]
Steven Hawkins commented on TEIID-5841:
---------------------------------------
The code has been committed. Doc changes and release note updates are pending - would
like to see if there will be anything else based upon TEIID-5798 to account for.
Authorization of table name that contain .
------------------------------------------
Key: TEIID-5841
URL:
https://issues.jboss.org/browse/TEIID-5841
Project: Teiid
Issue Type: Bug
Components: Query Engine
Reporter: Steven Hawkins
Assignee: Steven Hawkins
Priority: Major
Fix For: 13.0
Original Estimate: 6 hours
Remaining Estimate: 6 hours
We have a long standing issue with the permission system mostly due to the initial api
design - we only pass fully qualified names to the policy decider in the from of
schema.table. If the table name contains '.' the policy decider simplistically
walks up each segment - which effectively introduces inappropriate checks.
For example if we have:
view "a.b" and view "a", when we check permissions for
"a.b" we'll first check for the a.b resource, then the a resource - which is
not appropriate. This behavior in part was likely initially due to multi-schema import
scenarios, such that the imported table names would be qualified by source schema name.
Then you could add permissions against that partially qualified name
teiidSchema.sourceSchema. That will no longer be possible if we implement TEIID-5840