phoenix-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Hadoop QA (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (PHOENIX-672) Add GRANT and REVOKE commands using HBase AccessController
Date Fri, 17 Nov 2017 03:52:01 GMT

    [ https://issues.apache.org/jira/browse/PHOENIX-672?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16256432#comment-16256432
] 

Hadoop QA commented on PHOENIX-672:
-----------------------------------

{color:red}-1 overall{color}.  Here are the results of testing the latest attachment 
  http://issues.apache.org/jira/secure/attachment/12898104/PHOENIX-672.001.patch
  against master branch at commit ef3bce18fe7373b66136d933cc364001dff2c3f8.
  ATTACHMENT ID: 12898104

    {color:green}+1 @author{color}.  The patch does not contain any @author tags.

    {color:green}+1 tests included{color}.  The patch appears to include 3 new or modified
tests.

    {color:green}+1 javac{color}.  The applied patch does not increase the total number of
javac compiler warnings.

    {color:red}-1 release audit{color}.  The applied patch generated 4 release audit warnings
(more than the master's current 0 warnings).

    {color:red}-1 lineLengths{color}.  The patch introduces the following lines longer than
100:
    +            "SYSTEM.\"CATALOG\"", "SYSTEM.\"SEQUENCE\"", "SYSTEM.\"STATS\"", "SYSTEM.\"FUNCTION\""));
+            QueryConstants.SYSTEM_SCHEMA_NAME + "." + "\"" + PhoenixDatabaseMetaData.SYSTEM_SEQUENCE_TABLE+
"\"";
+        groupUser = User.createUserForTesting(testUtil.getConfiguration(), "groupUser", new
String[]{GROUP_SYSTEM_ACCESS});
+        unprivilegedUser = User.createUserForTesting(configuration, "unprivilegedUser", new
String[0]);
+        config.set("hbase.regionserver.wal.codec", "org.apache.hadoop.hbase.regionserver.wal.IndexedWALEditCodec");
+    @Parameterized.Parameters(name = "isNamespaceMapped={0}") // name is used by failsafe
as file name in reports
+    void grantPermissions(String toUser, Set<String> tablesToGrant, Permission.Action...
actions) throws Throwable {
+            AccessControlClient.grant(getUtility().getConnection(), TableName.valueOf(table),
toUser, null, null,
+    void grantPermissions(String toUser, String namespace, Permission.Action... actions)
throws Throwable {
+    void grantPermissions(String groupEntry, Permission.Action... actions) throws IOException,
Throwable {

     {color:red}-1 core tests{color}.  The patch failed these unit tests:
     ./phoenix-core/target/failsafe-reports/TEST-org.apache.phoenix.end2end.ColumnEncodedMutableTxStatsCollectorIT

Test results: https://builds.apache.org/job/PreCommit-PHOENIX-Build/1630//testReport/
Release audit warnings: https://builds.apache.org/job/PreCommit-PHOENIX-Build/1630//artifact/patchprocess/patchReleaseAuditWarnings.txt
Console output: https://builds.apache.org/job/PreCommit-PHOENIX-Build/1630//console

This message is automatically generated.

> Add GRANT and REVOKE commands using HBase AccessController
> ----------------------------------------------------------
>
>                 Key: PHOENIX-672
>                 URL: https://issues.apache.org/jira/browse/PHOENIX-672
>             Project: Phoenix
>          Issue Type: Task
>            Reporter: James Taylor
>            Assignee: Karan Mehta
>              Labels: namespaces, security
>             Fix For: 4.14.0
>
>         Attachments: PHOENIX-672.001.patch
>
>
> In HBase 0.98, cell-level security will be available. Take a look at [this](https://communities.intel.com/community/datastack/blog/2013/10/29/hbase-cell-security)
excellent blog post by @apurtell. Once Phoenix works on 0.96, we should add support for security
to our SQL grammar.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Mime
View raw message