is allowed to update the specified table.
|
void |
AccessControlManager.checkCanUpdateTableColumns(SecurityContext securityContext,
QualifiedObjectName tableName,
Set<String> updatedColumnNames) |
|
void |
AllowAllAccessControl.checkCanUpdateTableColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> updatedColumnNames) |
|
void |
DenyAllAccessControl.checkCanUpdateTableColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> updatedColumnNames) |
|
void |
ForwardingAccessControl.checkCanUpdateTableColumns(SecurityContext context,
QualifiedObjectName tableName,
Set<String> updatedColumnNames) |
|
Set<String> |
AccessControl.filterColumns(SecurityContext context,
CatalogSchemaTableName tableName,
Set<String> columns) |
Filter the list of columns to those visible to the identity.
|
Set<String> |
AccessControlManager.filterColumns(SecurityContext securityContext,
CatalogSchemaTableName table,
Set<String> columns) |
|
Set<String> |
AllowAllAccessControl.filterColumns(SecurityContext context,
CatalogSchemaTableName tableName,
Set<String> columns) |
|
Set<String> |
DenyAllAccessControl.filterColumns(SecurityContext context,
CatalogSchemaTableName tableName,
Set<String> columns) |
|
Set<String> |
ForwardingAccessControl.filterColumns(SecurityContext context,
CatalogSchemaTableName tableName,
Set<String> columns) |
|
Set<String> |
AccessControl.filterSchemas(SecurityContext context,
String catalogName,
Set<String> schemaNames) |
Filter the list of schemas in a catalog to those visible to the identity.
|
Set<String> |
AccessControlManager.filterSchemas(SecurityContext securityContext,
String catalogName,
Set<String> schemaNames) |
|
Set<String> |
AllowAllAccessControl.filterSchemas(SecurityContext context,
String catalogName,
Set<String> schemaNames) |
|
Set<String> |
DenyAllAccessControl.filterSchemas(SecurityContext context,
String catalogName,
Set<String> schemaNames) |
|
Set<String> |
ForwardingAccessControl.filterSchemas(SecurityContext context,
String catalogName,
Set<String> schemaNames) |
|
Set<SchemaTableName> |
AccessControl.filterTables(SecurityContext context,
String catalogName,
Set<SchemaTableName> tableNames) |
Filter the list of tables and views to those visible to the identity.
|
Set<SchemaTableName> |
AccessControlManager.filterTables(SecurityContext securityContext,
String catalogName,
Set<SchemaTableName> tableNames) |
|
Set<SchemaTableName> |
AllowAllAccessControl.filterTables(SecurityContext context,
String catalogName,
Set<SchemaTableName> tableNames) |
|
Set<SchemaTableName> |
DenyAllAccessControl.filterTables(SecurityContext context,
String catalogName,
Set<SchemaTableName> tableNames) |
|
Set<SchemaTableName> |
ForwardingAccessControl.filterTables(SecurityContext context,
String catalogName,
Set<SchemaTableName> tableNames) |
|
default List<ViewExpression> |
AccessControl.getColumnMasks(SecurityContext context,
QualifiedObjectName tableName,
String columnName,
Type type) |
|
List<ViewExpression> |
AccessControlManager.getColumnMasks(SecurityContext context,
QualifiedObjectName tableName,
String columnName,
Type type) |
|
List<ViewExpression> |
ForwardingAccessControl.getColumnMasks(SecurityContext context,
QualifiedObjectName tableName,
String columnName,
Type type) |
|
List<ViewExpression> |
ViewAccessControl.getColumnMasks(SecurityContext context,
QualifiedObjectName tableName,
String columnName,
Type type) |
|
default List<ViewExpression> |
AccessControl.getRowFilters(SecurityContext context,
QualifiedObjectName tableName) |
|
List<ViewExpression> |
AccessControlManager.getRowFilters(SecurityContext context,
QualifiedObjectName tableName) |
|
List<ViewExpression> |
ForwardingAccessControl.getRowFilters(SecurityContext context,
QualifiedObjectName tableName) |
|
List<ViewExpression> |
ViewAccessControl.getRowFilters(SecurityContext context,
QualifiedObjectName tableName) |
|