[ https://issues.apache.org/jira/browse/HBASE-5352?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Andrew Purtell resolved HBASE-5352. ----------------------------------- Resolution: Fixed Assignee: (was: Enis Soztutar) This umbrella has seen it's day. Will spin out still relevant unfinished subtasks to top level issues. > ACL improvements > ---------------- > > Key: HBASE-5352 > URL: https://issues.apache.org/jira/browse/HBASE-5352 > Project: HBase > Issue Type: Improvement > Components: security > Affects Versions: 0.92.1, 0.94.0 > Reporter: Enis Soztutar > > In this issue I would like to open discussion for a few minor ACL related > improvements. The proposed changes are as follows: > 1. Introduce something like > AccessControllerProtocol.checkPermissions(Permission[] permissions) API, so > that clients can check access rights before carrying out the operations. We > need this kind of operation for HCATALOG-245, which introduces authorization > providers for hbase over hcat. We cannot use getUserPermissions() since it > requires ADMIN permissions on the global/table level. > 2. getUserPermissions(tableName)/grant/revoke and drop/modify table > operations should not check for global CREATE/ADMIN rights, but table > CREATE/ADMIN rights. The reasoning is that if a user is able to admin or read > from a table, she should be able to read the table's permissions. We can > choose whether we want only READ or ADMIN permissions for > getUserPermission(). Since we check for global permissions first for table > permissions, configuring table access using global permissions will continue > to work. > 3. Grant/Revoke global permissions - HBASE-5342 (included for completeness) > From all 3, we may want to backport the first one to 0.92 since without it, > Hive/Hcatalog cannot use Hbase's authorization mechanism effectively. > I will create subissues and convert HBASE-5342 to a subtask when we get some > feedback, and opinions for going further. -- This message was sent by Atlassian JIRA (v6.2#6252)