You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@hbase.apache.org by te...@apache.org on 2013/08/22 22:29:31 UTC
svn commit: r1516592 -
/hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb
Author: tedyu
Date: Thu Aug 22 20:29:30 2013
New Revision: 1516592
URL: http://svn.apache.org/r1516592
Log:
HBASE-9302 NPE when granting permission on table (Ted Yu)
Modified:
hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb
Modified: hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb
URL: http://svn.apache.org/viewvc/hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb?rev=1516592&r1=1516591&r2=1516592&view=diff
==============================================================================
--- hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb (original)
+++ hbase/branches/0.95/hbase-server/src/main/ruby/hbase/security.rb Thu Aug 22 20:29:30 2013
@@ -53,6 +53,7 @@ module Hbase
end
if (table_name != nil)
+ tablebytes=table_name.to_java_bytes
#check if the tablename passed is actually a namespace
if (isNamespace?(table_name))
# Namespace should exist first.
@@ -60,7 +61,6 @@ module Hbase
raise(ArgumentError, "Can't find a namespace: #{namespace_name}") unless namespace_exists?(namespace_name)
#We pass the namespace name along with "@" so that we can differentiate a namespace from a table.
- tablebytes=table_name.to_java_bytes
# invoke cp endpoint to perform access controlse
org.apache.hadoop.hbase.protobuf.ProtobufUtil.grant(
protocol, user, tablebytes, perm.getActions())