[jira] [Created] (RANGER-4253) Updated Left Sidebar layout for Ranger Admin UI in react code base

2023-05-23 Thread Mugdha Varadkar (Jira)
Mugdha Varadkar created RANGER-4253:
---

 Summary: Updated Left Sidebar layout for Ranger Admin UI in react 
code base
 Key: RANGER-4253
 URL: https://issues.apache.org/jira/browse/RANGER-4253
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Reporter: Mugdha Varadkar
Assignee: Brijesh Bhalala


Attached templates for left sidebar layout change to be done in react for 
Ranger Admin UI.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (RANGER-4076) Support Java 17 for build and runtime

2023-05-23 Thread Rakesh Gupta (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-4076?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17725633#comment-17725633
 ] 

Rakesh Gupta commented on RANGER-4076:
--

Hello Andrew Luo, I have created an patch where we can build and bringup the 
Ranger manually also with docker. This patch is working with java 8,java 11 and 
java 17. Can i assign this jira to myself and raise a RR.

> Support Java 17 for build and runtime
> -
>
> Key: RANGER-4076
> URL: https://issues.apache.org/jira/browse/RANGER-4076
> Project: Ranger
>  Issue Type: New Feature
>  Components: admin, build-infra
>Reporter: Andrew Luo
>Priority: Major
> Attachments: 
> 0001-RANGER-4076-Support-Java-17-for-build-and-runtime.patch
>
>
> Currently only Java 8 and 11 are supported.  Java 17 is a major LTS version 
> of Java and adding support would modernize our Java version support.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin

2023-05-23 Thread Duong (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Duong updated RANGER-4251:
--
Description: 
The Ranger plugin for Ozone was implemented as per RANGER-2325.

When running performance testing on Ozone, we notice that the Ranger plugin 
contributes significantly to Ozone latency and it gets worse when Ozone is 
under heavy load, i.e. 100K OPPS.

!ozone-ranger-flamegraph.png|width=1128,height=337!

This ticket tracks the effort to improve the performance of the Ranger plugin 
for Ozone. 

Source of inefficiencies identified so far:
 # Ranger is logging/auditing all the requests, including reads that are 
accepted. This is too expensive and will be addressed by RANGER-4252.

  was:
The Ranger plugin for Ozone was implemented as per RANGER-2325.

When running performance testing on Ozone, we notice that the Ranger plugin 
contributes significantly to Ozone latency and it gets worse when Ozone is 
under heavy load, i.e. 100K OPPS.

!ozone-ranger-flamegraph.png|width=1128,height=337!

This ticket tracks the effort to improve the performance of the Ranger plugin 
for Ozone. 


> Performance improvement for Ozone plugin
> 
>
> Key: RANGER-4251
> URL: https://issues.apache.org/jira/browse/RANGER-4251
> Project: Ranger
>  Issue Type: Improvement
>  Components: plugins
>Reporter: Duong
>Priority: Major
> Attachments: ozone-ranger-flamegraph.png
>
>
> The Ranger plugin for Ozone was implemented as per RANGER-2325.
> When running performance testing on Ozone, we notice that the Ranger plugin 
> contributes significantly to Ozone latency and it gets worse when Ozone is 
> under heavy load, i.e. 100K OPPS.
> !ozone-ranger-flamegraph.png|width=1128,height=337!
> This ticket tracks the effort to improve the performance of the Ranger plugin 
> for Ozone. 
> Source of inefficiencies identified so far:
>  # Ranger is logging/auditing all the requests, including reads that are 
> accepted. This is too expensive and will be addressed by RANGER-4252.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-4252) Introduce audit handler for Ozone

2023-05-23 Thread Duong (Jira)
Duong created RANGER-4252:
-

 Summary: Introduce audit handler for Ozone
 Key: RANGER-4252
 URL: https://issues.apache.org/jira/browse/RANGER-4252
 Project: Ranger
  Issue Type: Sub-task
  Components: plugins
Reporter: Duong


RangerOzoneAuthorizer now uses RangerDefaultAuditHandler that audits every 
check, including trivial accepted reads. This is very expensive considering a 
busy environment with hundreds of reads per second. 

We should introduce a custom audit handler for Ozone to filter out which 
requests need auditing. This should be similar to other custom audit handlers 
like RangerHdfsAuditHandler, RangerHiveAuditHandler, or RangerKafkaAuditHandler.

 

Ref: 
[RangerOzoneAuthorizer|https://github.com/duongkame/ranger/blob/b6650fc8c81fd339052bb2999f4653460549fdb2/plugin-ozone/src/main/java/org/apache/ranger/authorization/ozone/authorizer/RangerOzoneAuthorizer.java#L66-L66]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin

2023-05-23 Thread Duong (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Duong updated RANGER-4251:
--
Description: 
The Ranger plugin for Ozone was implemented as per RANGER-2325.

When running performance testing on Ozone, we notice that the Ranger plugin 
contributes significantly to Ozone latency and it gets worse when Ozone is 
under heavy load, i.e. 100K OPPS.

!ozone-ranger-flamegraph.png|width=1128,height=337!

This ticket tracks the effort to improve the performance of the Ranger plugin 
for Ozone. 

  was:
The Ranger plugin for Ozone was implemented as per RANGER-2325.

When running performance testing on Ozone, we notice that the Ranger plugin 
contributes significantly to Ozone latency and it gets worse when Ozone is 
under heavy load, i.e. 100K OPPS.

 


> Performance improvement for Ozone plugin
> 
>
> Key: RANGER-4251
> URL: https://issues.apache.org/jira/browse/RANGER-4251
> Project: Ranger
>  Issue Type: Improvement
>  Components: plugins
>Reporter: Duong
>Priority: Major
> Attachments: ozone-ranger-flamegraph.png
>
>
> The Ranger plugin for Ozone was implemented as per RANGER-2325.
> When running performance testing on Ozone, we notice that the Ranger plugin 
> contributes significantly to Ozone latency and it gets worse when Ozone is 
> under heavy load, i.e. 100K OPPS.
> !ozone-ranger-flamegraph.png|width=1128,height=337!
> This ticket tracks the effort to improve the performance of the Ranger plugin 
> for Ozone. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin

2023-05-23 Thread Duong (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Duong updated RANGER-4251:
--
Attachment: ozone-ranger-flamegraph.png

> Performance improvement for Ozone plugin
> 
>
> Key: RANGER-4251
> URL: https://issues.apache.org/jira/browse/RANGER-4251
> Project: Ranger
>  Issue Type: Improvement
>  Components: plugins
>Reporter: Duong
>Priority: Major
> Attachments: ozone-ranger-flamegraph.png
>
>
> The Ranger plugin for Ozone was implemented as per RANGER-2325.
> When running performance testing on Ozone, we notice that the Ranger plugin 
> contributes significantly to Ozone latency and it gets worse when Ozone is 
> under heavy load, i.e. 100K OPPS.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4251) Performance improvement for Ozone plugin

2023-05-23 Thread Duong (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4251?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Duong updated RANGER-4251:
--
Description: 
The Ranger plugin for Ozone was implemented as per RANGER-2325.

When running performance testing on Ozone, we notice that the Ranger plugin 
contributes significantly to Ozone latency and it gets worse when Ozone is 
under heavy load, i.e. 100K OPPS.

 

> Performance improvement for Ozone plugin
> 
>
> Key: RANGER-4251
> URL: https://issues.apache.org/jira/browse/RANGER-4251
> Project: Ranger
>  Issue Type: Improvement
>  Components: plugins
>Reporter: Duong
>Priority: Major
>
> The Ranger plugin for Ozone was implemented as per RANGER-2325.
> When running performance testing on Ozone, we notice that the Ranger plugin 
> contributes significantly to Ozone latency and it gets worse when Ozone is 
> under heavy load, i.e. 100K OPPS.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-4251) Performance improvement for Ozone plugin

2023-05-23 Thread Duong (Jira)
Duong created RANGER-4251:
-

 Summary: Performance improvement for Ozone plugin
 Key: RANGER-4251
 URL: https://issues.apache.org/jira/browse/RANGER-4251
 Project: Ranger
  Issue Type: Improvement
  Components: plugins
Reporter: Duong






--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 74441: RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization

2023-05-23 Thread Ramesh Mani

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74441/
---

(Updated May 23, 2023, 11:18 p.m.)


Review request for ranger, Abhay Kulkarni and Madhan Neethiraj.


Changes
---

Updated the test case in the description


Bugs: RANGER-4165
https://issues.apache.org/jira/browse/RANGER-4165


Repository: ranger


Description
---

RANGER-4165:API to find whether a user/group is authorized to the given 
operation on any resource of give type


Diffs
-

  
agents-common/src/main/java/org/apache/ranger/plugin/contextenricher/RangerTagEnricher.java
 e0a86c398 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequest.java
 6a38747f4 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestImpl.java
 e561c4c7c 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestReadOnly.java
 4887c0112 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestWrapper.java
 6aec330d7 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerPolicyRepository.java
 b5b26702c 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerResourceTrie.java
 f89d51e35 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java
 eee1e1f1b 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyresourcematcher/RangerDefaultPolicyResourceMatcher.java
 e887730c9 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcher.java
 032d4487c 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcher.java
 c421388e7 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcher.java
 5fa5b68d4 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerResourceMatcher.java
 0cb3e0fed 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcher.java
 ee2fff3ed 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/ResourceMatcher.java
 5df4f1e3a 
  
agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java
 b505f495b 
  
agents-common/src/main/java/org/apache/ranger/plugin/util/RangerResourceEvaluatorsRetriever.java
 e60fe055b 
  
agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPathResourceTrie.java
 30a7215a6 
  
agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPolicyEngine.java
 b2a5151e5 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcherTest.java
 e31437fc1 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcherTest.java
 ad21b3239 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcherTest.java
 8fe3be9cc 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcherTest.java
 2b7f27200 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/TestResourceMatcher.java
 ea7bc01f2 
  agents-common/src/test/resources/policyengine/test_policyengine_aws.json 
118bef534 
  agents-common/src/test/resources/policyengine/test_policyengine_kafka.json 
PRE-CREATION 


Diff: https://reviews.apache.org/r/74441/diff/2/


Testing (updated)
---

Testing done with TestCase.
-- Request has to set the resource = " " and  resourceMatchingScope =  
"SELF_OR_PREFIX",
example:  
{"name":"Any topic Consume access for user3",
  "request":{
"resource":{"elements":{"topic":""}}, "resourceMatchingScope": 
"SELF_OR_PREFIX",
"accessType":"consume","user":"user3","userGroups":[]
  },
  "result":{"isAudited":true,"isAllowed":true,"policyId":102}
}
-- Policy maintained => user1 will have access to consume on several topics, 
this call should result in "ALLOWED".

-- Testing done with new tests in 
agents-common/src/test/resources/policyengine/test_policyengine_kafka.json


-- Ran all the PolicyEngine and plugin tests.


Thanks,

Ramesh Mani



[jira] [Comment Edited] (RANGER-4165) Support SELF_OR_PREFIX resource matching scope in Ranger Authorization

2023-05-23 Thread Ramesh Mani (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-4165?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17723252#comment-17723252
 ] 

Ramesh Mani edited comment on RANGER-4165 at 5/23/23 7:24 PM:
--

Attached reworked Patch from [~madhan] 

[https://reviews.apache.org/r/74441/diff/2#index_header]

[~abhayk]  Please review this patch. Thanks.

 


was (Author: rmani):
Attached reworked Patch from [~madhan] 

[https://reviews.apache.org/r/74441/diff/1#index_header]

[~abhayk]  Please review this patch. Thanks.

 

>  Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
> ---
>
> Key: RANGER-4165
> URL: https://issues.apache.org/jira/browse/RANGER-4165
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Affects Versions: 3.0.0
>Reporter: Ramesh Mani
>Assignee: Ramesh Mani
>Priority: Major
>
>  Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
> This is need to create an api which can find whether a user/group is 
> authorized to the given operation on any resource of give type.
> This is needed to implement a Ranger Kafka authorizer API which checks if the 
> caller is authorized to perform the given ACL operation on at least one 
> resource of the given type.
> [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType])



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 74441: RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger Authorization

2023-05-23 Thread Ramesh Mani

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74441/
---

(Updated May 23, 2023, 7:22 p.m.)


Review request for ranger, Abhay Kulkarni and Madhan Neethiraj.


Changes
---

RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger 
Authorization


Summary (updated)
-

RANGER-4165: Support SELF_OR_PREFIX resource matching scope in Ranger 
Authorization


Bugs: RANGER-4165
https://issues.apache.org/jira/browse/RANGER-4165


Repository: ranger


Description
---

RANGER-4165:API to find whether a user/group is authorized to the given 
operation on any resource of give type


Diffs (updated)
-

  
agents-common/src/main/java/org/apache/ranger/plugin/contextenricher/RangerTagEnricher.java
 e0a86c398 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequest.java
 6a38747f4 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestImpl.java
 e561c4c7c 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestReadOnly.java
 4887c0112 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestWrapper.java
 6aec330d7 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerPolicyRepository.java
 b5b26702c 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerResourceTrie.java
 f89d51e35 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java
 eee1e1f1b 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyresourcematcher/RangerDefaultPolicyResourceMatcher.java
 e887730c9 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcher.java
 032d4487c 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcher.java
 c421388e7 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcher.java
 5fa5b68d4 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerResourceMatcher.java
 0cb3e0fed 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcher.java
 ee2fff3ed 
  
agents-common/src/main/java/org/apache/ranger/plugin/resourcematcher/ResourceMatcher.java
 5df4f1e3a 
  
agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java
 b505f495b 
  
agents-common/src/main/java/org/apache/ranger/plugin/util/RangerResourceEvaluatorsRetriever.java
 e60fe055b 
  
agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPathResourceTrie.java
 30a7215a6 
  
agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPolicyEngine.java
 b2a5151e5 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerAbstractResourceMatcherTest.java
 e31437fc1 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerDefaultResourceMatcherTest.java
 ad21b3239 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerPathResourceMatcherTest.java
 8fe3be9cc 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/RangerURLResourceMatcherTest.java
 2b7f27200 
  
agents-common/src/test/java/org/apache/ranger/plugin/resourcematcher/TestResourceMatcher.java
 ea7bc01f2 
  agents-common/src/test/resources/policyengine/test_policyengine_aws.json 
118bef534 
  agents-common/src/test/resources/policyengine/test_policyengine_kafka.json 
PRE-CREATION 


Diff: https://reviews.apache.org/r/74441/diff/2/

Changes: https://reviews.apache.org/r/74441/diff/1-2/


Testing
---

Testing done with TestCase.
-- Request has to set the resource = " " and  resourceMatchingScope =  
"SELF_OR_PREFIX",
example:  
{"name":"Any topic Consume access for user3",
  "request":{
"resource":{"elements":{"topic":""}}, "resourceMatchingScope": 
"SELF_OR_PREFIX",
"accessType":"consume","user":"user3","userGroups":[],
"context": {"RESOURCE_TYPE": "topic"}
  },
  "result":{"isAudited":true,"isAllowed":true,"policyId":102}
}
-- Policy maintained => user1 will have access to consume on several topics, 
this call should result in "ALLOWED".

-- Testing done with new tests in 
agents-common/src/test/resources/policyengine/test_policyengine_kafka.json


-- Ran all the PolicyEngine and plugin tests.


Thanks,

Ramesh Mani



[jira] [Updated] (RANGER-4165) Support SELF_OR_PREFIX resource matching scope in Ranger Authorization

2023-05-23 Thread Ramesh Mani (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4165?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ramesh Mani updated RANGER-4165:

Description: 
 Support SELF_OR_PREFIX resource matching scope in Ranger Authorization

This is need to create an api which can find whether a user/group is authorized 
to the given operation on any resource of give type.

This is needed to implement a Ranger Kafka authorizer API which checks if the 
caller is authorized to perform the given ACL operation on at least one 
resource of the given type.

[https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType])

  was:
API to find whether a user/group is authorized to the given operation on any 
resource of give type.

This is needed to implement a Ranger Kafka authorizer API which checks if the 
caller is authorized to perform the given ACL operation on at least one 
resource of the given type.

[https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType])


>  Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
> ---
>
> Key: RANGER-4165
> URL: https://issues.apache.org/jira/browse/RANGER-4165
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Affects Versions: 3.0.0
>Reporter: Ramesh Mani
>Assignee: Ramesh Mani
>Priority: Major
>
>  Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
> This is need to create an api which can find whether a user/group is 
> authorized to the given operation on any resource of give type.
> This is needed to implement a Ranger Kafka authorizer API which checks if the 
> caller is authorized to perform the given ACL operation on at least one 
> resource of the given type.
> [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType])



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4165) Support SELF_OR_PREFIX resource matching scope in Ranger Authorization

2023-05-23 Thread Ramesh Mani (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4165?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ramesh Mani updated RANGER-4165:

Summary:  Support SELF_OR_PREFIX resource matching scope in Ranger 
Authorization  (was: API to find whether a user/group is authorized to the 
given operation on any resource of give type)

>  Support SELF_OR_PREFIX resource matching scope in Ranger Authorization
> ---
>
> Key: RANGER-4165
> URL: https://issues.apache.org/jira/browse/RANGER-4165
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Affects Versions: 3.0.0
>Reporter: Ramesh Mani
>Assignee: Ramesh Mani
>Priority: Major
>
> API to find whether a user/group is authorized to the given operation on any 
> resource of give type.
> This is needed to implement a Ranger Kafka authorizer API which checks if the 
> caller is authorized to perform the given ACL operation on at least one 
> resource of the given type.
> [https://kafka.apache.org/28/javadoc/org/apache/kafka/server/authorizer/Authorizer.html#authorizeByResourceType(org.apache.kafka.server.authorizer.AuthorizableRequestContext,org.apache.kafka.common.acl.AclOperation,org.apache.kafka.common.resource.ResourceType])



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})

2023-05-23 Thread Ramachandran (Jira)


[ https://issues.apache.org/jira/browse/RANGER-4250 ]


Ramachandran deleted comment on RANGER-4250:
--

was (Author: JIRAUSER295265):
[^0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch]

> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name})
> 
>
> Key: RANGER-4250
> URL: https://issues.apache.org/jira/browse/RANGER-4250
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ramachandran
>Assignee: Ramachandran
>Priority: Major
>  Labels: pull-request-available
> Fix For: 3.0.0
>
> Attachments: 
> 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch
>
>
> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
> Bad Request| at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
>  at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
>  at 
> org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
>  at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
> org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
> org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
>  at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
> at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
>  at 
> org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
>  at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})

2023-05-23 Thread Ramachandran (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ramachandran updated RANGER-4250:
-
Summary: Ranger throws BAD Request Error when we are not passing exec user 
to the getRoles (/public/v2/api/roles/name/{name})  (was: Ranger throws BAD 
Request Error when we are not passing exec user to the getRoles 
(/public/v2/api/roles/name/{name))

> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name})
> 
>
> Key: RANGER-4250
> URL: https://issues.apache.org/jira/browse/RANGER-4250
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ramachandran
>Assignee: Ramachandran
>Priority: Major
>  Labels: pull-request-available
> Fix For: 3.0.0
>
> Attachments: 
> 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch
>
>
> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
> Bad Request| at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
>  at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
>  at 
> org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
>  at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
> org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
> org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
>  at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
> at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
>  at 
> org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
>  at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})

2023-05-23 Thread Ramachandran (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ramachandran updated RANGER-4250:
-
Attachment: 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch

> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name})
> 
>
> Key: RANGER-4250
> URL: https://issues.apache.org/jira/browse/RANGER-4250
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ramachandran
>Assignee: Ramachandran
>Priority: Major
>  Labels: pull-request-available
> Fix For: 3.0.0
>
> Attachments: 
> 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch
>
>
> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
> Bad Request| at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
>  at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
>  at 
> org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
>  at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
> org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
> org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
>  at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
> at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
>  at 
> org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
>  at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})

2023-05-23 Thread Ramachandran (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ramachandran updated RANGER-4250:
-
Attachment: (was: 
0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch)

> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name})
> 
>
> Key: RANGER-4250
> URL: https://issues.apache.org/jira/browse/RANGER-4250
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ramachandran
>Assignee: Ramachandran
>Priority: Major
>  Labels: pull-request-available
> Fix For: 3.0.0
>
> Attachments: 
> 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch
>
>
> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
> Bad Request| at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
>  at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
>  at 
> org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
>  at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
> org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
> org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
>  at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
> at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
>  at 
> org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
>  at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 74453: RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name})

2023-05-23 Thread Ramachandran Krishnan

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74453/
---

(Updated May 23, 2023, 4:56 p.m.)


Review request for ranger, Don Bosco Durai, Abhay Kulkarni, Madhan Neethiraj, 
Mehul Parikh, Nikhil P, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, 
Sailaja Polavarapu, Subhrat Chaudhary, and Velmurugan Periasamy.


Summary (updated)
-

RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user 
to the getRoles (/public/v2/api/roles/name/{name})


Bugs: RANGER-4250
https://issues.apache.org/jira/browse/RANGER-4250


Repository: ranger


Description
---

Ranger throws BAD Request Error when we are not passing exec user to the 
getRoles (/public/v2/api/roles/name/{name)

getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
Bad Request| at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
 at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
 at 
org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
 at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
 at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
at 
org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
 at 
org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
 at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at


Diffs
-

  security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 


Diff: https://reviews.apache.org/r/74453/diff/2/


Testing
---


Thanks,

Ramachandran Krishnan



Re: Review Request 74453: RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)

2023-05-23 Thread Ramachandran Krishnan

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74453/
---

(Updated May 23, 2023, 4:55 p.m.)


Review request for ranger, Don Bosco Durai, Abhay Kulkarni, Madhan Neethiraj, 
Mehul Parikh, Nikhil P, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, 
Sailaja Polavarapu, Subhrat Chaudhary, and Velmurugan Periasamy.


Bugs: RANGER-4250
https://issues.apache.org/jira/browse/RANGER-4250


Repository: ranger


Description
---

Ranger throws BAD Request Error when we are not passing exec user to the 
getRoles (/public/v2/api/roles/name/{name)

getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
Bad Request| at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
 at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
 at 
org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
 at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
 at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
at 
org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
 at 
org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
 at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at


Diffs (updated)
-

  security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 


Diff: https://reviews.apache.org/r/74453/diff/2/

Changes: https://reviews.apache.org/r/74453/diff/1-2/


Testing
---


Thanks,

Ramachandran Krishnan



Re: Review Request 74451: RANGER-4063 Editable Search Filter (tokenizer) in Ranger React

2023-05-23 Thread Mehul Parikh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74451/#review225487
---


Ship it!




Ship It!

- Mehul Parikh


On May 23, 2023, 7:43 a.m., Mugdha Varadkar wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74451/
> ---
> 
> (Updated May 23, 2023, 7:43 a.m.)
> 
> 
> Review request for ranger, Brijesh Bhalala, Dhaval Rajpara, Madhan Neethiraj, 
> Mehul Parikh, and Nikunj Pansuriya.
> 
> 
> Bugs: RANGER-4063
> https://issues.apache.org/jira/browse/RANGER-4063
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Make the search filter user-editable in ranger react.
> 
> 
> Diffs
> -
> 
>   
> security-admin/src/main/webapp/react-webapp/src/components/CommonComponents.jsx
>  147ff7e05f2d56600a97a30aaf827e76dd02f0da 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/calendar.js
>  308c59feb4aa0dbb2621beb85cbbbab95160e00c 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/date_input.js
>  0fcdb90894ad6ff690117983ad0cc6946db70bb6 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/datepicker.js
>  8a87fde2418eefe623dc9a13379d7d3b78ee01d4 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/index.js
>  55eaad582d17d7a263db0177152f293f0b940b59 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/token.js
>  247ac66c448f9aedcbf986aabc1c55b351b8724e 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/typeahead/index.js
>  4941faf35a95a85bfbc9555640c5a238550e2957 
>   security-admin/src/main/webapp/react-webapp/src/styles/style.css 
> d2aecb12048d4539d6cc6518057a9ef3509647fa 
>   security-admin/src/main/webapp/react-webapp/src/utils/XAUtils.js 
> 4ff2732d6ba5c63df99ddbeedc533aa24280c0c2 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogs.jsx
>  f8d1f8e9253bf4105d7260ca2161b66c0599e8a3 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogsTable.jsx
>  7e4392a3c8198f9000613b6e6941810f17a360e7 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AdminLogs.jsx
>  4cb5062ce20167cb3efa2e496e67bd751cab3e44 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/LoginSessionsLogs.jsx
>  9e2ba988274a34c91762f37ee1cc2f391e2c74fb 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginStatusLogs.jsx
>  72a5272eb99ef1372334038c35fb5077eb7e6c71 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginsLog.jsx
>  2b706bd81f9f6d7af6eee7b1ba21e4eb7bfc93d9 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/UserSync.jsx 
> 48346a83bc919d5b5d5b747b2dfbf7417045dbdb 
>   
> security-admin/src/main/webapp/react-webapp/src/views/Encryption/KeyManager.jsx
>  d9083a2a77fd627377b73652617a9e1b6dd32d09 
>   
> security-admin/src/main/webapp/react-webapp/src/views/PermissionsModule/Permissions.jsx
>  9523d17d0724a85e069c42a1bb502db93c9751f9 
>   
> security-admin/src/main/webapp/react-webapp/src/views/PolicyListing/PolicyListing.jsx
>  3818e096874eb75ba82abde45b2b0c2d46ec3865 
>   
> security-admin/src/main/webapp/react-webapp/src/views/Reports/SearchPolicyTable.jsx
>  55dd1879b83b133c9ef54ac20f1d41e827f723cb 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/groups_details/GroupListing.jsx
>  c5b11fb0afa4730f873b72607446d8258ea8bff4 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleForm.jsx
>  e724050a8b7c49ad028f742dbcae099cec0d2b6f 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleListing.jsx
>  6031eb27bc8c3d0b03b6eadcb81997e4f324fd31 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/users_details/UserListing.jsx
>  6bdc7ba67363e2d3ed03f671f6734158ec1624ea 
> 
> 
> Diff: https://reviews.apache.org/r/74451/diff/1/
> 
> 
> Testing
> ---
> 
> Tested changes on a cluster setup with Ranger Admin build with react code 
> base. 
> Verfied search filter user editable use cases on the cluster setup.
> 
> Successful completion of build command :
> mvn clean compile package -Psecurity-admin-react
> 
> 
> Thanks,
> 
> Mugdha Varadkar
> 
>



[jira] [Commented] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)

2023-05-23 Thread Ramachandran (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17725321#comment-17725321
 ] 

Ramachandran commented on RANGER-4250:
--

[~mad...@apache.org]  The review is available 
here:[https://reviews.apache.org/r/74453/]

 

> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> ---
>
> Key: RANGER-4250
> URL: https://issues.apache.org/jira/browse/RANGER-4250
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ramachandran
>Assignee: Ramachandran
>Priority: Major
> Attachments: 
> 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch
>
>
> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
> Bad Request| at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
>  at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
>  at 
> org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
>  at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
> org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
> org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
>  at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
> at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
>  at 
> org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
>  at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)

2023-05-23 Thread Ramachandran (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4250?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ramachandran updated RANGER-4250:
-
Attachment: 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch

> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> ---
>
> Key: RANGER-4250
> URL: https://issues.apache.org/jira/browse/RANGER-4250
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ramachandran
>Assignee: Ramachandran
>Priority: Major
> Attachments: 
> 0001-RANGER-4250-Ranger-throws-BAD-Request-Error-when-we-.patch
>
>
> Ranger throws BAD Request Error when we are not passing exec user to the 
> getRoles (/public/v2/api/roles/name/{name)
> getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
> Bad Request| at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
>  at 
> org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
>  at 
> org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
>  at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
> org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
> org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
>  at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
> at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
>  at 
> org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
>  at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Review Request 74453: RANGER-4250 : Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)

2023-05-23 Thread Ramachandran Krishnan

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74453/
---

Review request for ranger, Don Bosco Durai, Abhay Kulkarni, Madhan Neethiraj, 
Mehul Parikh, Nikhil P, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, 
Sailaja Polavarapu, Subhrat Chaudhary, and Velmurugan Periasamy.


Bugs: RANGER-4250
https://issues.apache.org/jira/browse/RANGER-4250


Repository: ranger


Description
---

Ranger throws BAD Request Error when we are not passing exec user to the 
getRoles (/public/v2/api/roles/name/{name)

getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
Bad Request| at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
 at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
 at 
org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
 at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
 at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
at 
org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
 at 
org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
 at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at


Diffs
-

  security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 
  security-admin/src/test/java/org/apache/ranger/rest/TestRoleREST.java 
217c1bba3 


Diff: https://reviews.apache.org/r/74453/diff/1/


Testing
---


Thanks,

Ramachandran Krishnan



Re: Review Request 74451: RANGER-4063 Editable Search Filter (tokenizer) in Ranger React

2023-05-23 Thread Dhaval Rajpara

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74451/#review225486
---


Ship it!




Ship It!

- Dhaval Rajpara


On May 23, 2023, 7:43 a.m., Mugdha Varadkar wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74451/
> ---
> 
> (Updated May 23, 2023, 7:43 a.m.)
> 
> 
> Review request for ranger, Brijesh Bhalala, Dhaval Rajpara, Madhan Neethiraj, 
> Mehul Parikh, and Nikunj Pansuriya.
> 
> 
> Bugs: RANGER-4063
> https://issues.apache.org/jira/browse/RANGER-4063
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Make the search filter user-editable in ranger react.
> 
> 
> Diffs
> -
> 
>   
> security-admin/src/main/webapp/react-webapp/src/components/CommonComponents.jsx
>  147ff7e05f2d56600a97a30aaf827e76dd02f0da 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/calendar.js
>  308c59feb4aa0dbb2621beb85cbbbab95160e00c 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/date_input.js
>  0fcdb90894ad6ff690117983ad0cc6946db70bb6 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/datepicker.js
>  8a87fde2418eefe623dc9a13379d7d3b78ee01d4 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/index.js
>  55eaad582d17d7a263db0177152f293f0b940b59 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/token.js
>  247ac66c448f9aedcbf986aabc1c55b351b8724e 
>   
> security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/typeahead/index.js
>  4941faf35a95a85bfbc9555640c5a238550e2957 
>   security-admin/src/main/webapp/react-webapp/src/styles/style.css 
> d2aecb12048d4539d6cc6518057a9ef3509647fa 
>   security-admin/src/main/webapp/react-webapp/src/utils/XAUtils.js 
> 4ff2732d6ba5c63df99ddbeedc533aa24280c0c2 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogs.jsx
>  f8d1f8e9253bf4105d7260ca2161b66c0599e8a3 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogsTable.jsx
>  7e4392a3c8198f9000613b6e6941810f17a360e7 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AdminLogs.jsx
>  4cb5062ce20167cb3efa2e496e67bd751cab3e44 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/LoginSessionsLogs.jsx
>  9e2ba988274a34c91762f37ee1cc2f391e2c74fb 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginStatusLogs.jsx
>  72a5272eb99ef1372334038c35fb5077eb7e6c71 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginsLog.jsx
>  2b706bd81f9f6d7af6eee7b1ba21e4eb7bfc93d9 
>   
> security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/UserSync.jsx 
> 48346a83bc919d5b5d5b747b2dfbf7417045dbdb 
>   
> security-admin/src/main/webapp/react-webapp/src/views/Encryption/KeyManager.jsx
>  d9083a2a77fd627377b73652617a9e1b6dd32d09 
>   
> security-admin/src/main/webapp/react-webapp/src/views/PermissionsModule/Permissions.jsx
>  9523d17d0724a85e069c42a1bb502db93c9751f9 
>   
> security-admin/src/main/webapp/react-webapp/src/views/PolicyListing/PolicyListing.jsx
>  3818e096874eb75ba82abde45b2b0c2d46ec3865 
>   
> security-admin/src/main/webapp/react-webapp/src/views/Reports/SearchPolicyTable.jsx
>  55dd1879b83b133c9ef54ac20f1d41e827f723cb 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/groups_details/GroupListing.jsx
>  c5b11fb0afa4730f873b72607446d8258ea8bff4 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleForm.jsx
>  e724050a8b7c49ad028f742dbcae099cec0d2b6f 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleListing.jsx
>  6031eb27bc8c3d0b03b6eadcb81997e4f324fd31 
>   
> security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/users_details/UserListing.jsx
>  6bdc7ba67363e2d3ed03f671f6734158ec1624ea 
> 
> 
> Diff: https://reviews.apache.org/r/74451/diff/1/
> 
> 
> Testing
> ---
> 
> Tested changes on a cluster setup with Ranger Admin build with react code 
> base. 
> Verfied search filter user editable use cases on the cluster setup.
> 
> Successful completion of build command :
> mvn clean compile package -Psecurity-admin-react
> 
> 
> Thanks,
> 
> Mugdha Varadkar
> 
>



[jira] [Created] (RANGER-4250) Ranger throws BAD Request Error when we are not passing exec user to the getRoles (/public/v2/api/roles/name/{name)

2023-05-23 Thread Ramachandran (Jira)
Ramachandran created RANGER-4250:


 Summary: Ranger throws BAD Request Error when we are not passing 
exec user to the getRoles (/public/v2/api/roles/name/{name)
 Key: RANGER-4250
 URL: https://issues.apache.org/jira/browse/RANGER-4250
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Reporter: Ramachandran
Assignee: Ramachandran


Ranger throws BAD Request Error when we are not passing exec user to the 
getRoles (/public/v2/api/roles/name/{name)

getGroupsForUser('null') failed javax.ws.rs.WebApplicationException: HTTP 400 
Bad Request| at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:56)|
 at 
org.apache.ranger.common.RESTErrorUtil.createRESTException(RESTErrorUtil.java:325)|
 at 
org.apache.ranger.service.XUserService.getXUserByUserName(XUserService.java:160)|
 at org.apache.ranger.biz.XUserMgr.getXUserByUserName(XUserMgr.java:153)| at 
org.apache.ranger.biz.XUserMgr.getGroupsForUser(XUserMgr.java:893)| at 
org.apache.ranger.biz.XUserMgr$$FastClassBySpringCGLIB$$57c6d473.invoke()|
 at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)| 
at 
org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:688)|
 at 
org.apache.ranger.biz.XUserMgr$$EnhancerBySpringCGLIB$$ab39f3cf.getGroupsForUser()|
 at org.apache.ranger.rest.RoleREST.getRole(RoleREST.java:301)| at 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4063) Editable Search Filter (tokenizer) in Ranger React

2023-05-23 Thread Mugdha Varadkar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mugdha Varadkar updated RANGER-4063:

Attachment: (was: 0002-RANGER-4063.patch)

> Editable Search Filter (tokenizer) in Ranger React
> --
>
> Key: RANGER-4063
> URL: https://issues.apache.org/jira/browse/RANGER-4063
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dhaval Rajpara
>Assignee: Mugdha Varadkar
>Priority: Major
>  Labels: ranger-react
> Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch
>
>
> make the search filter user-editable in ranger react.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4063) Editable Search Filter (tokenizer) in Ranger React

2023-05-23 Thread Mugdha Varadkar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mugdha Varadkar updated RANGER-4063:

Attachment: 0002-RANGER-4063.patch

> Editable Search Filter (tokenizer) in Ranger React
> --
>
> Key: RANGER-4063
> URL: https://issues.apache.org/jira/browse/RANGER-4063
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dhaval Rajpara
>Assignee: Mugdha Varadkar
>Priority: Major
>  Labels: ranger-react
> Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch
>
>
> make the search filter user-editable in ranger react.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Review Request 74451: RANGER-4063 Editable Search Filter (tokenizer) in Ranger React

2023-05-23 Thread Mugdha Varadkar

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74451/
---

Review request for ranger, Brijesh Bhalala, Dhaval Rajpara, Madhan Neethiraj, 
Mehul Parikh, and Nikunj Pansuriya.


Bugs: RANGER-4063
https://issues.apache.org/jira/browse/RANGER-4063


Repository: ranger


Description
---

Make the search filter user-editable in ranger react.


Diffs
-

  
security-admin/src/main/webapp/react-webapp/src/components/CommonComponents.jsx 
147ff7e05f2d56600a97a30aaf827e76dd02f0da 
  
security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/calendar.js
 308c59feb4aa0dbb2621beb85cbbbab95160e00c 
  
security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/date_input.js
 0fcdb90894ad6ff690117983ad0cc6946db70bb6 
  
security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-datepicker/datepicker.js
 8a87fde2418eefe623dc9a13379d7d3b78ee01d4 
  
security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/index.js
 55eaad582d17d7a263db0177152f293f0b940b59 
  
security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/tokenizer/token.js
 247ac66c448f9aedcbf986aabc1c55b351b8724e 
  
security-admin/src/main/webapp/react-webapp/src/components/structured-filter/react-typeahead/typeahead/index.js
 4941faf35a95a85bfbc9555640c5a238550e2957 
  security-admin/src/main/webapp/react-webapp/src/styles/style.css 
d2aecb12048d4539d6cc6518057a9ef3509647fa 
  security-admin/src/main/webapp/react-webapp/src/utils/XAUtils.js 
4ff2732d6ba5c63df99ddbeedc533aa24280c0c2 
  
security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogs.jsx 
f8d1f8e9253bf4105d7260ca2161b66c0599e8a3 
  
security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AccessLogsTable.jsx
 7e4392a3c8198f9000613b6e6941810f17a360e7 
  
security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/AdminLogs.jsx 
4cb5062ce20167cb3efa2e496e67bd751cab3e44 
  
security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/LoginSessionsLogs.jsx
 9e2ba988274a34c91762f37ee1cc2f391e2c74fb 
  
security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginStatusLogs.jsx
 72a5272eb99ef1372334038c35fb5077eb7e6c71 
  
security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/PluginsLog.jsx 
2b706bd81f9f6d7af6eee7b1ba21e4eb7bfc93d9 
  security-admin/src/main/webapp/react-webapp/src/views/AuditEvent/UserSync.jsx 
48346a83bc919d5b5d5b747b2dfbf7417045dbdb 
  
security-admin/src/main/webapp/react-webapp/src/views/Encryption/KeyManager.jsx 
d9083a2a77fd627377b73652617a9e1b6dd32d09 
  
security-admin/src/main/webapp/react-webapp/src/views/PermissionsModule/Permissions.jsx
 9523d17d0724a85e069c42a1bb502db93c9751f9 
  
security-admin/src/main/webapp/react-webapp/src/views/PolicyListing/PolicyListing.jsx
 3818e096874eb75ba82abde45b2b0c2d46ec3865 
  
security-admin/src/main/webapp/react-webapp/src/views/Reports/SearchPolicyTable.jsx
 55dd1879b83b133c9ef54ac20f1d41e827f723cb 
  
security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/groups_details/GroupListing.jsx
 c5b11fb0afa4730f873b72607446d8258ea8bff4 
  
security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleForm.jsx
 e724050a8b7c49ad028f742dbcae099cec0d2b6f 
  
security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/role_details/RoleListing.jsx
 6031eb27bc8c3d0b03b6eadcb81997e4f324fd31 
  
security-admin/src/main/webapp/react-webapp/src/views/UserGroupRoleListing/users_details/UserListing.jsx
 6bdc7ba67363e2d3ed03f671f6734158ec1624ea 


Diff: https://reviews.apache.org/r/74451/diff/1/


Testing
---

Tested changes on a cluster setup with Ranger Admin build with react code base. 
Verfied search filter user editable use cases on the cluster setup.

Successful completion of build command :
mvn clean compile package -Psecurity-admin-react


Thanks,

Mugdha Varadkar



[jira] [Updated] (RANGER-4063) Editable Search Filter (tokenizer) in Ranger React

2023-05-23 Thread Mugdha Varadkar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mugdha Varadkar updated RANGER-4063:

Summary: Editable Search Filter (tokenizer) in Ranger React  (was: Editable 
tokenizer in ranger react.)

> Editable Search Filter (tokenizer) in Ranger React
> --
>
> Key: RANGER-4063
> URL: https://issues.apache.org/jira/browse/RANGER-4063
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dhaval Rajpara
>Assignee: Mugdha Varadkar
>Priority: Major
>  Labels: ranger-react
> Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch
>
>
> make the search filter user-editable in ranger react.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4063) Editable tokenizer in ranger react.

2023-05-23 Thread Mugdha Varadkar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mugdha Varadkar reassigned RANGER-4063:
---

Assignee: Mugdha Varadkar  (was: Dhaval Rajpara)

> Editable tokenizer in ranger react.
> ---
>
> Key: RANGER-4063
> URL: https://issues.apache.org/jira/browse/RANGER-4063
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dhaval Rajpara
>Assignee: Mugdha Varadkar
>Priority: Major
>  Labels: ranger-react
> Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch
>
>
> make the search filter user-editable in ranger react.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4063) Editable tokenizer in ranger react.

2023-05-23 Thread Mugdha Varadkar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4063?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mugdha Varadkar updated RANGER-4063:

Attachment: 0002-RANGER-4063.patch

> Editable tokenizer in ranger react.
> ---
>
> Key: RANGER-4063
> URL: https://issues.apache.org/jira/browse/RANGER-4063
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dhaval Rajpara
>Assignee: Mugdha Varadkar
>Priority: Major
>  Labels: ranger-react
> Attachments: 0001-RANGER-4063.patch, 0002-RANGER-4063.patch
>
>
> make the search filter user-editable in ranger react.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4025) Ranger improvement - Roles Import/export API for ranger admin

2023-05-23 Thread Rakesh Gupta (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rakesh Gupta updated RANGER-4025:
-
Attachment: 0007-RANGER-4025.patch

> Ranger improvement - Roles Import/export API for ranger admin
> -
>
> Key: RANGER-4025
> URL: https://issues.apache.org/jira/browse/RANGER-4025
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dineshkumar Yadav
>Assignee: Rakesh Gupta
>Priority: Major
> Attachments: 0007-RANGER-4025.patch
>
>
> Provide API for Roles import/export. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 74292: RANGER-4025: Ranger improvement - Roles Import/export API for ranger admin

2023-05-23 Thread Rakesh Gupta

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74292/
---

(Updated May 23, 2023, 7:27 a.m.)


Review request for ranger, Dineshkumar Yadav, Kishor Gollapalliwar, Abhay 
Kulkarni, Madhan Neethiraj, Mehul Parikh, Pradeep Agrawal, Ramesh Mani, sanket 
shelar, Sailaja Polavarapu, and Velmurugan Periasamy.


Bugs: RANGER-4025
https://issues.apache.org/jira/browse/RANGER-4025


Repository: ranger


Description
---

Provide API for Roles import/export.


Diffs (updated)
-

  agents-common/src/main/java/org/apache/ranger/plugin/model/RangerRole.java 
682bbd640 
  security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java c19e3e1a1 
  security-admin/src/main/java/org/apache/ranger/biz/RoleRefUpdater.java 
421b2312d 
  security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 
04aee289e 
  security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 
  security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java 
3447eb20e 
  security-admin/src/main/java/org/apache/ranger/view/RangerExportRoleList.java 
PRE-CREATION 
  security-admin/src/main/java/org/apache/ranger/view/RangerPolicyList.java 
4799b3f03 
  security-admin/src/main/java/org/apache/ranger/view/RangerRoleList.java 
adbe93db6 
  security-admin/src/test/java/org/apache/ranger/rest/TestServiceREST.java 
9d17553a4 


Diff: https://reviews.apache.org/r/74292/diff/7/

Changes: https://reviews.apache.org/r/74292/diff/6-7/


Testing
---

Tested the below Rest API's for Roles import/export to make sure everything 
works fine.

RoleREST Rest API :GET /roles/roles/exportJson
RoleREST Rest API :GET 
/roles/roles/exportJson?roleName={rolename},{rolename},

RoleREST Rest API :GET /roles/roles/importRolesFromFile
RoleREST Rest API :GET /roles/roles/importRolesFromFile?updateIfExists=true
RoleREST Rest API :GET 
/roles/roles/importRolesFromFile?createNonExistUserGroupRole=true


Thanks,

Rakesh Gupta



[jira] [Updated] (RANGER-4025) Ranger improvement - Roles Import/export API for ranger admin

2023-05-23 Thread Rakesh Gupta (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rakesh Gupta updated RANGER-4025:
-
Attachment: (was: 0006-RANGER-4025.patch)

> Ranger improvement - Roles Import/export API for ranger admin
> -
>
> Key: RANGER-4025
> URL: https://issues.apache.org/jira/browse/RANGER-4025
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dineshkumar Yadav
>Assignee: Rakesh Gupta
>Priority: Major
>
> Provide API for Roles import/export. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)