You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@hive.apache.org by th...@apache.org on 2014/02/09 21:43:38 UTC

svn commit: r1566401 [3/3] - in /hive/trunk: common/src/java/org/apache/hadoop/hive/conf/ conf/ data/conf/ itests/util/src/main/java/org/apache/hadoop/hive/ql/security/ metastore/src/java/org/apache/hadoop/hive/metastore/ ql/src/java/org/apache/hadoop/...

Added: hive/trunk/ql/src/test/results/clientnegative/authorization_revoke_table_fail2.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientnegative/authorization_revoke_table_fail2.q.out?rev=1566401&view=auto
==============================================================================
--- hive/trunk/ql/src/test/results/clientnegative/authorization_revoke_table_fail2.q.out (added)
+++ hive/trunk/ql/src/test/results/clientnegative/authorization_revoke_table_fail2.q.out Sun Feb  9 20:43:37 2014
@@ -0,0 +1,37 @@
+PREHOOK: query: -- current user has been set (comment line before the set cmd is resulting in parse error!!)
+
+CREATE TABLE table_priv_rfai2(i int)
+PREHOOK: type: CREATETABLE
+POSTHOOK: query: -- current user has been set (comment line before the set cmd is resulting in parse error!!)
+
+CREATE TABLE table_priv_rfai2(i int)
+POSTHOOK: type: CREATETABLE
+POSTHOOK: Output: default@table_priv_rfai2
+PREHOOK: query: -- grant insert to user2
+GRANT INSERT ON table_priv_rfai2 TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rfai2
+POSTHOOK: query: -- grant insert to user2
+GRANT INSERT ON table_priv_rfai2 TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rfai2
+PREHOOK: query: GRANT SELECT ON table_priv_rfai2 TO USER user3 WITH GRANT OPTION
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rfai2
+POSTHOOK: query: GRANT SELECT ON table_priv_rfai2 TO USER user3 WITH GRANT OPTION
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rfai2
+PREHOOK: query: -- grant select as user3 to user 2
+GRANT SELECT ON table_priv_rfai2 TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rfai2
+POSTHOOK: query: -- grant select as user3 to user 2
+GRANT SELECT ON table_priv_rfai2 TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rfai2
+PREHOOK: query: -- try dropping the privilege as user3
+REVOKE INSERT ON TABLE table_priv_rfai2 FROM USER user2
+PREHOOK: type: REVOKE_PRIVILEGE
+PREHOOK: Output: default@table_priv_rfai2
+FAILED: Execution Error, return code 1 from org.apache.hadoop.hive.ql.exec.DDLTask. Cannot find privilege Privilege [name=INSERT, columns=null] for Principal [name=user2, type=USER] on Hive Object [type=TABLE, dbname=default, table/viewname=table_priv_rfai2] granted by user3
+

Modified: hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles1.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles1.q.out?rev=1566401&r1=1566400&r2=1566401&view=diff
==============================================================================
--- hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles1.q.out (original)
+++ hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles1.q.out Sun Feb  9 20:43:37 2014
@@ -15,4 +15,4 @@ POSTHOOK: type: GRANT_ROLE
 PREHOOK: query: -- this will create a cycle
 grant role role2 to role role1
 PREHOOK: type: GRANT_ROLE
-FAILED: Execution Error, return code 1 from org.apache.hadoop.hive.ql.exec.DDLTask. org.apache.hadoop.hive.ql.security.authorization.plugin.HiveAuthorizationPluginException: Cannot grant role role1 to role2 as role2 already belongs to the role role1. (no cycles allowed)
+FAILED: Execution Error, return code 1 from org.apache.hadoop.hive.ql.exec.DDLTask. org.apache.hadoop.hive.ql.security.authorization.plugin.HiveAuthzPluginException: Cannot grant role role1 to role2 as role2 already belongs to the role role1. (no cycles allowed)

Modified: hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles2.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles2.q.out?rev=1566401&r1=1566400&r2=1566401&view=diff
==============================================================================
--- hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles2.q.out (original)
+++ hive/trunk/ql/src/test/results/clientnegative/authorization_role_cycles2.q.out Sun Feb  9 20:43:37 2014
@@ -41,4 +41,4 @@ POSTHOOK: type: GRANT_ROLE
 PREHOOK: query: -- this will create a cycle in middle of the hierarchy
 grant role role2 to role role4
 PREHOOK: type: GRANT_ROLE
-FAILED: Execution Error, return code 1 from org.apache.hadoop.hive.ql.exec.DDLTask. org.apache.hadoop.hive.ql.security.authorization.plugin.HiveAuthorizationPluginException: Cannot grant role role4 to role2 as role2 already belongs to the role role4. (no cycles allowed)
+FAILED: Execution Error, return code 1 from org.apache.hadoop.hive.ql.exec.DDLTask. org.apache.hadoop.hive.ql.security.authorization.plugin.HiveAuthzPluginException: Cannot grant role role4 to role2 as role2 already belongs to the role role4. (no cycles allowed)

Modified: hive/trunk/ql/src/test/results/clientpositive/authorization_1_sql_std.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientpositive/authorization_1_sql_std.q.out?rev=1566401&r1=1566400&r2=1566401&view=diff
==============================================================================
--- hive/trunk/ql/src/test/results/clientpositive/authorization_1_sql_std.q.out (original)
+++ hive/trunk/ql/src/test/results/clientpositive/authorization_1_sql_std.q.out Sun Feb  9 20:43:37 2014
@@ -5,28 +5,28 @@ POSTHOOK: type: CREATETABLE
 POSTHOOK: Output: default@src_autho_test
 PREHOOK: query: --table grant to user
 
-grant select on table src_autho_test to user hive_test_user
+grant select on table src_autho_test to user user_sauth
 PREHOOK: type: GRANT_PRIVILEGE
 PREHOOK: Output: default@src_autho_test
 POSTHOOK: query: --table grant to user
 
-grant select on table src_autho_test to user hive_test_user
+grant select on table src_autho_test to user user_sauth
 POSTHOOK: type: GRANT_PRIVILEGE
 POSTHOOK: Output: default@src_autho_test
-PREHOOK: query: show grant user hive_test_user on table src_autho_test
+PREHOOK: query: show grant user user_sauth on table src_autho_test
 PREHOOK: type: SHOW_GRANT
-POSTHOOK: query: show grant user hive_test_user on table src_autho_test
+POSTHOOK: query: show grant user user_sauth on table src_autho_test
 POSTHOOK: type: SHOW_GRANT
-default	src_autho_test			hive_test_user	USER	Select	false	-1	hive_test_user
-PREHOOK: query: revoke select on table src_autho_test from user hive_test_user
+default	src_autho_test			user_sauth	USER	SELECT	false	-1	hive_test_user
+PREHOOK: query: revoke select on table src_autho_test from user user_sauth
 PREHOOK: type: REVOKE_PRIVILEGE
 PREHOOK: Output: default@src_autho_test
-POSTHOOK: query: revoke select on table src_autho_test from user hive_test_user
+POSTHOOK: query: revoke select on table src_autho_test from user user_sauth
 POSTHOOK: type: REVOKE_PRIVILEGE
 POSTHOOK: Output: default@src_autho_test
-PREHOOK: query: show grant user hive_test_user on table src_autho_test
+PREHOOK: query: show grant user user_sauth on table src_autho_test
 PREHOOK: type: SHOW_GRANT
-POSTHOOK: query: show grant user hive_test_user on table src_autho_test
+POSTHOOK: query: show grant user user_sauth on table src_autho_test
 POSTHOOK: type: SHOW_GRANT
 PREHOOK: query: --role
 create role src_role
@@ -34,15 +34,15 @@ PREHOOK: type: CREATEROLE
 POSTHOOK: query: --role
 create role src_role
 POSTHOOK: type: CREATEROLE
-PREHOOK: query: grant role src_role to user hive_test_user
+PREHOOK: query: grant role src_role to user user_sauth
 PREHOOK: type: GRANT_ROLE
-POSTHOOK: query: grant role src_role to user hive_test_user
+POSTHOOK: query: grant role src_role to user user_sauth
 POSTHOOK: type: GRANT_ROLE
-PREHOOK: query: show role grant user hive_test_user
+PREHOOK: query: show role grant user user_sauth
 PREHOOK: type: SHOW_ROLE_GRANT
-POSTHOOK: query: show role grant user hive_test_user
+POSTHOOK: query: show role grant user user_sauth
 POSTHOOK: type: SHOW_ROLE_GRANT
-src_role	-1	hive_test_user	USER	false	-1	hive_test_user
+src_role	-1	user_sauth	USER	false	-1	hive_test_user
 PUBLIC	-1			false	-1	
 PREHOOK: query: --table grant to role
 
@@ -58,7 +58,7 @@ PREHOOK: query: show grant role src_role
 PREHOOK: type: SHOW_GRANT
 POSTHOOK: query: show grant role src_role on table src_autho_test
 POSTHOOK: type: SHOW_GRANT
-default	src_autho_test			src_role	ROLE	Select	false	-1	hive_test_user
+default	src_autho_test			src_role	ROLE	SELECT	false	-1	hive_test_user
 PREHOOK: query: revoke select on table src_autho_test from role src_role
 PREHOOK: type: REVOKE_PRIVILEGE
 PREHOOK: Output: default@src_autho_test

Added: hive/trunk/ql/src/test/results/clientpositive/authorization_create_table_owner_privs.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientpositive/authorization_create_table_owner_privs.q.out?rev=1566401&view=auto
==============================================================================
--- hive/trunk/ql/src/test/results/clientpositive/authorization_create_table_owner_privs.q.out (added)
+++ hive/trunk/ql/src/test/results/clientpositive/authorization_create_table_owner_privs.q.out Sun Feb  9 20:43:37 2014
@@ -0,0 +1,17 @@
+PREHOOK: query: create table create_table_creator_priv_test(i int)
+PREHOOK: type: CREATETABLE
+POSTHOOK: query: create table create_table_creator_priv_test(i int)
+POSTHOOK: type: CREATETABLE
+POSTHOOK: Output: default@create_table_creator_priv_test
+PREHOOK: query: -- all privileges should have been set for user
+
+show grant user user1 on table create_table_creator_priv_test
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: -- all privileges should have been set for user
+
+show grant user user1 on table create_table_creator_priv_test
+POSTHOOK: type: SHOW_GRANT
+default	create_table_creator_priv_test			user1	USER	DELETE	true	-1	user1
+default	create_table_creator_priv_test			user1	USER	INSERT	true	-1	user1
+default	create_table_creator_priv_test			user1	USER	SELECT	true	-1	user1
+default	create_table_creator_priv_test			user1	USER	UPDATE	true	-1	user1

Added: hive/trunk/ql/src/test/results/clientpositive/authorization_grant_table_priv.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientpositive/authorization_grant_table_priv.q.out?rev=1566401&view=auto
==============================================================================
--- hive/trunk/ql/src/test/results/clientpositive/authorization_grant_table_priv.q.out (added)
+++ hive/trunk/ql/src/test/results/clientpositive/authorization_grant_table_priv.q.out Sun Feb  9 20:43:37 2014
@@ -0,0 +1,106 @@
+PREHOOK: query: -- current user has been set (comment line before the set cmd is resulting in parse error!!)
+
+CREATE TABLE  table_priv1(i int)
+PREHOOK: type: CREATETABLE
+POSTHOOK: query: -- current user has been set (comment line before the set cmd is resulting in parse error!!)
+
+CREATE TABLE  table_priv1(i int)
+POSTHOOK: type: CREATETABLE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: -- all privileges should have been set for user
+
+-- grant insert privilege to another user
+GRANT INSERT ON table_priv1 TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv1
+POSTHOOK: query: -- all privileges should have been set for user
+
+-- grant insert privilege to another user
+GRANT INSERT ON table_priv1 TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv1
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv1
+POSTHOOK: type: SHOW_GRANT
+default	table_priv1			user2	USER	INSERT	false	-1	user1
+PREHOOK: query: -- grant select privilege to another user with grant
+GRANT SELECT ON table_priv1 TO USER user2 with grant option
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv1
+POSTHOOK: query: -- grant select privilege to another user with grant
+GRANT SELECT ON table_priv1 TO USER user2 with grant option
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv1
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv1
+POSTHOOK: type: SHOW_GRANT
+default	table_priv1			user2	USER	INSERT	false	-1	user1
+default	table_priv1			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- change to other user - user2
+-- grant permissions to another user as user2
+GRANT SELECT ON table_priv1 TO USER user3 with grant option
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv1
+POSTHOOK: query: -- change to other user - user2
+-- grant permissions to another user as user2
+GRANT SELECT ON table_priv1 TO USER user3 with grant option
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: SHOW GRANT USER user3 ON TABLE table_priv1
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user3 ON TABLE table_priv1
+POSTHOOK: type: SHOW_GRANT
+default	table_priv1			user3	USER	SELECT	true	-1	user2
+PREHOOK: query: -- change to other user - user3
+-- grant permissions to another user as user3
+GRANT SELECT ON table_priv1 TO USER user4 with grant option
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv1
+POSTHOOK: query: -- change to other user - user3
+-- grant permissions to another user as user3
+GRANT SELECT ON table_priv1 TO USER user4 with grant option
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: SHOW GRANT USER user4 ON TABLE table_priv1
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user4 ON TABLE table_priv1
+POSTHOOK: type: SHOW_GRANT
+default	table_priv1			user4	USER	SELECT	true	-1	user3
+#### A masked pattern was here ####
+
+-- grant all with grant to user22
+GRANT ALL ON table_priv1 TO USER user22 with grant option
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv1
+#### A masked pattern was here ####
+
+-- grant all with grant to user22
+GRANT ALL ON table_priv1 TO USER user22 with grant option
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: SHOW GRANT USER user22 ON TABLE table_priv1
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user22 ON TABLE table_priv1
+POSTHOOK: type: SHOW_GRANT
+default	table_priv1			user22	USER	DELETE	true	-1	user1
+default	table_priv1			user22	USER	INSERT	true	-1	user1
+default	table_priv1			user22	USER	SELECT	true	-1	user1
+default	table_priv1			user22	USER	UPDATE	true	-1	user1
+PREHOOK: query: -- grant all without grant to user33
+GRANT ALL ON table_priv1 TO USER user33 with grant option
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv1
+POSTHOOK: query: -- grant all without grant to user33
+GRANT ALL ON table_priv1 TO USER user33 with grant option
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv1
+PREHOOK: query: SHOW GRANT USER user33 ON TABLE table_priv1
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user33 ON TABLE table_priv1
+POSTHOOK: type: SHOW_GRANT
+default	table_priv1			user33	USER	DELETE	true	-1	user22
+default	table_priv1			user33	USER	INSERT	true	-1	user22
+default	table_priv1			user33	USER	SELECT	true	-1	user22
+default	table_priv1			user33	USER	UPDATE	true	-1	user22

Added: hive/trunk/ql/src/test/results/clientpositive/authorization_revoke_table_priv.q.out
URL: http://svn.apache.org/viewvc/hive/trunk/ql/src/test/results/clientpositive/authorization_revoke_table_priv.q.out?rev=1566401&view=auto
==============================================================================
--- hive/trunk/ql/src/test/results/clientpositive/authorization_revoke_table_priv.q.out (added)
+++ hive/trunk/ql/src/test/results/clientpositive/authorization_revoke_table_priv.q.out Sun Feb  9 20:43:37 2014
@@ -0,0 +1,150 @@
+PREHOOK: query: -- current user has been set (comment line before the set cmd is resulting in parse error!!)
+
+CREATE TABLE  table_priv_rev(i int)
+PREHOOK: type: CREATETABLE
+POSTHOOK: query: -- current user has been set (comment line before the set cmd is resulting in parse error!!)
+
+CREATE TABLE  table_priv_rev(i int)
+POSTHOOK: type: CREATETABLE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: -- grant insert privilege to user2
+GRANT INSERT ON table_priv_rev TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- grant insert privilege to user2
+GRANT INSERT ON table_priv_rev TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+PREHOOK: query: -- revoke insert privilege from user2
+REVOKE INSERT ON TABLE table_priv_rev FROM USER user2
+PREHOOK: type: REVOKE_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- revoke insert privilege from user2
+REVOKE INSERT ON TABLE table_priv_rev FROM USER user2
+POSTHOOK: type: REVOKE_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+PREHOOK: query: -- grant all privileges one at a time --
+-- grant insert privilege to user2
+GRANT INSERT ON table_priv_rev TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- grant all privileges one at a time --
+-- grant insert privilege to user2
+GRANT INSERT ON table_priv_rev TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+PREHOOK: query: -- grant select privilege to user2, with grant option
+GRANT SELECT ON table_priv_rev TO USER user2 WITH GRANT OPTION
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- grant select privilege to user2, with grant option
+GRANT SELECT ON table_priv_rev TO USER user2 WITH GRANT OPTION
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+default	table_priv_rev			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- grant update privilege to user2
+GRANT UPDATE ON table_priv_rev TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- grant update privilege to user2
+GRANT UPDATE ON table_priv_rev TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+default	table_priv_rev			user2	USER	UPDATE	false	-1	user1
+default	table_priv_rev			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- grant delete privilege to user2
+GRANT DELETE ON table_priv_rev TO USER user2
+PREHOOK: type: GRANT_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- grant delete privilege to user2
+GRANT DELETE ON table_priv_rev TO USER user2
+POSTHOOK: type: GRANT_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	DELETE	false	-1	user1
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+default	table_priv_rev			user2	USER	UPDATE	false	-1	user1
+default	table_priv_rev			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- start revoking --
+-- revoke update privilege from user2
+REVOKE UPDATE ON TABLE table_priv_rev FROM USER user2
+PREHOOK: type: REVOKE_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- start revoking --
+-- revoke update privilege from user2
+REVOKE UPDATE ON TABLE table_priv_rev FROM USER user2
+POSTHOOK: type: REVOKE_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	DELETE	false	-1	user1
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+default	table_priv_rev			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- revoke DELETE privilege from user2
+REVOKE DELETE ON TABLE table_priv_rev FROM USER user2
+PREHOOK: type: REVOKE_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- revoke DELETE privilege from user2
+REVOKE DELETE ON TABLE table_priv_rev FROM USER user2
+POSTHOOK: type: REVOKE_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	INSERT	false	-1	user1
+default	table_priv_rev			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- revoke insert privilege from user2
+REVOKE INSERT ON TABLE table_priv_rev FROM USER user2
+PREHOOK: type: REVOKE_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- revoke insert privilege from user2
+REVOKE INSERT ON TABLE table_priv_rev FROM USER user2
+POSTHOOK: type: REVOKE_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT
+default	table_priv_rev			user2	USER	SELECT	true	-1	user1
+PREHOOK: query: -- revoke select privilege from user2
+REVOKE SELECT ON TABLE table_priv_rev FROM USER user2
+PREHOOK: type: REVOKE_PRIVILEGE
+PREHOOK: Output: default@table_priv_rev
+POSTHOOK: query: -- revoke select privilege from user2
+REVOKE SELECT ON TABLE table_priv_rev FROM USER user2
+POSTHOOK: type: REVOKE_PRIVILEGE
+POSTHOOK: Output: default@table_priv_rev
+PREHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+PREHOOK: type: SHOW_GRANT
+POSTHOOK: query: SHOW GRANT USER user2 ON TABLE table_priv_rev
+POSTHOOK: type: SHOW_GRANT