remove upgrading bullet

Project: http://git-wip-us.apache.org/repos/asf/drill/repo
Commit: http://git-wip-us.apache.org/repos/asf/drill/commit/d6c7d97a
Tree: http://git-wip-us.apache.org/repos/asf/drill/tree/d6c7d97a
Diff: http://git-wip-us.apache.org/repos/asf/drill/diff/d6c7d97a

Branch: refs/heads/gh-pages
Commit: d6c7d97a3e92e973f018a5e9f8201644b00a84b9
Parents: 707190d
Author: Kristine Hahn <[email protected]>
Authored: Tue May 5 11:27:39 2015 -0700
Committer: Kristine Hahn <[email protected]>
Committed: Tue May 5 11:27:39 2015 -0700

----------------------------------------------------------------------
 _docs/rn/070-0.9.0-rn.md | 1 -
 1 file changed, 1 deletion(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/drill/blob/d6c7d97a/_docs/rn/070-0.9.0-rn.md
----------------------------------------------------------------------
diff --git a/_docs/rn/070-0.9.0-rn.md b/_docs/rn/070-0.9.0-rn.md
index 761269d..edae5c8 100755
--- a/_docs/rn/070-0.9.0-rn.md
+++ b/_docs/rn/070-0.9.0-rn.md
@@ -4,7 +4,6 @@ parent: "Release Notes"
 ---
 It has been about a month since the release of Drill 0.8, which included [more 
than 240 improvements]({{ site.baseurl }}/blog/drill-0.8-released/). Today 
we're happy to announce the availability of Drill 0.9, providing additional 
enhancements and bug fixes. In fact, this release includes [200 resolved 
JIRAs](https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12313820&version=12328813).
 Some of the noteworthy features in Drill 0.9 are:
 
-* **Upgrading** Remove the old version before upgrading, as described in 
"[Upgrading to the Latest Version of Apache 
Drill](http://doc.mapr.com/display/MapR/Upgrading+to+the+Latest+Version+of+Apache+Drill)."
 * **Authentication** 
([DRILL-2674](https://issues.apache.org/jira/browse/DRILL-2674)). Drill now 
supports username/password authentication through the Java and C++ clients, as 
well as JDBC and ODBC. On the server-side, Drill leverages Linux PAM to 
securely validate the credentials. Users can choose to use an external user 
directory such as Active Directory or LDAP. To enable authentication, set the 
`security.user.auth` option in `drill-override.conf`.
 * **Impersonation** 
([DRILL-2363](https://issues.apache.org/jira/browse/DRILL-2363)). Queries now 
execute and access resources using the identity of the user who submitted the 
query. Previously, all queries would run as the same user (eg, `drill`). With 
the new impersonation capability, the query will fail if the submitting user 
does not have permission to read the requested file(s) in the distributed file 
system. To enable impersonation, set the `drill.exec.impersonation` option in 
`drill-override.conf`.
 * **Ownership chaining**. Drill now allows views with different owners to be 
chained. This represents a very flexible access control solution. For example, 
an administrator with access to raw, sensitive data could create a view called 
`masked` which would expose only a subset of the data to other users. The 
administrator would enable users to read the `masked` view but not the raw 
data. Note that Drill provides an option `max_chained_user_hops` that specifies 
how many ownership changed are allowed in a chain, thereby providing 
administrators (or data stewards) more control over sharing of data.

Reply via email to