hbase-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Francis Liu (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HBASE-8692) [AccessController] Restrict HTableDescriptor enumeration
Date Fri, 09 Aug 2013 23:10:48 GMT

    [ https://issues.apache.org/jira/browse/HBASE-8692?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13735456#comment-13735456
] 

Francis Liu commented on HBASE-8692:
------------------------------------

{quote}
Yes that is the intent, but it is a side effect of the fact the API used by the shell retrieves
descriptors.
{quote}
I see, that needs to be fixed then opened HBASE-9182


{quote}
This patch doesn't block access to the UI. We may be talking past each other.
{quote}
No sorry I got your message. Using the wrong words. What I meant to say was instead of recommending
to protect the page. Secure it instead.

{quote}
The secure deployment model I use is only admins/operations see the UIs. Is there a JIRA open
for presenting different levels of information on the UI to users authenticating with different
levels of privilege? I haven't seen it. Should we have one?
{quote}
I think we should as the other components behave in such a manner, created HBASE-9183.
                
> [AccessController] Restrict HTableDescriptor enumeration
> --------------------------------------------------------
>
>                 Key: HBASE-8692
>                 URL: https://issues.apache.org/jira/browse/HBASE-8692
>             Project: HBase
>          Issue Type: Improvement
>          Components: Coprocessors, security
>    Affects Versions: 0.98.0, 0.95.1, 0.94.9
>            Reporter: Andrew Purtell
>            Assignee: Andrew Purtell
>             Fix For: 0.98.0, 0.95.2, 0.94.9
>
>         Attachments: 8692-0.94.patch, 8692-0.94.patch, 8692-0.94.patch, 8692-0.94.patch,
8692.patch, 8692.patch, 8692.patch, 8692.patch
>
>
> Some users are concerned about having table schema exposed to every user and would like
it protected, similar to the rest of the admin operations for schema. 
> This used to be hopeless because META would leak HTableDescriptors in HRegionInfo, but
that is no longer the case in 0.94+.
> Consider adding CP hooks in the master for intercepting HMasterInterface#getHTableDescriptors
and HMasterInterface#getHTableDescriptors(List<String>).  Add support in the AccessController
for only allowing GLOBAL ADMIN to the first method. Add support in the AccessController for
allowing access to the descriptors for the table names in the list of the second method only
if the user has TABLE ADMIN privilege for all of the listed table names.
> Then, fix the code in HBaseAdmin (and elsewhere) that expects to be able to enumerate
all table descriptors e.g. in deleteTable. A TABLE ADMIN can delete a table but won’t have
GLOBAL ADMIN privilege to enumerate the total list. So a minor fixup is needed here, and in
other places like this which make the same assumption.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message