Details
Description
In case of secure cluster, we allow the HBase clients to read the zk nodes by providing the global read permissions to all for certain nodes. These nodes are the master address znode, root server znode and the clusterId znode. In ZKUtil.createACL() , we can see these node names are specially handled.
But there are some other client side admin APIs which makes a read call into the zookeeper from the client. This include the isTableEnabled() call (May be some other. I have seen this). Here the client directly reads a node in the zookeeper ( node created for this table ) and the data is matched to know whether this is enabled or not.
Now in secure cluster case any client can read zookeeper nodes which it needs for its normal operation like the master address and root server address. But what if the client calls this API? [isTableEnaled () ].
Attachments
Attachments
Issue Links
- is part of
-
HBASE-6099 Secure ZooKeeper integration changes
- Closed
-
HBASE-6096 AccessController v2
- Closed
- is related to
-
HBASE-6061 Fix ACL "Admin" Table inconsistent permission check
- Closed
-
HBASE-6086 Admin operations on a table should be authorized against table permissions instead of global permissions.
- Closed