[GitHub] [ranger] bolkedebruin commented on issue #36: [RANGER-2395] Add Presto plugin

2020-03-06 Thread GitBox
bolkedebruin commented on issue #36: [RANGER-2395] Add Presto plugin
URL: https://github.com/apache/ranger/pull/36#issuecomment-596051979
 
 
   Code changes as the API has changed.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services


[GitHub] [ranger] ebyhr opened a new pull request #57: [RANGER-2747] Ranger integration with presto works on "Release 317" but fails on versions later

2020-03-06 Thread GitBox
ebyhr opened a new pull request #57: [RANGER-2747] Ranger integration with 
presto works on "Release 317" but fails on versions later
URL: https://github.com/apache/ranger/pull/57
 
 
   Update Presto version to 318 from 310
   
   JIRA https://issues.apache.org/jira/browse/RANGER-2747
   


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services


[jira] [Updated] (RANGER-2755) Update Atlas service-def and plugin for changes in ATLAS-3653

2020-03-06 Thread Madhan Neethiraj (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-2755?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Madhan Neethiraj updated RANGER-2755:
-
Attachment: RANGER-2755.patch

> Update Atlas service-def and plugin for changes in ATLAS-3653
> -
>
> Key: RANGER-2755
> URL: https://issues.apache.org/jira/browse/RANGER-2755
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, plugins
>Affects Versions: 2.1.0
>Reporter: Madhan Neethiraj
>Assignee: Madhan Neethiraj
>Priority: Major
> Fix For: 2.1.0
>
> Attachments: RANGER-2755.patch
>
>
> Recent change in ATLAS-3653 renamed permission {{entity-update-namespace}} to 
> {{entity-update-business-metadata}}. Atlas service-def and 
> authorization-plugin in Ranger should be updated for this change.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (RANGER-2755) Update Atlas service-def and plugin for changes in ATLAS-3653

2020-03-06 Thread Velmurugan Periasamy (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2755?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17053779#comment-17053779
 ] 

Velmurugan Periasamy commented on RANGER-2755:
--

+1 for the patch. Not able to see review. May be it is down. 

> Update Atlas service-def and plugin for changes in ATLAS-3653
> -
>
> Key: RANGER-2755
> URL: https://issues.apache.org/jira/browse/RANGER-2755
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, plugins
>Affects Versions: 2.1.0
>Reporter: Madhan Neethiraj
>Assignee: Madhan Neethiraj
>Priority: Major
> Fix For: 2.1.0
>
> Attachments: RANGER-2755.patch
>
>
> Recent change in ATLAS-3653 renamed permission {{entity-update-namespace}} to 
> {{entity-update-business-metadata}}. Atlas service-def and 
> authorization-plugin in Ranger should be updated for this change.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


Re: Review Request 72209: RANGER-2755: updated Atlas service-def and plugin for changes in ATLAS-3653

2020-03-06 Thread Ramesh Mani

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/72209/#review219831
---


Ship it!




Ship It!

- Ramesh Mani


On March 6, 2020, 6:44 p.m., Madhan Neethiraj wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/72209/
> ---
> 
> (Updated March 6, 2020, 6:44 p.m.)
> 
> 
> Review request for ranger, keval bhatt, Abhay Kulkarni, Mehul Parikh, Nixon 
> Rodrigues, Ramesh Mani, Sarath Subramanian, and Velmurugan Periasamy.
> 
> 
> Bugs: ATLAS-3653 and RANGER-2755
> https://issues.apache.org/jira/browse/ATLAS-3653
> https://issues.apache.org/jira/browse/RANGER-2755
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> - updated Atlas service-def and Atlas plugin for renaming of 'namespace' to 
> 'business-metadata'
> - since current Atlas service-def and plugin that references 'namespace' is 
> not yet included in any release, there is no need for migration (of existing 
> service-def and policies)
> 
> 
> Diffs
> -
> 
>   agents-common/src/main/resources/service-defs/ranger-servicedef-atlas.json 
> 9355b71c5 
>   
> plugin-atlas/src/main/java/org/apache/ranger/authorization/atlas/authorizer/RangerAtlasAuthorizer.java
>  ca06cf830 
>   
> plugin-atlas/src/main/java/org/apache/ranger/services/atlas/RangerServiceAtlas.java
>  d27cde3c0 
> 
> 
> Diff: https://reviews.apache.org/r/72209/diff/1/
> 
> 
> Testing
> ---
> 
> 
> Thanks,
> 
> Madhan Neethiraj
> 
>



[jira] [Commented] (RANGER-2755) Update Atlas service-def and plugin for changes in ATLAS-3653

2020-03-06 Thread Ramesh Mani (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2755?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17053765#comment-17053765
 ] 

Ramesh Mani commented on RANGER-2755:
-

+1 for the Patch.

> Update Atlas service-def and plugin for changes in ATLAS-3653
> -
>
> Key: RANGER-2755
> URL: https://issues.apache.org/jira/browse/RANGER-2755
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, plugins
>Affects Versions: 2.1.0
>Reporter: Madhan Neethiraj
>Assignee: Madhan Neethiraj
>Priority: Major
> Fix For: 2.1.0
>
> Attachments: RANGER-2755.patch
>
>
> Recent change in ATLAS-3653 renamed permission {{entity-update-namespace}} to 
> {{entity-update-business-metadata}}. Atlas service-def and 
> authorization-plugin in Ranger should be updated for this change.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[GitHub] [ranger] tooptoop4 edited a comment on issue #36: [RANGER-2395] Add Presto plugin

2020-03-06 Thread GitBox
tooptoop4 edited a comment on issue #36: [RANGER-2395] Add Presto plugin
URL: https://github.com/apache/ranger/pull/36#issuecomment-595948740
 
 
   @bolkedebruin for getting plugin to work again (not add row/col level) is it 
just a matter of updating version in pom.xml or code changes too? I'm guessing 
https://github.com/prestosql/presto/pull/1624 in release 320 and 
https://github.com/prestosql/presto/pull/171 in release 318 broke it as users 
mention 317 works.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services


[GitHub] [ranger] tooptoop4 commented on issue #36: [RANGER-2395] Add Presto plugin

2020-03-06 Thread GitBox
tooptoop4 commented on issue #36: [RANGER-2395] Add Presto plugin
URL: https://github.com/apache/ranger/pull/36#issuecomment-595948740
 
 
   @bolkedebruin for getting plugin to work again (not add row/col level) is it 
just a matter of updating version in pom.xml or code changes too?


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services


Review Request 72209: RANGER-2755: updated Atlas service-def and plugin for changes in ATLAS-3653

2020-03-06 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/72209/
---

Review request for ranger, keval bhatt, Abhay Kulkarni, Mehul Parikh, Nixon 
Rodrigues, Ramesh Mani, Sarath Subramanian, and Velmurugan Periasamy.


Bugs: ATLAS-3653 and RANGER-2755
https://issues.apache.org/jira/browse/ATLAS-3653
https://issues.apache.org/jira/browse/RANGER-2755


Repository: ranger


Description
---

- updated Atlas service-def and Atlas plugin for renaming of 'namespace' to 
'business-metadata'
- since current Atlas service-def and plugin that references 'namespace' is not 
yet included in any release, there is no need for migration (of existing 
service-def and policies)


Diffs
-

  agents-common/src/main/resources/service-defs/ranger-servicedef-atlas.json 
9355b71c5 
  
plugin-atlas/src/main/java/org/apache/ranger/authorization/atlas/authorizer/RangerAtlasAuthorizer.java
 ca06cf830 
  
plugin-atlas/src/main/java/org/apache/ranger/services/atlas/RangerServiceAtlas.java
 d27cde3c0 


Diff: https://reviews.apache.org/r/72209/diff/1/


Testing
---


Thanks,

Madhan Neethiraj



[jira] [Created] (RANGER-2755) Update Atlas service-def and plugin for changes in ATLAS-3653

2020-03-06 Thread Madhan Neethiraj (Jira)
Madhan Neethiraj created RANGER-2755:


 Summary: Update Atlas service-def and plugin for changes in 
ATLAS-3653
 Key: RANGER-2755
 URL: https://issues.apache.org/jira/browse/RANGER-2755
 Project: Ranger
  Issue Type: Bug
  Components: admin, plugins
Affects Versions: 2.1.0
Reporter: Madhan Neethiraj
Assignee: Madhan Neethiraj


Recent change in ATLAS-3653 renamed permission {{entity-update-namespace}} to 
{{entity-update-business-metadata}}. Atlas service-def and authorization-plugin 
in Ranger should be updated for this change.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (RANGER-2749) Ranger depends on commons-lang but doesn't specify it in it's pom

2020-03-06 Thread Grant Henke (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2749?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17053479#comment-17053479
 ] 

Grant Henke commented on RANGER-2749:
-

[~pradeep] I posted a patch and review board that resolves the issue. Let me 
know if you need anything else.

> Ranger depends on commons-lang but doesn't specify it in it's pom
> -
>
> Key: RANGER-2749
> URL: https://issues.apache.org/jira/browse/RANGER-2749
> Project: Ranger
>  Issue Type: Bug
>  Components: plugins
>Affects Versions: 2.0.0
>Reporter: Grant Henke
>Priority: Major
> Attachments: 
> 0001-RANGER-2749-Add-explicit-commons-lang-dependency.patch
>
>
> Ranger uses commons lang for StringUtils in places like: 
> [https://github.com/apache/ranger/blob/master/agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerAccessRequestImpl.java#L31]
> However, it doesn't add commons-lang as a dependency and instead depends on 
> the transitive dependency from hadoop-common. When compiling my plugin with 
> with Hadoop 3.2+ I get a `java.lang.NoClassDefFoundError: 
> org/apache/commons/lang/StringUtils` because Hadoop no longer depends on 
> commons-lang. 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[GitHub] [ranger] brucemen711 commented on issue #36: [RANGER-2395] Add Presto plugin

2020-03-06 Thread GitBox
brucemen711 commented on issue #36: [RANGER-2395] Add Presto plugin
URL: https://github.com/apache/ranger/pull/36#issuecomment-595795880
 
 
   Thanks @bolkedebruin, im looking for it.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services


Re: Review Request 72207: RANGER-2744 : Add response header in login.jsp page

2020-03-06 Thread Nitin Galave

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/72207/
---

(Updated March 6, 2020, 1:32 p.m.)


Review request for ranger, Gautam Borad, Mehul Parikh, Pradeep Agrawal, and 
Velmurugan Periasamy.


Bugs: RANGER-2744
https://issues.apache.org/jira/browse/RANGER-2744


Repository: ranger


Description
---

Good coding practice-add additional headers in ranger.


Diffs
-

  security-admin/src/main/resources/conf.dist/security-applicationContext.xml 
c359971 


Diff: https://reviews.apache.org/r/72207/diff/1/


Testing
---


Thanks,

Nitin Galave



[jira] [Commented] (RANGER-2751) SSL enabled Apache Ranger (2.1.0) not working with SSL enabled Presto (Prestosql 310) - Policy synch up not happening

2020-03-06 Thread Pradeep Agrawal (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2751?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17053397#comment-17053397
 ] 

Pradeep Agrawal commented on RANGER-2751:
-

You can try either of the two approach here :

1) import the ranger admin cert into jdk cacert of the presto plugin machine.

or

2) Try to create a trust store and import the ranger admin certificate in that 
trust store at the plugin end. you might have to use below two properties and 
make sure its reflected in ranger-*ssl*.site.xml when you enable the presto 
plugin

SSL_TRUSTSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-truststore.jks
SSL_TRUSTSTORE_PASSWORD=none

 

 

> SSL enabled Apache Ranger (2.1.0) not working with SSL enabled Presto 
> (Prestosql 310) - Policy synch up not happening 
> --
>
> Key: RANGER-2751
> URL: https://issues.apache.org/jira/browse/RANGER-2751
> Project: Ranger
>  Issue Type: Bug
>  Components: plugins
>Affects Versions: 2.1.0
>Reporter: sajai
>Priority: Major
> Fix For: 2.1.0
>
>
> *Facing the below error when trying to integrate Apache Ranger with Prestosql 
> (310 version).*
> *Both Ranger and Presto is working independently, but the Presto policies 
> from Ranger are not downloading/refreshing. Couldn't find the policies 
> downloaded in Ranger web ui in Audits/Plugin tab. Also if we remove SSL from 
> Ranger side it starts working fine. Issue is only when SSL is enabled in 
> Ranger, then Presto inot working with Ranger,*
> 2020-03-04T07:50:59.600-0600 ERROR Thread-91 
> org.apache.ranger.plugin.util.PolicyRefresher 
> PolicyRefresher(serviceName=presto-catalogs-dev): failed to refresh policies. 
> Will continue to use last known version of policies (-1)
> java.lang.IllegalArgumentException: TrustManager is not specified
> *ranger-2.1.0-SNAPSHOT-admin/install.properties:-*
> db_root_user=root
> db_root_password=Sqlpwd@123
> db_host=localhost
> db_name=ranger
> db_user=rangeradmin
> db_password=Rangerpwd@123
> rangerAdmin_password=Rangerpwd@123
> rangerTagsync_password=Rangerpwd@123
> rangerUsersync_password=Rangerpwd@123
> keyadmin_password=Rangerpwd@123
> policymgr_external_url=https://hostname_ranger:6182
> policymgr_http_enabled=false
> policymgr_https_keystore_file=/opt/iss_cert/clientcert.jks
> policymgr_https_keystore_keyalias=
> policymgr_https_keystore_password=31b17532aeb4fb5ba3af2bae850567
> unix_user=ranger
> unix_user_pwd=Rangerpwd@123
> unix_group=ranger
> #LDAP|ACTIVE_DIRECTORY|UNIX|NONE
> authentication_method=LDAP
> xa_ldap_url=ldaps://hostname_ldapserver:636
> xa_ldap_userDNpattern=uid=\{0},OU=xxx,DC=xx,DC=,DC=COM
> xa_ldap_groupSearchBase=DC=xxx,DC=ccc,DC=COM
> xa_ldap_groupSearchFilter=(member=cn=\{0},OU=xxx,DC=xx,DC=,DC=COM)
> xa_ldap_groupRoleAttribute=cn
> xa_ldap_base_dn=DC=xx,DC=,DC=COM
> xa_ldap_bind_dn=CN=XXX,OU=XX,DC=xx,DC=,DC=COM
> xa_ldap_bind_password=uBLRzVJK
> xa_ldap_referral=follow
> xa_ldap_userSearchFilter=(uid=\{0})
> *With the above values,able to start ranger with SSL and LDAP enabled and 
> also able to login succesfully with both unix admin credentials and also with 
> ldap credentials.*
>  
> *ranger-2.1.0-SNAPSHOT-presto-plugin/install.properties:-*
> POLICY_MGR_URL=https:/hostname_ranger:6182
> REPOSITORY_NAME=presto-catalogs-dev
> *# You do not need use SSL between agent and security admin tool, please 
> leave these sample value as it is.*
> SSL_KEYSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-keystore.jks
> SSL_KEYSTORE_PASSWORD=none
> SSL_TRUSTSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-truststore.jks
> SSL_TRUSTSTORE_PASSWORD=none
> *keep blank if component user is default*
> CUSTOM_USER=
> *keep blank if component group is default*
> CUSTOM_GROUP=
>  
> *presto-server-310/etc/config.properties:-*
> coordinator=true
> node-scheduler.include-coordinator=true
> http-server.http.enabled=false
> node.internal-address-source=FQDN
> node.internal-address=hostname_presto
> internal-communication.https.required=true
> internal-communication.https.keystore.path=/opt/iss_cert/clientcert.jks
> internal-communication.https.keystore.key=31b17532aeb4fb5ba3af2bae850567
> discovery-server.enabled=true
> discovery.uri=https://hostname_presto:8443
> http-server.authentication.type=PASSWORD,CERTIFICATE
> http-server.https.enabled=true
> http-server.https.port=8443
> http-server.https.keystore.path=/opt/iss_cert/clientcert.jks
> http-server.https.keystore.key=31b17532aeb4fb5ba3af2bae850567



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (RANGER-2751) SSL enabled Apache Ranger (2.1.0) not working with SSL enabled Presto (Prestosql 310) - Policy synch up not happening

2020-03-06 Thread Bolke de Bruin (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-2751?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17053348#comment-17053348
 ] 

Bolke de Bruin commented on RANGER-2751:


https://issues.apache.org/jira/browse/RANGER-2611

Check what the config file of the plugin actually says (your ranger-XXX.xml)

> SSL enabled Apache Ranger (2.1.0) not working with SSL enabled Presto 
> (Prestosql 310) - Policy synch up not happening 
> --
>
> Key: RANGER-2751
> URL: https://issues.apache.org/jira/browse/RANGER-2751
> Project: Ranger
>  Issue Type: Bug
>  Components: plugins
>Affects Versions: 2.1.0
>Reporter: sajai
>Priority: Major
> Fix For: 2.1.0
>
>
> *Facing the below error when trying to integrate Apache Ranger with Prestosql 
> (310 version).*
> *Both Ranger and Presto is working independently, but the Presto policies 
> from Ranger are not downloading/refreshing. Couldn't find the policies 
> downloaded in Ranger web ui in Audits/Plugin tab. Also if we remove SSL from 
> Ranger side it starts working fine. Issue is only when SSL is enabled in 
> Ranger, then Presto inot working with Ranger,*
> 2020-03-04T07:50:59.600-0600 ERROR Thread-91 
> org.apache.ranger.plugin.util.PolicyRefresher 
> PolicyRefresher(serviceName=presto-catalogs-dev): failed to refresh policies. 
> Will continue to use last known version of policies (-1)
> java.lang.IllegalArgumentException: TrustManager is not specified
> *ranger-2.1.0-SNAPSHOT-admin/install.properties:-*
> db_root_user=root
> db_root_password=Sqlpwd@123
> db_host=localhost
> db_name=ranger
> db_user=rangeradmin
> db_password=Rangerpwd@123
> rangerAdmin_password=Rangerpwd@123
> rangerTagsync_password=Rangerpwd@123
> rangerUsersync_password=Rangerpwd@123
> keyadmin_password=Rangerpwd@123
> policymgr_external_url=https://hostname_ranger:6182
> policymgr_http_enabled=false
> policymgr_https_keystore_file=/opt/iss_cert/clientcert.jks
> policymgr_https_keystore_keyalias=
> policymgr_https_keystore_password=31b17532aeb4fb5ba3af2bae850567
> unix_user=ranger
> unix_user_pwd=Rangerpwd@123
> unix_group=ranger
> #LDAP|ACTIVE_DIRECTORY|UNIX|NONE
> authentication_method=LDAP
> xa_ldap_url=ldaps://hostname_ldapserver:636
> xa_ldap_userDNpattern=uid=\{0},OU=xxx,DC=xx,DC=,DC=COM
> xa_ldap_groupSearchBase=DC=xxx,DC=ccc,DC=COM
> xa_ldap_groupSearchFilter=(member=cn=\{0},OU=xxx,DC=xx,DC=,DC=COM)
> xa_ldap_groupRoleAttribute=cn
> xa_ldap_base_dn=DC=xx,DC=,DC=COM
> xa_ldap_bind_dn=CN=XXX,OU=XX,DC=xx,DC=,DC=COM
> xa_ldap_bind_password=uBLRzVJK
> xa_ldap_referral=follow
> xa_ldap_userSearchFilter=(uid=\{0})
> *With the above values,able to start ranger with SSL and LDAP enabled and 
> also able to login succesfully with both unix admin credentials and also with 
> ldap credentials.*
>  
> *ranger-2.1.0-SNAPSHOT-presto-plugin/install.properties:-*
> POLICY_MGR_URL=https:/hostname_ranger:6182
> REPOSITORY_NAME=presto-catalogs-dev
> *# You do not need use SSL between agent and security admin tool, please 
> leave these sample value as it is.*
> SSL_KEYSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-keystore.jks
> SSL_KEYSTORE_PASSWORD=none
> SSL_TRUSTSTORE_FILE_PATH=/etc/hadoop/conf/ranger-plugin-truststore.jks
> SSL_TRUSTSTORE_PASSWORD=none
> *keep blank if component user is default*
> CUSTOM_USER=
> *keep blank if component group is default*
> CUSTOM_GROUP=
>  
> *presto-server-310/etc/config.properties:-*
> coordinator=true
> node-scheduler.include-coordinator=true
> http-server.http.enabled=false
> node.internal-address-source=FQDN
> node.internal-address=hostname_presto
> internal-communication.https.required=true
> internal-communication.https.keystore.path=/opt/iss_cert/clientcert.jks
> internal-communication.https.keystore.key=31b17532aeb4fb5ba3af2bae850567
> discovery-server.enabled=true
> discovery.uri=https://hostname_presto:8443
> http-server.authentication.type=PASSWORD,CERTIFICATE
> http-server.https.enabled=true
> http-server.https.port=8443
> http-server.https.keystore.path=/opt/iss_cert/clientcert.jks
> http-server.https.keystore.key=31b17532aeb4fb5ba3af2bae850567



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (RANGER-2744) Add response header in login.jsp page

2020-03-06 Thread Nitin Galave (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-2744?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nitin Galave updated RANGER-2744:
-
Attachment: (was: 0001-RANGER-2744.patch)

> Add response header in login.jsp page
> -
>
> Key: RANGER-2744
> URL: https://issues.apache.org/jira/browse/RANGER-2744
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Nitin Galave
>Assignee: Nitin Galave
>Priority: Major
> Attachments: 0001-RANGER-2744.patch
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (RANGER-2744) Add response header in login.jsp page

2020-03-06 Thread Nitin Galave (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-2744?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nitin Galave updated RANGER-2744:
-
Attachment: 0001-RANGER-2744.patch

> Add response header in login.jsp page
> -
>
> Key: RANGER-2744
> URL: https://issues.apache.org/jira/browse/RANGER-2744
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Nitin Galave
>Assignee: Nitin Galave
>Priority: Major
> Attachments: 0001-RANGER-2744.patch
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Updated] (RANGER-2752) Upgrade from 0.7.0 to master fails due to schema issue

2020-03-06 Thread Pradeep Agrawal (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-2752?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Pradeep Agrawal updated RANGER-2752:

Fix Version/s: (was: master)

> Upgrade from 0.7.0 to master fails due to schema issue
> --
>
> Key: RANGER-2752
> URL: https://issues.apache.org/jira/browse/RANGER-2752
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, Ranger
>Affects Versions: 0.7.0
>Reporter: Andrew Luo
>Priority: Major
> Attachments: 
> 0001-RANGER-2752-Add-corresponding-upgrade-patch-for-RANGER-2550.patch, 
> ranger_admin_sql_db_patch.log
>
>
> Upgrading from 0.7.0 to the current master fails with the following error:
>  
> 2020-03-04 07:38:00,523  [JISQL] /usr/lib/jvm/java-8-openjdk-amd64/bin/java  
> -cp 
> /opt/mysql-connector-java-5.1.48.jar:/opt/ranger-2.1.0-SNAPSHOT-admin/jisql/lib/*
>  org.apache.util.sql.Jisql -driver mysqlconj -cstring 
> jdbc:mysql://ranger-mysql/ranger -u 'ranger' -p '' -noheader -trim -c 
> \;  -query "insert into x_db_version_h (version, inst_at, inst_by, 
> updated_at, updated_by,active) values ('J10015', current_timestamp, 'Ranger 
> 2.1.0-SNAPSHOT', current_timestamp, '306a9688fa98','N') ;"
> Wed Mar 04 07:38:01 UTC 2020 WARN: Establishing SSL connection without 
> server's identity verification is not recommended. According to MySQL 
> 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection must be established 
> by default if explicit option isn't set. For compliance with existing 
> applications not using SSL the verifyServerCertificate property is set to 
> 'false'. You need either to explicitly disable SSL by setting useSSL=false, 
> or set useSSL=true and provide truststore for server certificate verification.
> 2020-03-04 07:38:01,164  [I] java patch PatchForKafkaServiceDefUpdate_J10015 
> is being applied..
> Wed Mar 04 07:38:11 UTC 2020 WARN: Establishing SSL connection without 
> server's identity verification is not recommended. According to MySQL 
> 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection must be established 
> by default if explicit option isn't set. For compliance with existing 
> applications not using SSL the verifyServerCertificate property is set to 
> 'false'. You need either to explicitly disable SSL by setting useSSL=false, 
> or set useSSL=true and provide truststore for server certificate verification.
> Wed Mar 04 07:38:11 UTC 2020 WARN: Establishing SSL connection without 
> server's identity verification is not recommended. According to MySQL 
> 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection must be established 
> by default if explicit option isn't set. For compliance with existing 
> applications not using SSL the verifyServerCertificate property is set to 
> 'false'. You need either to explicitly disable SSL by setting useSSL=false, 
> or set useSSL=true and provide truststore for server certificate verification.
> Wed Mar 04 07:38:11 UTC 2020 WARN: Establishing SSL connection without 
> server's identity verification is not recommended. According to MySQL 
> 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection must be established 
> by default if explicit option isn't set. For compliance with existing 
> applications not using SSL the verifyServerCertificate property is set to 
> 'false'. You need either to explicitly disable SSL by setting useSSL=false, 
> or set useSSL=true and provide truststore for server certificate verification.
> Wed Mar 04 07:38:11 UTC 2020 WARN: Establishing SSL connection without 
> server's identity verification is not recommended. According to MySQL 
> 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection must be established 
> by default if explicit option isn't set. For compliance with existing 
> applications not using SSL the verifyServerCertificate property is set to 
> 'false'. You need either to explicitly disable SSL by setting useSSL=false, 
> or set useSSL=true and provide truststore for server certificate verification.
> Wed Mar 04 07:38:11 UTC 2020 WARN: Establishing SSL connection without 
> server's identity verification is not recommended. According to MySQL 
> 5.5.45+, 5.6.26+ and 5.7.6+ requirements SSL connection must be established 
> by default if explicit option isn't set. For compliance with existing 
> applications not using SSL the verifyServerCertificate property is set to 
> 'false'. You need either to explicitly disable SSL by setting useSSL=false, 
> or set useSSL=true and provide truststore for server certificate verification.
> [EL Warning]: 2020-03-04 07:38:19.282--ClientSession(841450293)--Exception 
> [EclipseLink-4002] (Eclipse Persistence Services - 2.5.2.v20140319-9ad6abd): 
> org.eclipse.persistence.exceptions.DatabaseException
> Internal Exception: com.mysql.jdbc.MysqlDataTruncation: Data truncation: Out 
>