uld prefer to keep parser accepted list configuration as it is.
- Gautam
---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/40858/#review108670
------
t/Behavior:**
Ranger installation finished without any error.
Ranger login was working.
Thanks,
Gautam Borad
ally generated e-mail. To reply, visit:
https://reviews.apache.org/r/40868/#review108677
-------
On Dec. 2, 2015, 2:13 p.m., Gautam Borad wrote:
>
> ---
> This is an automatically generated e
new'
5. Visited audit menu, audit tab to check new logs related to 'mypolicy1'
**Result/Behavior:**
Update policy log was generated and seen.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-761?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-761:
Attachment: RANGER-761-2.patch
> Transaction logs not getting generated under audit menu admin
[
https://issues.apache.org/jira/browse/RANGER-759?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15037184#comment-15037184
]
Gautam Borad commented on RANGER-759:
-
Committed to master :
https://github
Gautam Borad created RANGER-761:
---
Summary: Transaction logs not getting generated under audit menu
admin tab if policy name is changed
Key: RANGER-761
URL: https://issues.apache.org/jira/browse/RANGER-761
Gautam Borad created RANGER-760:
---
Summary: Ranger UI code cleanup
Key: RANGER-760
URL: https://issues.apache.org/jira/browse/RANGER-760
Project: Ranger
Issue Type: Bug
Components
Gautam Borad created RANGER-759:
---
Summary: Fix Ranger Knox SSO logout/session expired issues
Key: RANGER-759
URL: https://issues.apache.org/jira/browse/RANGER-759
Project: Ranger
Issue Type
Gautam Borad created RANGER-758:
---
Summary: Handle special characters in passwords starting from -r
Key: RANGER-758
URL: https://issues.apache.org/jira/browse/RANGER-758
Project: Ranger
[
https://issues.apache.org/jira/browse/RANGER-748?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15035232#comment-15035232
]
Gautam Borad commented on RANGER-748:
-
Committed to master :
https://github
[
https://issues.apache.org/jira/browse/RANGER-749?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15035205#comment-15035205
]
Gautam Borad commented on RANGER-749:
-
Committed to master :
https://github
) were
not in sync and even in that contition, Policies are able to retain users
accurately in all conditions.
Result:
Users assigned in policies are retained after the upgrade and even when Users
are not in sync in x_user and x_portal_user tables.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-748?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-748:
Attachment: RANGER-748.patch
> Users in policy got changed after upgr
[
https://issues.apache.org/jira/browse/RANGER-743?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15030607#comment-15030607
]
Gautam Borad commented on RANGER-743:
-
Committed to master :
https://github
[
https://issues.apache.org/jira/browse/RANGER-743?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad resolved RANGER-743.
-
Resolution: Fixed
> External users with Admin Role should be allowed to create/update us
export/import script.
Tested creating keys, encryption zone and also the distcp command to copy
file from one encryption zone on one cluster to another encryption zone on
another cluster.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-749?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-749:
Attachment: RANGER-749.patch
> Ranger KMS to support multiple KMS instances with keys acr
[
https://issues.apache.org/jira/browse/RANGER-741?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15029503#comment-15029503
]
Gautam Borad commented on RANGER-741:
-
Committed to master :
https://github
Gautam Borad created RANGER-749:
---
Summary: Ranger KMS to support multiple KMS instances with keys
across multiple clusters
Key: RANGER-749
URL: https://issues.apache.org/jira/browse/RANGER-749
Project
Gautam Borad created RANGER-748:
---
Summary: Users in policy got changed after upgrade
Key: RANGER-748
URL: https://issues.apache.org/jira/browse/RANGER-748
Project: Ranger
Issue Type: Bug
le can read assigned role.
PreAuthorise Annotation mapped in REST API/method shall allow Only users
authenticated with particular roles.
**Testing done with patch:** 1) UNIX/LDAP/AD users can create and update users.
Thanks,
Gautam Borad
---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/40696/#review107932
---
Ship it!
Ship It!
- Gautam Borad
On Nov. 25, 2015, 6:53 a.m
to not use audit to DB as audit source then
installation script should not do any audit db related password validation and
audit to DB related properties should not be updated.
Thanks,
Gautam Borad
Gautam Borad created RANGER-743:
---
Summary: External users with Admin Role should be allowed to
create/update users
Key: RANGER-743
URL: https://issues.apache.org/jira/browse/RANGER-743
Project: Ranger
Gautam Borad created RANGER-741:
---
Summary: Fix installation script to skip Audit DB password check
if audit source is SOLR
Key: RANGER-741
URL: https://issues.apache.org/jira/browse/RANGER-741
Project
[
https://issues.apache.org/jira/browse/RANGER-733?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15018385#comment-15018385
]
Gautam Borad commented on RANGER-733:
-
Committed to master :
https://github
file was created and loging was
happening in usersync_new.log file.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-733?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-733:
Affects Version/s: 0.5.0
> Implement best coding practices to resolve issues found during code s
[
https://issues.apache.org/jira/browse/RANGER-733?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-733:
Fix Version/s: 0.5.1
> Implement best coding practices to resolve issues found during code s
[
https://issues.apache.org/jira/browse/RANGER-685?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15010123#comment-15010123
]
Gautam Borad commented on RANGER-685:
-
[~dillidorai] Will update the Description
a9d5739ac0b541e9d713fd234ce9d9ceade2e9d1
security-admin/src/main/webapp/scripts/views/common/ProfileBar.js
0f872708f31202fc9b3422b7672d88eae107dc2f
Diff: https://reviews.apache.org/r/40343/diff/
Testing
---
Tested with local Ranger admin authentication against KNOX SSO and tried
various scenarios.
Thanks,
Gautam
-
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/40343/#review106705
---
On Nov. 16, 2015, 11:20 a.m., Gautam Borad wrote:
>
> --
grant authorities.
Similar implementation has being done for LDAP/AD/JDBC in
RangerAuthenticationProvider.java.
- Gautam
---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/40343/#review10680
a9d5739ac0b541e9d713fd234ce9d9ceade2e9d1
security-admin/src/main/webapp/scripts/views/common/ProfileBar.js
0f872708f31202fc9b3422b7672d88eae107dc2f
Diff: https://reviews.apache.org/r/40343/diff/
Testing
---
Tested with local Ranger admin authentication against KNOX SSO and tried
various scenarios.
Thanks,
Gautam
0f872708f31202fc9b3422b7672d88eae107dc2f
Diff: https://reviews.apache.org/r/40343/diff/
Testing
---
Tested with local Ranger admin authentication against KNOX SSO and tried
various scenarios.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-733?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad reassigned RANGER-733:
---
Assignee: Gautam Borad (was: Velmurugan Periasamy)
> Implement best coding practices
---
Checked for policy download performance improvement for Ranger having 1500
policies.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-702?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-702:
Fix Version/s: 0.5.1
> Optimize policy download performa
[
https://issues.apache.org/jira/browse/RANGER-714?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14997946#comment-14997946
]
Gautam Borad commented on RANGER-714:
-
Committed to master :
https://github
dc3eaaa90d4
Diff: https://reviews.apache.org/r/39900/diff/
Testing
---
Tested with local Ranger setup.
Thanks,
Gautam Borad
ger/view/RangerServerInfo.java
PRE-CREATION
security-admin/src/main/webapp/scripts/prelogin/XAPrelogin.js
3d33d8678b3069dcdba5ff5536722dc3eaaa90d4
Diff: https://reviews.apache.org/r/39900/diff/
Testing
---
Tested with local Ranger setup.
Thanks,
Gautam Borad
e dryrun mode script.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-716?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-716:
Attachment: RANGER-716.patch
> New Public API to check user credenti
[
https://issues.apache.org/jira/browse/RANGER-714?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-714:
Attachment: RANGER-714.patch
> Enhancements to the db admin setup scri
Hi Selva/All,
I would like to volunteer to do the website redesign work. Will keep
the community posted with latest developments/discussions regarding the
website. Thanks.
On Wed, Oct 28, 2015 at 6:43 PM, Selvamohan Neethiraj
wrote:
> Hi Rangers:
>
> I am looking for volunteers who can help
[
https://issues.apache.org/jira/browse/RANGER-716?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-716:
Attachment: RANGER-716.patch
> New Public API to check user credenti
[
https://issues.apache.org/jira/browse/RANGER-716?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-716:
Fix Version/s: 0.6.0
> New Public API to check user credenti
Gautam Borad created RANGER-716:
---
Summary: New Public API to check user credentials
Key: RANGER-716
URL: https://issues.apache.org/jira/browse/RANGER-716
Project: Ranger
Issue Type
Gautam Borad created RANGER-714:
---
Summary: Enhancements to the db admin setup scripts.
Key: RANGER-714
URL: https://issues.apache.org/jira/browse/RANGER-714
Project: Ranger
Issue Type: Bug
[
https://issues.apache.org/jira/browse/RANGER-706?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14980442#comment-14980442
]
Gautam Borad commented on RANGER-706:
-
Committed to branch *ranger-0.5* :
h
required columns were added in the
table after applying the patch.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-706?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-706:
Attachment: RANGER-706.patch
> Optimize audit db upgrade patches to minimize timeout iss
Gautam Borad created RANGER-706:
---
Summary: Optimize audit db upgrade patches to minimize timeout
issues
Key: RANGER-706
URL: https://issues.apache.org/jira/browse/RANGER-706
Project: Ranger
[
https://issues.apache.org/jira/browse/RANGER-674?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14976246#comment-14976246
]
Gautam Borad commented on RANGER-674:
-
Committed to ranger-0.5 :
https://github
[
https://issues.apache.org/jira/browse/RANGER-701?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14973928#comment-14973928
]
Gautam Borad commented on RANGER-701:
-
Committed to master :
https://github
[
https://issues.apache.org/jira/browse/RANGER-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-701:
Attachment: RANGER-701.2.patch
> Update setup scripts to allow special characters in passwo
Gautam Borad created RANGER-702:
---
Summary: Optimize policy download performance
Key: RANGER-702
URL: https://issues.apache.org/jira/browse/RANGER-702
Project: Ranger
Issue Type: Bug
rsync/ KMS installation using Mysql, Oracle, Postgres, MS
SQL, SQLAnywhere, Azure DB by using various combinations of special characters.
Mentioned password combinations were also tested on Bind Password field for
AD/LDAP Sync/Authentication.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-701:
Attachment: RANGER-701.1.patch
> Update setup scripts to allow special characters in passwo
ng various combinations of special characters.
Mentioned password combinations were also tested on Bind Password field for
AD/LDAP Sync/Authentication.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-701:
Attachment: RANGER-701.patch
> Update setup scripts to allow special characters in passwo
Gautam Borad created RANGER-701:
---
Summary: Update setup scripts to allow special characters in
passwords
Key: RANGER-701
URL: https://issues.apache.org/jira/browse/RANGER-701
Project: Ranger
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14958432#comment-14958432
]
Gautam Borad commented on RANGER-688:
-
Committed to master :
https://github
pa_named_queries.xml
0370e9abe60582152f6d71ac8e0ed8312e4f2e7f
Diff: https://reviews.apache.org/r/39122/diff/
Testing
---
Tested by creating a XPOrtalUser user using curl command and then for a new
user, assigned permissions to check if permissions are not messed up.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-688:
Attachment: RANGER-688.2.patch
> Handle scenario where ids of XUser and XPortalUser are not in s
api?
>
> thanks
>
> On Tue, Oct 13, 2015 at 1:59 PM, Gautam Borad wrote:
>
>>
>> ---
>> This is an automatically generated e-mail. To rep
user as well as for
user role user.
- Keyadmin role user : Only KMS Audit access logs were visible
- Admin role user : All Audit access logs were visible
- User role user : All Audit access logs were visible
Thanks,
Gautam Borad
---
Tested on a cluster having Ranger and verified sync of users by changing the
sync interval.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-697?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-697:
Attachment: RANGER-697.patch
> KeyAdmin role user should see only KMS related audit access logs
/java/org/apache/ranger/biz/TestXUserMgr.java
cda423e80b3c74fce0edf9f43a213f917dd33396
Diff: https://reviews.apache.org/r/35001/diff/
Testing
---
Tested on local instance for session timeout as well curl call to change user
role.
Thanks,
Gautam Borad
Gautam Borad created RANGER-697:
---
Summary: KeyAdmin role user should see only KMS related audit
access logs in Audit tab
Key: RANGER-697
URL: https://issues.apache.org/jira/browse/RANGER-697
Project
---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/39122/#review102121
---
On Oct. 9, 2015, 9:15 a.m., Gautam Borad wrote:
>
>
e that userPermission object is there in db but `isAllowed`
is set to `No` so in this case if isCreate flag is set then we are kind of
assigning/creating permission to that user.
- Gautam
---
This is an automatically g
Kafka, Yarn using custom user and
manually enabled plugin and verified enforcements after enabling plugin.
Thanks,
Gautam Borad
//reviews.apache.org/r/39122/diff/
Testing
---
Tested by creating a XPOrtalUser user using curl command and then for a new
user, assigned permissions to check if permissions are not messed up.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-673?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-673:
Attachment: RANGER-673.1.patch
> Setup changes to allow Ranger service to installed using cus
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-688:
Attachment: RANGER-688.1.patch
> Handle scenario where ids of XUser and XPortalUser are not in s
curl command and then for a new
user, assigned permissions to check if permissions are not messed up.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-688:
Attachment: RANGER-688.patch
> Handle scenario where ids of XUser and XPortalUser are not in s
[
https://issues.apache.org/jira/browse/RANGER-677?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14948617#comment-14948617
]
Gautam Borad commented on RANGER-677:
-
Committed to ranger-0.5 :
https://github
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-688:
Summary: Handle scenario where ids of XUser and XPortalUser are not in sync
(was: User/Group
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-688:
Description:
If by any chance, the User/Group permissions had been accidentally removed from
the
[
https://issues.apache.org/jira/browse/RANGER-688?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-688:
Description:
If by any chance, the User/Group permissions had been accidentally removed from
the
Gautam Borad created RANGER-688:
---
Summary: User/Group Permissions were removed from Ranger Admin
user and cannot be restored
Key: RANGER-688
URL: https://issues.apache.org/jira/browse/RANGER-688
[
https://issues.apache.org/jira/browse/RANGER-671?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14948167#comment-14948167
]
Gautam Borad commented on RANGER-671:
-
Committed to master :
https://github
/src/main/java/org/apache/ranger/unixusersync/config/UserGroupSyncConfig.java
7240fce840abfdc2e63dacb6e17c1e4bf8ef24c3
Diff: https://reviews.apache.org/r/39078/diff/
Testing
---
Tested on a cluster having Ranger and verified sync of users by changing the
sync interval.
Thanks,
Gautam
-
security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java
a5ac557ca2e8fca0f4e2ee963dbc5075ac030cdf
Diff: https://reviews.apache.org/r/39040/diff/
Testing
---
Verified on local Ranger KMS setup for default policy to not have the public
group.
Thanks,
Gautam Borad
/apache/ranger/biz/TestXUserMgr.java ab149ad
Diff: https://reviews.apache.org/r/38848/diff/
Testing
---
Tested REST calls using curl commands on a cluster having Ranger. Also done
manual testing of Permission Model to work as expected.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-680?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-680:
Attachment: RANGER-680.patch
> Remove public group (by default) in default policy for KMS r
[
https://issues.apache.org/jira/browse/RANGER-681?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-681:
Attachment: RANGER-681.patch
> Update default sync intervals for LDAP and U
Gautam Borad created RANGER-681:
---
Summary: Update default sync intervals for LDAP and UNIX
Key: RANGER-681
URL: https://issues.apache.org/jira/browse/RANGER-681
Project: Ranger
Issue Type: Bug
[
https://issues.apache.org/jira/browse/RANGER-526?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-526:
Attachment: RANGER-526.2.patch
> Provide REST API to change user r
[
https://issues.apache.org/jira/browse/RANGER-677?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14946361#comment-14946361
]
Gautam Borad commented on RANGER-677:
-
Committed to master :
https://github
/TestXUserMgr.java ab149ad
Diff: https://reviews.apache.org/r/38848/diff/
Testing
---
Tested REST calls using curl commands on a cluster having Ranger. Also done
manual testing of Permission Model to work as expected.
Thanks,
Gautam Borad
> security-admin/src/main/java/org/apache/ranger/service/XUserPermissionService.java
> 92b6951
> security-admin/src/main/resources/META-INF/jpa_named_queries.xml ac4c753
> security-admin/src/test/java/org/apache/ranger/biz/TestXUserMgr.java
> ab149ad
>
> Diff: https://reviews.apache.org/r/38848/diff/
>
>
> Testing
> ---
>
> Tested REST calls using curl commands on a cluster having Ranger. Also done
> manual testing of Permission Model to work as expected.
>
>
> Thanks,
>
> Gautam Borad
>
>
- Gautam
---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/38848/#review101601
---
On Oct. 6, 2015, 10:14 a.m., Gautam Borad wrote
/apache/ranger/biz/TestXUserMgr.java ab149ad
Diff: https://reviews.apache.org/r/38848/diff/
Testing
---
Tested REST calls using curl commands on a cluster having Ranger. Also done
manual testing of Permission Model to work as expected.
Thanks,
Gautam Borad
[
https://issues.apache.org/jira/browse/RANGER-671?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-671:
Attachment: RANGER-671.2.patch
> Add support to retrieve permissions for the logged in user f
[
https://issues.apache.org/jira/browse/RANGER-671?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Gautam Borad updated RANGER-671:
Attachment: RANGER-671.1.patch
> Add support to retrieve permissions for the logged in user f
301 - 400 of 824 matches
Mail list logo