]
Steven Hawkins resolved TEIID-5841.
-----------------------------------
Resolution: Done
Went ahead and made preliminary doc updates. It will likely be expanded after
TEIID-5798
Authorization of table name that contain .
------------------------------------------
Key: TEIID-5841
URL:
https://issues.jboss.org/browse/TEIID-5841
Project: Teiid
Issue Type: Bug
Components: Query Engine
Reporter: Steven Hawkins
Assignee: Steven Hawkins
Priority: Major
Fix For: 13.0
Original Estimate: 6 hours
Remaining Estimate: 6 hours
We have a long standing issue with the permission system mostly due to the initial api
design - we only pass fully qualified names to the policy decider in the from of
schema.table. If the table name contains '.' the policy decider simplistically
walks up each segment - which effectively introduces inappropriate checks.
For example if we have:
view "a.b" and view "a", when we check permissions for
"a.b" we'll first check for the a.b resource, then the a resource - which is
not appropriate. This behavior in part was likely initially due to multi-schema import
scenarios, such that the imported table names would be qualified by source schema name.
Then you could add permissions against that partially qualified name
teiidSchema.sourceSchema. That will no longer be possible if we implement TEIID-5840