[
https://issues.apache.org/jira/browse/HAWQ-1207?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15831463#comment-15831463
]
Lili Ma commented on HAWQ-1207:
---
[~thebellhead] I split the stories given that they are from two aspects:
catalog table and super user.
For super user, HAWQ behavior without Ranger is that superuser can have all the
privileges upon HAWQ internal tables. We need limit the super user behavior
for accessing tables create by others.
Besides this, there are a lot of super user specific behaviors for some
objects. Only superuser can have the right for following behavior:
1. create cast: when function is NULL
2. create filespace
3. create/remove/alter foreign-data wrapper
4. create function: For untrusted language, only superuser can create function.
5. create/drop procedural language
6. create/drop/alter resource queue
7. create tablespace: It means the privilege to create tablespace, and only
superuser can do. But the CREATE privilege for tablespace means creating
database/table/index... in tablespace, which is different.
8. create external table: Only super user can create EXECUTE external web table
or create an external table with a file protocol (but in HAWQ 2.0, the file
protocol is not supported any more).
9. create operator class
10. copy: Only superuser can copy to or from a file. And in ranger, the
superuser can not run copy to or from when he doesn't have the privilege for
that table select or insert.
11. alter state of system triggers
12. some build in functions, including pg_logdir_ls, pg_ls_dir, pg_read_file,
pg_reload_conf, pg_rotate_logfile, pg_signal_backend, pg_start_backup,
pg_stat_file, pg_stat_get_activity, pg_stat_get_backend_activity_start,
pg_stat_get_backend_activity, pg_stat_get_backend_client_addr,
pg_stat_get_backend_client_port, pg_stat_get_backend_start,
pg_stat_get_backend_waiting, pg_stop_backup, pg_switch_xlog, pg_stat_reset
For above operations, we'd rather keep it checked in HAWQ side, if there is no
other concerns.
> Gpadmin super user processing on ACL
>
>
> Key: HAWQ-1207
> URL: https://issues.apache.org/jira/browse/HAWQ-1207
> Project: Apache HAWQ
> Issue Type: Sub-task
> Components: Security
>Reporter: Lili Ma
>Assignee: Alexander Denissov
> Fix For: backlog
>
>
> Once we specify enable_ranger, we need process gpadmin user privileges.
> Ideally, we should also restrict gpadmin behavior since we won't allow
> gpadmin to have all control on all user data.
> During the init system period, we can let gpadmin has all the privileges on
> all the objects. May implement this as seed policy in Ranger plugin side.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)