Regarding contributor grant
Hi All, I would like to be a contributor for Ranger. I would really appreciate if you can grant me the permission. Regards, Sid
[jira] [Commented] (RANGER-2754) Update presto dependency and implement row/column level security
[ https://issues.apache.org/jira/browse/RANGER-2754?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17104891#comment-17104891 ] t oo commented on RANGER-2754: -- 332 prestosql release's [https://github.com/prestosql/presto/commit/0039dd8b2922df2c2ce57ccd337c357e5136bc3f] seems to have broken column masking (tried MASK_SHOW_LAST_4): io.prestosql.spi.PrestoException: line 1:16: Invalid column mask for 'hive.meta.presto_queries.username': Access Denied: Cannot execute function regexp_replace at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.analyzeColumnMask(StatementAnalyzer.java:2537) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.lambda$analyzeFiltersAndMasks$13(StatementAnalyzer.java:1073) at com.google.common.collect.ImmutableList.forEach(ImmutableList.java:405) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.analyzeFiltersAndMasks(StatementAnalyzer.java:1073) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitTable(StatementAnalyzer.java:1057) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitTable(StatementAnalyzer.java:300) at io.prestosql.sql.tree.Table.accept(Table.java:53) at io.prestosql.sql.tree.AstVisitor.process(AstVisitor.java:27) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:315) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.analyzeFrom(StatementAnalyzer.java:2307) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuerySpecification(StatementAnalyzer.java:1257) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuerySpecification(StatementAnalyzer.java:300) at io.prestosql.sql.tree.QuerySpecification.accept(QuerySpecification.java:144) at io.prestosql.sql.tree.AstVisitor.process(AstVisitor.java:27) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:315) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:325) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuery(StatementAnalyzer.java:910) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuery(StatementAnalyzer.java:300) at io.prestosql.sql.tree.Query.accept(Query.java:107) at io.prestosql.sql.tree.AstVisitor.process(AstVisitor.java:27) at io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:315) at io.prestosql.sql.analyzer.StatementAnalyzer.analyze(StatementAnalyzer.java:292) at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:83) at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:75) at io.prestosql.execution.SqlQueryExecution.analyze(SqlQueryExecution.java:217) at io.prestosql.execution.SqlQueryExecution.(SqlQueryExecution.java:176) at io.prestosql.execution.SqlQueryExecution.(SqlQueryExecution.java:93) at io.prestosql.execution.SqlQueryExecution$SqlQueryExecutionFactory.createQueryExecution(SqlQueryExecution.java:705) at io.prestosql.dispatcher.LocalDispatchQueryFactory.lambda$createDispatchQuery$0(LocalDispatchQueryFactory.java:121) at io.prestosql.$gen.Presto_014fffb_dirty__33320200511_183941_2.call(Unknown Source) at com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:125) at com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTask.java:69) at com.google.common.util.concurrent.TrustedListenableFutureTask.run(TrustedListenableFutureTask.java:78) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source) at java.base/java.lang.Thread.run(Unknown Source) Caused by: io.prestosql.spi.PrestoException: line 1:6: Access Denied: Cannot execute function regexp_replace at io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitFunctionCall(ExpressionAnalyzer.java:930) at io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitFunctionCall(ExpressionAnalyzer.java:327) at io.prestosql.sql.tree.FunctionCall.accept(FunctionCall.java:110) at io.prestosql.sql.tree.StackableAstVisitor.process(StackableAstVisitor.java:27) at io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.process(ExpressionAnalyzer.java:350) at io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitCast(ExpressionAnalyzer.java:1147) at io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitCast(ExpressionAnalyzer.java:327) at io.prestosql.sql.tree.Cast.accept(Cast.java:91) at io.prestosql.sql.tree.StackableAstVisitor.process(StackableAstVisitor.java:27) at io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.process(ExpressionAnalyzer.java:350) at io.prestosql.sql.analyzer.ExpressionAnalyzer.analyze(ExpressionAnalyzer.java:288) at io.prestosql.sql.analyzer.ExpressionAnalyzer.analyzeExpression(ExpressionAnalyzer.java:1601) at
[jira] [Commented] (RANGER-2754) Update presto dependency and implement row/column level security
[ https://issues.apache.org/jira/browse/RANGER-2754?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17104863#comment-17104863 ] t oo commented on RANGER-2754: -- [~ppanda-beta] [https://cwiki.apache.org/confluence/display/RANGER/REST+APIs+for+Service+Definition%2C+Service+and+Policy+Management#RESTAPIsforServiceDefinition,ServiceandPolicyManagement-SearchServiceDefinitions] seems to work for updating service definition > Update presto dependency and implement row/column level security > > > Key: RANGER-2754 > URL: https://issues.apache.org/jira/browse/RANGER-2754 > Project: Ranger > Issue Type: Improvement > Components: plugins >Affects Versions: master >Reporter: Bolke de Bruin >Assignee: Bolke de Bruin >Priority: Major > Fix For: 2.1.0 > > Attachments: > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, > RANGER-2754-v2.patch, RANGER-2754.patch > > > 1. PrestoSql has changed its Security API hence the Ranger plugin has stopped > working for versions > ~321. > 2. Presto master now has row/column level security support -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Created] (RANGER-2821) Update ranger authorizer for Atlas to add admin-purge
Sidharth Kumar Mishra created RANGER-2821: - Summary: Update ranger authorizer for Atlas to add admin-purge Key: RANGER-2821 URL: https://issues.apache.org/jira/browse/RANGER-2821 Project: Ranger Issue Type: Bug Components: plugins Reporter: Sidharth Kumar Mishra -- This message was sent by Atlassian Jira (v8.3.4#803005)
[jira] [Updated] (RANGER-2817) Service configuration update does not cause policies in the service to get downloaded to plugin
[ https://issues.apache.org/jira/browse/RANGER-2817?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mahesh Hanumant Bandal updated RANGER-2817: --- Attachment: RANGER-2817-V3.patch > Service configuration update does not cause policies in the service to get > downloaded to plugin > --- > > Key: RANGER-2817 > URL: https://issues.apache.org/jira/browse/RANGER-2817 > Project: Ranger > Issue Type: Bug > Components: Ranger >Affects Versions: master >Reporter: Abhay Kulkarni >Assignee: Mahesh Hanumant Bandal >Priority: Major > Fix For: master > > Attachments: RANGER-2817-V1.patch, RANGER-2817-V2.patch, > RANGER-2817-V3.patch > > > Ranger service configuration variables with names with prefix > "ranger.plugin." are downloaded to Ranger plugins along with the policies in > the Ranger service. However, when such configuration parameter is updated > with a new value, that in itself does not cause the policies (and relevant > service configuration parameters) to be downloaded to plugin when the plugin > requests the download. -- This message was sent by Atlassian Jira (v8.3.4#803005)