> On Jan. 9, 2023, 4:31 a.m., Ramesh Mani wrote:
> > agents-common/src/main/java/org/apache/ranger/plugin/util/ServiceDefUtil.java
> > Lines 67 (patched)
> > <https://reviews.apache.org/r/74270/diff/5/?file=2273658#file2273658line67>
> >
> >     Does the _ALL in the MARKER ACCESSTYPE include hive:tempudfadmin
> >     In Hive Plugin we avoid ALL permission to give impliedGrant to 
> > hive:tempudfadmin because of security reason. Hive Users need exclusive 
> > permission to create tempUdfs.
> >     Should the _ALL in MARKER ACCESS TYPE has to be handled in the same way?

@Ramesh - _ALL includes every access-type defined in the service-def; its a 
short cut to replace the need to add individual permissions in a policy. This 
will be of immense help especially in tag-based policies, where a service could 
be added after a tag-based policy is created.

Excluding specific permissions like hive:tempudfadmin can be done with 
exception in policies. Does this address the concern?


- Madhan


-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74270/#review225074
-----------------------------------------------------------


On Jan. 9, 2023, 12:13 a.m., Madhan Neethiraj wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74270/
> -----------------------------------------------------------
> 
> (Updated Jan. 9, 2023, 12:13 a.m.)
> 
> 
> Review request for ranger, Ankita Sinha, Kishor Gollapalliwar, Abhay 
> Kulkarni, Mehul Parikh, Pradeep Agrawal, Ramesh Mani, Sailaja Polavarapu, 
> Subhrat Chaudhary, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-4035
>     https://issues.apache.org/jira/browse/RANGER-4035
> 
> 
> Repository: ranger
> 
> 
> Description
> -------
> 
> - added field AccessTypeDef.category, which can be set to one of the 
> following: CREATE/READ/UPDATE/DELETE/MANAGE
> - added field RangerServiceDef.markerAccessTypes, which will be populated by 
> Ranger admin with following entries containing impliedGrants as per category 
> specified in RangerServiceDef.accessTypes:
>   -- _CREATE
>   -- _READ
>   -- _UPDATE
>   -- _DELETE
>   -- _MANAGE
> - RangerServiceDef.markerAccessTypes will include _ALL, with all 
> RangerServiceDef.accessTypes as impliedGrants
> 
> 
> Diffs
> -----
> 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/model/RangerServiceDef.java
>  05dde4edf 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerPolicyValidator.java
>  e1b5fe8f1 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerServiceDefHelper.java
>  4e287f9a4 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerValidator.java
>  d47be1404 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerAuditPolicyEvaluator.java
>  1c46f184c 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java
>  55752e79c 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/util/ServiceDefUtil.java 
> fe1cf9244 
>   
> agents-common/src/test/java/org/apache/ranger/plugin/model/validation/TestRangerValidator.java
>  6114225ca 
>   
> agents-common/src/test/java/org/apache/ranger/plugin/policyengine/TestPolicyEngine.java
>  eb3d0ff46 
>   
> agents-common/src/test/java/org/apache/ranger/plugin/util/ServiceDefUtilTest.java
>  3cd42f44f 
>   
> agents-common/src/test/resources/policyengine/test_policyengine_marker_access_types.json
>  PRE-CREATION 
>   agents-common/src/test/resources/test_servicedef-normalize.json 
> PRE-CREATION 
>   intg/src/main/python/apache_ranger/model/ranger_service_def.py 3fd90f706 
>   security-admin/src/main/java/org/apache/ranger/biz/PolicyRefUpdater.java 
> 6cc3509d8 
>   security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 
> 6b9604817 
>   
> security-admin/src/main/java/org/apache/ranger/service/RangerServiceDefServiceBase.java
>  656bc0184 
> 
> 
> Diff: https://reviews.apache.org/r/74270/diff/5/
> 
> 
> Testing
> -------
> 
> - added unit tests to validate authorization with policies having marker 
> access-types
> - verified policy can be created with marker accessTypes via REST API call
> - verified that plugin enforce built-in marker access-types referenced in 
> policies
> - verified that older version plugins continue to enforce policies for 
> regular access-types i.e. non marker access-types
> - TODO: policy UI to include permissions listed in 
> RangerServiceDef.markerAccessTypes
> 
> 
> Thanks,
> 
> Madhan Neethiraj
> 
>

Reply via email to