@Override protected void doTableOp(final Shell shellState, final String tableName) throws Exception { try { shellState.getAccumuloClient().securityOperations().revokeTablePermission(user, tableName, TablePermission.valueOf(permission[1])); Shell.log.debug( "Revoked from " + user + " the " + permission[1] + " permission on table " + tableName); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("No such table permission", e); } }
secOps.revokeTablePermission(user, table, TablePermission.ALTER_TABLE); secOps.revokeTablePermission(user, table, TablePermission.BULK_IMPORT); secOps.revokeTablePermission(user, table, TablePermission.DROP_TABLE); secOps.revokeTablePermission(user, table, TablePermission.GRANT); secOps.revokeTablePermission(user, table, TablePermission.READ); secOps.revokeTablePermission(user, table, TablePermission.WRITE);
secOps.revokeTablePermission(user, table, TablePermission.ALTER_TABLE); secOps.revokeTablePermission(user, table, TablePermission.BULK_IMPORT); secOps.revokeTablePermission(user, table, TablePermission.DROP_TABLE); secOps.revokeTablePermission(user, table, TablePermission.GRANT); secOps.revokeTablePermission(user, table, TablePermission.READ); secOps.revokeTablePermission(user, table, TablePermission.WRITE);
@Override protected void doTableOp(final Shell shellState, final String tableName) throws Exception { try { shellState.getConnector().securityOperations().revokeTablePermission(user, tableName, TablePermission.valueOf(permission[1])); Shell.log.debug( "Revoked from " + user + " the " + permission[1] + " permission on table " + tableName); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("No such table permission", e); } }
private void changeTablePermission(Connector conn, Random rand, String userName, String tableName) throws AccumuloException, AccumuloSecurityException { EnumSet<TablePermission> perms = EnumSet.noneOf(TablePermission.class); for (TablePermission p : TablePermission.values()) { if (conn.securityOperations().hasTablePermission(userName, tableName, p)) perms.add(p); } EnumSet<TablePermission> more = EnumSet.allOf(TablePermission.class); more.removeAll(perms); if (rand.nextBoolean() && more.size() > 0) { List<TablePermission> moreList = new ArrayList<>(more); TablePermission choice = moreList.get(rand.nextInt(moreList.size())); log.debug("adding permission " + choice); conn.securityOperations().grantTablePermission(userName, tableName, choice); } else { if (perms.size() > 0) { List<TablePermission> permList = new ArrayList<>(perms); TablePermission choice = permList.get(rand.nextInt(permList.size())); log.debug("removing permission " + choice); conn.securityOperations().revokeTablePermission(userName, tableName, choice); } } }
@Override public void revokeTablePermission(ByteBuffer login, String user, String table, org.apache.accumulo.proxy.thrift.TablePermission perm) throws org.apache.accumulo.proxy.thrift.AccumuloException, org.apache.accumulo.proxy.thrift.AccumuloSecurityException, org.apache.accumulo.proxy.thrift.TableNotFoundException, TException { try { getConnector(login).securityOperations().revokeTablePermission(user, table, TablePermission.getPermissionById((byte) perm.getValue())); } catch (Exception e) { handleExceptionTNF(e); } }
connection = connectionFactory.getConnection(AccumuloConnectionFactory.Priority.ADMIN, trackingMap); SecurityOperations ops = connection.securityOperations(); ops.revokeTablePermission(userName, tableName, TablePermission.valueOf(permission)); } catch (AccumuloSecurityException e) { log.error(e.getMessage(), e);
@Test public void getDiskUsageErrors() throws TableExistsException, AccumuloException, AccumuloSecurityException, TableNotFoundException, TException { String tableName = getUniqueNames(1)[0]; connector.tableOperations().create(tableName); List<DiskUsage> diskUsage = connector.tableOperations() .getDiskUsage(Collections.singleton(tableName)); assertEquals(1, diskUsage.size()); assertEquals(0, (long) diskUsage.get(0).getUsage()); assertEquals(tableName, diskUsage.get(0).getTables().iterator().next()); connector.securityOperations().revokeTablePermission(getAdminPrincipal(), tableName, TablePermission.READ); try { connector.tableOperations().getDiskUsage(Collections.singleton(tableName)); fail("Should throw securityexception"); } catch (AccumuloSecurityException e) {} connector.tableOperations().delete(tableName); try { connector.tableOperations().getDiskUsage(Collections.singleton(tableName)); fail("Should throw tablenotfound"); } catch (TableNotFoundException e) {} }
connector.securityOperations().revokeTablePermission("root", testName.getMethodName(), TablePermission.WRITE);
@After public void resetMetadataPermission() throws Exception { Connector conn = getConnector(); // Final state doesn't match the original if (rootHasWritePermission != conn.securityOperations().hasTablePermission("root", MetadataTable.NAME, TablePermission.WRITE)) { if (rootHasWritePermission) { // root had write permission when starting, ensure root still does conn.securityOperations().grantTablePermission("root", MetadataTable.NAME, TablePermission.WRITE); } else { // root did not have write permission when starting, ensure that it does not conn.securityOperations().revokeTablePermission("root", MetadataTable.NAME, TablePermission.WRITE); } } }
assertTrue( c.securityOperations().hasTablePermission(c.whoami(), tableName, TablePermission.READ)); c.securityOperations().revokeTablePermission(c.whoami(), tableName, TablePermission.READ); assertFalse( c.securityOperations().hasTablePermission(c.whoami(), tableName, TablePermission.READ)); c.securityOperations().revokeTablePermission(c.whoami(), tableName, TablePermission.READ); fail(); } catch (Exception e) { c.securityOperations().revokeTablePermission(c.whoami(), tableName, TablePermission.READ); fail(); } catch (Exception e) {
conn.securityOperations().grantTablePermission(AUDIT_USER_2, NEW_TEST_TABLE_NAME, TablePermission.READ); conn.securityOperations().revokeTablePermission(AUDIT_USER_2, NEW_TEST_TABLE_NAME, TablePermission.READ); auditConnector.securityOperations().changeLocalUserPassword(AUDIT_USER_2,
if ("take".equals(action)) { try { conn.securityOperations().revokeTablePermission(target, tableName, tabPerm); } catch (AccumuloSecurityException ae) { switch (ae.getSecurityErrorCode()) {
c.securityOperations().revokeTablePermission(principal, tableName, perm); verifyHasNoTablePermissions(c, principal, tableName, perm);