[jira] [Commented] (HAWQ-1207) Gpadmin super user processing on ACL

2017-01-20 Thread Lili Ma (JIRA)

[ 
https://issues.apache.org/jira/browse/HAWQ-1207?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15831463#comment-15831463
 ] 

Lili Ma commented on HAWQ-1207:
---

[~thebellhead] I split the stories given that they are from two aspects: 
catalog table and super user. 

For super user, HAWQ behavior without Ranger is that superuser can have all the 
privileges upon HAWQ internal tables.  We need limit the super user behavior 
for accessing tables create by others.

Besides this, there are a lot of super user specific behaviors for some 
objects. Only superuser can have the right for following behavior: 
1. create cast: when function is NULL
2. create filespace
3. create/remove/alter foreign-data wrapper
4. create function: For untrusted language, only superuser can create function.
5. create/drop procedural language
6. create/drop/alter resource queue
7. create tablespace: It means the privilege to create tablespace, and only 
superuser can do. But the CREATE privilege for tablespace means creating 
database/table/index... in tablespace, which is different.
8. create external table: Only super user can create EXECUTE external web table 
or create an external table with a file protocol (but in HAWQ 2.0, the file 
protocol is not supported any more).
9. create operator class
10. copy: Only superuser can copy to or from a file. And in ranger, the 
superuser can not run copy to or from when he doesn't have the privilege for 
that table select or insert.
11. alter state of system triggers
12. some build in functions, including pg_logdir_ls, pg_ls_dir, pg_read_file, 
pg_reload_conf, pg_rotate_logfile, pg_signal_backend, pg_start_backup, 
pg_stat_file, pg_stat_get_activity, pg_stat_get_backend_activity_start, 
pg_stat_get_backend_activity, pg_stat_get_backend_client_addr, 
pg_stat_get_backend_client_port, pg_stat_get_backend_start, 
pg_stat_get_backend_waiting, pg_stop_backup, pg_switch_xlog, pg_stat_reset

For above operations, we'd rather keep it checked in HAWQ side, if there is no 
other concerns.


> Gpadmin super user processing on ACL
> 
>
> Key: HAWQ-1207
> URL: https://issues.apache.org/jira/browse/HAWQ-1207
> Project: Apache HAWQ
>  Issue Type: Sub-task
>  Components: Security
>Reporter: Lili Ma
>Assignee: Alexander Denissov
> Fix For: backlog
>
>
> Once we specify enable_ranger, we need process gpadmin user privileges. 
> Ideally, we should also restrict gpadmin behavior since we won't allow 
> gpadmin to have all control on all user data. 
> During the init system period, we can let gpadmin has all the privileges on 
> all the objects. May implement this as seed policy in Ranger plugin side.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HAWQ-1207) Gpadmin super user processing on ACL

2016-12-08 Thread Alastair "Bell" Turner (JIRA)

[ 
https://issues.apache.org/jira/browse/HAWQ-1207?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15731861#comment-15731861
 ] 

Alastair "Bell" Turner commented on HAWQ-1207:
--

This and HAWQ-1206 are two sides of the same issue. That issue is how to 
identify which tables are subject to external access controls (Ranger or 
impersonation) and which are subject to HAWQ's internal access controls. Those 
where access is controlled internally will be accessible to gpadmin and any 
which are externally managed won't. The distinction may be as simple as system 
vs user tables.

I would suggest merging this and HAWQ-1206 into one ticket to cover both 
aspects of issue since the solution may be common.

> Gpadmin super user processing on ACL
> 
>
> Key: HAWQ-1207
> URL: https://issues.apache.org/jira/browse/HAWQ-1207
> Project: Apache HAWQ
>  Issue Type: Sub-task
>  Components: Security
>Reporter: Lili Ma
>Assignee: Alexander Denissov
> Fix For: backlog
>
>
> Once we specify enable_ranger, we need process gpadmin user privileges. 
> Ideally, we should also restrict gpadmin behavior since we won't allow 
> gpadmin to have all control on all user data. 
> During the init system period, we can let gpadmin has all the privileges on 
> all the objects. May implement this as seed policy in Ranger plugin side.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)