[ 
https://issues.apache.org/jira/browse/HBASE-19483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16290084#comment-16290084
 ] 

Appy commented on HBASE-19483:
------------------------------

At first I thought that [~stack]'s suggestion was great, but the current 
approach was fine too, after all, it was just exposing RSGroupInfo which was 
public.
But then looking around, found {{RSGroupAdminEndpoint implements 
MasterCoprocessor}}. RSGroupAdminServer is itself a coprocessor in a separate 
package! No no to adding rsgroup hooks in hbase-server.

Looking around more, the absolute proper way to do this would be:
1) moving require*() fns to a new class AccessChecker (contains 
TableAuthManager) in hbase-server
2) Create it's instance from RSGroupAdminServer
Then directly do auth checks from within rsgroup code.

Doesn't look much work. What do you think?
(If we do go this path, would suggest doing AC change and RSGroup change in 
separate jiras)


> Add proper privilege check for rsgroup commands
> -----------------------------------------------
>
>                 Key: HBASE-19483
>                 URL: https://issues.apache.org/jira/browse/HBASE-19483
>             Project: HBase
>          Issue Type: Bug
>            Reporter: Ted Yu
>            Assignee: Guangxu Cheng
>             Fix For: 1.4.1, 1.5.0, 2.0.0-beta-1
>
>         Attachments: HBASE-19483.master.001.patch, 
> HBASE-19483.master.002.patch, HBASE-19483.master.003.patch
>
>
> Currently list_rsgroups command can be executed by any user.
> This is inconsistent with other list commands such as list_peers and 
> list_peer_configs.
> We should add proper privilege check for list_rsgroups command.
> privilege check should be added for get_table_rsgroup / get_server_rsgroup / 
> get_rsgroup commands.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to