[ 
https://issues.apache.org/jira/browse/HDFS-12147?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16091136#comment-16091136
 ] 

Nandakumar commented on HDFS-12147:
-----------------------------------

Hi [~cheersyang],

bq. Why the checkBucketAccess is exposed as a RPC call in KSM?
According to {{DistributedStorageHandler}} we are exposing 
{{checkBucketAccess}}, which can be used by user to check if they have required 
permission on a bucket. Similar to {{checkVolumeAccess}} for Ozone Volumes.
{code}
  @Override
  public void checkBucketAccess(BucketArgs args)
      throws IOException, OzoneException {
    throw new UnsupportedOperationException(
        "checkBucketAccess not implemented");
  }
{code}

bq. why we are comparing OzoneAcl?
The client has flexibility to check permission on user, group or world. So the 
client has to pass {{OzoneAcl}} which will tell us on which user/group/world 
and the permission that has to be checked.

Internal checks (for addBucketProperty, deleteBucket) will directly use user 
name and or group name as you mentioned.

> Ozone: KSM: Add checkBucketAccess
> ---------------------------------
>
>                 Key: HDFS-12147
>                 URL: https://issues.apache.org/jira/browse/HDFS-12147
>             Project: Hadoop HDFS
>          Issue Type: Sub-task
>          Components: ozone
>            Reporter: Nandakumar
>            Assignee: Nandakumar
>         Attachments: HDFS-12147-HDFS-7240.000.patch, 
> HDFS-12147-HDFS-7240.001.patch
>
>
> Checks if the caller has access to a given bucket.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

---------------------------------------------------------------------
To unsubscribe, e-mail: hdfs-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: hdfs-issues-h...@hadoop.apache.org

Reply via email to