[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-09 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925396#comment-13925396
 ] 

Prashant Kommireddi commented on PIG-3765:
--

[~cheolsoo] - would you mind closing this out if there are no more failures? 
PIG-3802 fixes it.

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Fix For: 0.13.0

 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch, 
 PIG-3765_4.patch, PIG-3765_5.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-08 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13925093#comment-13925093
 ] 

Prashant Kommireddi commented on PIG-3765:
--

Opened PIG-3802 to fix this.

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Fix For: 0.13.0

 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch, 
 PIG-3765_4.patch, PIG-3765_5.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-07 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13924574#comment-13924574
 ] 

Prashant Kommireddi commented on PIG-3765:
--

Sure, I will take a look at it during the weekend. It probably has got to do 
with the use of {{@Rule}} for checking exception message contents. I will 
probably eliminate that.

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Fix For: 0.13.0

 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch, 
 PIG-3765_4.patch, PIG-3765_5.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-06 Thread Cheolsoo Park (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923129#comment-13923129
 ] 

Cheolsoo Park commented on PIG-3765:


I made some comments in RB.

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-06 Thread Cheolsoo Park (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923347#comment-13923347
 ] 

Cheolsoo Park commented on PIG-3765:


+1 assuming unit tests pass.

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch, 
 PIG-3765_4.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-06 Thread Cheolsoo Park (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923348#comment-13923348
 ] 

Cheolsoo Park commented on PIG-3765:


Please open a jira to document this feature. I think it's perfect to document 
it to the admin section-
http://pig.apache.org/docs/r0.12.0/admin.html


 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch, 
 PIG-3765_4.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-06 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923648#comment-13923648
 ] 

Prashant Kommireddi commented on PIG-3765:
--

Committed to trunk. Thanks [~cheolsoo] for the review!

Note: typo in the above comment - failed as PigServer was NOT being set

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch, 
 PIG-3765_4.patch, PIG-3765_5.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-05 Thread Cheolsoo Park (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13921119#comment-13921119
 ] 

Cheolsoo Park commented on PIG-3765:


[~prkommireddi], do you mind uploading your patch to RB?

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-03-05 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13921170#comment-13921170
 ] 

Prashant Kommireddi commented on PIG-3765:
--

Sure, https://reviews.apache.org/r/18779/

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch, PIG-3765_3.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-02-25 Thread Daniel Dai (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13911849#comment-13911849
 ] 

Daniel Dai commented on PIG-3765:
-

Overall, patch looks good. I have two comments:
1. In your use case, is user allowed to use PigServer/script engine in place of 
Grunt? If so, we need to hook PigServer as well.
2. Do we need to change the signature of GruntParser which entails lengthy test 
changes? Seems it is not absolutely needed, right?

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-02-25 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13911952#comment-13911952
 ] 

Prashant Kommireddi commented on PIG-3765:
--

1. You are right, PigServer must handle this as well.
2. I felt it looked cleaner and more intuitive to change the signature. Having 
a setter for PigServer object seemed unnecessary after having looked at the way 
it was being used in the codebase so far. It's mostly 1 line changes in test 
cases, wasn't too hard to do it. What do you think?

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch, PIG-3765_2.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)


[jira] [Commented] (PIG-3765) Ability to disable Pig commands and operators

2014-02-14 Thread Prashant Kommireddi (JIRA)

[ 
https://issues.apache.org/jira/browse/PIG-3765?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13902244#comment-13902244
 ] 

Prashant Kommireddi commented on PIG-3765:
--

Doesn't include docs either, will have it in the next patch.

 Ability to disable Pig commands and operators
 -

 Key: PIG-3765
 URL: https://issues.apache.org/jira/browse/PIG-3765
 Project: Pig
  Issue Type: New Feature
  Components: documentation, grunt
Reporter: Prashant Kommireddi
Assignee: Prashant Kommireddi
 Attachments: PIG-3765.patch


 This is an admin feature providing ability to blacklist or/and whitelist 
 certain commands and operations. Pig exposes a few of these that could be not 
 very safe in a multitenant environment. For example, sh invokes shell 
 commands, set allows users to change non-final configs. While these are 
 tremendously useful in general, having an ability to disable would make Pig a 
 safer platform. The goal is to allow administrators to be able to have more 
 control over user scripts. Default behaviour would still be the same - no 
 filters applied on commands and operators.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)