jcamachor commented on a change in pull request #794: HIVE-21884
URL: https://github.com/apache/hive/pull/794#discussion_r335744741
##########
File path: ql/src/java/org/apache/hadoop/hive/ql/parse/HiveParser.g
##########
@@ -2066,6 +2074,71 @@ dropMaterializedViewStatement
: KW_DROP KW_MATERIALIZED KW_VIEW ifExists? viewName ->
^(TOK_DROP_MATERIALIZED_VIEW viewName ifExists?)
;
+createScheduledQueryStatement
+@init { pushMsg("create scheduled query statement", state); }
+@after { popMsg(state); }
+ : KW_CREATE KW_SCHEDULED KW_QUERY name=identifier
+ scheduleSpec
+ executedAsSpec?
Review comment:
OK... I may not understand how this is working now. Let me ask the following.
When you specify 'execute as' another user, where do we check that the
current user has admin permission? I checked `Operation2Privilege` but that
does not seem to prevent anyone from executing the statement as someone else.
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
[email protected]
With regards,
Apache Git Services
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]