You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@hbase.apache.org by "Ted Yu (JIRA)" <ji...@apache.org> on 2018/01/02 19:04:00 UTC
[jira] [Commented] (HBASE-19483) Add proper privilege check for
rsgroup commands
[ https://issues.apache.org/jira/browse/HBASE-19483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16308518#comment-16308518 ]
Ted Yu commented on HBASE-19483:
--------------------------------
Ping [~appy]
> Add proper privilege check for rsgroup commands
> -----------------------------------------------
>
> Key: HBASE-19483
> URL: https://issues.apache.org/jira/browse/HBASE-19483
> Project: HBase
> Issue Type: Bug
> Reporter: Ted Yu
> Assignee: Guangxu Cheng
> Fix For: 1.4.1, 1.5.0, 2.0.0-beta-2
>
> Attachments: 19483.master.011.patch, 19483.v11.patch, 19483.v11.patch, HBASE-19483.master.001.patch, HBASE-19483.master.002.patch, HBASE-19483.master.003.patch, HBASE-19483.master.004.patch, HBASE-19483.master.005.patch, HBASE-19483.master.006.patch, HBASE-19483.master.007.patch, HBASE-19483.master.008.patch, HBASE-19483.master.009.patch, HBASE-19483.master.010.patch, HBASE-19483.master.011.patch, HBASE-19483.master.011.patch
>
>
> Currently list_rsgroups command can be executed by any user.
> This is inconsistent with other list commands such as list_peers and list_peer_configs.
> We should add proper privilege check for list_rsgroups command.
> privilege check should be added for get_table_rsgroup / get_server_rsgroup / get_rsgroup commands.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)