You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@hbase.apache.org by te...@apache.org on 2013/08/22 22:29:31 UTC

svn commit: r1516592 - /hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb

Author: tedyu
Date: Thu Aug 22 20:29:30 2013
New Revision: 1516592

URL: http://svn.apache.org/r1516592
Log:
HBASE-9302 NPE when granting permission on table (Ted Yu)


Modified:
    hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb

Modified: hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb
URL: http://svn.apache.org/viewvc/hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb?rev=1516592&r1=1516591&r2=1516592&view=diff
==============================================================================
--- hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb (original)
+++ hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb Thu Aug 22 20:29:30 2013
@@ -53,6 +53,7 @@ module Hbase
         end
 
         if (table_name != nil)
+          tablebytes=table_name.to_java_bytes
           #check if the tablename passed is actually a namespace
           if (isNamespace?(table_name))
             # Namespace should exist first.
@@ -60,7 +61,6 @@ module Hbase
             raise(ArgumentError, "Can't find a namespace: #{namespace_name}") unless namespace_exists?(namespace_name)
 
             #We pass the namespace name along with "@" so that we can differentiate a namespace from a table.
-            tablebytes=table_name.to_java_bytes
             # invoke cp endpoint to perform access controlse
             org.apache.hadoop.hbase.protobuf.ProtobufUtil.grant(
               protocol, user, tablebytes, perm.getActions())