Regarding contributor grant

2020-05-11 Thread sidharth mishra
Hi All,

I would like to be a contributor for Ranger. I would really appreciate if
you can grant me the permission.

Regards,
Sid


[jira] [Commented] (RANGER-2754) Update presto dependency and implement row/column level security

2020-05-11 Thread t oo (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2754?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17104891#comment-17104891
 ] 

t oo commented on RANGER-2754:
--

332 prestosql release's 
[https://github.com/prestosql/presto/commit/0039dd8b2922df2c2ce57ccd337c357e5136bc3f]
 seems to have broken column masking (tried MASK_SHOW_LAST_4):

io.prestosql.spi.PrestoException: line 1:16: Invalid column mask for 
'hive.meta.presto_queries.username': Access Denied: Cannot execute function 
regexp_replace
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.analyzeColumnMask(StatementAnalyzer.java:2537)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.lambda$analyzeFiltersAndMasks$13(StatementAnalyzer.java:1073)
 at com.google.common.collect.ImmutableList.forEach(ImmutableList.java:405)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.analyzeFiltersAndMasks(StatementAnalyzer.java:1073)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitTable(StatementAnalyzer.java:1057)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitTable(StatementAnalyzer.java:300)
 at io.prestosql.sql.tree.Table.accept(Table.java:53)
 at io.prestosql.sql.tree.AstVisitor.process(AstVisitor.java:27)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:315)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.analyzeFrom(StatementAnalyzer.java:2307)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuerySpecification(StatementAnalyzer.java:1257)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuerySpecification(StatementAnalyzer.java:300)
 at io.prestosql.sql.tree.QuerySpecification.accept(QuerySpecification.java:144)
 at io.prestosql.sql.tree.AstVisitor.process(AstVisitor.java:27)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:315)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:325)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuery(StatementAnalyzer.java:910)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.visitQuery(StatementAnalyzer.java:300)
 at io.prestosql.sql.tree.Query.accept(Query.java:107)
 at io.prestosql.sql.tree.AstVisitor.process(AstVisitor.java:27)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer$Visitor.process(StatementAnalyzer.java:315)
 at 
io.prestosql.sql.analyzer.StatementAnalyzer.analyze(StatementAnalyzer.java:292)
 at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:83)
 at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:75)
 at io.prestosql.execution.SqlQueryExecution.analyze(SqlQueryExecution.java:217)
 at io.prestosql.execution.SqlQueryExecution.(SqlQueryExecution.java:176)
 at io.prestosql.execution.SqlQueryExecution.(SqlQueryExecution.java:93)
 at 
io.prestosql.execution.SqlQueryExecution$SqlQueryExecutionFactory.createQueryExecution(SqlQueryExecution.java:705)
 at 
io.prestosql.dispatcher.LocalDispatchQueryFactory.lambda$createDispatchQuery$0(LocalDispatchQueryFactory.java:121)
 at 
io.prestosql.$gen.Presto_014fffb_dirty__33320200511_183941_2.call(Unknown 
Source)
 at 
com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:125)
 at 
com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTask.java:69)
 at 
com.google.common.util.concurrent.TrustedListenableFutureTask.run(TrustedListenableFutureTask.java:78)
 at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
 at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
 at java.base/java.lang.Thread.run(Unknown Source)
Caused by: io.prestosql.spi.PrestoException: line 1:6: Access Denied: Cannot 
execute function regexp_replace
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitFunctionCall(ExpressionAnalyzer.java:930)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitFunctionCall(ExpressionAnalyzer.java:327)
 at io.prestosql.sql.tree.FunctionCall.accept(FunctionCall.java:110)
 at 
io.prestosql.sql.tree.StackableAstVisitor.process(StackableAstVisitor.java:27)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.process(ExpressionAnalyzer.java:350)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitCast(ExpressionAnalyzer.java:1147)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.visitCast(ExpressionAnalyzer.java:327)
 at io.prestosql.sql.tree.Cast.accept(Cast.java:91)
 at 
io.prestosql.sql.tree.StackableAstVisitor.process(StackableAstVisitor.java:27)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer$Visitor.process(ExpressionAnalyzer.java:350)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer.analyze(ExpressionAnalyzer.java:288)
 at 
io.prestosql.sql.analyzer.ExpressionAnalyzer.analyzeExpression(ExpressionAnalyzer.java:1601)
 at 

[jira] [Commented] (RANGER-2754) Update presto dependency and implement row/column level security

2020-05-11 Thread t oo (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2754?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17104863#comment-17104863
 ] 

t oo commented on RANGER-2754:
--

[~ppanda-beta] 
[https://cwiki.apache.org/confluence/display/RANGER/REST+APIs+for+Service+Definition%2C+Service+and+Policy+Management#RESTAPIsforServiceDefinition,ServiceandPolicyManagement-SearchServiceDefinitions]
 seems to work for updating service definition

> Update presto dependency and implement row/column level security
> 
>
> Key: RANGER-2754
> URL: https://issues.apache.org/jira/browse/RANGER-2754
> Project: Ranger
>  Issue Type: Improvement
>  Components: plugins
>Affects Versions: master
>Reporter: Bolke de Bruin
>Assignee: Bolke de Bruin
>Priority: Major
> Fix For: 2.1.0
>
> Attachments: 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> 0001-RANGER-2754-Upgrade-presto-dependency-and-improve-lo.patch, 
> RANGER-2754-v2.patch, RANGER-2754.patch
>
>
> 1. PrestoSql has changed its Security API hence the Ranger plugin has stopped 
> working for versions > ~321. 
> 2. Presto master now has row/column level security support



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Created] (RANGER-2821) Update ranger authorizer for Atlas to add admin-purge

2020-05-11 Thread Sidharth Kumar Mishra (Jira)
Sidharth Kumar Mishra created RANGER-2821:
-

 Summary: Update ranger authorizer for Atlas to add admin-purge
 Key: RANGER-2821
 URL: https://issues.apache.org/jira/browse/RANGER-2821
 Project: Ranger
  Issue Type: Bug
  Components: plugins
Reporter: Sidharth Kumar Mishra






--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (RANGER-2817) Service configuration update does not cause policies in the service to get downloaded to plugin

2020-05-11 Thread Mahesh Hanumant Bandal (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-2817?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mahesh Hanumant Bandal updated RANGER-2817:
---
Attachment: RANGER-2817-V3.patch

> Service configuration update does not cause policies in the service to get 
> downloaded to plugin
> ---
>
> Key: RANGER-2817
> URL: https://issues.apache.org/jira/browse/RANGER-2817
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: master
>Reporter: Abhay Kulkarni
>Assignee: Mahesh Hanumant Bandal
>Priority: Major
> Fix For: master
>
> Attachments: RANGER-2817-V1.patch, RANGER-2817-V2.patch, 
> RANGER-2817-V3.patch
>
>
> Ranger service configuration variables with names with prefix 
> "ranger.plugin." are downloaded to Ranger plugins along with the policies in 
> the Ranger service. However, when such configuration parameter is updated 
> with a new value, that in itself does not cause the policies  (and relevant 
> service configuration parameters) to be downloaded to plugin when the plugin 
> requests the download.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)