[jira] [Updated] (RANGER-3920) When sync'ing users from Ldap, intermittent User/Group/UserGroup membership is missing

2022-09-20 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3920?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3920:
-
Description: 
Problem Statement:

Currently, Usersync sync's users/groups/usergroup in batches. In doing so, the 
user/group/usergroup at the end of the batch is not sync'ed. 
For example consider batch is of size 1000, so batch starts from 0-999 and  
then  next batch starts from 1001-1999. So in each batch one 
user/group/usergroup is missing.

 

  was:
Problem Statement:

Usersync sync's user/group/usergroup membership in batches. For example 
consider batch is of size 1000. So batch start from 0-999 and next batch starts 
from 1001-1999. So in each batch one user count missing.

 


> When sync'ing users from Ldap,  intermittent User/Group/UserGroup membership  
> is missing
> 
>
> Key: RANGER-3920
> URL: https://issues.apache.org/jira/browse/RANGER-3920
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, Ranger, usersync
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 2.4.0
>
>
> Problem Statement:
> Currently, Usersync sync's users/groups/usergroup in batches. In doing so, 
> the user/group/usergroup at the end of the batch is not sync'ed. 
> For example consider batch is of size 1000, so batch starts from 0-999 and  
> then  next batch starts from 1001-1999. So in each batch one 
> user/group/usergroup is missing.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-3920) When sync'ing users from Ldap, intermittent User/Group/UserGroup membership is missing

2022-09-20 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3920?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3920:
-
Summary: When sync'ing users from Ldap,  intermittent User/Group/UserGroup 
membership  is missing  (was: In Ldap usersync one User/Group/UserGroup 
membership is missed in each batch when pushed to ranger)

> When sync'ing users from Ldap,  intermittent User/Group/UserGroup membership  
> is missing
> 
>
> Key: RANGER-3920
> URL: https://issues.apache.org/jira/browse/RANGER-3920
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, Ranger, usersync
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 2.4.0
>
>
> Problem Statement:
> Usersync sync's user/group/usergroup membership in batches. For example 
> consider batch is of size 1000. So batch start from 0-999 and next batch 
> starts from 1001-1999. So in each batch one user count missing.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-3920) In Ldap usersync one User/Group/UserGroup membership is missed in each batch when pushed to ranger

2022-09-20 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3920?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3920:
-
Description: 
Problem Statement:

Usersync sync's user/group/usergroup membership in batches. For example 
consider batch is of size 1000. So batch start from 0-999 and next batch starts 
from 1001-1999. So in each batch one user count missing.

 

  was:In Ldap usersync one User/Group/UserGroup membership is missed in each 
batch when pushed to ranger


> In Ldap usersync one User/Group/UserGroup membership is missed in each batch 
> when pushed to ranger
> --
>
> Key: RANGER-3920
> URL: https://issues.apache.org/jira/browse/RANGER-3920
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, Ranger, usersync
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 2.4.0
>
>
> Problem Statement:
> Usersync sync's user/group/usergroup membership in batches. For example 
> consider batch is of size 1000. So batch start from 0-999 and next batch 
> starts from 1001-1999. So in each batch one user count missing.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-3920) In Ldap usersync one User/Group/UserGroup membership is missed in each batch when pushed to ranger

2022-09-20 Thread Ankita Sinha (Jira)
Ankita Sinha created RANGER-3920:


 Summary: In Ldap usersync one User/Group/UserGroup membership is 
missed in each batch when pushed to ranger
 Key: RANGER-3920
 URL: https://issues.apache.org/jira/browse/RANGER-3920
 Project: Ranger
  Issue Type: Bug
  Components: admin, Ranger, usersync
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 2.4.0


In Ldap usersync one User/Group/UserGroup membership is missed in each batch 
when pushed to ranger



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-3621) Optimise Tag/Policy iterator

2022-02-18 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3621?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3621:
-
Description: 
Optimise the logic of Tag and service-policies cache iterator

{+}_Problem Statement_{+}:
Tags/policies in the iterator are not freed till the whole processing of all 
Tags/policies are done. So, in the case where there are lot of tag/policies, 
the performance can be impacted as the large number of tags/policies are held 
by iterator for long time. This causes performance degradation while retrieving 
the tags from db.

{+}_Solution_{+}:
The individual tag/policy as soon as it is processed should be removed from the 
iterator.

  was:
Optimise the logic of Tag iterator

{+}_Problem Statement_{+}:
Tags in the iterator are not freed till the whole processing of all Tags are 
done. So, in the case where there are lot of tag, the performance can be 
impacted as the large number of tags are held by iterator for long time. This 
causes performance degradation while retrieving the tags from db.

{+}_Solution_{+}:
The individual tag as soon as it is processed should be removed from the 
iterator.


> Optimise Tag/Policy iterator  
> --
>
> Key: RANGER-3621
> URL: https://issues.apache.org/jira/browse/RANGER-3621
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Affects Versions: 2.2.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Major
> Attachments: RANGER-3621-Optimise-Tag-iterator.patch
>
>
> Optimise the logic of Tag and service-policies cache iterator
> {+}_Problem Statement_{+}:
> Tags/policies in the iterator are not freed till the whole processing of all 
> Tags/policies are done. So, in the case where there are lot of tag/policies, 
> the performance can be impacted as the large number of tags/policies are held 
> by iterator for long time. This causes performance degradation while 
> retrieving the tags from db.
> {+}_Solution_{+}:
> The individual tag/policy as soon as it is processed should be removed from 
> the iterator.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Updated] (RANGER-3621) Optimise Tag/Policy iterator

2022-02-18 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3621?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3621:
-
Summary: Optimise Tag/Policy iterator(was: Optimise Tag iterator  )

> Optimise Tag/Policy iterator  
> --
>
> Key: RANGER-3621
> URL: https://issues.apache.org/jira/browse/RANGER-3621
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Affects Versions: 2.2.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Major
> Attachments: RANGER-3621-Optimise-Tag-iterator.patch
>
>
> Optimise the logic of Tag iterator
> {+}_Problem Statement_{+}:
> Tags in the iterator are not freed till the whole processing of all Tags are 
> done. So, in the case where there are lot of tag, the performance can be 
> impacted as the large number of tags are held by iterator for long time. This 
> causes performance degradation while retrieving the tags from db.
> {+}_Solution_{+}:
> The individual tag as soon as it is processed should be removed from the 
> iterator.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Created] (RANGER-3625) Update isDebugEnable condition in RangerHiveAuthorizer

2022-02-15 Thread Ankita Sinha (Jira)
Ankita Sinha created RANGER-3625:


 Summary: Update isDebugEnable condition in RangerHiveAuthorizer
 Key: RANGER-3625
 URL: https://issues.apache.org/jira/browse/RANGER-3625
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 2.2.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha


{+}_Problem Statement_{+}: 
In RangerHiveAuthorizer, the Logger isDebugEnabled condition needs to be updated


{code:java}
else if (!result.getIsAllowed()) {
if (!LOG.isDebugEnabled()) {
String path = 
resource.getAsString();

LOG.debug(String.format("filterListCmdObjects: Permission denied: user [%s] 
does not have [%s] privilege on [%s]. resource[%s], request[%s], result[%s]",
user, 
request.getHiveAccessType().name(), path, resource, request, result));
} {code}
here in above code the condition check is "!LOG.isDebugEnabled()" and log is 
logged at Debug level which will never get log.

{+}_Solution_{+}:
The condition "{*}if (!LOG.isDebugEnabled()){*}" should be replaced by *"if 
(LOG.isDebugEnabled())"*

 



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Updated] (RANGER-3625) Update isDebugEnable condition in RangerHiveAuthorizer

2022-02-15 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3625?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3625:
-
Attachment: RANGER-3625-Update-isDebugEnable-condition-in-Ranger.patch

> Update isDebugEnable condition in RangerHiveAuthorizer
> --
>
> Key: RANGER-3625
> URL: https://issues.apache.org/jira/browse/RANGER-3625
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 2.2.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Trivial
> Attachments: 
> RANGER-3625-Update-isDebugEnable-condition-in-Ranger.patch
>
>
> {+}_Problem Statement_{+}: 
> In RangerHiveAuthorizer, the Logger isDebugEnabled condition needs to be 
> updated
> {code:java}
> else if (!result.getIsAllowed()) {
>   if (!LOG.isDebugEnabled()) {
>   String path = 
> resource.getAsString();
>   
> LOG.debug(String.format("filterListCmdObjects: Permission denied: user [%s] 
> does not have [%s] privilege on [%s]. resource[%s], request[%s], result[%s]",
>   user, 
> request.getHiveAccessType().name(), path, resource, request, result));
>   } {code}
> here in above code the condition check is "!LOG.isDebugEnabled()" and log is 
> logged at Debug level which will never get log.
> {+}_Solution_{+}:
> The condition "{*}if (!LOG.isDebugEnabled()){*}" should be replaced by *"if 
> (LOG.isDebugEnabled())"*
>  



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Updated] (RANGER-3621) Optimise Tag iterator

2022-02-15 Thread Ankita Sinha (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-3621?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-3621:
-
Attachment: RANGER-3621-Optimise-Tag-iterator.patch

> Optimise Tag iterator  
> ---
>
> Key: RANGER-3621
> URL: https://issues.apache.org/jira/browse/RANGER-3621
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Affects Versions: 2.2.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
>Priority: Major
> Attachments: RANGER-3621-Optimise-Tag-iterator.patch
>
>
> Optimise the logic of Tag iterator
> {+}_Problem Statement_{+}:
> Tags in the iterator are not freed till the whole processing of all Tags are 
> done. So, in the case where there are lot of tag, the performance can be 
> impacted as the large number of tags are held by iterator for long time. This 
> causes performance degradation while retrieving the tags from db.
> {+}_Solution_{+}:
> The individual tag as soon as it is processed should be removed from the 
> iterator.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Created] (RANGER-3621) Optimise Tag iterator

2022-02-14 Thread Ankita Sinha (Jira)
Ankita Sinha created RANGER-3621:


 Summary: Optimise Tag iterator  
 Key: RANGER-3621
 URL: https://issues.apache.org/jira/browse/RANGER-3621
 Project: Ranger
  Issue Type: Improvement
  Components: Ranger
Affects Versions: 2.2.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha


Optimise the logic of Tag iterator

{+}_Problem Statement_{+}:
Tags in the iterator are not freed till the whole processing of all Tags are 
done. So, in the case where there are lot of tag, the performance can be 
impacted as the large number of tags are held by iterator for long time. This 
causes performance degradation while retrieving the tags from db.

{+}_Solution_{+}:
The individual tag as soon as it is processed should be removed from the 
iterator.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Updated] (RANGER-2331) Ranger-KMS - KeySecure HSM Integration

2019-02-14 Thread Ankita Sinha (JIRA)


 [ 
https://issues.apache.org/jira/browse/RANGER-2331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-2331:
-
Attachment: (was: RANGER-2331-ranger-0.7.patch)

> Ranger-KMS - KeySecure HSM Integration
> --
>
> Key: RANGER-2331
> URL: https://issues.apache.org/jira/browse/RANGER-2331
> Project: Ranger
>  Issue Type: New Feature
>  Components: kms, Ranger
>Reporter: Velmurugan Periasamy
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 0.7.2, 2.0.0
>
> Attachments: RANGER-2331.patch
>
>
> This JIRA is to support Ranger KMS integration with Gemalto KeySecure HSM to 
> manage master keys.
> Similar to Luna integration - https://issues.apache.org/jira/browse/RANGER-868
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Assigned] (RANGER-2331) Ranger-KMS - KeySecure HSM Integration

2019-02-14 Thread Ankita Sinha (JIRA)


 [ 
https://issues.apache.org/jira/browse/RANGER-2331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reassigned RANGER-2331:


Assignee: Gautam Borad  (was: Ankita Sinha)

> Ranger-KMS - KeySecure HSM Integration
> --
>
> Key: RANGER-2331
> URL: https://issues.apache.org/jira/browse/RANGER-2331
> Project: Ranger
>  Issue Type: New Feature
>  Components: kms, Ranger
>Reporter: Velmurugan Periasamy
>Assignee: Gautam Borad
>Priority: Major
> Fix For: 0.7.2, 2.0.0
>
> Attachments: RANGER-2331.patch
>
>
> This JIRA is to support Ranger KMS integration with Gemalto KeySecure HSM to 
> manage master keys.
> Similar to Luna integration - https://issues.apache.org/jira/browse/RANGER-868
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (RANGER-2331) Ranger-KMS - KeySecure HSM Integration

2019-02-14 Thread Ankita Sinha (JIRA)


 [ 
https://issues.apache.org/jira/browse/RANGER-2331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-2331:
-
Attachment: (was: RANGER-2331-01.path)

> Ranger-KMS - KeySecure HSM Integration
> --
>
> Key: RANGER-2331
> URL: https://issues.apache.org/jira/browse/RANGER-2331
> Project: Ranger
>  Issue Type: New Feature
>  Components: kms, Ranger
>Reporter: Velmurugan Periasamy
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 0.7.2, 2.0.0
>
> Attachments: RANGER-2331.patch
>
>
> This JIRA is to support Ranger KMS integration with Gemalto KeySecure HSM to 
> manage master keys.
> Similar to Luna integration - https://issues.apache.org/jira/browse/RANGER-868
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (RANGER-2331) Ranger-KMS - KeySecure HSM Integration

2019-02-14 Thread Ankita Sinha (JIRA)


 [ 
https://issues.apache.org/jira/browse/RANGER-2331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-2331:
-
Attachment: RANGER-2331-ranger-0.7.patch

> Ranger-KMS - KeySecure HSM Integration
> --
>
> Key: RANGER-2331
> URL: https://issues.apache.org/jira/browse/RANGER-2331
> Project: Ranger
>  Issue Type: New Feature
>  Components: kms, Ranger
>Reporter: Velmurugan Periasamy
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 0.7.2, 2.0.0
>
> Attachments: RANGER-2331-01.path, RANGER-2331-ranger-0.7.patch, 
> RANGER-2331.patch
>
>
> This JIRA is to support Ranger KMS integration with Gemalto KeySecure HSM to 
> manage master keys.
> Similar to Luna integration - https://issues.apache.org/jira/browse/RANGER-868
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (RANGER-2331) Ranger-KMS - KeySecure HSM Integration

2019-02-13 Thread Ankita Sinha (JIRA)


 [ 
https://issues.apache.org/jira/browse/RANGER-2331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-2331:
-
Attachment: RANGER-2331-01.path

> Ranger-KMS - KeySecure HSM Integration
> --
>
> Key: RANGER-2331
> URL: https://issues.apache.org/jira/browse/RANGER-2331
> Project: Ranger
>  Issue Type: New Feature
>  Components: kms, Ranger
>Reporter: Velmurugan Periasamy
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 0.7.2, 2.0.0
>
> Attachments: RANGER-2331-01.path, RANGER-2331.patch
>
>
> This JIRA is to support Ranger KMS integration with Gemalto KeySecure HSM to 
> manage master keys.
> Similar to Luna integration - https://issues.apache.org/jira/browse/RANGER-868
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Assigned] (RANGER-2331) Ranger-KMS - KeySecure HSM Integration

2019-02-13 Thread Ankita Sinha (JIRA)


 [ 
https://issues.apache.org/jira/browse/RANGER-2331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reassigned RANGER-2331:


Assignee: Ankita Sinha  (was: bhavik patel)

> Ranger-KMS - KeySecure HSM Integration
> --
>
> Key: RANGER-2331
> URL: https://issues.apache.org/jira/browse/RANGER-2331
> Project: Ranger
>  Issue Type: New Feature
>  Components: kms, Ranger
>Reporter: Velmurugan Periasamy
>Assignee: Ankita Sinha
>Priority: Major
> Fix For: 0.7.2, 2.0.0
>
> Attachments: RANGER-2331.patch
>
>
> This JIRA is to support Ranger KMS integration with Gemalto KeySecure HSM to 
> manage master keys.
> Similar to Luna integration - https://issues.apache.org/jira/browse/RANGER-868
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (RANGER-1945) Save Service would add dirty user when current user is admin

2018-01-04 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1945?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16312457#comment-16312457
 ] 

Ankita Sinha commented on RANGER-1945:
--

The user needs to be created, because in case of Secure kerberos environment 
after the authentication is successful will need that user in our DB to do any 
operations. So any user which is authenticated successfully will be created in 
Ranger. 

> Save Service would add dirty user when current user is admin
> 
>
> Key: RANGER-1945
> URL: https://issues.apache.org/jira/browse/RANGER-1945
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 0.6.3
>Reporter: chuanjie.duan
> Attachments: RANGER-1945.001.patch
>
>
> When user actually is not exist and current user is admin, "save" operation 
> would still add user in the backend. It would be a dirty data and obscure 
> operation(operator maybe doesn't know). And I sync user  from ldap, both of 
> them mark external user, it's hard to distinguish. I suggest don't create 
> user whenever current is admin or not.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Resolved] (RANGER-1759) Ranger KMS and Ranger Admin startup failed at credentialapi.buildks with java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2

2017-09-11 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1759?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha resolved RANGER-1759.
--
Resolution: Auto Closed

> Ranger KMS and Ranger Admin startup failed at credentialapi.buildks with 
> java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2
> 
>
> Key: RANGER-1759
> URL: https://issues.apache.org/jira/browse/RANGER-1759
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: master, 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: master, 0.7.1
>
> Attachments: RANGER-1759_07.patch, RANGER-1759_master.patch
>
>
> Ranger KMS and Ranger Admin startup failed with  
> java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2.
> {code}
> Exception in thread "main" java.lang.NoClassDefFoundError: 
> org/codehaus/stax2/XMLInputFactory2
>   at 
> org.apache.ranger.credentialapi.CredentialReader.getDecryptedString(CredentialReader.java:38)
>   at 
> org.apache.ranger.credentialapi.buildks.createCredential(buildks.java:88)
>   at org.apache.ranger.credentialapi.buildks.main(buildks.java:40)
> Caused by: java.lang.ClassNotFoundException: 
> org.codehaus.stax2.XMLInputFactory2
>   at java.net.URLClassLoader.findClass(URLClassLoader.java:381)
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
>   at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:335)
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
>   ... 3 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1759) Ranger KMS and Ranger Admin startup failed at credentialapi.buildks with java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2

2017-09-01 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1759?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1759:
-
Attachment: RANGER-1759_07.patch
RANGER-1759_master.patch

> Ranger KMS and Ranger Admin startup failed at credentialapi.buildks with 
> java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2
> 
>
> Key: RANGER-1759
> URL: https://issues.apache.org/jira/browse/RANGER-1759
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: master, 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: master, 0.7.1
>
> Attachments: RANGER-1759_07.patch, RANGER-1759_master.patch
>
>
> Ranger KMS and Ranger Admin startup failed with  
> java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2.
> {code}
> Exception in thread "main" java.lang.NoClassDefFoundError: 
> org/codehaus/stax2/XMLInputFactory2
>   at 
> org.apache.ranger.credentialapi.CredentialReader.getDecryptedString(CredentialReader.java:38)
>   at 
> org.apache.ranger.credentialapi.buildks.createCredential(buildks.java:88)
>   at org.apache.ranger.credentialapi.buildks.main(buildks.java:40)
> Caused by: java.lang.ClassNotFoundException: 
> org.codehaus.stax2.XMLInputFactory2
>   at java.net.URLClassLoader.findClass(URLClassLoader.java:381)
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
>   at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:335)
>   at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
>   ... 3 more
> {code}



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Created] (RANGER-1759) Ranger KMS and Ranger Admin startup failed at credentialapi.buildks with java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2

2017-09-01 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1759:


 Summary: Ranger KMS and Ranger Admin startup failed at 
credentialapi.buildks with java.lang.NoClassDefFoundError: 
org/codehaus/stax2/XMLInputFactory2
 Key: RANGER-1759
 URL: https://issues.apache.org/jira/browse/RANGER-1759
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.1, master
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: master, 0.7.1


Ranger KMS and Ranger Admin startup failed with  
java.lang.NoClassDefFoundError: org/codehaus/stax2/XMLInputFactory2.

{code}
Exception in thread "main" java.lang.NoClassDefFoundError: 
org/codehaus/stax2/XMLInputFactory2
at 
org.apache.ranger.credentialapi.CredentialReader.getDecryptedString(CredentialReader.java:38)
at 
org.apache.ranger.credentialapi.buildks.createCredential(buildks.java:88)
at org.apache.ranger.credentialapi.buildks.main(buildks.java:40)
Caused by: java.lang.ClassNotFoundException: org.codehaus.stax2.XMLInputFactory2
at java.net.URLClassLoader.findClass(URLClassLoader.java:381)
at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:335)
at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
... 3 more
{code}



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1705) Good coding practice in Ranger recommended by static code analysis

2017-08-23 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1705?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16138009#comment-16138009
 ] 

Ankita Sinha commented on RANGER-1705:
--

Committed to master : 
https://github.com/apache/ranger/commit/02c094393f40b209800f740a1ca8eaa8f7f4e43a
Committed to ranger-0.7 : 
https://github.com/apache/ranger/commit/b85c312b1e34890a9f0cb1d16b3e254452ec7a3c

> Good coding practice in Ranger recommended by static code analysis
> --
>
> Key: RANGER-1705
> URL: https://issues.apache.org/jira/browse/RANGER-1705
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: master, 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: master, 0.7.1
>
> Attachments: RANGER-1705.patch
>
>
> Good coding practice in Ranger recommended by static code analysis on the 
> last commit made.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-27 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16103176#comment-16103176
 ] 

Ankita Sinha commented on RANGER-1690:
--

Committed to master : 
https://github.com/apache/ranger/commit/7d5d00c15d4fdde8d57182dc67ec05b883474191

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: Ankita Sinha
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch, 
> RANGER-1690.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Comment Edited] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-27 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16103003#comment-16103003
 ] 

Ankita Sinha edited comment on RANGER-1690 at 7/27/17 9:39 AM:
---

Hi [~peng.jianhua], the setup is breaking due to extra character at the end of 
the line in ranger-ugsync-default.xml. I am attaching the patch for the same in 
this jira and raised the [review 
request|https://reviews.apache.org/r/61175/diff/1#index_header]. Can you please 
review.


was (Author: ankita.sinha):
Hi [~peng.jianhua], the setup is breaking due to extra character at the end of 
the line in ranger-ugsync-default.xml. I am attaching the patch for the same in 
this jira and raise the [review 
request|https://reviews.apache.org/r/61175/diff/1#index_header]. Can you please 
review.

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: Ankita Sinha
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch, 
> RANGER-1690.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Assigned] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-27 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reassigned RANGER-1690:


Assignee: Ankita Sinha  (was: peng.jianhua)

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: Ankita Sinha
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch, 
> RANGER-1690.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-27 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1690:
-
Attachment: RANGER-1690.patch

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: peng.jianhua
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch, 
> RANGER-1690.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-27 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16103003#comment-16103003
 ] 

Ankita Sinha commented on RANGER-1690:
--

Hi [~peng.jianhua], the setup is breaking due to extra character at the end of 
the line in ranger-ugsync-default.xml. I am attaching the patch for the same in 
this jira and raise the [review 
request|https://reviews.apache.org/r/61175/diff/1#index_header]. Can you please 
review.

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: peng.jianhua
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-25 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16099861#comment-16099861
 ] 

Ankita Sinha commented on RANGER-1690:
--

[~peng.jianhua], Ranger Usersync setup is failing due to this commit with the 
below error 

{code}
ranger-1.0.0-SNAPSHOT-usersync# ./setup.sh 
INFO: moving [/etc/ranger/usersync/conf/java_home.sh] to 
[/etc/ranger/usersync/conf/.java_home.sh.25072017152843] ...
Traceback (most recent call last):
  File "./setup.py", line 574, in 
main()
  File "./setup.py", line 402, in main
defaultProps = getXMLConfigMap(join(confFolderName, defaultSiteXMLFileName))
  File "./setup.py", line 155, in getXMLConfigMap
tree = ET.parse(xmlFileName)
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1182, in parse
tree.parse(source, parser)
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 656, in parse
parser.feed(data)
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1653, in feed
self._raiseerror(v)
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1517, in _raiseerror
raise err
xml.etree.ElementTree.ParseError: not well-formed (invalid token): line 22, 
column 21
{code}

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: peng.jianhua
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Reopened] (RANGER-1690) Ranger usersync created error users. Ranger usersync got System Virtual User Group Name instead of real group name when built the unix user list.

2017-07-25 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1690?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reopened RANGER-1690:
--

> Ranger usersync created error users. Ranger usersync got System Virtual User 
> Group Name instead of real group name when built the unix user list. 
> --
>
> Key: RANGER-1690
> URL: https://issues.apache.org/jira/browse/RANGER-1690
> Project: Ranger
>  Issue Type: Bug
>  Components: usersync
>Reporter: peng.jianhua
>Assignee: peng.jianhua
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1690-Ranger-usersync-created-error-users.-Ran.patch
>
>
> The ranger.usersync.unix.minGroupId is not set default value. Like 
> ranger.usersync.unix.minUserId, it should be set default value. Following 
> variable equals to 0 when built the unix user list. 
> minimumGroupId=Integer.parseInt(config.getMinGroupId());
> Ranger usersync may get System Virtual User Group Name instead of real group 
> name.
> if (numGroupId < minimumGroupId)
> continue;
> String groupName = groupId2groupNameMap.get(gid);
> This result is that the Ranger usersync created error users. 
> http://www.archivum.info/debian-bugs-clo...@lists.debian.org/2006-03/03888/Bug-333706-marked-as-done-(useradd-lacks-r-option).html



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1705) Good coding practice in Ranger recommended by static code analysis

2017-07-21 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1705?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1705:
-
Attachment: RANGER-1705.patch

> Good coding practice in Ranger recommended by static code analysis
> --
>
> Key: RANGER-1705
> URL: https://issues.apache.org/jira/browse/RANGER-1705
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: master, 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: master, 0.7.1
>
> Attachments: RANGER-1705.patch
>
>
> Good coding practice in Ranger recommended by static code analysis on the 
> last commit made.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Created] (RANGER-1705) Good coding practice in Ranger recommended by static code analysis

2017-07-21 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1705:


 Summary: Good coding practice in Ranger recommended by static code 
analysis
 Key: RANGER-1705
 URL: https://issues.apache.org/jira/browse/RANGER-1705
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.1, master
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: master, 0.7.1


Good coding practice in Ranger recommended by static code analysis on the last 
commit made.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Resolved] (RANGER-1638) Improve the password validation from Ranger API

2017-07-18 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1638?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha resolved RANGER-1638.
--
Resolution: Fixed

> Improve the password validation from Ranger API
> ---
>
> Key: RANGER-1638
> URL: https://issues.apache.org/jira/browse/RANGER-1638
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 0.7.0
>Reporter: Mehul Parikh
>Assignee: Ankita Sinha
> Fix For: 1.0.0, 0.7.2
>
> Attachments: RANGER-1638.1.patch, RANGER-1638.patch, RANGER-1638.patch
>
>
> Ranger API should apply password validation in sync with what UI is applying 
> for all users. 



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1638) Improve the password validation from Ranger API

2017-07-18 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1638?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16092523#comment-16092523
 ] 

Ankita Sinha commented on RANGER-1638:
--

Committed to master : 
https://github.com/apache/ranger/commit/55e6d4e1398f27d897795a174a332d6e18642b08
Committed to ranger-0.7 : 
https://github.com/apache/ranger/commit/61d352fc4c2a14527ccb9f5cd216b8711096c346

> Improve the password validation from Ranger API
> ---
>
> Key: RANGER-1638
> URL: https://issues.apache.org/jira/browse/RANGER-1638
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 0.7.0
>Reporter: Mehul Parikh
>Assignee: Ankita Sinha
> Fix For: 1.0.0, 0.7.2
>
> Attachments: RANGER-1638.1.patch, RANGER-1638.patch, RANGER-1638.patch
>
>
> Ranger API should apply password validation in sync with what UI is applying 
> for all users. 



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Assigned] (RANGER-1638) Improve the password validation from Ranger API

2017-07-17 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1638?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reassigned RANGER-1638:


Assignee: Ankita Sinha  (was: Gautam Borad)

> Improve the password validation from Ranger API
> ---
>
> Key: RANGER-1638
> URL: https://issues.apache.org/jira/browse/RANGER-1638
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 0.7.0
>Reporter: Mehul Parikh
>Assignee: Ankita Sinha
> Fix For: 1.0.0, 0.7.2
>
> Attachments: RANGER-1638.1.patch, RANGER-1638.patch, RANGER-1638.patch
>
>
> Ranger API should apply password validation in sync with what UI is applying 
> for all users. 



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-07-10 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16080109#comment-16080109
 ] 

Ankita Sinha commented on RANGER-1639:
--

Committed to Master : 
https://github.com/apache/ranger/commit/b47fe34779beb4be49015ca2f3dfecae7413135a
Committed to ranger-0.7 : 
https://github.com/apache/ranger/commit/50ef5f0fd94f29debb81bffb15d2aefe6dad4381

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639_07.patch, RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-27 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16065878#comment-16065878
 ] 

Ankita Sinha commented on RANGER-1653:
--

Committed to master branch : 
https://github.com/apache/ranger/commit/fdb74d51f86cc5e464e1beefd910fa3fc73ec45d
Committed to ranger-0.7 branch : 
https://github.com/apache/ranger/commit/8675a2495001404ca5ef5678923cf35999ab2211

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653_07.patch, RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-23 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: RANGER-1639_07.patch

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639_07.patch, RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-22 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: RANGER-1639.patch

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-22 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: (was: RANGER-1639.patch)

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: (was: RANGER-1653_07.patch)

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653_07.patch, RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: RANGER-1653.patch

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653_07.patch, RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: (was: RANGER-1653.patch)

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653_07.patch, RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: RANGER-1653_07.patch

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653_07.patch, RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: RANGER-1653.patch

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: (was: RANGER-1653.patch)

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: (was: RANGER-1653.patch)

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: RANGER-1653.patch

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1653?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1653:
-
Attachment: RANGER-1653.patch

> Proxying Ranger UI does not work with Ranger-KnoxSSO
> 
>
> Key: RANGER-1653
> URL: https://issues.apache.org/jira/browse/RANGER-1653
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1653.patch
>
>
> *Actual* :
> Ranger is not able to handle forwardable headers when proxying the Ranger UI 
> and turning on SSO for Ranger.
> *Expected* :
> Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Created] (RANGER-1653) Proxying Ranger UI does not work with Ranger-KnoxSSO

2017-06-19 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1653:


 Summary: Proxying Ranger UI does not work with Ranger-KnoxSSO
 Key: RANGER-1653
 URL: https://issues.apache.org/jira/browse/RANGER-1653
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 1.0.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 1.0.0


*Actual* :
Ranger is not able to handle forwardable headers when proxying the Ranger UI 
and turning on SSO for Ranger.

*Expected* :
Proxying Ranger UI should work with Ranger-KnoxSSO



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16047800#comment-16047800
 ] 

Ankita Sinha commented on RANGER-1582:
--

Committed to ranger-0.7 : 
https://github.com/apache/ranger/commit/d4cf793efd2d5c1604e4404ad12f72252470c1cd

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1582.patch
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16047786#comment-16047786
 ] 

Ankita Sinha commented on RANGER-1582:
--

Committed to master : 
https://github.com/apache/ranger/commit/9a99e3f41cc2125295058a8fc32e5b9e53bb48a4

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1582.patch
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: RANGER-1639.patch

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: (was: RANGER-1639.patch)

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: RANGER-1639.patch

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Attachment: (was: RANGER-1582.patch)

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Created] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1639:


 Summary: Ranger KMS should validate key name before importing into 
DB
 Key: RANGER-1639
 URL: https://issues.apache.org/jira/browse/RANGER-1639
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 1.0.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 1.0.0


*Actual* : 
Ranger KMS does not validate key name before importing into DB. So the imported 
key can have special characters in Key name.

*Expected* :
Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Commented] (RANGER-1607) Ranger service check failed on SLES11.3 cluster with sslv3 alert handshake failure

2017-05-23 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1607?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16021210#comment-16021210
 ] 

Ankita Sinha commented on RANGER-1607:
--

Committed to Master : 
https://github.com/apache/ranger/commit/56a93f6e483be0c49e35095f7eb0ea20123628e6
Committed to ranger-0.7 : 
https://github.com/apache/ranger/commit/a3c8de04f19b984e16cc8a828ac0c3ac99683e00

> Ranger service check failed on SLES11.3 cluster with sslv3 alert handshake 
> failure
> --
>
> Key: RANGER-1607
> URL: https://issues.apache.org/jira/browse/RANGER-1607
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0, 0.7.1
>
> Attachments: RANGER-1607.patch
>
>
> On SLES11.3 with JDK 1.7 environment, Ranger admin service check is failing  
> with below error :
> {code}
> curl  --negotiate -u: -k https://localhost:6182/login.jsp
> curl: (35) error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert 
> handshake failure
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1607) Ranger service check failed on SLES11.3 cluster with sslv3 alert handshake failure

2017-05-23 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1607?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1607:
-
Attachment: RANGER-1607.patch

> Ranger service check failed on SLES11.3 cluster with sslv3 alert handshake 
> failure
> --
>
> Key: RANGER-1607
> URL: https://issues.apache.org/jira/browse/RANGER-1607
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0, 0.7.1
>
> Attachments: RANGER-1607.patch
>
>
> On SLES11.3 with JDK 1.7 environment, Ranger admin service check is failing  
> with below error :
> {code}
> curl  --negotiate -u: -k https://localhost:6182/login.jsp
> curl: (35) error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert 
> handshake failure
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Created] (RANGER-1607) Ranger service check failed on SLES11.3 cluster with sslv3 alert handshake failure

2017-05-23 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1607:


 Summary: Ranger service check failed on SLES11.3 cluster with 
sslv3 alert handshake failure
 Key: RANGER-1607
 URL: https://issues.apache.org/jira/browse/RANGER-1607
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 1.0.0, 0.7.1


On SLES11.3 with JDK 1.7 environment, Ranger admin service check is failing  
with below error :

{code}
curl  --negotiate -u: -k https://localhost:6182/login.jsp
curl: (35) error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert 
handshake failure
{code}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-05-16 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Attachment: RANGER-1582.patch

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1582.patch
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-05-16 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Description: 
*Actual* :
Currently Knox SSO is just supported from Ranger UI through web browser. 

*Expected* : 
Support KNOX SSO Token based authentication on Ranger REST API calls.

  was:
Actual :
Currently Knox SSO is just supported from Ranger UI through web browser. 

Expected : 
Support KNOX SSO Token based authentication on Ranger REST API calls.


> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-05-16 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Description: 
*Actual : *
Currently Knox SSO is just supported from Ranger UI through web browser. 

*Expected : *
Support KNOX SSO Token based authentication on Ranger REST API calls.

  was:
**Actual : **
Currently Knox SSO is just supported from Ranger UI through web browser. 

**Expected : **
Support KNOX SSO Token based authentication on Ranger REST API calls.


> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual : *
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected : *
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-05-16 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Description: 
Actual :
Currently Knox SSO is just supported from Ranger UI through web browser. 

Expected : 
Support KNOX SSO Token based authentication on Ranger REST API calls.

  was:
*Actual : *
Currently Knox SSO is just supported from Ranger UI through web browser. 

*Expected : *
Support KNOX SSO Token based authentication on Ranger REST API calls.


> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> Actual :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> Expected : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Commented] (RANGER-1562) HDFS test connection is failing due to null pointer exception

2017-05-10 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1562?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16004130#comment-16004130
 ] 

Ankita Sinha commented on RANGER-1562:
--

Committed to Master branch : 
https://github.com/apache/ranger/commit/0ba3e129a068cf68ea8c2a77f003e112d0d54e08
Committed to ranger-0.7 branch : 
https://github.com/apache/ranger/commit/9aad8d6e7649fe40909a74af8865fff3e28e3ebc

> HDFS test connection is failing due to null pointer exception
> -
>
> Key: RANGER-1562
> URL: https://issues.apache.org/jira/browse/RANGER-1562
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Deepak Sharma
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1562.patch
>
>
> HDFS test connection  is failing due to null pointer exception:
> {code}
> 2017-05-05 15:36:10,025 [timed-executor-pool-0] INFO  
> apache.ranger.services.hdfs.client.HdfsClient (HdfsClient.java:204) - ===> 
> HdfsClient.testConnection()
> 2017-05-05 15:36:10,032 [timed-executor-pool-0] ERROR 
> org.apache.ranger.biz.ServiceMgr$TimedCallable (ServiceMgr.java:510) - 
> TimedCallable.call: Error:java.lang.NullPointerException
> 2017-05-05 15:36:10,035 [http-bio-6182-exec-4] ERROR 
> org.apache.ranger.biz.ServiceMgr (ServiceMgr.java:188) - ==> 
> ServiceMgr.validateConfig 
> Error:org.apache.ranger.plugin.client.HadoopException: 
> java.lang.NullPointerException
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1562) HDFS test connection is failing due to null pointer exception

2017-05-09 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1562?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1562:
-
Attachment: RANGER-1562.patch

> HDFS test connection is failing due to null pointer exception
> -
>
> Key: RANGER-1562
> URL: https://issues.apache.org/jira/browse/RANGER-1562
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Deepak Sharma
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1562.patch
>
>
> HDFS test connection  is failing due to null pointer exception:
> {code}
> 2017-05-05 15:36:10,025 [timed-executor-pool-0] INFO  
> apache.ranger.services.hdfs.client.HdfsClient (HdfsClient.java:204) - ===> 
> HdfsClient.testConnection()
> 2017-05-05 15:36:10,032 [timed-executor-pool-0] ERROR 
> org.apache.ranger.biz.ServiceMgr$TimedCallable (ServiceMgr.java:510) - 
> TimedCallable.call: Error:java.lang.NullPointerException
> 2017-05-05 15:36:10,035 [http-bio-6182-exec-4] ERROR 
> org.apache.ranger.biz.ServiceMgr (ServiceMgr.java:188) - ==> 
> ServiceMgr.validateConfig 
> Error:org.apache.ranger.plugin.client.HadoopException: 
> java.lang.NullPointerException
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Assigned] (RANGER-1562) HDFS test connection is failing due to null pointer exception

2017-05-09 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1562?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reassigned RANGER-1562:


Assignee: Ankita Sinha

> HDFS test connection is failing due to null pointer exception
> -
>
> Key: RANGER-1562
> URL: https://issues.apache.org/jira/browse/RANGER-1562
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Deepak Sharma
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
>
> HDFS test connection  is failing due to null pointer exception:
> {code}
> 2017-05-05 15:36:10,025 [timed-executor-pool-0] INFO  
> apache.ranger.services.hdfs.client.HdfsClient (HdfsClient.java:204) - ===> 
> HdfsClient.testConnection()
> 2017-05-05 15:36:10,032 [timed-executor-pool-0] ERROR 
> org.apache.ranger.biz.ServiceMgr$TimedCallable (ServiceMgr.java:510) - 
> TimedCallable.call: Error:java.lang.NullPointerException
> 2017-05-05 15:36:10,035 [http-bio-6182-exec-4] ERROR 
> org.apache.ranger.biz.ServiceMgr (ServiceMgr.java:188) - ==> 
> ServiceMgr.validateConfig 
> Error:org.apache.ranger.plugin.client.HadoopException: 
> java.lang.NullPointerException
> {code}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1560) Code Improvement To Follow Best Practices

2017-05-05 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1560?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1560:
-
Attachment: RANGER-1560.patch

> Code Improvement To Follow Best Practices
> -
>
> Key: RANGER-1560
> URL: https://issues.apache.org/jira/browse/RANGER-1560
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0, 0.7.1
>
> Attachments: RANGER-1560.patch
>
>
> Code Improvement To Follow Best Practices



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1556) Provide keyadmin user with privileges to read ranger kms audits

2017-05-03 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1556?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1556:
-
Attachment: RANGER-1556.patch

> Provide keyadmin user with privileges to read ranger kms audits
> ---
>
> Key: RANGER-1556
> URL: https://issues.apache.org/jira/browse/RANGER-1556
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1556.patch
>
>
> *Actual* : 
> To provide keyadmin user privileges for Ranger KMS Audit folder, manually 
> policy need to be created giving all access rights in HDFS repo
> *Expected* :
> Need to handle default policy creation in HDFS for keyadmin user to have 
> access to all access rights for Ranger KMS Audits folder (/ranger/audit/kms)



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1556) Provide keyadmin user with privileges to read ranger kms audits

2017-05-03 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1556?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1556:
-
Description: 
*Actual* : 
To provide keyadmin user privileges for Ranger KMS Audit folder, manually 
policy need to be created giving all access rights in HDFS repo

*Expected* :
Need to handle default policy creation in HDFS for keyadmin user to have access 
to all access rights for Ranger KMS Audits folder (/ranger/audit/kms)

  was:
Actual : 
To provide keyadmin user privileges for Ranger KMS Audit folder, manually 
policy need to be created giving all access rights in HDFS repo

Expected :
Need to handle default policy creation in HDFS for keyadmin user to have access 
to all access rights for Ranger KMS Audits folder (/ranger/audit/kms)


> Provide keyadmin user with privileges to read ranger kms audits
> ---
>
> Key: RANGER-1556
> URL: https://issues.apache.org/jira/browse/RANGER-1556
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
>
> *Actual* : 
> To provide keyadmin user privileges for Ranger KMS Audit folder, manually 
> policy need to be created giving all access rights in HDFS repo
> *Expected* :
> Need to handle default policy creation in HDFS for keyadmin user to have 
> access to all access rights for Ranger KMS Audits folder (/ranger/audit/kms)



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Created] (RANGER-1556) Provide keyadmin user with privileges to read ranger kms audits

2017-05-03 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1556:


 Summary: Provide keyadmin user with privileges to read ranger kms 
audits
 Key: RANGER-1556
 URL: https://issues.apache.org/jira/browse/RANGER-1556
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.1
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 0.7.1


Actual : 
To provide keyadmin user privileges for Ranger KMS Audit folder, manually 
policy need to be created giving all access rights in HDFS repo

Expected :
Need to handle default policy creation in HDFS for keyadmin user to have access 
to all access rights for Ranger KMS Audits folder (/ranger/audit/kms)



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1548) Display detailed error messages in Ranger for Audit store issues

2017-04-28 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1548?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1548:
-
Attachment: RANGER-1548_master.patch

> Display detailed error messages in Ranger for Audit store issues
> 
>
> Key: RANGER-1548
> URL: https://issues.apache.org/jira/browse/RANGER-1548
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1548_07.patch, RANGER-1548_master.patch
>
>
> Actual :
> When audit store is not configured properly or if audit store is down, Ranger 
> UI shows 
> "Unable to connect to Audit store !!"
> Expected : 
> To show more informative message if audit store has some issues.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1548) Display detailed error messages in Ranger for Audit store issues

2017-04-28 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1548?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1548:
-
Attachment: (was: RANGER-1548_07.patch)

> Display detailed error messages in Ranger for Audit store issues
> 
>
> Key: RANGER-1548
> URL: https://issues.apache.org/jira/browse/RANGER-1548
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1548_07.patch
>
>
> Actual :
> When audit store is not configured properly or if audit store is down, Ranger 
> UI shows 
> "Unable to connect to Audit store !!"
> Expected : 
> To show more informative message if audit store has some issues.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1548) Display detailed error messages in Ranger for Audit store issues

2017-04-28 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1548?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1548:
-
Attachment: (was: RANGER-1548.patch)

> Display detailed error messages in Ranger for Audit store issues
> 
>
> Key: RANGER-1548
> URL: https://issues.apache.org/jira/browse/RANGER-1548
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1548_07.patch
>
>
> Actual :
> When audit store is not configured properly or if audit store is down, Ranger 
> UI shows 
> "Unable to connect to Audit store !!"
> Expected : 
> To show more informative message if audit store has some issues.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1548) Display detailed error messages in Ranger for Audit store issues

2017-04-27 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1548?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1548:
-
Attachment: RANGER-1548_07.patch

> Display detailed error messages in Ranger for Audit store issues
> 
>
> Key: RANGER-1548
> URL: https://issues.apache.org/jira/browse/RANGER-1548
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1548_07.patch, RANGER-1548.patch
>
>
> Actual :
> When audit store is not configured properly or if audit store is down, Ranger 
> UI shows 
> "Unable to connect to Audit store !!"
> Expected : 
> To show more informative message if audit store has some issues.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1548) Display detailed error messages in Ranger for Audit store issues

2017-04-27 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1548?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1548:
-
Attachment: RANGER-1548.patch

> Display detailed error messages in Ranger for Audit store issues
> 
>
> Key: RANGER-1548
> URL: https://issues.apache.org/jira/browse/RANGER-1548
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1548.patch
>
>
> Actual :
> When audit store is not configured properly or if audit store is down, Ranger 
> UI shows 
> "Unable to connect to Audit store !!"
> Expected : 
> To show more informative message if audit store has some issues.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Created] (RANGER-1548) Display detailed error messages in Ranger for Audit store issues

2017-04-27 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1548:


 Summary: Display detailed error messages in Ranger for Audit store 
issues
 Key: RANGER-1548
 URL: https://issues.apache.org/jira/browse/RANGER-1548
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.1
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 0.7.1


Actual :
When audit store is not configured properly or if audit store is down, Ranger 
UI shows 
"Unable to connect to Audit store !!"

Expected : 
To show more informative message if audit store has some issues.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Commented] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-04-25 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15983331#comment-15983331
 ] 

Ankita Sinha commented on RANGER-1483:
--

Committed to Master branch : 
https://github.com/apache/ranger/commit/66b258ae951611a4a2862d8f0547071d8d411146
Committed to 0.7 branch : 
https://github.com/apache/ranger/commit/70dcd590701f581f864ee847f7a28c41620349a8

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07.patch, RANGER-1483_Master.patch, 
> RANGER-1483.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-04-25 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1483:
-
Attachment: RANGER-1483.patch

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07.patch, RANGER-1483_Master.patch, 
> RANGER-1483.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-04-25 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1483:
-
Attachment: (was: RANGER-1483_master_01.patch)

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07.patch, RANGER-1483_Master.patch, 
> RANGER-1483.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-04-18 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1483:
-
Attachment: RANGER-1483_07_1.patch
RANGER-1483_master_01.patch

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07_1.patch, RANGER-1483_07.patch, 
> RANGER-1483_master_01.patch, RANGER-1483_Master.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Reopened] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-04-18 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reopened RANGER-1483:
--

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07_1.patch, RANGER-1483_07.patch, 
> RANGER-1483_master_01.patch, RANGER-1483_Master.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Commented] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-03-31 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15951334#comment-15951334
 ] 

Ankita Sinha commented on RANGER-1483:
--

Committed to Master branch : 
https://github.com/apache/ranger/commit/6cfb01883fb97bd98e5e5b7baacb3cdd85a15b68

Committed to 0.7 branch : 
https://github.com/apache/ranger/commit/6c0b06252ad670bdbd5ffba93a3b51015308e9ec

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07.patch, RANGER-1483_Master.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-03-31 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1483:
-
Attachment: (was: RANGER-1483_07.patch)

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-03-31 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1483:
-
Attachment: (was: RANGER-1483_Master.patch)

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Commented] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-03-29 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15948378#comment-15948378
 ] 

Ankita Sinha commented on RANGER-1483:
--

[~coheigea], I think RANGER-768 is about Metastore plugin and the DDL-triggered 
policy changes. This Jira is about providing an optional feature of fetching 
database/table information from Hive Metastore directly.

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07.patch, RANGER-1483_Master.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-03-29 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1483:
-
Attachment: RANGER-1483_07.patch
RANGER-1483_Master.patch

> Ranger hive service definition to use hive metastore directly
> -
>
> Key: RANGER-1483
> URL: https://issues.apache.org/jira/browse/RANGER-1483
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.1
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1483_07.patch, RANGER-1483_Master.patch
>
>
> Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver 
> to fetch hive db/table info, which is used to populate drop downs while 
> creating/updating policies. Adding ranger hive service definition to also use 
> hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Created] (RANGER-1483) Ranger hive service definition to use hive metastore directly

2017-03-29 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1483:


 Summary: Ranger hive service definition to use hive metastore 
directly
 Key: RANGER-1483
 URL: https://issues.apache.org/jira/browse/RANGER-1483
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.1
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 0.7.1


Currently, ranger hive service definition uses hiveserver2(hs2) jdbc driver to 
fetch hive db/table info, which is used to populate drop downs while 
creating/updating policies. Adding ranger hive service definition to also use 
hive metastore client which read from hive metastore db.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Created] (RANGER-1453) Ranger KMS failed to start with Exception: More than one Master Key exists

2017-03-14 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1453:


 Summary: Ranger KMS failed to start with Exception: More than one 
Master Key exists
 Key: RANGER-1453
 URL: https://issues.apache.org/jira/browse/RANGER-1453
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 0.7.1


Ranger KMS failed to start with Exception: More than one Master Key exists
{code}
OpenJDK 64-Bit Server VM warning: ignoring option MaxPermSize=256m; support was 
removed in 8.0
Mar 07, 2017 7:22:30 AM org.apache.ranger.server.tomcat.EmbeddedServer 
loadConfig
SEVERE: Load configuration fail. Reason: java.io.FileNotFoundException: 
/usr/hdp/2.6.0.2-4/ranger-kms/ews/ranger-admin-default-site.xml (No such file 
or directory)
Mar 07, 2017 7:22:30 AM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Webapp file =./webapp, webAppName = /kms
Mar 07, 2017 7:22:30 AM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Adding webapp [/kms] = path [./webapp] .
Mar 07, 2017 7:22:30 AM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Finished init of webapp [/kms] = path [./webapp].
Mar 07, 2017 7:22:30 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["http-bio-9292"]
Mar 07, 2017 7:22:30 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service Tomcat
Mar 07, 2017 7:22:30 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet Engine: Apache Tomcat/7.0.68
Mar 07, 2017 7:22:30 AM org.apache.catalina.startup.ContextConfig 
getDefaultWebXmlFragment
INFO: No global web.xml found
Mar 07, 2017 7:22:36 AM org.apache.catalina.startup.TldConfig execute
INFO: At least one JAR was scanned for TLDs yet contained no TLDs. Enable debug 
logging for this logger for a complete list of JARs that were scanned but no 
TLDs were found in them. Skipping unneeded JARs during scanning can improve 
startup time and JSP compilation time.
log4j:WARN No such property [maxFileSize] in 
org.apache.log4j.DailyRollingFileAppender.
log4j:WARN No such property [maxBackupIndex] in 
org.apache.log4j.DailyRollingFileAppender.
log4j:WARN No such property [maxBackupIndex] in 
org.apache.log4j.DailyRollingFileAppender.
log4j:WARN No such property [maxFileSize] in 
org.apache.log4j.DailyRollingFileAppender.
java.lang.Exception: More than one Master Key exists
at 
org.apache.hadoop.crypto.key.RangerMasterKey.getEncryptedMK(RangerMasterKey.java:143)
at 
org.apache.hadoop.crypto.key.RangerMasterKey.getMasterKey(RangerMasterKey.java:71)
at 
org.apache.hadoop.crypto.key.RangerKeyStoreProvider.(RangerKeyStoreProvider.java:106)
at 
org.apache.hadoop.crypto.key.RangerKeyStoreProvider$Factory.createProvider(RangerKeyStoreProvider.java:399)
at 
org.apache.hadoop.crypto.key.KeyProviderFactory.get(KeyProviderFactory.java:95)
at 
org.apache.hadoop.crypto.key.kms.server.KMSWebApp.contextInitialized(KMSWebApp.java:176)
at 
org.apache.catalina.core.StandardContext.listenerStart(StandardContext.java:5068)
at 
org.apache.catalina.core.StandardContext.startInternal(StandardContext.java:5584)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:147)
at 
org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1572)
at 
org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1562)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
java.lang.Exception: No Master Key Found
at 
org.apache.hadoop.crypto.key.RangerMasterKey.getMasterKey(RangerMasterKey.java:75)
at 
org.apache.hadoop.crypto.key.RangerKeyStoreProvider.(RangerKeyStoreProvider.java:106)
at 
org.apache.hadoop.crypto.key.RangerKeyStoreProvider$Factory.createProvider(RangerKeyStoreProvider.java:399)
at 
org.apache.hadoop.crypto.key.KeyProviderFactory.get(KeyProviderFactory.java:95)
at 
org.apache.hadoop.crypto.key.kms.server.KMSWebApp.contextInitialized(KMSWebApp.java:176)
at 
org.apache.catalina.core.StandardContext.listenerStart(StandardContext.java:5068)
at 
org.apache.catalina.core.StandardContext.startInternal(StandardContext.java:5584)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:147)
at 
org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1572)
at 
org.apache.catalina.core.ContainerBase$StartChild.call(ContainerBase.java:1562)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at 

[jira] [Commented] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-10 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15905232#comment-15905232
 ] 

Ankita Sinha commented on RANGER-1428:
--

Master branch commit  : 
https://github.com/apache/ranger/commit/910aff0edf48b595a4e86b31d2edfda621d2f9ff

Ranger-0.7 branch commit : 
https://github.com/apache/ranger/commit/852e89cda3f54cf322a695cd511b015f31a335c0

> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1428.patch
>
>
> Description:
> Junk email id is displayed in some scenario
> Steps to reproduce
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-09 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Attachment: RANGER-1428.patch

> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1428.patch
>
>
> Description:
> Junk email id is displayed in some scenario
> Steps to reproduce
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-09 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Attachment: (was: RANGER-1428.patch)

> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
>
> Description:
> Junk email id is displayed in some scenario
> Steps to reproduce
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-07 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Attachment: RANGER-1428.patch

> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1428.patch
>
>
> Description:
> Junk email id is displayed in some scenario
> Steps to reproduce
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-07 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Attachment: (was: RANGER-1428.patch)

> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1428.patch
>
>
> Description:
> Junk email id is displayed in some scenario
> Steps to reproduce
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-07 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Description: 
Description:

Junk email id is displayed in some scenario

Steps to reproduce
When added non-existing user while creating a service, it gets created in user 
listing without email id but when same user is deleted it shows some random 
data in email field in “User Profile deleted” entry

Steps to follow:
1. Create a service with non-existing user(user will get created in user 
listing)
2. Now delete that user
3. Go to Audit-Admin tab and check log for "User Profile deleted", in email-id 
field it will show some random data

  was:
Description:

1. Junk email id is displayed in some scenario

Steps to reproduce point 2
When added non-existing user while creating a service, it gets created in user 
listing without email id but when same user is deleted it shows some random 
data in email field in “User Profile deleted” entry

Steps to follow:
1. Create a service with non-existing user(user will get created in user 
listing)
2. Now delete that user
3. Go to Audit-Admin tab and check log for "User Profile deleted", in email-id 
field it will show some random data


> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1428.patch
>
>
> Description:
> Junk email id is displayed in some scenario
> Steps to reproduce
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) In certain scenario user data contains junk email-id

2017-03-07 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Summary: In certain scenario user data contains junk email-id  (was: Access 
type for Knox under Audit tab is not displayed and In certain scenario user 
data contains junk email-id)

> In certain scenario user data contains junk email-id
> 
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
> Attachments: RANGER-1428.patch
>
>
> Description:
> 1. Access type for knox is not displayed under Audit tab
> 2. Junk email id is displayed in some scenario
> Steps to reproduce point 2
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1428) Access type for Knox under Audit tab is not displayed and In certain scenario user data contains junk email-id

2017-03-07 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1428?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1428:
-
Summary: Access type for Knox under Audit tab is not displayed and In 
certain scenario user data contains junk email-id  (was: Access type for Knox 
under Audit tab is not displayed and In certain scenario user data contains 
junk email-id if email-id is not specified)

> Access type for Knox under Audit tab is not displayed and In certain scenario 
> user data contains junk email-id
> --
>
> Key: RANGER-1428
> URL: https://issues.apache.org/jira/browse/RANGER-1428
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.1
>
>
> Description:
> 1. Access type for knox is not displayed under Audit tab
> 2. Junk email id is displayed in some scenario
> Steps to reproduce point 2
> When added non-existing user while creating a service, it gets created in 
> user listing without email id but when same user is deleted it shows some 
> random data in email field in “User Profile deleted” entry
> Steps to follow:
> 1. Create a service with non-existing user(user will get created in user 
> listing)
> 2. Now delete that user
> 3. Go to Audit-Admin tab and check log for "User Profile deleted", in 
> email-id field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Created] (RANGER-1428) Access type for Knox under Audit tab is not displayed and In certain scenario user data contains junk email-id if email-id is not specified

2017-03-07 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1428:


 Summary: Access type for Knox under Audit tab is not displayed and 
In certain scenario user data contains junk email-id if email-id is not 
specified
 Key: RANGER-1428
 URL: https://issues.apache.org/jira/browse/RANGER-1428
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 0.7.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 0.7.1


Description:

1. Access type for knox is not displayed under Audit tab
2. Junk email id is displayed in some scenario

Steps to reproduce point 2
When added non-existing user while creating a service, it gets created in user 
listing without email id but when same user is deleted it shows some random 
data in email field in “User Profile deleted” entry

Steps to follow:
1. Create a service with non-existing user(user will get created in user 
listing)
2. Now delete that user
3. Go to Audit-Admin tab and check log for "User Profile deleted", in email-id 
field it will show some random data



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Commented] (RANGER-1379) Good coding practice for concurrent modification

2017-02-14 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1379?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=15865753#comment-15865753
 ] 

Ankita Sinha commented on RANGER-1379:
--

Patch committed.
master : 
https://github.com/apache/ranger/commit/2d406044fafb574400bc66d06ee679f6dda5ed23

> Good coding practice for concurrent modification
> 
>
> Key: RANGER-1379
> URL: https://issues.apache.org/jira/browse/RANGER-1379
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 0.7.0
>
> Attachments: RANGER-1379.patch
>
>
> Good coding practice for checking is request from browser or console.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1352) few cases where even if JSON is invalid then also message appears IMPORTED SUCCSSFULLY

2017-02-06 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1352?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1352:
-
Attachment: RANGER-1352.patch

> few cases where even if JSON is invalid then also message appears IMPORTED 
> SUCCSSFULLY
> --
>
> Key: RANGER-1352
> URL: https://issues.apache.org/jira/browse/RANGER-1352
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Deepak Sharma
>Assignee: Ankita Sinha
> Fix For: 0.7.0
>
> Attachments: RANGER-1352.patch
>
>
> few cases where even if JSON is invalid then also message appears IMPORTED 
> SUCCSSFULLY.
> case 1:
> Json is correct but there is small mistake of case sensitivity instead true 
> its True. so ideally this json is considered as invalid from jsonlint.
> but Ranger import pass in this case, but it does not import any policy. 
> Case 2:
> if json file is empty , then also it says import successful, ideally it 
> should failed saying invalid json or something appropriate.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Updated] (RANGER-1352) few cases where even if JSON is invalid then also message appears IMPORTED SUCCSSFULLY

2017-02-05 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1352?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1352:
-
Attachment: RANGER-1352.patch

> few cases where even if JSON is invalid then also message appears IMPORTED 
> SUCCSSFULLY
> --
>
> Key: RANGER-1352
> URL: https://issues.apache.org/jira/browse/RANGER-1352
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Deepak Sharma
>Assignee: Ankita Sinha
> Fix For: 0.7.0
>
> Attachments: RANGER-1352.patch
>
>
> few cases where even if JSON is invalid then also message appears IMPORTED 
> SUCCSSFULLY.
> case 1:
> Json is correct but there is small mistake of case sensitivity instead true 
> its True. so ideally this json is considered as invalid from jsonlint.
> but Ranger import pass in this case, but it does not import any policy. 
> Case 2:
> if json file is empty , then also it says import successful, ideally it 
> should failed saying invalid json or something appropriate.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


[jira] [Assigned] (RANGER-1352) few cases where even if JSON is invalid then also message appears IMPORTED SUCCSSFULLY

2017-02-05 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1352?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha reassigned RANGER-1352:


Assignee: Ankita Sinha

> few cases where even if JSON is invalid then also message appears IMPORTED 
> SUCCSSFULLY
> --
>
> Key: RANGER-1352
> URL: https://issues.apache.org/jira/browse/RANGER-1352
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 0.7.0
>Reporter: Deepak Sharma
>Assignee: Ankita Sinha
> Fix For: 0.7.0
>
>
> few cases where even if JSON is invalid then also message appears IMPORTED 
> SUCCSSFULLY.
> case 1:
> Json is correct but there is small mistake of case sensitivity instead true 
> its True. so ideally this json is considered as invalid from jsonlint.
> but Ranger import pass in this case, but it does not import any policy. 
> Case 2:
> if json file is empty , then also it says import successful, ideally it 
> should failed saying invalid json or something appropriate.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)


  1   2   >