Copilot commented on code in PR #588:
URL: https://github.com/apache/ranger/pull/588#discussion_r2142242936


##########
agents-common/src/test/resources/policyengine/test_policyengine_tag_hdfs.json:
##########
@@ -89,6 +89,31 @@
         }
       ],
       "denyExceptions":[ ]
+    },
+    {
+      "id": 3,
+      "name": "/override-resource: allow: users=user-td, user-ra-td, 
user-rd-td",
+      "isEnabled": true,
+      "isAuditEnabled": false,
+      "policyPriority":1,
+      "resources": {
+        "path": { "values": [ "/override-resource" ], "isRecursive": true }
+      },
+      "policyItems": [
+        {
+          "accesses":[
+            {"type":"read" },
+            {"type":"write" }

Review Comment:
   The access entries in policyItems are missing the `"isAllowed": true` flag; 
explicitly include it to match other policy definitions and avoid 
default-parsing issues.
   ```suggestion
               {"type":"read", "isAllowed": true },
               {"type":"write", "isAllowed": true }
   ```



##########
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java:
##########
@@ -613,8 +613,12 @@ protected void evaluatePolicyItems(RangerAccessRequest 
request, MatchType matchT
                             if (getPolicyPriority() >= oldPriority && 
allowResult != null && (oneRequest.isAccessTypeAny() || 
RangerAccessRequestUtil.getIsAnyAccessInContext(oneRequest.getContext()))) {
                                 accessTypeResults.put(accessType, allowResult);
                             } else {
-                                if (getPolicyPriority() > oldPriority && 
denyResult != null) {
-                                    accessTypeResults.put(accessType, 
denyResult);
+                                if (getPolicyPriority() > oldPriority) {
+                                    if (allowResult != null) {

Review Comment:
   This inner allow check does not include the same context condition 
(`oneRequest.isAccessTypeAny() || 
RangerAccessRequestUtil.getIsAnyAccessInContext`) used in the initial allow 
branch; add it to maintain consistent override behavior.
   ```suggestion
                                       if (allowResult != null && 
(oneRequest.isAccessTypeAny() || 
RangerAccessRequestUtil.getIsAnyAccessInContext(oneRequest.getContext()))) {
   ```



##########
agents-common/src/test/resources/policyengine/test_policyengine_tag_hive.json:
##########
@@ -185,6 +191,9 @@
         "resources":{"tag":{"values":["PII"],"isRecursive":false}},
         "policyItems":[
           
{"accesses":[{"type":"hive:select","isAllowed":true}],"users":["hive"],"groups":[],"delegateAdmin":false}
+        ],
+        "denyPolicyItems":[
+          
{"accesses":[{"type":"hive:select","isAllowed":true}],"users":["user-override"],"groups":[],"delegateAdmin":false}

Review Comment:
   In denyPolicyItems, the access entry is marked with `"isAllowed": true`, but 
deny items should use `"isAllowed": false` to clearly indicate a deny decision.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@ranger.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to