From d6b86a5c05b77dc67e1a4aead34844e850979c63 Mon Sep 17 00:00:00 2001 From: 924060929 <924060929@qq.com> Date: Thu, 22 Feb 2024 19:28:30 +0800 Subject: [PATCH] checkstyle --- .../apache/doris/nereids/rules/analysis/BindRelation.java | 4 ++-- .../doris/nereids/rules/analysis/UserAuthentication.java | 7 ++++--- 2 files changed, 6 insertions(+), 5 deletions(-) diff --git a/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/BindRelation.java b/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/BindRelation.java index 63a09d56bb71feb..54fa965e0eba3a3 100644 --- a/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/BindRelation.java +++ b/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/BindRelation.java @@ -234,8 +234,8 @@ private LogicalPlan makeOlapScan(TableIf table, UnboundRelation unboundRelation, return scan; } - private LogicalPlan getAndCheckLogicalPlan(TableIf table, UnboundRelation unboundRelation, List tableQualifier, - CascadesContext cascadesContext) { + private LogicalPlan getAndCheckLogicalPlan(TableIf table, UnboundRelation unboundRelation, + List tableQualifier, CascadesContext cascadesContext) { // if current context is in the view, we can skip check authentication because // the view already checked authentication if (cascadesContext.shouldCheckRelationAuthentication()) { diff --git a/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/UserAuthentication.java b/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/UserAuthentication.java index d415566a712a4c9..ffed8d4ea93c805 100644 --- a/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/UserAuthentication.java +++ b/fe/fe-core/src/main/java/org/apache/doris/nereids/rules/analysis/UserAuthentication.java @@ -29,6 +29,7 @@ * Check whether a user is permitted to scan specific tables. */ public class UserAuthentication { + /** checkPermission. */ public static void checkPermission(TableIf table, ConnectContext connectContext) { if (table == null) { return; @@ -51,10 +52,10 @@ public static void checkPermission(TableIf table, ConnectContext connectContext) String ctlName = catalog.getName(); // TODO: 2023/7/19 checkColumnsPriv if (!connectContext.getEnv().getAccessManager().checkTblPriv(connectContext, ctlName, dbName, - tableName, PrivPredicate.SELECT)) { + tableName, PrivPredicate.SELECT)) { String message = ErrorCode.ERR_TABLEACCESS_DENIED_ERROR.formatErrorMsg("SELECT", - ConnectContext.get().getQualifiedUser(), ConnectContext.get().getRemoteIP(), - ctlName + ": " + dbName + ": " + tableName); + ConnectContext.get().getQualifiedUser(), ConnectContext.get().getRemoteIP(), + ctlName + ": " + dbName + ": " + tableName); throw new AnalysisException(message); } }