svn commit: r1873963 - in /phoenix/site/publish/language: datatypes.html functions.html index.html

2020-02-12 Thread chinmayskulkarni
Author: chinmayskulkarni
Date: Wed Feb 12 23:22:46 2020
New Revision: 1873963

URL: http://svn.apache.org/viewvc?rev=1873963&view=rev
Log:
(Nitesh Maheshwari) PHOENIX-5695: Phoenix website build.sh should return when 
child script has errors

Modified:
phoenix/site/publish/language/datatypes.html
phoenix/site/publish/language/functions.html
phoenix/site/publish/language/index.html

Modified: phoenix/site/publish/language/datatypes.html
URL: 
http://svn.apache.org/viewvc/phoenix/site/publish/language/datatypes.html?rev=1873963&r1=1873962&r2=1873963&view=diff
==
--- phoenix/site/publish/language/datatypes.html (original)
+++ phoenix/site/publish/language/datatypes.html Wed Feb 12 23:22:46 2020
@@ -1,7 +1,7 @@
 
 
 
 

Modified: phoenix/site/publish/language/functions.html
URL: 
http://svn.apache.org/viewvc/phoenix/site/publish/language/functions.html?rev=1873963&r1=1873962&r2=1873963&view=diff
==
--- phoenix/site/publish/language/functions.html (original)
+++ phoenix/site/publish/language/functions.html Wed Feb 12 23:22:46 2020
@@ -1,7 +1,7 @@
 
 
 
 

Modified: phoenix/site/publish/language/index.html
URL: 
http://svn.apache.org/viewvc/phoenix/site/publish/language/index.html?rev=1873963&r1=1873962&r2=1873963&view=diff
==
--- phoenix/site/publish/language/index.html (original)
+++ phoenix/site/publish/language/index.html Wed Feb 12 23:22:46 2020
@@ -1,7 +1,7 @@
 
 
 
 




Build failed in Jenkins: Phoenix-4.x-HBase-1.3 #683

2020-02-12 Thread Apache Jenkins Server
See 


Changes:

[Rajeshbabu Chintaguntla] PHOENIX-5724 Use exec permission in Phoenix ACLs only 
when execute check


--
[...truncated 107.50 KB...]
[INFO] Running 
org.apache.phoenix.end2end.ColumnEncodedImmutableTxStatsCollectorIT
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 55.156 s 
- in org.apache.phoenix.end2end.ConnectionUtilIT
[INFO] Running org.apache.phoenix.end2end.ContextClassloaderIT
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.714 s 
- in org.apache.phoenix.end2end.ContextClassloaderIT
[INFO] Running org.apache.phoenix.end2end.CostBasedDecisionIT
[INFO] Running org.apache.phoenix.end2end.CountDistinctCompressionIT
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.784 s 
- in org.apache.phoenix.end2end.CountDistinctCompressionIT
[WARNING] Tests run: 28, Failures: 0, Errors: 0, Skipped: 4, Time elapsed: 
191.152 s - in 
org.apache.phoenix.end2end.ColumnEncodedMutableNonTxStatsCollectorIT
[WARNING] Tests run: 28, Failures: 0, Errors: 0, Skipped: 4, Time elapsed: 
193.177 s - in org.apache.phoenix.end2end.ColumnEncodedMutableTxStatsCollectorIT
[WARNING] Tests run: 28, Failures: 0, Errors: 0, Skipped: 4, Time elapsed: 
194.05 s - in 
org.apache.phoenix.end2end.ColumnEncodedImmutableNonTxStatsCollectorIT
[WARNING] Tests run: 28, Failures: 0, Errors: 0, Skipped: 4, Time elapsed: 
197.84 s - in 
org.apache.phoenix.end2end.ColumnEncodedImmutableTxStatsCollectorIT
[INFO] Running org.apache.phoenix.end2end.CsvBulkLoadToolIT
[INFO] Running org.apache.phoenix.end2end.DropSchemaIT
[INFO] Running org.apache.phoenix.end2end.FlappingLocalIndexIT
[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 293.183 
s - in org.apache.phoenix.end2end.ConcurrentMutationsExtendedIT
[INFO] Running org.apache.phoenix.end2end.IndexBuildTimestampIT
[INFO] Running org.apache.phoenix.end2end.IndexExtendedIT
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 32.518 s 
- in org.apache.phoenix.end2end.DropSchemaIT
[INFO] Running org.apache.phoenix.end2end.IndexRebuildTaskIT
[INFO] Running org.apache.phoenix.end2end.IndexScrutinyToolForTenantIT
[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 158.864 
s - in org.apache.phoenix.end2end.CsvBulkLoadToolIT
[INFO] Running org.apache.phoenix.end2end.IndexScrutinyToolIT
[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 192.838 
s - in org.apache.phoenix.end2end.FlappingLocalIndexIT
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 100.687 
s - in org.apache.phoenix.end2end.IndexScrutinyToolForTenantIT
[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 199.503 
s - in org.apache.phoenix.end2end.IndexBuildTimestampIT
[INFO] Tests run: 48, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 241.296 
s - in org.apache.phoenix.end2end.IndexExtendedIT
[INFO] Running org.apache.phoenix.end2end.IndexToolForPartialBuildIT
[INFO] Running 
org.apache.phoenix.end2end.IndexToolForPartialBuildWithNamespaceEnabledIT
[INFO] Running org.apache.phoenix.end2end.IndexToolIT
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 28.183 s 
- in org.apache.phoenix.end2end.IndexToolForPartialBuildIT
[ERROR] Tests run: 1, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 231.638 
s <<< FAILURE! - in org.apache.phoenix.end2end.IndexRebuildTaskIT
[ERROR] testIndexRebuildTask(org.apache.phoenix.end2end.IndexRebuildTaskIT)  
Time elapsed: 231.634 s  <<< FAILURE!
java.lang.AssertionError: Ran out of time waiting for task state to become 
COMPLETED
at 
org.apache.phoenix.end2end.IndexRebuildTaskIT.waitForTaskState(IndexRebuildTaskIT.java:196)
at 
org.apache.phoenix.end2end.IndexRebuildTaskIT.testIndexRebuildTask(IndexRebuildTaskIT.java:156)

[INFO] Running org.apache.phoenix.end2end.MigrateSystemTablesToSystemNamespaceIT
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 49.249 s 
- in org.apache.phoenix.end2end.IndexToolForPartialBuildWithNamespaceEnabledIT
[INFO] Running org.apache.phoenix.end2end.LocalIndexSplitMergeIT
[INFO] Running org.apache.phoenix.end2end.MaxLookbackIT
[INFO] Running 
org.apache.phoenix.end2end.NonColumnEncodedImmutableNonTxStatsCollectorIT
[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 65.029 s 
- in org.apache.phoenix.end2end.MaxLookbackIT
[INFO] Running 
org.apache.phoenix.end2end.NonColumnEncodedImmutableTxStatsCollectorIT
[INFO] Tests run: 20, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 702.568 
s - in org.apache.phoenix.end2end.CostBasedDecisionIT
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 191 s - 
in org.apache.phoenix.end2end.LocalIndexSplitMergeIT
[WARNING] Tests run: 28, Failures: 0, Errors: 0, Skipped: 4, Time elapsed: 
190.703 s - in 
org.apache.phoeni

Apache-Phoenix | 4.x-HBase-1.3 | Build Successful

2020-02-12 Thread Apache Jenkins Server
4.x-HBase-1.3 branch build status Successful

Source repository https://git-wip-us.apache.org/repos/asf?p=phoenix.git;a=shortlog;h=refs/heads/4.x-HBase-1.3

Compiled Artifacts https://builds.apache.org/job/Phoenix-4.x-HBase-1.3/lastSuccessfulBuild/artifact/

Test Report https://builds.apache.org/job/Phoenix-4.x-HBase-1.3/lastCompletedBuild/testReport/

Changes
[Rajeshbabu Chintaguntla] PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check



Build times for last couple of runsLatest build time is the right most | Legend blue: normal, red: test failure, gray: timeout


Apache-Phoenix | Master | Build Successful

2020-02-12 Thread Apache Jenkins Server
Master branch build status Successful
Source repository https://git-wip-us.apache.org/repos/asf?p=phoenix.git;a=shortlog;h=refs/heads/master

Last Successful Compiled Artifacts https://builds.apache.org/job/Phoenix-master/lastSuccessfulBuild/artifact/

Last Complete Test Report https://builds.apache.org/job/Phoenix-master/lastCompletedBuild/testReport/

Changes
[Rajeshbabu Chintaguntla] PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check



Build times for last couple of runsLatest build time is the right most | Legend blue: normal, red: test failure, gray: timeout


Apache Phoenix - Timeout crawler - Build https://builds.apache.org/job/Phoenix-master/2651/

2020-02-12 Thread Apache Jenkins Server
[...truncated 51 lines...]

Jenkins build is back to normal : Phoenix-4.x-HBase-1.5 #272

2020-02-12 Thread Apache Jenkins Server
See 




[phoenix] branch 4.x-HBase-1.3 updated: PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check enabled(Rajeshbabu)

2020-02-12 Thread rajeshbabu
This is an automated email from the ASF dual-hosted git repository.

rajeshbabu pushed a commit to branch 4.x-HBase-1.3
in repository https://gitbox.apache.org/repos/asf/phoenix.git


The following commit(s) were added to refs/heads/4.x-HBase-1.3 by this push:
 new ad7fead  PHOENIX-5724 Use exec permission in Phoenix ACLs only when 
execute check enabled(Rajeshbabu)
ad7fead is described below

commit ad7feadbec76b9e4db38be443ea5f75c2c8d30df
Author: Rajeshbabu Chintaguntla 
AuthorDate: Wed Feb 12 23:54:56 2020 +0530

PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check 
enabled(Rajeshbabu)
---
 .../coprocessor/PhoenixAccessController.java   | 46 +++---
 1 file changed, 32 insertions(+), 14 deletions(-)

diff --git 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
index 0e7a094..15b4486 100644
--- 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
+++ 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
@@ -53,13 +53,8 @@ import 
org.apache.hadoop.hbase.regionserver.RegionCoprocessorHost;
 import org.apache.hadoop.hbase.security.AccessDeniedException;
 import org.apache.hadoop.hbase.security.User;
 import org.apache.hadoop.hbase.security.UserProvider;
-import org.apache.hadoop.hbase.security.access.AccessChecker;
-import org.apache.hadoop.hbase.security.access.AccessControlClient;
-import org.apache.hadoop.hbase.security.access.AuthResult;
-import org.apache.hadoop.hbase.security.access.Permission;
+import org.apache.hadoop.hbase.security.access.*;
 import org.apache.hadoop.hbase.security.access.Permission.Action;
-import org.apache.hadoop.hbase.security.access.TableAuthManager;
-import org.apache.hadoop.hbase.security.access.UserPermission;
 import org.apache.hadoop.hbase.util.Bytes;
 import org.apache.hadoop.hbase.zookeeper.ZooKeeperWatcher;
 import 
org.apache.phoenix.coprocessor.PhoenixMetaDataCoprocessorHost.PhoenixMetaDataControllerEnvironment;
@@ -80,6 +75,7 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 private PhoenixMetaDataControllerEnvironment env;
 AtomicReference> accessControllers 
= new AtomicReference<>();
 private boolean hbaseAccessControllerEnabled = false;
+private boolean execPermissionsCheckEnabled;
 private boolean accessCheckEnabled;
 private AccessChecker accessChecker;
 private UserProvider userProvider;
@@ -123,6 +119,8 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 LOGGER.warn(
 "PhoenixAccessController has been loaded with 
authorization checks disabled.");
 }
+this.execPermissionsCheckEnabled = 
conf.getBoolean(AccessControlConstants.EXEC_PERMISSION_CHECKS_KEY,
+AccessControlConstants.DEFAULT_EXEC_PERMISSION_CHECKS);
 if (env instanceof PhoenixMetaDataControllerEnvironment) {
 this.env = (PhoenixMetaDataControllerEnvironment)env;
 } else {
@@ -180,12 +178,17 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 Set physicalTablesChecked = new HashSet();
 if (tableType == PTableType.VIEW || tableType == PTableType.INDEX) {
 physicalTablesChecked.add(parentPhysicalTableName);
-requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+if(execPermissionsCheckEnabled) {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+} else {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ);
+}
 }
 
 if (tableType == PTableType.VIEW) {
-
-Action[] requiredActions = { Action.READ, Action.EXEC };
+
+Action[] requiredActions = execPermissionsCheckEnabled ?
+new Action[]{ Action.READ, Action.EXEC } : new Action[] { 
Action.READ};
 for (TableName index : indexes) {
 if (!physicalTablesChecked.add(index)) {
 // skip check for local index as we have already check the 
ACLs above
@@ -235,9 +238,12 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 // skip check for local index
 if (physicalTableName != null && 
!parentPhysicalTableName.equals(physicalTableName)
 && 
!MetaDataUtil.isViewIndex(physicalTableName.getNameAsString())) {
+List actions = Arrays.asList(Action.READ, 
Action.WRITE, Action.CREATE, Action.ADMIN);
+if(execPermissionsCheckEnabled) {
+actions.add(Action.EXEC);
+}
 authorizeOrGrantAccessToUsers("Create" + tableType, 
parentPhysicalTableName,
-

[phoenix] branch 4.x-HBase-1.4 updated: PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check enabled(Rajeshbabu)

2020-02-12 Thread rajeshbabu
This is an automated email from the ASF dual-hosted git repository.

rajeshbabu pushed a commit to branch 4.x-HBase-1.4
in repository https://gitbox.apache.org/repos/asf/phoenix.git


The following commit(s) were added to refs/heads/4.x-HBase-1.4 by this push:
 new fd7b375  PHOENIX-5724 Use exec permission in Phoenix ACLs only when 
execute check enabled(Rajeshbabu)
fd7b375 is described below

commit fd7b375293c2e14852b4d23db9a2d98f6693496a
Author: Rajeshbabu Chintaguntla 
AuthorDate: Wed Feb 12 22:38:32 2020 +0530

PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check 
enabled(Rajeshbabu)
---
 .../coprocessor/PhoenixAccessController.java   | 46 +++---
 1 file changed, 32 insertions(+), 14 deletions(-)

diff --git 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
index 4603f1e..a4788b2 100644
--- 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
+++ 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
@@ -54,13 +54,8 @@ import 
org.apache.hadoop.hbase.regionserver.RegionCoprocessorHost;
 import org.apache.hadoop.hbase.security.AccessDeniedException;
 import org.apache.hadoop.hbase.security.User;
 import org.apache.hadoop.hbase.security.UserProvider;
-import org.apache.hadoop.hbase.security.access.AccessChecker;
-import org.apache.hadoop.hbase.security.access.AccessControlClient;
-import org.apache.hadoop.hbase.security.access.AuthResult;
-import org.apache.hadoop.hbase.security.access.Permission;
+import org.apache.hadoop.hbase.security.access.*;
 import org.apache.hadoop.hbase.security.access.Permission.Action;
-import org.apache.hadoop.hbase.security.access.TableAuthManager;
-import org.apache.hadoop.hbase.security.access.UserPermission;
 import org.apache.hadoop.hbase.util.Bytes;
 import org.apache.hadoop.hbase.zookeeper.ZooKeeperWatcher;
 import 
org.apache.phoenix.coprocessor.PhoenixMetaDataCoprocessorHost.PhoenixMetaDataControllerEnvironment;
@@ -82,6 +77,7 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 AtomicReference> accessControllers 
= new AtomicReference<>();
 private boolean accessCheckEnabled;
 private boolean hbaseAccessControllerEnabled;
+private boolean execPermissionsCheckEnabled;
 private UserProvider userProvider;
 private AccessChecker accessChecker;
 public static final Logger LOGGER = 
LoggerFactory.getLogger(PhoenixAccessController.class);
@@ -124,6 +120,8 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 LOGGER.warn(
 "PhoenixAccessController has been loaded with 
authorization checks disabled.");
 }
+this.execPermissionsCheckEnabled = 
conf.getBoolean(AccessControlConstants.EXEC_PERMISSION_CHECKS_KEY,
+AccessControlConstants.DEFAULT_EXEC_PERMISSION_CHECKS);
 if (env instanceof PhoenixMetaDataControllerEnvironment) {
 this.env = (PhoenixMetaDataControllerEnvironment)env;
 } else {
@@ -181,12 +179,17 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 Set physicalTablesChecked = new HashSet();
 if (tableType == PTableType.VIEW || tableType == PTableType.INDEX) {
 physicalTablesChecked.add(parentPhysicalTableName);
-requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+if(execPermissionsCheckEnabled) {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+} else {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ);
+}
 }
 
 if (tableType == PTableType.VIEW) {
-
-Action[] requiredActions = { Action.READ, Action.EXEC };
+
+Action[] requiredActions = execPermissionsCheckEnabled ?
+new Action[]{ Action.READ, Action.EXEC } : new Action[] { 
Action.READ};
 for (TableName index : indexes) {
 if (!physicalTablesChecked.add(index)) {
 // skip check for local index as we have already check the 
ACLs above
@@ -236,9 +239,12 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 // skip check for local index
 if (physicalTableName != null && 
!parentPhysicalTableName.equals(physicalTableName)
 && 
!MetaDataUtil.isViewIndex(physicalTableName.getNameAsString())) {
+List actions = Arrays.asList(Action.READ, 
Action.WRITE, Action.CREATE, Action.ADMIN);
+if(execPermissionsCheckEnabled) {
+actions.add(Action.EXEC);
+}
 authorizeOrGrantAccessToUsers("Create" + tableType, 

[phoenix] branch 4.x-HBase-1.5 updated: PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check enabled(Rajeshbabu)

2020-02-12 Thread rajeshbabu
This is an automated email from the ASF dual-hosted git repository.

rajeshbabu pushed a commit to branch 4.x-HBase-1.5
in repository https://gitbox.apache.org/repos/asf/phoenix.git


The following commit(s) were added to refs/heads/4.x-HBase-1.5 by this push:
 new d128960  PHOENIX-5724 Use exec permission in Phoenix ACLs only when 
execute check enabled(Rajeshbabu)
d128960 is described below

commit d12896058d6833d343d5889bc119dae43e7f3c32
Author: Rajeshbabu Chintaguntla 
AuthorDate: Wed Feb 12 22:38:32 2020 +0530

PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check 
enabled(Rajeshbabu)
---
 .../coprocessor/PhoenixAccessController.java   | 46 +++---
 1 file changed, 32 insertions(+), 14 deletions(-)

diff --git 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
index c1113bc..83e9593 100644
--- 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
+++ 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
@@ -54,13 +54,8 @@ import 
org.apache.hadoop.hbase.regionserver.RegionCoprocessorHost;
 import org.apache.hadoop.hbase.security.AccessDeniedException;
 import org.apache.hadoop.hbase.security.User;
 import org.apache.hadoop.hbase.security.UserProvider;
-import org.apache.hadoop.hbase.security.access.AccessChecker;
-import org.apache.hadoop.hbase.security.access.AccessControlClient;
-import org.apache.hadoop.hbase.security.access.AuthResult;
-import org.apache.hadoop.hbase.security.access.Permission;
+import org.apache.hadoop.hbase.security.access.*;
 import org.apache.hadoop.hbase.security.access.Permission.Action;
-import org.apache.hadoop.hbase.security.access.TableAuthManager;
-import org.apache.hadoop.hbase.security.access.UserPermission;
 import org.apache.hadoop.hbase.util.Bytes;
 import org.apache.hadoop.hbase.zookeeper.ZooKeeperWatcher;
 import 
org.apache.phoenix.coprocessor.PhoenixMetaDataCoprocessorHost.PhoenixMetaDataControllerEnvironment;
@@ -82,6 +77,7 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 AtomicReference> accessControllers 
= new AtomicReference<>();
 private boolean accessCheckEnabled;
 private boolean hbaseAccessControllerEnabled;
+private boolean execPermissionsCheckEnabled;
 private UserProvider userProvider;
 private AccessChecker accessChecker;
 public static final Logger LOGGER = 
LoggerFactory.getLogger(PhoenixAccessController.class);
@@ -124,6 +120,8 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 LOGGER.warn(
 "PhoenixAccessController has been loaded with 
authorization checks disabled.");
 }
+this.execPermissionsCheckEnabled = 
conf.getBoolean(AccessControlConstants.EXEC_PERMISSION_CHECKS_KEY,
+AccessControlConstants.DEFAULT_EXEC_PERMISSION_CHECKS);
 if (env instanceof PhoenixMetaDataControllerEnvironment) {
 this.env = (PhoenixMetaDataControllerEnvironment)env;
 } else {
@@ -181,12 +179,17 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 Set physicalTablesChecked = new HashSet();
 if (tableType == PTableType.VIEW || tableType == PTableType.INDEX) {
 physicalTablesChecked.add(parentPhysicalTableName);
-requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+if(execPermissionsCheckEnabled) {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+} else {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ);
+}
 }
 
 if (tableType == PTableType.VIEW) {
-
-Action[] requiredActions = { Action.READ, Action.EXEC };
+
+Action[] requiredActions = execPermissionsCheckEnabled ?
+new Action[]{ Action.READ, Action.EXEC } : new Action[] { 
Action.READ};
 for (TableName index : indexes) {
 if (!physicalTablesChecked.add(index)) {
 // skip check for local index as we have already check the 
ACLs above
@@ -236,9 +239,12 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 // skip check for local index
 if (physicalTableName != null && 
!parentPhysicalTableName.equals(physicalTableName)
 && 
!MetaDataUtil.isViewIndex(physicalTableName.getNameAsString())) {
+List actions = Arrays.asList(Action.READ, 
Action.WRITE, Action.CREATE, Action.ADMIN);
+if(execPermissionsCheckEnabled) {
+actions.add(Action.EXEC);
+}
 authorizeOrGrantAccessToUsers("Create" + tableType, 

[phoenix] branch master updated: PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check enabled(Rajeshbabu)

2020-02-12 Thread rajeshbabu
This is an automated email from the ASF dual-hosted git repository.

rajeshbabu pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/phoenix.git


The following commit(s) were added to refs/heads/master by this push:
 new cf67e5d  PHOENIX-5724 Use exec permission in Phoenix ACLs only when 
execute check enabled(Rajeshbabu)
cf67e5d is described below

commit cf67e5d4a46183ba11c8c0547034f075b57b1ab0
Author: Rajeshbabu Chintaguntla 
AuthorDate: Wed Feb 12 22:22:24 2020 +0530

PHOENIX-5724 Use exec permission in Phoenix ACLs only when execute check 
enabled(Rajeshbabu)
---
 .../coprocessor/PhoenixAccessController.java   | 46 +++---
 1 file changed, 32 insertions(+), 14 deletions(-)

diff --git 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
index 8a7d285..2bb9011 100644
--- 
a/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
+++ 
b/phoenix-core/src/main/java/org/apache/phoenix/coprocessor/PhoenixAccessController.java
@@ -56,13 +56,8 @@ import 
org.apache.hadoop.hbase.regionserver.RegionCoprocessorHost;
 import org.apache.hadoop.hbase.security.AccessDeniedException;
 import org.apache.hadoop.hbase.security.User;
 import org.apache.hadoop.hbase.security.UserProvider;
-import org.apache.hadoop.hbase.security.access.AccessChecker;
-import org.apache.hadoop.hbase.security.access.AccessControlClient;
-import org.apache.hadoop.hbase.security.access.AccessControlUtil;
-import org.apache.hadoop.hbase.security.access.AuthResult;
-import org.apache.hadoop.hbase.security.access.Permission;
+import org.apache.hadoop.hbase.security.access.*;
 import org.apache.hadoop.hbase.security.access.Permission.Action;
-import org.apache.hadoop.hbase.security.access.UserPermission;
 import org.apache.hadoop.hbase.util.Bytes;
 import org.apache.hadoop.hbase.zookeeper.ZKWatcher;
 import org.apache.phoenix.compat.hbase.CompatPermissionUtil;
@@ -90,6 +85,7 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 AtomicReference> accessControllers = new 
AtomicReference<>();
 private boolean hbaseAccessControllerEnabled;
 private boolean accessCheckEnabled;
+private boolean execPermissionsCheckEnabled;
 private UserProvider userProvider;
 private AccessChecker accessChecker;
 public static final Logger LOGGER = 
LoggerFactory.getLogger(PhoenixAccessController.class);
@@ -139,6 +135,8 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 LOGGER.warn(
 "PhoenixAccessController has been loaded with 
authorization checks disabled.");
 }
+this.execPermissionsCheckEnabled = 
conf.getBoolean(AccessControlConstants.EXEC_PERMISSION_CHECKS_KEY,
+AccessControlConstants.DEFAULT_EXEC_PERMISSION_CHECKS);
 if (env instanceof PhoenixMetaDataControllerEnvironment) {
 this.env = (PhoenixMetaDataControllerEnvironment)env;
 } else {
@@ -187,12 +185,17 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 Set physicalTablesChecked = new HashSet();
 if (tableType == PTableType.VIEW || tableType == PTableType.INDEX) {
 physicalTablesChecked.add(parentPhysicalTableName);
-requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+if(execPermissionsCheckEnabled) {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ, Action.EXEC);
+} else {
+requireAccess("Create" + tableType, parentPhysicalTableName, 
Action.READ);
+}
 }
 
 if (tableType == PTableType.VIEW) {
-
-Action[] requiredActions = { Action.READ, Action.EXEC };
+
+Action[] requiredActions = execPermissionsCheckEnabled ?
+new Action[]{ Action.READ, Action.EXEC } : new Action[] { 
Action.READ};
 for (TableName index : indexes) {
 if (!physicalTablesChecked.add(index)) {
 // skip check for local index as we have already check the 
ACLs above
@@ -242,9 +245,12 @@ public class PhoenixAccessController extends 
BaseMetaDataEndpointObserver {
 // skip check for local index
 if (physicalTableName != null && 
!parentPhysicalTableName.equals(physicalTableName)
 && 
!MetaDataUtil.isViewIndex(physicalTableName.getNameAsString())) {
+List actions = Arrays.asList(Action.READ, 
Action.WRITE, Action.CREATE, Action.ADMIN);
+if(execPermissionsCheckEnabled) {
+actions.add(Action.EXEC);
+}
 authorizeOrGrantAccessToUsers("Create" + tableType, 
parentPhysicalTableName,
-Arrays.asList(Ac

Apache Phoenix - Timeout crawler - Build https://builds.apache.org/job/Phoenix-master-matrix/3/

2020-02-12 Thread Apache Jenkins Server
[...truncated 21 lines...]
Looking at the log, list of test(s) that timed-out:

Build:
https://builds.apache.org/job/Phoenix-master-matrix/3/


Affected test class(es):
Set(['as SYSTEM'])


Build step 'Execute shell' marked build as failure
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

Build failed in Jenkins: Phoenix Compile Compatibility with HBase #1268

2020-02-12 Thread Apache Jenkins Server
See 


Changes:


--
Started by timer
Running as SYSTEM
[EnvInject] - Loading node environment variables.
Building remotely on H35 (ubuntu) in workspace 

[Phoenix_Compile_Compat_wHBase] $ /bin/bash /tmp/jenkins5474378368860941857.sh
core file size  (blocks, -c) 0
data seg size   (kbytes, -d) unlimited
scheduling priority (-e) 0
file size   (blocks, -f) unlimited
pending signals (-i) 386461
max locked memory   (kbytes, -l) 16384
max memory size (kbytes, -m) unlimited
open files  (-n) 6
pipe size(512 bytes, -p) 8
POSIX message queues (bytes, -q) 819200
real-time priority  (-r) 0
stack size  (kbytes, -s) 8192
cpu time   (seconds, -t) unlimited
max user processes  (-u) 10240
virtual memory  (kbytes, -v) unlimited
file locks  (-x) unlimited
core id : 0
core id : 1
core id : 2
core id : 3
core id : 4
core id : 5
physical id : 0
physical id : 1
MemTotal:   98978412 kB
MemFree:17765696 kB
Filesystem  Size  Used Avail Use% Mounted on
udev 48G 0   48G   0% /dev
tmpfs   9.5G  1.6M  9.5G   1% /run
/dev/sda3   3.6T  530G  2.9T  16% /
tmpfs48G  4.0K   48G   1% /dev/shm
tmpfs   5.0M 0  5.0M   0% /run/lock
tmpfs48G 0   48G   0% /sys/fs/cgroup
/dev/sda2   473M  159M  290M  36% /boot
tmpfs   9.5G  4.0K  9.5G   1% /run/user/910
/dev/loop0   90M   90M 0 100% /snap/core/8268
/dev/loop2   55M   55M 0 100% /snap/core18/1650
/dev/loop6   60M   60M 0 100% /snap/snapcraft/3943
/dev/loop5   60M   60M 0 100% /snap/snapcraft/3970
/dev/loop1   55M   55M 0 100% /snap/core18/1668
/dev/loop7   67M   67M 0 100% /snap/lxd/13253
/dev/loop4   67M   67M 0 100% /snap/lxd/13300
/dev/loop3   92M   92M 0 100% /snap/core/8592
apache-maven-2.2.1
apache-maven-3.0.5
apache-maven-3.1.1
apache-maven-3.2.5
apache-maven-3.3.9
apache-maven-3.5.2
apache-maven-3.5.4
apache-maven-3.6.0
apache-maven-3.6.2
apache-maven-3.6.3
latest
latest2
latest3


===
Verifying compile level compatibility with HBase 0.98 with Phoenix 
4.x-HBase-0.98
===

Cloning into 'hbase'...
Checking out files:  81% (4121/5044)   Checking out files:  82% (4137/5044)   
Checking out files:  83% (4187/5044)   Checking out files:  84% (4237/5044)   
Checking out files:  85% (4288/5044)   Checking out files:  86% (4338/5044)   
Checking out files:  87% (4389/5044)   Checking out files:  88% (4439/5044)   
Checking out files:  89% (4490/5044)   Checking out files:  90% (4540/5044)   
Checking out files:  91% (4591/5044)   Checking out files:  92% (4641/5044)   
Checking out files:  93% (4691/5044)   Checking out files:  94% (4742/5044)   
Checking out files:  95% (4792/5044)   Checking out files:  96% (4843/5044)   
Checking out files:  97% (4893/5044)   Checking out files:  98% (4944/5044)   
Checking out files:  99% (4994/5044)   Checking out files: 100% (5044/5044)   
Checking out files: 100% (5044/5044), done.
Switched to a new branch '0.98'
Branch '0.98' set up to track remote branch '0.98' from 'origin'.
[ERROR] Plugin org.codehaus.mojo:findbugs-maven-plugin:2.5.2 or one of its 
dependencies could not be resolved: Failed to read artifact descriptor for 
org.codehaus.mojo:findbugs-maven-plugin:jar:2.5.2: Could not transfer artifact 
org.codehaus.mojo:findbugs-maven-plugin:pom:2.5.2 from/to central 
(https://repo.maven.apache.org/maven2): Transfer failed for 
https://repo.maven.apache.org/maven2/org/codehaus/mojo/findbugs-maven-plugin/2.5.2/findbugs-maven-plugin-2.5.2.pom:
 Received fatal alert: protocol_version -> [Help 1]
[ERROR] 
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e 
switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR] 
[ERROR] For more information about the errors and possible solutions, please 
read the following articles:
[ERROR] [Help 1] 
http://cwiki.apache.org/confluence/display/MAVEN/PluginResolutionException
Build step 'Execute shell' marked build as failure


Apache Phoenix - Timeout crawler - Build https://builds.apache.org/job/Phoenix-master/2650/

2020-02-12 Thread Apache Jenkins Server
[...truncated 67 lines...]
Looking at the log, list of test(s) that timed-out:

Build:
https://builds.apache.org/job/Phoenix-master/2650/


Affected test class(es):
Set(['as SYSTEM'])


Build step 'Execute shell' marked build as failure
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

Apache-Phoenix | Master | Build Successful

2020-02-12 Thread Apache Jenkins Server
Master branch build status Successful
Source repository https://git-wip-us.apache.org/repos/asf?p=phoenix.git;a=shortlog;h=refs/heads/master

Last Successful Compiled Artifacts https://builds.apache.org/job/Phoenix-master/lastSuccessfulBuild/artifact/

Last Complete Test Report https://builds.apache.org/job/Phoenix-master/lastCompletedBuild/testReport/

Changes
[s.kadam] PHOENIX-5629 Phoenix Function to return HBase row timestamp



Build times for last couple of runsLatest build time is the right most | Legend blue: normal, red: test failure, gray: timeout