Details
-
Improvement
-
Status: Closed
-
Major
-
Resolution: Fixed
-
0.92.1, 0.94.0
-
None
-
None
Description
In this issue I would like to open discussion for a few minor ACL related improvements. The proposed changes are as follows:
1. Introduce something like AccessControllerProtocol.checkPermissions(Permission[] permissions) API, so that clients can check access rights before carrying out the operations. We need this kind of operation for HCATALOG-245, which introduces authorization providers for hbase over hcat. We cannot use getUserPermissions() since it requires ADMIN permissions on the global/table level.
2. getUserPermissions(tableName)/grant/revoke and drop/modify table operations should not check for global CREATE/ADMIN rights, but table CREATE/ADMIN rights. The reasoning is that if a user is able to admin or read from a table, she should be able to read the table's permissions. We can choose whether we want only READ or ADMIN permissions for getUserPermission(). Since we check for global permissions first for table permissions, configuring table access using global permissions will continue to work.
3. Grant/Revoke global permissions - HBASE-5342 (included for completeness)
From all 3, we may want to backport the first one to 0.92 since without it, Hive/Hcatalog cannot use Hbase's authorization mechanism effectively.
I will create subissues and convert HBASE-5342 to a subtask when we get some feedback, and opinions for going further.
Attachments
Issue Links
- is part of
-
HBASE-6098 ACL design changes
- Closed
-
HBASE-6101 Ensure Observers cover all relevant RPC and lifecycle code paths
- Closed
-
HBASE-6096 AccessController v2
- Closed