[jira] [Created] (RANGER-4253) Updated Left Sidebar layout for Ranger Admin UI in react code base
Mugdha Varadkar created RANGER-4253: --- Summary: Updated Left Sidebar layout for Ranger Admin UI in react code base Key: RANGER-4253 URL: https://issues.apache.org/jira/browse/RANGER-4253 Project: Ranger Issue Type: Bug Components: Ranger Reporter: Mugdha Varadkar Assignee: Brijesh Bhalala Attached templates for left sidebar layout change to be done in react for Ranger Admin UI. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Commented] (RANGER-4076) Support Java 17 for build and runtime
[ https://issues.apache.org/jira/browse/RANGER-4076?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17725633#comment-17725633 ] Rakesh Gupta commented on RANGER-4076: -- Hello Andrew Luo, I have created an patch where we can build and bringup the Ranger manually also with docker. This patch is working with java 8,java 11 and java 17. Can i assign this jira to myself and raise a RR. > Support Java 17 for build and runtime > - > > Key: RANGER-4076 > URL: https://issues.apache.org/jira/browse/RANGER-4076 > Project: Ranger > Issue Type: New Feature > Components: admin, build-infra >Reporter: Andrew Luo >Priority: Major > Attachments: > 0001-RANGER-4076-Support-Java-17-for-build-and-runtime.patch > > > Currently only Java 8 and 11 are supported. Java 17 is a major LTS version > of Java and adding support would modernize our Java version support. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin
[ https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Duong updated RANGER-4251: -- Description: The Ranger plugin for Ozone was implemented as per RANGER-2325. When running performance testing on Ozone, we notice that the Ranger plugin contributes significantly to Ozone latency and it gets worse when Ozone is under heavy load, i.e. 100K OPPS. !ozone-ranger-flamegraph.png|width=1128,height=337! This ticket tracks the effort to improve the performance of the Ranger plugin for Ozone. Source of inefficiencies identified so far: # Ranger is logging/auditing all the requests, including reads that are accepted. This is too expensive and will be addressed by RANGER-4252. was: The Ranger plugin for Ozone was implemented as per RANGER-2325. When running performance testing on Ozone, we notice that the Ranger plugin contributes significantly to Ozone latency and it gets worse when Ozone is under heavy load, i.e. 100K OPPS. !ozone-ranger-flamegraph.png|width=1128,height=337! This ticket tracks the effort to improve the performance of the Ranger plugin for Ozone. > Performance improvement for Ozone plugin > > > Key: RANGER-4251 > URL: https://issues.apache.org/jira/browse/RANGER-4251 > Project: Ranger > Issue Type: Improvement > Components: plugins >Reporter: Duong >Priority: Major > Attachments: ozone-ranger-flamegraph.png > > > The Ranger plugin for Ozone was implemented as per RANGER-2325. > When running performance testing on Ozone, we notice that the Ranger plugin > contributes significantly to Ozone latency and it gets worse when Ozone is > under heavy load, i.e. 100K OPPS. > !ozone-ranger-flamegraph.png|width=1128,height=337! > This ticket tracks the effort to improve the performance of the Ranger plugin > for Ozone. > Source of inefficiencies identified so far: > # Ranger is logging/auditing all the requests, including reads that are > accepted. This is too expensive and will be addressed by RANGER-4252. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Created] (RANGER-4252) Introduce audit handler for Ozone
Duong created RANGER-4252: - Summary: Introduce audit handler for Ozone Key: RANGER-4252 URL: https://issues.apache.org/jira/browse/RANGER-4252 Project: Ranger Issue Type: Sub-task Components: plugins Reporter: Duong RangerOzoneAuthorizer now uses RangerDefaultAuditHandler that audits every check, including trivial accepted reads. This is very expensive considering a busy environment with hundreds of reads per second. We should introduce a custom audit handler for Ozone to filter out which requests need auditing. This should be similar to other custom audit handlers like RangerHdfsAuditHandler, RangerHiveAuditHandler, or RangerKafkaAuditHandler. Ref: [RangerOzoneAuthorizer|https://github.com/duongkame/ranger/blob/b6650fc8c81fd339052bb2999f4653460549fdb2/plugin-ozone/src/main/java/org/apache/ranger/authorization/ozone/authorizer/RangerOzoneAuthorizer.java#L66-L66] -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin
[ https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Duong updated RANGER-4251: -- Description: The Ranger plugin for Ozone was implemented as per RANGER-2325. When running performance testing on Ozone, we notice that the Ranger plugin contributes significantly to Ozone latency and it gets worse when Ozone is under heavy load, i.e. 100K OPPS. !ozone-ranger-flamegraph.png|width=1128,height=337! This ticket tracks the effort to improve the performance of the Ranger plugin for Ozone. was: The Ranger plugin for Ozone was implemented as per RANGER-2325. When running performance testing on Ozone, we notice that the Ranger plugin contributes significantly to Ozone latency and it gets worse when Ozone is under heavy load, i.e. 100K OPPS. > Performance improvement for Ozone plugin > > > Key: RANGER-4251 > URL: https://issues.apache.org/jira/browse/RANGER-4251 > Project: Ranger > Issue Type: Improvement > Components: plugins >Reporter: Duong >Priority: Major > Attachments: ozone-ranger-flamegraph.png > > > The Ranger plugin for Ozone was implemented as per RANGER-2325. > When running performance testing on Ozone, we notice that the Ranger plugin > contributes significantly to Ozone latency and it gets worse when Ozone is > under heavy load, i.e. 100K OPPS. > !ozone-ranger-flamegraph.png|width=1128,height=337! > This ticket tracks the effort to improve the performance of the Ranger plugin > for Ozone. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin
[ https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Duong updated RANGER-4251: -- Attachment: ozone-ranger-flamegraph.png > Performance improvement for Ozone plugin > > > Key: RANGER-4251 > URL: https://issues.apache.org/jira/browse/RANGER-4251 > Project: Ranger > Issue Type: Improvement > Components: plugins >Reporter: Duong >Priority: Major > Attachments: ozone-ranger-flamegraph.png > > > The Ranger plugin for Ozone was implemented as per RANGER-2325. > When running performance testing on Ozone, we notice that the Ranger plugin > contributes significantly to Ozone latency and it gets worse when Ozone is > under heavy load, i.e. 100K OPPS. > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin
[ https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Duong updated RANGER-4251: -- Description: The Ranger plugin for Ozone was implemented as per RANGER-2325. When running performance testing on Ozone, we notice that the Ranger plugin contributes significantly to Ozone latency and it gets worse when Ozone is under heavy load, i.e. 100K OPPS. > Performance improvement for Ozone plugin > > > Key: RANGER-4251 > URL: https://issues.apache.org/jira/browse/RANGER-4251 > Project: Ranger > Issue Type: Improvement > Components: plugins >Reporter: Duong >Priority: Major > > The Ranger plugin for Ozone was implemented as per RANGER-2325. > When running performance testing on Ozone, we notice that the Ranger plugin > contributes significantly to Ozone latency and it gets worse when Ozone is > under heavy load, i.e. 100K OPPS. > -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Created] (RANGER-4251) Performance improvement for Ozone plugin
Duong created RANGER-4251: - Summary: Performance improvement for Ozone plugin Key: RANGER-4251 URL: https://issues.apache.org/jira/browse/RANGER-4251 Project: Ranger Issue Type: Improvement Components: plugins Reporter: Duong -- This message was sent by Atlassian Jira (v8.20.10#820010)
Re: Review Request 74441: RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74441/ --- (Updated May 23, 2023, 11:18 p.m.) Review request for ranger, Abhay Kulkarni and Madhan Neethiraj. Changes --- Updated the test case in the description Bugs: RANGER-4165 https://issues.apache.org/jira/browse/RANGER-4165 Repository: ranger Description --- RANGER-4165:API to find whether a user/group is authorized to the given operation on any resource of give type Diffs - agents-common/src/main/java/org/apache/ranger/plugin/contextenricher/RangerTagEnricher.java e0a86c398 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequest.java 6a38747f4 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestImpl.java e561c4c7c agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestReadOnly.java 4887c0112 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestWrapper.java 6aec330d7 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerPolicyRepository.java b5b26702c agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerResourceTrie.java f89d51e35 agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java eee1e1f1b agents-common/src/main/java/org/apache/ranger/plugin/policyresourcematcher/RangerDefaultPolicyResourceMatcher.java e887730c9 agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcher.java 032d4487c agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcher.java c421388e7 agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcher.java 5fa5b68d4 agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerResourceMatcher.java 0cb3e0fed agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcher.java ee2fff3ed agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/ResourceMatcher.java 5df4f1e3a agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java b505f495b agents-common/src/main/java/org/apache/ranger/plugin/util/RangerResourceEvaluatorsRetriever.java e60fe055b agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPathResourceTrie.java 30a7215a6 agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPolicyEngine.java b2a5151e5 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcherTest.java e31437fc1 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcherTest.java ad21b3239 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcherTest.java 8fe3be9cc agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcherTest.java 2b7f27200 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/TestResourceMatcher.java ea7bc01f2 agents-common/src/test/resources/policyengine/test_policyengine_aws.json 118bef534 agents-common/src/test/resources/policyengine/test_policyengine_kafka.json PRE-CREATION Diff: https://reviews.apache.org/r/74441/diff/2/ Testing (updated) --- Testing done with TestCase. -- Request has to set the resource = " " and resourceMatchingScope = "SELF_OR_PREFIX", example: {"name":"Any topic Consume access for user3", "request":{ "resource":{"elements":{"topic":""}}, "resourceMatchingScope": "SELF_OR_PREFIX", "accessType":"consume","user":"user3","userGroups":[] }, "result":{"isAudited":true,"isAllowed":true,"policyId":102} } -- Policy maintained => user1 will have access to consume on several topics, this call should result in "ALLOWED". -- Testing done with new tests in agents-common/src/test/resources/policyengine/test_policyengine_kafka.json -- Ran all the PolicyEngine and plugin tests. Thanks, Ramesh Mani
[jira] [Comment Edited] (RANGER-4165) Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
[ https://issues.apache.org/jira/browse/RANGER-4165?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17723252#comment-17723252 ] Ramesh Mani edited comment on RANGER-4165 at 5/23/23 7:24 PM: -- Attached reworked Patch from [~madhan] [https://reviews.apache.org/r/74441/diff/2#index_header] [~abhayk] Please review this patch. Thanks. was (Author: rmani): Attached reworked Patch from [~madhan] [https://reviews.apache.org/r/74441/diff/1#index_header] [~abhayk] Please review this patch. Thanks. > Support SELF_OR_PREFIX resource matching scope in Ranger Authorization > --- > > Key: RANGER-4165 > URL: https://issues.apache.org/jira/browse/RANGER-4165 > Project: Ranger > Issue Type: Improvement > Components: Ranger >Affects Versions: 3.0.0 >Reporter: Ramesh Mani >Assignee: Ramesh Mani >Priority: Major > > Support SELF_OR_PREFIX resource matching scope in Ranger Authorization > This is need to create an api which can find whether a user/group is > authorized to the given operation on any resource of give type. > This is needed to implement a Ranger Kafka authorizer API which checks if the > caller is authorized to perform the given ACL operation on at least one > resource of the given type. > [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType]) -- This message was sent by Atlassian Jira (v8.20.10#820010)
Re: Review Request 74441: RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74441/ --- (Updated May 23, 2023, 7:22 p.m.) Review request for ranger, Abhay Kulkarni and Madhan Neethiraj. Changes --- RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization Summary (updated) - RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization Bugs: RANGER-4165 https://issues.apache.org/jira/browse/RANGER-4165 Repository: ranger Description --- RANGER-4165:API to find whether a user/group is authorized to the given operation on any resource of give type Diffs (updated) - agents-common/src/main/java/org/apache/ranger/plugin/contextenricher/RangerTagEnricher.java e0a86c398 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequest.java 6a38747f4 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestImpl.java e561c4c7c agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestReadOnly.java 4887c0112 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestWrapper.java 6aec330d7 agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerPolicyRepository.java b5b26702c agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerResourceTrie.java f89d51e35 agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java eee1e1f1b agents-common/src/main/java/org/apache/ranger/plugin/policyresourcematcher/RangerDefaultPolicyResourceMatcher.java e887730c9 agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcher.java 032d4487c agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcher.java c421388e7 agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcher.java 5fa5b68d4 agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerResourceMatcher.java 0cb3e0fed agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcher.java ee2fff3ed agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/ResourceMatcher.java 5df4f1e3a agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java b505f495b agents-common/src/main/java/org/apache/ranger/plugin/util/RangerResourceEvaluatorsRetriever.java e60fe055b agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPathResourceTrie.java 30a7215a6 agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPolicyEngine.java b2a5151e5 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcherTest.java e31437fc1 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcherTest.java ad21b3239 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcherTest.java 8fe3be9cc agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcherTest.java 2b7f27200 agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/TestResourceMatcher.java ea7bc01f2 agents-common/src/test/resources/policyengine/test_policyengine_aws.json 118bef534 agents-common/src/test/resources/policyengine/test_policyengine_kafka.json PRE-CREATION Diff: https://reviews.apache.org/r/74441/diff/2/ Changes: https://reviews.apache.org/r/74441/diff/1-2/ Testing --- Testing done with TestCase. -- Request has to set the resource = " " and resourceMatchingScope = "SELF_OR_PREFIX", example: {"name":"Any topic Consume access for user3", "request":{ "resource":{"elements":{"topic":""}}, "resourceMatchingScope": "SELF_OR_PREFIX", "accessType":"consume","user":"user3","userGroups":[], "context": {"RESOURCE_TYPE": "topic"} }, "result":{"isAudited":true,"isAllowed":true,"policyId":102} } -- Policy maintained => user1 will have access to consume on several topics, this call should result in "ALLOWED". -- Testing done with new tests in agents-common/src/test/resources/policyengine/test_policyengine_kafka.json -- Ran all the PolicyEngine and plugin tests. Thanks, Ramesh Mani
[jira] [Updated] (RANGER-4165) Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
[ https://issues.apache.org/jira/browse/RANGER-4165?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ramesh Mani updated RANGER-4165: Description: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization This is need to create an api which can find whether a user/group is authorized to the given operation on any resource of give type. This is needed to implement a Ranger Kafka authorizer API which checks if the caller is authorized to perform the given ACL operation on at least one resource of the given type. [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType]) was: API to find whether a user/group is authorized to the given operation on any resource of give type. This is needed to implement a Ranger Kafka authorizer API which checks if the caller is authorized to perform the given ACL operation on at least one resource of the given type. [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType]) > Support SELF_OR_PREFIX resource matching scope in Ranger Authorization > --- > > Key: RANGER-4165 > URL: https://issues.apache.org/jira/browse/RANGER-4165 > Project: Ranger > Issue Type: Improvement > Components: Ranger >Affects Versions: 3.0.0 >Reporter: Ramesh Mani >Assignee: Ramesh Mani >Priority: Major > > Support SELF_OR_PREFIX resource matching scope in Ranger Authorization > This is need to create an api which can find whether a user/group is > authorized to the given operation on any resource of give type. > This is needed to implement a Ranger Kafka authorizer API which checks if the > caller is authorized to perform the given ACL operation on at least one > resource of the given type. > [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType]) -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4165) Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
[ https://issues.apache.org/jira/browse/RANGER-4165?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ramesh Mani updated RANGER-4165: Summary: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization (was: API to find whether a user/group is authorized to the given operation on any resource of give type) > Support SELF_OR_PREFIX resource matching scope in Ranger Authorization > --- > > Key: RANGER-4165 > URL: https://issues.apache.org/jira/browse/RANGER-4165 > Project: Ranger > Issue Type: Improvement > Components: Ranger >Affects Versions: 3.0.0 >Reporter: Ramesh Mani >Assignee: Ramesh Mani >Priority: Major > > API to find whether a user/group is authorized to the given operation on any > resource of give type. > This is needed to implement a Ranger Kafka authorizer API which checks if the > caller is authorized to perform the given ACL operation on at least one > resource of the given type. > [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType]) -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})
[ https://issues.apache.org/jira/browse/RANGER-4250 ] Ramachandran deleted comment on RANGER-4250: -- was (Author: JIRAUSER295265): [^0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch] > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name}) > > > Key: RANGER-4250 > URL: https://issues.apache.org/jira/browse/RANGER-4250 > Project: Ranger > Issue Type: Bug > Components: Ranger >Reporter: Ramachandran >Assignee: Ramachandran >Priority: Major > Labels: pull-request-available > Fix For: 3.0.0 > > Attachments: > 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > > > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 > Bad Request| at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| > at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| > at > org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| > at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at > org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at > org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| > at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| > at > org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| > at > org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| > at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})
[ https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ramachandran updated RANGER-4250: - Summary: Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name}) (was: Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)) > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name}) > > > Key: RANGER-4250 > URL: https://issues.apache.org/jira/browse/RANGER-4250 > Project: Ranger > Issue Type: Bug > Components: Ranger >Reporter: Ramachandran >Assignee: Ramachandran >Priority: Major > Labels: pull-request-available > Fix For: 3.0.0 > > Attachments: > 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > > > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 > Bad Request| at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| > at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| > at > org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| > at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at > org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at > org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| > at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| > at > org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| > at > org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| > at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})
[ https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ramachandran updated RANGER-4250: - Attachment: 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name}) > > > Key: RANGER-4250 > URL: https://issues.apache.org/jira/browse/RANGER-4250 > Project: Ranger > Issue Type: Bug > Components: Ranger >Reporter: Ramachandran >Assignee: Ramachandran >Priority: Major > Labels: pull-request-available > Fix For: 3.0.0 > > Attachments: > 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > > > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 > Bad Request| at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| > at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| > at > org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| > at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at > org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at > org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| > at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| > at > org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| > at > org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| > at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})
[ https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ramachandran updated RANGER-4250: - Attachment: (was: 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch) > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name}) > > > Key: RANGER-4250 > URL: https://issues.apache.org/jira/browse/RANGER-4250 > Project: Ranger > Issue Type: Bug > Components: Ranger >Reporter: Ramachandran >Assignee: Ramachandran >Priority: Major > Labels: pull-request-available > Fix For: 3.0.0 > > Attachments: > 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > > > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 > Bad Request| at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| > at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| > at > org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| > at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at > org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at > org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| > at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| > at > org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| > at > org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| > at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
Re: Review Request 74453: RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74453/ --- (Updated May 23, 2023, 4:56 p.m.) Review request for ranger, Don Bosco Durai, Abhay Kulkarni, Madhan Neethiraj, Mehul Parikh, Nikhil P, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja Polavarapu, Subhrat Chaudhary, and Velmurugan Periasamy. Summary (updated) - RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name}) Bugs: RANGER-4250 https://issues.apache.org/jira/browse/RANGER-4250 Repository: ranger Description --- Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name) getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 Bad Request| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| at org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| at org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at Diffs - security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 Diff: https://reviews.apache.org/r/74453/diff/2/ Testing --- Thanks, Ramachandran Krishnan
Re: Review Request 74453: RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74453/ --- (Updated May 23, 2023, 4:55 p.m.) Review request for ranger, Don Bosco Durai, Abhay Kulkarni, Madhan Neethiraj, Mehul Parikh, Nikhil P, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja Polavarapu, Subhrat Chaudhary, and Velmurugan Periasamy. Bugs: RANGER-4250 https://issues.apache.org/jira/browse/RANGER-4250 Repository: ranger Description --- Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name) getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 Bad Request| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| at org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| at org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at Diffs (updated) - security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 Diff: https://reviews.apache.org/r/74453/diff/2/ Changes: https://reviews.apache.org/r/74453/diff/1-2/ Testing --- Thanks, Ramachandran Krishnan
Re: Review Request 74451: RANGER-4063 Editable Search Filter (tokenizer) in Ranger React
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74451/#review225487 --- Ship it! Ship It! - Mehul Parikh On May 23, 2023, 7:43 a.m., Mugdha Varadkar wrote: > > --- > This is an automatically generated e-mail. To reply, visit: > https://reviews.apache.org/r/74451/ > --- > > (Updated May 23, 2023, 7:43 a.m.) > > > Review request for ranger, Brijesh Bhalala, Dhaval Rajpara, Madhan Neethiraj, > Mehul Parikh, and Nikunj Pansuriya. > > > Bugs: RANGER-4063 > https://issues.apache.org/jira/browse/RANGER-4063 > > > Repository: ranger > > > Description > --- > > Make the search filter user-editable in ranger react. > > > Diffs > - > > > security-admin/src/main/webapp/react-webapp/src/components/CommonComponents.jsx > 147ff7e05f2d56600a97a30aaf827e76dd02f0da > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/calendar.js > 308c59feb4aa0dbb2621beb85cbbbab95160e00c > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/date_input.js > 0fcdb90894ad6ff690117983ad0cc6946db70bb6 > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/datepicker.js > 8a87fde2418eefe623dc9a13379d7d3b78ee01d4 > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/index.js > 55eaad582d17d7a263db0177152f293f0b940b59 > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/token.js > 247ac66c448f9aedcbf986aabc1c55b351b8724e > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/typeahead/index.js > 4941faf35a95a85bfbc9555640c5a238550e2957 > security-admin/src/main/webapp/react-webapp/src/styles/style.css > d2aecb12048d4539d6cc6518057a9ef3509647fa > security-admin/src/main/webapp/react-webapp/src/utils/XAUtils.js > 4ff2732d6ba5c63df99ddbeedc533aa24280c0c2 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogs.jsx > f8d1f8e9253bf4105d7260ca2161b66c0599e8a3 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogsTable.jsx > 7e4392a3c8198f9000613b6e6941810f17a360e7 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AdminLogs.jsx > 4cb5062ce20167cb3efa2e496e67bd751cab3e44 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/LoginSessionsLogs.jsx > 9e2ba988274a34c91762f37ee1cc2f391e2c74fb > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginStatusLogs.jsx > 72a5272eb99ef1372334038c35fb5077eb7e6c71 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginsLog.jsx > 2b706bd81f9f6d7af6eee7b1ba21e4eb7bfc93d9 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/UserSync.jsx > 48346a83bc919d5b5d5b747b2dfbf7417045dbdb > > security-admin/src/main/webapp/react-webapp/src/views/Encryption/KeyManager.jsx > d9083a2a77fd627377b73652617a9e1b6dd32d09 > > security-admin/src/main/webapp/react-webapp/src/views/PermissionsModule/Permissions.jsx > 9523d17d0724a85e069c42a1bb502db93c9751f9 > > security-admin/src/main/webapp/react-webapp/src/views/PolicyListing/PolicyListing.jsx > 3818e096874eb75ba82abde45b2b0c2d46ec3865 > > security-admin/src/main/webapp/react-webapp/src/views/Reports/SearchPolicyTable.jsx > 55dd1879b83b133c9ef54ac20f1d41e827f723cb > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/groups_details/GroupListing.jsx > c5b11fb0afa4730f873b72607446d8258ea8bff4 > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleForm.jsx > e724050a8b7c49ad028f742dbcae099cec0d2b6f > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleListing.jsx > 6031eb27bc8c3d0b03b6eadcb81997e4f324fd31 > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/users_details/UserListing.jsx > 6bdc7ba67363e2d3ed03f671f6734158ec1624ea > > > Diff: https://reviews.apache.org/r/74451/diff/1/ > > > Testing > --- > > Tested changes on a cluster setup with Ranger Admin build with react code > base. > Verfied search filter user editable use cases on the cluster setup. > > Successful completion of build command : > mvn clean compile package -Psecurity-admin-react > > > Thanks, > > Mugdha Varadkar > >
[jira] [Commented] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)
[ https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17725321#comment-17725321 ] Ramachandran commented on RANGER-4250: -- [~mad...@apache.org] The review is available here:[https://reviews.apache.org/r/74453/] > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > --- > > Key: RANGER-4250 > URL: https://issues.apache.org/jira/browse/RANGER-4250 > Project: Ranger > Issue Type: Bug > Components: Ranger >Reporter: Ramachandran >Assignee: Ramachandran >Priority: Major > Attachments: > 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > > > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 > Bad Request| at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| > at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| > at > org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| > at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at > org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at > org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| > at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| > at > org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| > at > org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| > at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)
[ https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Ramachandran updated RANGER-4250: - Attachment: 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > --- > > Key: RANGER-4250 > URL: https://issues.apache.org/jira/browse/RANGER-4250 > Project: Ranger > Issue Type: Bug > Components: Ranger >Reporter: Ramachandran >Assignee: Ramachandran >Priority: Major > Attachments: > 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch > > > Ranger throws BAD Request Error when we are not passing exec user to the > getRoles (/public/v2/api/roles/name/{name) > getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 > Bad Request| at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| > at > org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| > at > org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| > at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at > org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at > org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| > at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| > at > org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| > at > org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| > at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
Review Request 74453: RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74453/ --- Review request for ranger, Don Bosco Durai, Abhay Kulkarni, Madhan Neethiraj, Mehul Parikh, Nikhil P, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja Polavarapu, Subhrat Chaudhary, and Velmurugan Periasamy. Bugs: RANGER-4250 https://issues.apache.org/jira/browse/RANGER-4250 Repository: ranger Description --- Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name) getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 Bad Request| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| at org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| at org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at Diffs - security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 security-admin/src/test/java/org/apache/ranger/rest/TestRoleREST.java 217c1bba3 Diff: https://reviews.apache.org/r/74453/diff/1/ Testing --- Thanks, Ramachandran Krishnan
Re: Review Request 74451: RANGER-4063 Editable Search Filter (tokenizer) in Ranger React
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74451/#review225486 --- Ship it! Ship It! - Dhaval Rajpara On May 23, 2023, 7:43 a.m., Mugdha Varadkar wrote: > > --- > This is an automatically generated e-mail. To reply, visit: > https://reviews.apache.org/r/74451/ > --- > > (Updated May 23, 2023, 7:43 a.m.) > > > Review request for ranger, Brijesh Bhalala, Dhaval Rajpara, Madhan Neethiraj, > Mehul Parikh, and Nikunj Pansuriya. > > > Bugs: RANGER-4063 > https://issues.apache.org/jira/browse/RANGER-4063 > > > Repository: ranger > > > Description > --- > > Make the search filter user-editable in ranger react. > > > Diffs > - > > > security-admin/src/main/webapp/react-webapp/src/components/CommonComponents.jsx > 147ff7e05f2d56600a97a30aaf827e76dd02f0da > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/calendar.js > 308c59feb4aa0dbb2621beb85cbbbab95160e00c > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/date_input.js > 0fcdb90894ad6ff690117983ad0cc6946db70bb6 > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/datepicker.js > 8a87fde2418eefe623dc9a13379d7d3b78ee01d4 > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/index.js > 55eaad582d17d7a263db0177152f293f0b940b59 > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/token.js > 247ac66c448f9aedcbf986aabc1c55b351b8724e > > security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/typeahead/index.js > 4941faf35a95a85bfbc9555640c5a238550e2957 > security-admin/src/main/webapp/react-webapp/src/styles/style.css > d2aecb12048d4539d6cc6518057a9ef3509647fa > security-admin/src/main/webapp/react-webapp/src/utils/XAUtils.js > 4ff2732d6ba5c63df99ddbeedc533aa24280c0c2 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogs.jsx > f8d1f8e9253bf4105d7260ca2161b66c0599e8a3 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogsTable.jsx > 7e4392a3c8198f9000613b6e6941810f17a360e7 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AdminLogs.jsx > 4cb5062ce20167cb3efa2e496e67bd751cab3e44 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/LoginSessionsLogs.jsx > 9e2ba988274a34c91762f37ee1cc2f391e2c74fb > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginStatusLogs.jsx > 72a5272eb99ef1372334038c35fb5077eb7e6c71 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginsLog.jsx > 2b706bd81f9f6d7af6eee7b1ba21e4eb7bfc93d9 > > security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/UserSync.jsx > 48346a83bc919d5b5d5b747b2dfbf7417045dbdb > > security-admin/src/main/webapp/react-webapp/src/views/Encryption/KeyManager.jsx > d9083a2a77fd627377b73652617a9e1b6dd32d09 > > security-admin/src/main/webapp/react-webapp/src/views/PermissionsModule/Permissions.jsx > 9523d17d0724a85e069c42a1bb502db93c9751f9 > > security-admin/src/main/webapp/react-webapp/src/views/PolicyListing/PolicyListing.jsx > 3818e096874eb75ba82abde45b2b0c2d46ec3865 > > security-admin/src/main/webapp/react-webapp/src/views/Reports/SearchPolicyTable.jsx > 55dd1879b83b133c9ef54ac20f1d41e827f723cb > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/groups_details/GroupListing.jsx > c5b11fb0afa4730f873b72607446d8258ea8bff4 > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleForm.jsx > e724050a8b7c49ad028f742dbcae099cec0d2b6f > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleListing.jsx > 6031eb27bc8c3d0b03b6eadcb81997e4f324fd31 > > security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/users_details/UserListing.jsx > 6bdc7ba67363e2d3ed03f671f6734158ec1624ea > > > Diff: https://reviews.apache.org/r/74451/diff/1/ > > > Testing > --- > > Tested changes on a cluster setup with Ranger Admin build with react code > base. > Verfied search filter user editable use cases on the cluster setup. > > Successful completion of build command : > mvn clean compile package -Psecurity-admin-react > > > Thanks, > > Mugdha Varadkar > >
[jira] [Created] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)
Ramachandran created RANGER-4250: Summary: Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name) Key: RANGER-4250 URL: https://issues.apache.org/jira/browse/RANGER-4250 Project: Ranger Issue Type: Bug Components: Ranger Reporter: Ramachandran Assignee: Ramachandran Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name) getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 Bad Request| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)| at org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)| at org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)| at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()| at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)| at org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()| at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4063) Editable Search Filter (tokenizer) in Ranger React
[ https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mugdha Varadkar updated RANGER-4063: Attachment: (was: 0002-RANGER-4063.patch) > Editable Search Filter (tokenizer) in Ranger React > -- > > Key: RANGER-4063 > URL: https://issues.apache.org/jira/browse/RANGER-4063 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dhaval Rajpara >Assignee: Mugdha Varadkar >Priority: Major > Labels: ranger-react > Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch > > > make the search filter user-editable in ranger react. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4063) Editable Search Filter (tokenizer) in Ranger React
[ https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mugdha Varadkar updated RANGER-4063: Attachment: 0002-RANGER-4063.patch > Editable Search Filter (tokenizer) in Ranger React > -- > > Key: RANGER-4063 > URL: https://issues.apache.org/jira/browse/RANGER-4063 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dhaval Rajpara >Assignee: Mugdha Varadkar >Priority: Major > Labels: ranger-react > Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch > > > make the search filter user-editable in ranger react. -- This message was sent by Atlassian Jira (v8.20.10#820010)
Review Request 74451: RANGER-4063 Editable Search Filter (tokenizer) in Ranger React
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74451/ --- Review request for ranger, Brijesh Bhalala, Dhaval Rajpara, Madhan Neethiraj, Mehul Parikh, and Nikunj Pansuriya. Bugs: RANGER-4063 https://issues.apache.org/jira/browse/RANGER-4063 Repository: ranger Description --- Make the search filter user-editable in ranger react. Diffs - security-admin/src/main/webapp/react-webapp/src/components/CommonComponents.jsx 147ff7e05f2d56600a97a30aaf827e76dd02f0da security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/calendar.js 308c59feb4aa0dbb2621beb85cbbbab95160e00c security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/date_input.js 0fcdb90894ad6ff690117983ad0cc6946db70bb6 security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/datepicker.js 8a87fde2418eefe623dc9a13379d7d3b78ee01d4 security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/index.js 55eaad582d17d7a263db0177152f293f0b940b59 security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/token.js 247ac66c448f9aedcbf986aabc1c55b351b8724e security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/typeahead/index.js 4941faf35a95a85bfbc9555640c5a238550e2957 security-admin/src/main/webapp/react-webapp/src/styles/style.css d2aecb12048d4539d6cc6518057a9ef3509647fa security-admin/src/main/webapp/react-webapp/src/utils/XAUtils.js 4ff2732d6ba5c63df99ddbeedc533aa24280c0c2 security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogs.jsx f8d1f8e9253bf4105d7260ca2161b66c0599e8a3 security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogsTable.jsx 7e4392a3c8198f9000613b6e6941810f17a360e7 security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AdminLogs.jsx 4cb5062ce20167cb3efa2e496e67bd751cab3e44 security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/LoginSessionsLogs.jsx 9e2ba988274a34c91762f37ee1cc2f391e2c74fb security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginStatusLogs.jsx 72a5272eb99ef1372334038c35fb5077eb7e6c71 security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginsLog.jsx 2b706bd81f9f6d7af6eee7b1ba21e4eb7bfc93d9 security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/UserSync.jsx 48346a83bc919d5b5d5b747b2dfbf7417045dbdb security-admin/src/main/webapp/react-webapp/src/views/Encryption/KeyManager.jsx d9083a2a77fd627377b73652617a9e1b6dd32d09 security-admin/src/main/webapp/react-webapp/src/views/PermissionsModule/Permissions.jsx 9523d17d0724a85e069c42a1bb502db93c9751f9 security-admin/src/main/webapp/react-webapp/src/views/PolicyListing/PolicyListing.jsx 3818e096874eb75ba82abde45b2b0c2d46ec3865 security-admin/src/main/webapp/react-webapp/src/views/Reports/SearchPolicyTable.jsx 55dd1879b83b133c9ef54ac20f1d41e827f723cb security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/groups_details/GroupListing.jsx c5b11fb0afa4730f873b72607446d8258ea8bff4 security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleForm.jsx e724050a8b7c49ad028f742dbcae099cec0d2b6f security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleListing.jsx 6031eb27bc8c3d0b03b6eadcb81997e4f324fd31 security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/users_details/UserListing.jsx 6bdc7ba67363e2d3ed03f671f6734158ec1624ea Diff: https://reviews.apache.org/r/74451/diff/1/ Testing --- Tested changes on a cluster setup with Ranger Admin build with react code base. Verfied search filter user editable use cases on the cluster setup. Successful completion of build command : mvn clean compile package -Psecurity-admin-react Thanks, Mugdha Varadkar
[jira] [Updated] (RANGER-4063) Editable Search Filter (tokenizer) in Ranger React
[ https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mugdha Varadkar updated RANGER-4063: Summary: Editable Search Filter (tokenizer) in Ranger React (was: Editable tokenizer in ranger react.) > Editable Search Filter (tokenizer) in Ranger React > -- > > Key: RANGER-4063 > URL: https://issues.apache.org/jira/browse/RANGER-4063 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dhaval Rajpara >Assignee: Mugdha Varadkar >Priority: Major > Labels: ranger-react > Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch > > > make the search filter user-editable in ranger react. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Assigned] (RANGER-4063) Editable tokenizer in ranger react.
[ https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mugdha Varadkar reassigned RANGER-4063: --- Assignee: Mugdha Varadkar (was: Dhaval Rajpara) > Editable tokenizer in ranger react. > --- > > Key: RANGER-4063 > URL: https://issues.apache.org/jira/browse/RANGER-4063 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dhaval Rajpara >Assignee: Mugdha Varadkar >Priority: Major > Labels: ranger-react > Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch > > > make the search filter user-editable in ranger react. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4063) Editable tokenizer in ranger react.
[ https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Mugdha Varadkar updated RANGER-4063: Attachment: 0002-RANGER-4063.patch > Editable tokenizer in ranger react. > --- > > Key: RANGER-4063 > URL: https://issues.apache.org/jira/browse/RANGER-4063 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dhaval Rajpara >Assignee: Mugdha Varadkar >Priority: Major > Labels: ranger-react > Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch > > > make the search filter user-editable in ranger react. -- This message was sent by Atlassian Jira (v8.20.10#820010)
[jira] [Updated] (RANGER-4025) Ranger improvement - Roles Import/export API for ranger admin
[ https://issues.apache.org/jira/browse/RANGER-4025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Rakesh Gupta updated RANGER-4025: - Attachment: 0007-RANGER-4025.patch > Ranger improvement - Roles Import/export API for ranger admin > - > > Key: RANGER-4025 > URL: https://issues.apache.org/jira/browse/RANGER-4025 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dineshkumar Yadav >Assignee: Rakesh Gupta >Priority: Major > Attachments: 0007-RANGER-4025.patch > > > Provide API for Roles import/export. -- This message was sent by Atlassian Jira (v8.20.10#820010)
Re: Review Request 74292: RANGER-4025: Ranger improvement - Roles Import/export API for ranger admin
--- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/74292/ --- (Updated May 23, 2023, 7:27 a.m.) Review request for ranger, Dineshkumar Yadav, Kishor Gollapalliwar, Abhay Kulkarni, Madhan Neethiraj, Mehul Parikh, Pradeep Agrawal, Ramesh Mani, sanket shelar, Sailaja Polavarapu, and Velmurugan Periasamy. Bugs: RANGER-4025 https://issues.apache.org/jira/browse/RANGER-4025 Repository: ranger Description --- Provide API for Roles import/export. Diffs (updated) - agents-common/src/main/java/org/apache/ranger/plugin/model/RangerRole.java 682bbd640 security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java c19e3e1a1 security-admin/src/main/java/org/apache/ranger/biz/RoleRefUpdater.java 421b2312d security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 04aee289e security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java 3447eb20e security-admin/src/main/java/org/apache/ranger/view/RangerExportRoleList.java PRE-CREATION security-admin/src/main/java/org/apache/ranger/view/RangerPolicyList.java 4799b3f03 security-admin/src/main/java/org/apache/ranger/view/RangerRoleList.java adbe93db6 security-admin/src/test/java/org/apache/ranger/rest/TestServiceREST.java 9d17553a4 Diff: https://reviews.apache.org/r/74292/diff/7/ Changes: https://reviews.apache.org/r/74292/diff/6-7/ Testing --- Tested the below Rest API's for Roles import/export to make sure everything works fine. RoleREST Rest API :GET /roles/roles/exportJson RoleREST Rest API :GET /roles/roles/exportJson?roleName={rolename},{rolename}, RoleREST Rest API :GET /roles/roles/importRolesFromFile RoleREST Rest API :GET /roles/roles/importRolesFromFile?updateIfExists=true RoleREST Rest API :GET /roles/roles/importRolesFromFile?createNonExistUserGroupRole=true Thanks, Rakesh Gupta
[jira] [Updated] (RANGER-4025) Ranger improvement - Roles Import/export API for ranger admin
[ https://issues.apache.org/jira/browse/RANGER-4025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Rakesh Gupta updated RANGER-4025: - Attachment: (was: 0006-RANGER-4025.patch) > Ranger improvement - Roles Import/export API for ranger admin > - > > Key: RANGER-4025 > URL: https://issues.apache.org/jira/browse/RANGER-4025 > Project: Ranger > Issue Type: New Feature > Components: Ranger >Reporter: Dineshkumar Yadav >Assignee: Rakesh Gupta >Priority: Major > > Provide API for Roles import/export. -- This message was sent by Atlassian Jira (v8.20.10#820010)