-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/75206/#review226913
-----------------------------------------------------------


Ship it!




Ship It!

- Madhan Neethiraj


On Sept. 13, 2024, 6:17 p.m., Abhay Kulkarni wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/75206/
> -----------------------------------------------------------
> 
> (Updated Sept. 13, 2024, 6:17 p.m.)
> 
> 
> Review request for ranger, madhan, Madhan Neethiraj, Mahesh Bandal, Ramesh 
> Mani, and Sailaja Polavarapu.
> 
> 
> Bugs: RANGER-4820
>     https://issues.apache.org/jira/browse/RANGER-4820
> 
> 
> Repository: ranger
> 
> 
> Description
> -------
> 
> This is a follow-up to the earlier patch.
> 
> After HDFS release 2.8.0, the EXECUTE permission on a HDFS resource is 
> expected to succeed unless there is a matching DENY Ranger policy. Please 
> refer to https://issues.apache.org/jira/browse/RANGER-1707 for more details.
> 
> When an HDFS access requests a combination of multiple accesses, with one of 
> them being EXECUTE access, this behavior needs to be accounted for in a 
> generic manner. This patch addresses this requirement by supporting the set 
> of such accesses in the context of the access-request.
> 
> 
> Diffs
> -----
> 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java
>  be6cd5584 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java
>  de31737d6 
>   
> hdfs-agent/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java
>  aa59e3ad6 
> 
> 
> Diff: https://reviews.apache.org/r/75206/diff/1/
> 
> 
> Testing
> -------
> 
> Ran all unit tests successfully.
> 
> Verified the specified scenario in a cluster successfully.
> 
> 
> Thanks,
> 
> Abhay Kulkarni
> 
>

Reply via email to