hbase-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From te...@apache.org
Subject hbase git commit: HBASE-12811 [AccessController] NPE while scanning a table with user not having READ permission on the namespace (Ashish)
Date Thu, 08 Jan 2015 17:05:14 GMT
Repository: hbase
Updated Branches:
  refs/heads/0.98 40390b139 -> 9b3625371


HBASE-12811 [AccessController] NPE while scanning a table with user not having READ permission
on the namespace (Ashish)


Project: http://git-wip-us.apache.org/repos/asf/hbase/repo
Commit: http://git-wip-us.apache.org/repos/asf/hbase/commit/9b362537
Tree: http://git-wip-us.apache.org/repos/asf/hbase/tree/9b362537
Diff: http://git-wip-us.apache.org/repos/asf/hbase/diff/9b362537

Branch: refs/heads/0.98
Commit: 9b36253711ca6306aa6e1488beefd4db1feb9d28
Parents: 40390b1
Author: tedyu <yuzhihong@gmail.com>
Authored: Thu Jan 8 09:05:08 2015 -0800
Committer: tedyu <yuzhihong@gmail.com>
Committed: Thu Jan 8 09:05:08 2015 -0800

----------------------------------------------------------------------
 .../apache/hadoop/hbase/security/access/TableAuthManager.java    | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/hbase/blob/9b362537/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/TableAuthManager.java
----------------------------------------------------------------------
diff --git a/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/TableAuthManager.java
b/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/TableAuthManager.java
index ae4af26..f2983ad 100644
--- a/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/TableAuthManager.java
+++ b/hbase-server/src/main/java/org/apache/hadoop/hbase/security/access/TableAuthManager.java
@@ -475,8 +475,8 @@ public class TableAuthManager {
     }
     if (table == null) table = AccessControlLists.ACL_TABLE_NAME;
     // Namespace authorization supercedes table level
-    if (authorize(getNamespacePermissions(table.getNamespaceAsString()).getGroup(groupName),
-        table, family, action)) {
+    String namespace = table.getNamespaceAsString();
+    if (authorize(getNamespacePermissions(namespace).getGroup(groupName), namespace, action))
{
       return true;
     }
     // Check table level


Mime
View raw message