----------------------------------------------------------- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/75206/#review226913 -----------------------------------------------------------
Ship it! Ship It! - Madhan Neethiraj On Sept. 13, 2024, 6:17 p.m., Abhay Kulkarni wrote: > > ----------------------------------------------------------- > This is an automatically generated e-mail. To reply, visit: > https://reviews.apache.org/r/75206/ > ----------------------------------------------------------- > > (Updated Sept. 13, 2024, 6:17 p.m.) > > > Review request for ranger, madhan, Madhan Neethiraj, Mahesh Bandal, Ramesh > Mani, and Sailaja Polavarapu. > > > Bugs: RANGER-4820 > https://issues.apache.org/jira/browse/RANGER-4820 > > > Repository: ranger > > > Description > ------- > > This is a follow-up to the earlier patch. > > After HDFS release 2.8.0, the EXECUTE permission on a HDFS resource is > expected to succeed unless there is a matching DENY Ranger policy. Please > refer to https://issues.apache.org/jira/browse/RANGER-1707 for more details. > > When an HDFS access requests a combination of multiple accesses, with one of > them being EXECUTE access, this behavior needs to be accounted for in a > generic manner. This patch addresses this requirement by supporting the set > of such accesses in the context of the access-request. > > > Diffs > ----- > > > agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java > be6cd5584 > > agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java > de31737d6 > > hdfs-agent/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java > aa59e3ad6 > > > Diff: https://reviews.apache.org/r/75206/diff/1/ > > > Testing > ------- > > Ran all unit tests successfully. > > Verified the specified scenario in a cluster successfully. > > > Thanks, > > Abhay Kulkarni > >
