zxl-333 commented on code in PR #5975:
URL: https://github.com/apache/hive/pull/5975#discussion_r2215463570


##########
standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/HMSHandler.java:
##########
@@ -3047,7 +3047,8 @@ private boolean drop_table_core(final RawStore ms, final 
String catName, final S
       tableDataShouldBeDeleted = checkTableDataShouldBeDeleted(tbl, 
deleteData);
       if (tableDataShouldBeDeleted && tbl.getSd().getLocation() != null) {
         tblPath = new Path(tbl.getSd().getLocation());
-        if (!wh.isWritable(tblPath.getParent())) {
+       // HIVE-28804 drop table user should have table path and parent path 
permission

Review Comment:
   > @zxl-333 Your test case appears to be able to reproduce this issue. 
However, in the actual production environment, user clusters usually have 
Ranger or other authentication plugins enabled to ensure metadata permissions 
and storage permissions.
   > 
   > So I’d like to ask, have you encountered this issue in your real 
production environment with Ranger or similar authentication plugins enabled? 
Or, in actual production environments, how do you ensure Hive table permission 
control?
   > 
   > Thanks.
   
   One of our clusters does not use ranger. Therefore, the users raised this 
issue as feedback. Using ranger is completely fine. This cluster also does not 
employ Hive's own authorization model; instead, it solely relies on HDFS 
permission control.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: gitbox-unsubscr...@hive.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: gitbox-unsubscr...@hive.apache.org
For additional commands, e-mail: gitbox-h...@hive.apache.org

Reply via email to