[ https://issues.apache.org/jira/browse/HBASE-19483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16288792#comment-16288792 ]
stack commented on HBASE-19483: ------------------------------- Aint' this just wrong, having hbase-server know about rsgroup? The perm check should be baked into RSGroup and not done as CP pre/post? (its fine adding rs strings to the AC table that rsgroup in it...). What ye think? > Add proper privilege check for rsgroup commands > ----------------------------------------------- > > Key: HBASE-19483 > URL: https://issues.apache.org/jira/browse/HBASE-19483 > Project: HBase > Issue Type: Bug > Reporter: Ted Yu > Assignee: Guangxu Cheng > Attachments: HBASE-19483.master.001.patch, > HBASE-19483.master.002.patch, HBASE-19483.master.003.patch > > > Currently list_rsgroups command can be executed by any user. > This is inconsistent with other list commands such as list_peers and > list_peer_configs. > We should add proper privilege check for list_rsgroups command. > privilege check should be added for get_table_rsgroup / get_server_rsgroup / > get_rsgroup commands. -- This message was sent by Atlassian JIRA (v6.4.14#64029)