Affects Version/s: 0.98.7, 0.99.1
Hadoop Flags:Incompatible change, Reviewed
Release Note:When no Authorizations passed in Scan , will take user's Auth labels for the Scan and return results accordingly. Prior to this Jira, we were returning only those cells with out any visibility in such a case.
In Visibility Labels security, a set of labels (auths) are administered and associated with a user.
A user can normally only see cell data during scan that are part of the user's label set (auths).
Scan uses setAuthorizations to indicates its wants to use the auths to access the cells.
Similarly in the shell:
But it is a surprise to find that setAuthorizations seems to be 'mandatory' in the default visibility label security setting. Every scan needs to setAuthorizations before the scan can get any cells even the cells are under the labels the request user is part of.
The following steps will illustrate the issue:
Run as superuser.
Run as 'user1':
I am not sure if this is expected by design or a bug.
But a more reasonable, more client application backward compatible, and less surprising default behavior should probably look like this:
A scan's default auths, if its Authorizations attributes is not set explicitly, should be all the auths the request user is administered and allowed on the server.
If scan.setAuthorizations is used, then the server further filter the auths during scan: use the input auths minus what is not in user's label set on the server.