svn commit: r63607 - /release/ranger/KEYS
Author: vel Date: Thu Aug 24 03:09:50 2023 New Revision: 63607 Log: added updated key Modified: release/ranger/KEYS Modified: release/ranger/KEYS == --- release/ranger/KEYS (original) +++ release/ranger/KEYS Thu Aug 24 03:09:50 2023 @@ -1423,3 +1423,83 @@ EzHph1+pew7u71RH3nzPRYdpAy/kcrU3fM09pNPm bRauHaY5gnYka0t0/OxPQMW85hg/14876ffof41s/lMkCA== =F/Fk -END PGP PUBLIC KEY BLOCK- +pub rsa4096 2016-01-08 [SC] [expires: 2026-08-22] + A04605B4558E8105B180BA5DEB4200BBD4393DE8 +uid [ultimate] Velmurugan Periasamy +sig 3EB4200BBD4393DE8 2023-08-23 [self-signature] +sig 616B344C45DD65FA 2018-09-28 Mehul Parikh +sig 3 X 9C0596B11E19B762 2016-04-16 Selvamohan Neethiraj +sub rsa4096 2016-01-08 [E] [expires: 2026-08-22] +sig EB4200BBD4393DE8 2023-08-23 [self-signature] + +-BEGIN PGP PUBLIC KEY BLOCK- +Comment: GPGTools - https://gpgtools.org + +mQINBFaQPX0BEAColXMvyYKBqdi4sgMaHVH2JWSHtwijzazg9QAERzW/t1KNQHtM +jmU+a2JwRDjJ/pDZrBqcCNhCb0RSxziK4quGkwoMNJEC+U+FIsoNGYcEB9O/ojY3 +5VOU9EybuU9O0bUbvU1t8lsCfdP5C7NVJ944tXfOEC/RVyoexEbj+ao/agpYElL9 +y9EjXVkVZOUvfEMtKl7r6Aco/RuhVhSKSlAyG38RNnTFFC8JmYKXnZupDYpdu75N +mZJrMrWNMthvvXF0O1xKVWber48OgILf9mK6KBsb2qPSGpmYtpJRLK0CFRpeBPiZ +ELkkZqA8VkFPdlrPt/GfYU9E1+3g+hagApmYM+T1/veYnCy7ZOVJWusfFBMdSGWf +rIyudXrT4CZx1EuUrkqX8TSWplczX5npPzV+fM4PVjK/9Tt+l6oLoxw57mr3af3T +sY/7YCEuj3Nj6bDlWDN7oswr6lHBxJjT7Z6fyoQJUlXSJi1VqZ9GIgzODG4RTsXn +2Z/M/mASHV7bgjQ8OfNPLATb08wH0R/ULMfUpvQsstgWt3mDuXa3zt7AuzKn6eLR +8guJikzj9msRcFqkPOR9dOhy3q/3rBd5FXWicCo4bfjflB7CoajqAYPgMZwTgaaw +16fGKPDE5kTtXkPdYpuOfbNlDRN1kFf3GjCek50fj1gilP5LwQ7OmXgQ/wARAQAB +tCVWZWxtdXJ1Z2FuIFBlcmlhc2FteSA8dmVsQGFwYWNoZS5vcmc+iQJUBBMBCgA+ +AhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAFiEEoEYFtFWOgQWxgLpd60IAu9Q5 +PegFAmTmUNcFCRP5rdoACgkQ60IAu9Q5PegRAw/8DmZWNLNqQ/l38tF9/MWOEyxa +R8U4i7OsbBi2z+nd6GDeO9O0AASBNIBxl9Q61EOFIExtE0DJ6m4zU16vo3hSCaYK +JrrutWIhwqUbNoKDaOGv1kG6mS2Lq8IjlxaDkldM5osjagolB0rc7Nb6EHFkJHVN +9fDeeYYUBk7o7hV85JfSeuZ2ZauvZdDo/vFIKmjy8Pm6Fb73A9FkBS1iVZ8r4Jhw +eCmJERvgG+x5dMLfr7Nf5Ife20hYh7jUBFwoP0Yrk/IHse1eOGwE8gCgUe5VXswn +B3UMv64EQ8HVcTgylE5tuDv2nFdMYVwGMV4tPnyq1vE4OgULcie75k/jF11zPiay +1207BEtNJgy31FJpNmKEGoiwtKVf12DBpgdDSEIBdirnL+9AOdZa+185va/hJ1aQ +vESnhYWvlXjZ4fbculEUHF9p4MZyDvQo6goqbM32nxwUEAZdd8WPKveh/Q4XpWuh +waG7tXjRyTJGuIvMXE+mKdSODCa8fiL3akEWBmNDeSYHlQA4wC0PcOMR6KdNcSRG +FSqPCTL4bZ/zz9Qmc3pjn6/VOO0ZTqHdAr9aNdTIBoTS5K431p9I9v2xyQvK1WCL +6n8Ns+Beg1QJUg2Z7lWyXheLkXoQZ2C4miD9TCgvvCl/bMTko9dnbHFhcRoBUaO3 +a/EelF2HjYjFz0rZr9iJASIEEwEKAAwFAlcSWXcFgweGH4AACgkQnAWWsR4Zt2ID +gAgArfUDgKStWqPda0bvdnbAmpwTG5mx/7shg55UphDhhHfqLur0sr6XvNjgEgIF +SfbpXKqItk6g1oe48K81u9Le56mpUxfUnaRLYhTKKMNujY724rRiqLH342BhF6Gx +5rHFOfbaGe5Y6wKB+xrMnD1lyN4/g08ZVK2nzLtaUwyjK8fN77a/sTTVIDuEZogE +sAekvwOGYIG7cIGmj3sLgypiVaow46OsIXKNkgFwNwSq/dfLq755CwlgX8fUZlou +U01I/PKXKYyGWGDSzdRP6VyeVMVWk57DemyRVVo0AyJTNKD3DKWCnu+oxleerybc +wfXtGlHJ/ZrI/KTgUFq1/n15mokCMwQQAQgAHRYhBJ9l+3GEYXZFptvRRGFrNExF +3WX6BQJbrji9AAoJEGFrNExF3WX6cMgQAMhpqMEUo9F8oJ0rOb49oExRS/tkmu8t +TqNhfCQ8RJcoUqaOfS8NlXwIwUXnp5eZCKnet52IQAW6g8rjf8hPxvhCNKaLzGLw +wMA2iactf6c5QyC0NChX+XxQBMtXh7yYJtVeRyENaiWrrWNsHhOjDtE5NT8kpUNP +flbR8ByfdqlZ92NW1xqpRu3cd7DQNsaLXw4MkUkhXvsfrQkAc8V2mgyiSBPzOSoH +lSEmU7rtqR1oGj7h4ARKGJanaGnTQDsMjHeDc2OSlel9qruCvCx6EAhOaYHiR+By +/nlKYTx3+8bQqjaC3z4NW4sP67TTYoxB4V9VMw+hT3uCnARObBy27zjo4bAP2iYE +yJ/BUDtIfZdY1AGTOJM2uy+8zzpilUAYkgxs67Mnuy8EFe/dCIJ6gT48u48MxMOR +eHgKlLW5BYzQz7QgFsJdIqKZD+CDinplEpCHp5s+nDAOxxvaxyAPtjCDd0mk6nwT +RcK7qohleFgl9rdU5IEfcAADKYRB8+4WV2lPBTtQYCIErFylbiSWucJHBUgyyKU9 +EoSl9cf28sJ+RwaRZCOney2CdZ0Nko6zpRotmAEERUCpQtMDhaq/f683AFTD8Zzf +oXMfTmXh1UZngIJOeg2PWH+qu8A750FKFfVd/F4S1D5lJgCxc+WNTJDqbyGBRKqt +h4AGygOo9L3xuQINBFaQPX0BEACbzwCpUh2roFGBegq5Y9rC2348Ny5yrTCgf/m6 +IKwtMDObnydtdpXzQEHGO3Vu20YN1WS5Sss/a8QOwAPZj1C1Qcayfkk4bwUgx+vH +bQ5yCe+T1+WM5J3Ydm7jS98042qZXVgYKv6z9z54St2Rx3eoJE5homLSTyFrU0k7 +Y9vqTYCgOgbceZeXCWvHnOmsjedVmlaFzAxQuxiEvcAG3ECYPxTBBebD54s2QBaA +Q4/664JZALizjm+le/rcN4RHFdm5Ayv30UmMdWuGjMCfiS4TLoXOcm0Ss3z/5O0H +8wBZyp+4JR1KaBnsCh11Jti68UD8tbzYfNUSaaJGwGXOndVot4hbVERpGZb053U8 +HxbYNmZPajHj4JIOB4UjF1Ck5s4zh2bDptv1aOfgvgT0xhKrCzVxOKJJb0K4YRwx +wLfkivUi7/oVJhLvnNfa5GHATeZEQPlRwq1OB/xN7zZLZbBE5JN6fF2/r2hn/pAe +/lwxSobGf6GDxhzhmrxu1AyrQUmvQyX798v8EZvy5mTbNak3WA5HLA+rJ3zoLPqx +XRw3cTy98qVB2d2pHzR0SSR5MlBoUkhrl6tbxAkWrSZrPkioZLeUn//81oXaiwbj +VTRVXJxWwV+6vWmGK+y2LCsagLNVQ9y7DZXhVxxPqKGbSKSsQBcX5N/WBpxD7E2r ++OalxQARAQABiQI8BBgBCgAmAhsMFiEEoEYFtFWOgQWxgLpd60IAu9Q5PegFAmTm +V74FCRP5tMEACgkQ60IAu9Q5PehZsQ/+J5JBGH/DiL2O5kj8nAQ9E5K+4MfcbQ6b +c+LyvESYEvwofZZprFSD4CQTtKjMSn5QbPh6LSuLtuRIOGmkpX24Lq7vf52aFv1H +wbNye/rW47U1eh3yKZ0qlJPGsx9dCi157BWOXTWCiKZmwV3pD6PHXVK7/WuT1LUP +XxYT13fJUYEtBqVeB0lXNIywISnLlU2kchmxOxV8AVH+1onQqRKfOqMTzJkOGR/w +sLeqi0Rdr34i/zmorQghAg8EhfmNALVXdvQNacNEEf0bYYLeJFiIOWpLAtv1aALp +aihKC3vRXYLfr3MTSe1eMI382s3MFJo1dscbwEQA06s/8YjqAVN8mlhe99rOKEFS +sV7LnPzX7dTZy2liOU+MABaEdCtBgqW3m
[ranger-site] branch master updated: updated org
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger-site.git The following commit(s) were added to refs/heads/master by this push: new cf0cee6 updated org cf0cee6 is described below commit cf0cee6a05a9ebc36c4bef5efc1f5b90265bcfef Author: Velmurugan Periasamy AuthorDate: Wed Aug 23 19:11:26 2023 -0400 updated org --- team-list.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/team-list.html b/team-list.html index db3cef6..ccd7093 100644 --- a/team-list.html +++ b/team-list.html @@ -356,7 +356,7 @@ vel Velmurugan Periasamy mailto:v...@apache.org;>v...@apache.org -Cloudera +Cloudera Inc PMC, Committer -5 -5
[ranger] branch ranger-2.2 updated: RANGER-3171 : Ranger ui became broken after logout in Firefox.
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new ede5686 RANGER-3171 : Ranger ui became broken after logout in Firefox. ede5686 is described below commit ede568667973c96b1be5dcba8117c18725a98f58 Author: Dhaval Rajpara AuthorDate: Fri Feb 19 01:52:38 2021 +0530 RANGER-3171 : Ranger ui became broken after logout in Firefox. Signed-off-by: Velmurugan Periasamy --- .../security/web/filter/RangerSecurityContextFormationFilter.java | 1 + security-admin/src/main/webapp/login.jsp | 4 2 files changed, 5 insertions(+) diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java index 6cc3a81..c508579 100644 --- a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java +++ b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java @@ -133,6 +133,7 @@ public class RangerSecurityContextFormationFilter extends GenericFilterBean { context.setUserSession(userSession); } HttpServletResponse res = (HttpServletResponse)response; + res.setHeader("Cache-Control", "no-cache, no-store, max-age=0, must-revalidate"); res.setHeader("X-Frame-Options", "DENY" ); res.setHeader("X-XSS-Protection", "1; mode=block"); res.setHeader("Strict-Transport-Security", "max-age=31536000; includeSubDomains"); diff --git a/security-admin/src/main/webapp/login.jsp b/security-admin/src/main/webapp/login.jsp index e61278d..df234ef 100644 --- a/security-admin/src/main/webapp/login.jsp +++ b/security-admin/src/main/webapp/login.jsp @@ -57,6 +57,10 @@ response.setHeader("X-XSS-Protection", "1; mode=block"); response.setHeader("Content-Security-Policy", "default-src 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self'; img-src 'self'; style-src 'self' 'unsafe-inline';font-src 'self'"); response.setHeader("Strict-Transport-Security", "max-age=31536000; includeSubDomains"); +// Delete browser cache in firefox environment +response.setHeader("Cache-Control", "no-cache, no-store, max-age=0, must-revalidate"); // HTTP 1.1. +response.setHeader("Pragma", "no-cache"); +response.setHeader("Expires", "0"); %>
[ranger] branch master updated: RANGER-3171 : Ranger ui became broken after logout in Firefox.
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 10c8555 RANGER-3171 : Ranger ui became broken after logout in Firefox. 10c8555 is described below commit 10c8555055579b34f18088a26949eb1254c0e914 Author: Dhaval Rajpara AuthorDate: Fri Feb 19 01:52:38 2021 +0530 RANGER-3171 : Ranger ui became broken after logout in Firefox. Signed-off-by: Velmurugan Periasamy --- .../security/web/filter/RangerSecurityContextFormationFilter.java | 1 + security-admin/src/main/webapp/login.jsp | 4 2 files changed, 5 insertions(+) diff --git a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java index 6cc3a81..c508579 100644 --- a/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java +++ b/security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSecurityContextFormationFilter.java @@ -133,6 +133,7 @@ public class RangerSecurityContextFormationFilter extends GenericFilterBean { context.setUserSession(userSession); } HttpServletResponse res = (HttpServletResponse)response; + res.setHeader("Cache-Control", "no-cache, no-store, max-age=0, must-revalidate"); res.setHeader("X-Frame-Options", "DENY" ); res.setHeader("X-XSS-Protection", "1; mode=block"); res.setHeader("Strict-Transport-Security", "max-age=31536000; includeSubDomains"); diff --git a/security-admin/src/main/webapp/login.jsp b/security-admin/src/main/webapp/login.jsp index e61278d..df234ef 100644 --- a/security-admin/src/main/webapp/login.jsp +++ b/security-admin/src/main/webapp/login.jsp @@ -57,6 +57,10 @@ response.setHeader("X-XSS-Protection", "1; mode=block"); response.setHeader("Content-Security-Policy", "default-src 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self'; img-src 'self'; style-src 'self' 'unsafe-inline';font-src 'self'"); response.setHeader("Strict-Transport-Security", "max-age=31536000; includeSubDomains"); +// Delete browser cache in firefox environment +response.setHeader("Cache-Control", "no-cache, no-store, max-age=0, must-revalidate"); // HTTP 1.1. +response.setHeader("Pragma", "no-cache"); +response.setHeader("Expires", "0"); %>
[ranger] branch ranger-2.2 updated: RANGER-3172 : Patch to migrate old policy to use new Policy Ref table
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new 1fbd0a3 RANGER-3172 : Patch to migrate old policy to use new Policy Ref table 1fbd0a3 is described below commit 1fbd0a31527d87a5d2d0bb239ac4ca9be3a58b57 Author: Dineshkumar Yadav AuthorDate: Wed Feb 17 17:02:16 2021 +0530 RANGER-3172 : Patch to migrate old policy to use new Policy Ref table Signed-off-by: Nitin Galave --- .../optimized/current/ranger_core_db_mysql.sql | 1 + .../optimized/current/ranger_core_db_oracle.sql| 1 + .../050-create-index-for-resource-signature.sql| 4 +- .../optimized/current/ranger_core_db_postgres.sql | 1 + .../current/ranger_core_db_sqlanywhere.sql | 2 + .../sqlanywhere/patches/049-create-rms-schema.sql | 11 +- .../optimized/current/ranger_core_db_sqlserver.sql | 1 + .../java/org/apache/ranger/db/XXPolicyDao.java | 10 + .../apache/ranger/db/XXPolicyItemAccessDao.java| 8 + .../apache/ranger/db/XXPolicyItemConditionDao.java | 8 + .../java/org/apache/ranger/db/XXPolicyItemDao.java | 9 + .../ranger/db/XXPolicyItemDataMaskInfoDao.java | 8 + .../apache/ranger/db/XXPolicyItemGroupPermDao.java | 9 + .../ranger/db/XXPolicyItemRowFilterInfoDao.java| 9 + .../apache/ranger/db/XXPolicyItemUserPermDao.java | 9 + .../org/apache/ranger/db/XXPolicyResourceDao.java | 8 + .../apache/ranger/db/XXPolicyResourceMapDao.java | 9 + ...atchForMigratingOldRegimePolicyJson_J10046.java | 530 + .../main/resources/META-INF/jpa_named_queries.xml | 38 ++ 19 files changed, 672 insertions(+), 4 deletions(-) diff --git a/security-admin/db/mysql/optimized/current/ranger_core_db_mysql.sql b/security-admin/db/mysql/optimized/current/ranger_core_db_mysql.sql index ad8c3ff..7179dc9 100644 --- a/security-admin/db/mysql/optimized/current/ranger_core_db_mysql.sql +++ b/security-admin/db/mysql/optimized/current/ranger_core_db_mysql.sql @@ -1833,4 +1833,5 @@ INSERT INTO x_db_version_h (version,inst_at,inst_by,updated_at,updated_by,active INSERT INTO x_db_version_h (version,inst_at,inst_by,updated_at,updated_by,active) VALUES ('J10043',UTC_TIMESTAMP(),'Ranger 1.0.0',UTC_TIMESTAMP(),'localhost','Y'); INSERT INTO x_db_version_h (version,inst_at,inst_by,updated_at,updated_by,active) VALUES ('J10044',UTC_TIMESTAMP(),'Ranger 1.0.0',UTC_TIMESTAMP(),'localhost','Y'); INSERT INTO x_db_version_h (version,inst_at,inst_by,updated_at,updated_by,active) VALUES ('J10045',UTC_TIMESTAMP(),'Ranger 1.0.0',UTC_TIMESTAMP(),'localhost','Y'); +INSERT INTO x_db_version_h (version,inst_at,inst_by,updated_at,updated_by,active) VALUES ('J10046',UTC_TIMESTAMP(),'Ranger 1.0.0',UTC_TIMESTAMP(),'localhost','Y'); INSERT INTO x_db_version_h (version,inst_at,inst_by,updated_at,updated_by,active) VALUES ('JAVA_PATCHES',UTC_TIMESTAMP(),'Ranger 1.0.0',UTC_TIMESTAMP(),'localhost','Y'); diff --git a/security-admin/db/oracle/optimized/current/ranger_core_db_oracle.sql b/security-admin/db/oracle/optimized/current/ranger_core_db_oracle.sql index 759cdd0..40917cd 100644 --- a/security-admin/db/oracle/optimized/current/ranger_core_db_oracle.sql +++ b/security-admin/db/oracle/optimized/current/ranger_core_db_oracle.sql @@ -2047,5 +2047,6 @@ INSERT INTO x_db_version_h (id,version,inst_at,inst_by,updated_at,updated_by,act INSERT INTO x_db_version_h (id,version,inst_at,inst_by,updated_at,updated_by,active) VALUES (X_DB_VERSION_H_SEQ.nextval,'J10043',sys_extract_utc(systimestamp),'Ranger 1.0.0',sys_extract_utc(systimestamp),'localhost','Y'); INSERT INTO x_db_version_h (id,version,inst_at,inst_by,updated_at,updated_by,active) VALUES (X_DB_VERSION_H_SEQ.nextval,'J10044',sys_extract_utc(systimestamp),'Ranger 1.0.0',sys_extract_utc(systimestamp),'localhost','Y'); INSERT INTO x_db_version_h (id,version,inst_at,inst_by,updated_at,updated_by,active) VALUES (X_DB_VERSION_H_SEQ.nextval,'J10045',sys_extract_utc(systimestamp),'Ranger 1.0.0',sys_extract_utc(systimestamp),'localhost','Y'); +INSERT INTO x_db_version_h (id,version,inst_at,inst_by,updated_at,updated_by,active) VALUES (X_DB_VERSION_H_SEQ.nextval,'J10046',sys_extract_utc(systimestamp),'Ranger 1.0.0',sys_extract_utc(systimestamp),'localhost','Y'); INSERT INTO x_db_version_h (id,version,inst_at,inst_by,updated_at,updated_by,active) VALUES (X_DB_VERSION_H_SEQ.nextval,'JAVA_PATCHES',sys_extract_utc(systimestamp),'Ranger 1.0.0',sys_extract_utc(systimestamp),'localhost','Y'); commit; diff --git a/security-admin/db/oracle/patches/050-create-index-for-resource-signature.sql b/security-admin/db/oracle/patches/050-create-index-for-resource-signature.sql index 6974f7c..2e1964c 100644 --- a/security-admin/db/oracle/patches/050-create-index-for-resource-signature.sql +++ b/security-admin/db/oracle/patches
[ranger] branch ranger-2.2 updated: RANGER-3177 : Toggle switch not render after change in resources drop down value.
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new b9aed23 RANGER-3177 : Toggle switch not render after change in resources drop down value. b9aed23 is described below commit b9aed233726ed75cf2b7b2dabe36b9244d71f529 Author: Nitin Galave AuthorDate: Thu Feb 11 00:01:27 2021 +0530 RANGER-3177 : Toggle switch not render after change in resources drop down value. Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/webapp/scripts/modules/XAOverrides.js | 8 +--- .../src/main/webapp/scripts/views/policies/RangerPolicyForm.js| 3 +++ 2 files changed, 8 insertions(+), 3 deletions(-) diff --git a/security-admin/src/main/webapp/scripts/modules/XAOverrides.js b/security-admin/src/main/webapp/scripts/modules/XAOverrides.js index d99f646..a7904eb 100644 --- a/security-admin/src/main/webapp/scripts/modules/XAOverrides.js +++ b/security-admin/src/main/webapp/scripts/modules/XAOverrides.js @@ -532,7 +532,10 @@ var Vent = require('modules/Vent'); if(!_.isNull(this.value) && !_.isEmpty(this.value)){ this.value.values = _.map(this.value.values, function(val){ return _.escape(val); }); - this.$resource.val(this.value.values.toString()) + // Set initial value for resources. + if (_.isUndefined(def)) { + this.$resource.val(this.value.values.toString()); + } //to preserve resources values to text field if(!_.isUndefined(this.value.resourceType)){ this.preserveResourceValues[this.value.resourceType] = this.value.values.toString(); @@ -636,8 +639,7 @@ that.$resource.select2('val', val) }else{ that.$resource.select2('val', ""); - that.value=[]; - } + } //reset values that.value.isExcludes = false; that.value.isRecursive = false; diff --git a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js index fd1cae8..b52579a 100644 --- a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js +++ b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js @@ -597,6 +597,9 @@ define(function(require){ this.model.set('zoneName', App.vZone.vZoneName); } this.model.set('resources',resources); + if(this.model.get('none')) { + this.model.unset('none'); + } this.model.unset('path'); //Set UserGroups Permission
[ranger] branch master updated: RANGER-3177 : Toggle switch not render after change in resources drop down value.
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 6a61a4d RANGER-3177 : Toggle switch not render after change in resources drop down value. 6a61a4d is described below commit 6a61a4d81d95da58c14a8c38821645567bbb44d7 Author: Nitin Galave AuthorDate: Thu Feb 11 00:01:27 2021 +0530 RANGER-3177 : Toggle switch not render after change in resources drop down value. Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/webapp/scripts/modules/XAOverrides.js | 8 +--- .../src/main/webapp/scripts/views/policies/RangerPolicyForm.js| 3 +++ 2 files changed, 8 insertions(+), 3 deletions(-) diff --git a/security-admin/src/main/webapp/scripts/modules/XAOverrides.js b/security-admin/src/main/webapp/scripts/modules/XAOverrides.js index d99f646..a7904eb 100644 --- a/security-admin/src/main/webapp/scripts/modules/XAOverrides.js +++ b/security-admin/src/main/webapp/scripts/modules/XAOverrides.js @@ -532,7 +532,10 @@ var Vent = require('modules/Vent'); if(!_.isNull(this.value) && !_.isEmpty(this.value)){ this.value.values = _.map(this.value.values, function(val){ return _.escape(val); }); - this.$resource.val(this.value.values.toString()) + // Set initial value for resources. + if (_.isUndefined(def)) { + this.$resource.val(this.value.values.toString()); + } //to preserve resources values to text field if(!_.isUndefined(this.value.resourceType)){ this.preserveResourceValues[this.value.resourceType] = this.value.values.toString(); @@ -636,8 +639,7 @@ that.$resource.select2('val', val) }else{ that.$resource.select2('val', ""); - that.value=[]; - } + } //reset values that.value.isExcludes = false; that.value.isRecursive = false; diff --git a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js index fd1cae8..b52579a 100644 --- a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js +++ b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js @@ -597,6 +597,9 @@ define(function(require){ this.model.set('zoneName', App.vZone.vZoneName); } this.model.set('resources',resources); + if(this.model.get('none')) { + this.model.unset('none'); + } this.model.unset('path'); //Set UserGroups Permission
[ranger] branch ranger-2.2 updated: RANGER-3168: User/Auditor should have read-only access for Servicedef via PublicAPIsv2 API
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new 580b99f RANGER-3168: User/Auditor should have read-only access for Servicedef via PublicAPIsv2 API 580b99f is described below commit 580b99f911c93092967ed8bff1bf0ce88ff067f0 Author: Mahesh Bandal AuthorDate: Fri Jan 29 16:37:39 2021 +0530 RANGER-3168: User/Auditor should have read-only access for Servicedef via PublicAPIsv2 API Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java | 3 --- 1 file changed, 3 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java b/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java index 19b93e6..ab2f54a 100644 --- a/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java +++ b/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java @@ -127,7 +127,6 @@ public class PublicAPIsv2 { @GET @Path("/api/servicedef/{id}") - @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") @Produces({ "application/json", "application/xml" }) public RangerServiceDef getServiceDef(@PathParam("id") Long id) { return serviceREST.getServiceDef(id); @@ -135,7 +134,6 @@ public class PublicAPIsv2 { @GET @Path("/api/servicedef/name/{name}") - @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") @Produces({ "application/json", "application/xml" }) public RangerServiceDef getServiceDefByName(@PathParam("name") String name) { return serviceREST.getServiceDefByName(name); @@ -143,7 +141,6 @@ public class PublicAPIsv2 { @GET @Path("/api/servicedef/") - @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") @Produces({ "application/json", "application/xml" }) public List searchServiceDefs(@Context HttpServletRequest request) { return serviceREST.getServiceDefs(request).getServiceDefs();
[ranger] branch master updated: RANGER-3168: User/Auditor should have read-only access for Servicedef via PublicAPIsv2 API
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new c1cb497 RANGER-3168: User/Auditor should have read-only access for Servicedef via PublicAPIsv2 API c1cb497 is described below commit c1cb497fab4b00b8c834ba0d3995ae6567ff2406 Author: Mahesh Bandal AuthorDate: Fri Jan 29 16:37:39 2021 +0530 RANGER-3168: User/Auditor should have read-only access for Servicedef via PublicAPIsv2 API Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java | 3 --- 1 file changed, 3 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java b/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java index 19b93e6..ab2f54a 100644 --- a/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java +++ b/security-admin/src/main/java/org/apache/ranger/rest/PublicAPIsv2.java @@ -127,7 +127,6 @@ public class PublicAPIsv2 { @GET @Path("/api/servicedef/{id}") - @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") @Produces({ "application/json", "application/xml" }) public RangerServiceDef getServiceDef(@PathParam("id") Long id) { return serviceREST.getServiceDef(id); @@ -135,7 +134,6 @@ public class PublicAPIsv2 { @GET @Path("/api/servicedef/name/{name}") - @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") @Produces({ "application/json", "application/xml" }) public RangerServiceDef getServiceDefByName(@PathParam("name") String name) { return serviceREST.getServiceDefByName(name); @@ -143,7 +141,6 @@ public class PublicAPIsv2 { @GET @Path("/api/servicedef/") - @PreAuthorize("hasRole('ROLE_SYS_ADMIN')") @Produces({ "application/json", "application/xml" }) public List searchServiceDefs(@Context HttpServletRequest request) { return serviceREST.getServiceDefs(request).getServiceDefs();
[ranger] 01/03: RANGER-3124: Search filter with user name having non latin character is not working on Audit>>Access tab
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git commit 036fe4df863f6becc6e404b2a20b6d5136025eea Author: BHAGYASHRI KOKATE AuthorDate: Wed Dec 23 12:10:51 2020 +0530 RANGER-3124: Search filter with user name having non latin character is not working on Audit>>Access tab Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/java/org/apache/ranger/common/StringUtil.java | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java b/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java index 97f0d2a..eec6c40 100644 --- a/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java +++ b/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java @@ -37,8 +37,8 @@ public class StringUtil implements Serializable { static final public int MIN_PASSWORD_LENGTH = 8; -static final public String VALIDATION_NAME = "^([A-Za-z0-9_]|[\u00C0-\u017F])([a-zA-Z0-9\\s_. -@]|[\u00C0-\u017F])+$"; - static final public String VALIDATION_TEXT = "[a-zA-Z0-9\\ \"!@#$%^*()-_=+;:'|~`?/{}\\.\\,\\-\\?<>]*"; + static final public String VALIDATION_NAME = "^([A-Za-z0-9_]|[\u00C0-\u017F])([a-zA-Z0-9\\s_. -@]|[\u00C0-\u017F])+$"; + static final public String VALIDATION_TEXT = "[a-zA-Z0-9\\ \"!@#$%^*()-_=+;:'|~`?/{}\\.\\,\\-\\?<>\\x00-\\x7F\\p{L}-]*"; static final public String VALIDATION_LOGINID = "^([A-Za-z0-9_]|[\u00C0-\u017F])([a-z0-9,._\\-+/@= ]|[\u00C0-\u017F])+$"; static final public String VALIDATION_ALPHA = "[a-z,A-Z]*";
[ranger] 02/03: RANGER-3105 : Upgrade Ranger Tomcat to 8.5 or 9.0
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git commit 345296fa876c2dc120c9d806bbb5cad815c6b1e0 Author: mateenmansoori AuthorDate: Thu Jan 21 15:39:34 2021 +0530 RANGER-3105 : Upgrade Ranger Tomcat to 8.5 or 9.0 Signed-off-by: Velmurugan Periasamy --- embeddedwebserver/pom.xml | 10 -- .../java/org/apache/ranger/server/tomcat/EmbeddedServer.java | 2 +- pom.xml| 2 +- security-admin/src/main/webapp/META-INF/context.xml| 6 +++--- 4 files changed, 5 insertions(+), 15 deletions(-) diff --git a/embeddedwebserver/pom.xml b/embeddedwebserver/pom.xml index 3a98041..8d623fa 100644 --- a/embeddedwebserver/pom.xml +++ b/embeddedwebserver/pom.xml @@ -50,16 +50,6 @@ org.apache.tomcat.embed -tomcat-embed-logging-juli -${tomcat.embed.version} - - -org.apache.tomcat.embed -tomcat-embed-logging-log4j -${tomcat.embed.version} - - -org.apache.tomcat.embed tomcat-embed-websocket ${tomcat.embed.version} diff --git a/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java b/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java index 8edcbbb..b1b242d 100644 --- a/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java +++ b/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java @@ -388,7 +388,6 @@ public class EmbeddedServer { server.getConnector().setAllowTrace(Boolean.valueOf(EmbeddedServerUtil.getConfig("ranger.service.http.connector.attrib.allowTrace", "false"))); server.getConnector().setAsyncTimeout(EmbeddedServerUtil.getLongConfig("ranger.service.http.connector.attrib.asyncTimeout", 1L)); server.getConnector().setEnableLookups(Boolean.valueOf(EmbeddedServerUtil.getConfig("ranger.service.http.connector.attrib.enableLookups", "false"))); - server.getConnector().setMaxHeaderCount(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxHeaderCount", 100)); server.getConnector().setMaxParameterCount(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxParameterCount", 1)); server.getConnector().setMaxPostSize(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxPostSize", 2097152)); server.getConnector().setMaxSavePostSize(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxSavePostSize", 4096)); @@ -396,6 +395,7 @@ public class EmbeddedServer { server.getConnector().setURIEncoding(EmbeddedServerUtil.getConfig("ranger.service.http.connector.attrib.URIEncoding", "UTF-8")); server.getConnector().setXpoweredBy(false); server.getConnector().setAttribute("server", "Apache Ranger"); + server.getConnector().setProperty("sendReasonPhrase",EmbeddedServerUtil.getConfig("ranger.service.http.connector.property.sendReasonPhrase", "true")); Iterator iterator = EmbeddedServerUtil.getRangerConfigProperties().keySet().iterator(); String key = null; String property = null; diff --git a/pom.xml b/pom.xml index dc21e53..fc858d7 100644 --- a/pom.xml +++ b/pom.xml @@ -188,7 +188,7 @@ 1.99.7 1.2.0 1.19 -7.0.105 +8.5.61 6.9.4 1.7 3.4.14 diff --git a/security-admin/src/main/webapp/META-INF/context.xml b/security-admin/src/main/webapp/META-INF/context.xml index 9c7ea95..30c37cb 100644 --- a/security-admin/src/main/webapp/META-INF/context.xml +++ b/security-admin/src/main/webapp/META-INF/context.xml @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. --> - - + + +
[ranger] branch ranger-2.2 updated (52a0f3d -> 0c72d21)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git. from 52a0f3d RANGER-3153: Updated TLS version to 1.2 for ranger new 036fe4d RANGER-3124: Search filter with user name having non latin character is not working on Audit>>Access tab new 345296f RANGER-3105 : Upgrade Ranger Tomcat to 8.5 or 9.0 new 0c72d21 RANGER-3149 : Adding exisitng policy check for PatchForKafkaServiceDefUpdate_J10033 The 3 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: embeddedwebserver/pom.xml | 10 - .../ranger/server/tomcat/EmbeddedServer.java | 2 +- pom.xml| 2 +- .../java/org/apache/ranger/common/StringUtil.java | 4 +- .../PatchForKafkaServiceDefUpdate_J10033.java | 207 - .../src/main/webapp/META-INF/context.xml | 6 +- 6 files changed, 125 insertions(+), 106 deletions(-)
[ranger] 03/03: RANGER-3149 : Adding exisitng policy check for PatchForKafkaServiceDefUpdate_J10033
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git commit 0c72d21ca917327ce25ef4bfb54ff0316de643d0 Author: Dhaval B. Shah AuthorDate: Tue Jan 12 21:50:32 2021 +0530 RANGER-3149 : Adding exisitng policy check for PatchForKafkaServiceDefUpdate_J10033 Signed-off-by: Velmurugan Periasamy --- .../PatchForKafkaServiceDefUpdate_J10033.java | 207 - 1 file changed, 118 insertions(+), 89 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java b/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java index 5b80cc2..6a869ce 100644 --- a/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java +++ b/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java @@ -17,6 +17,7 @@ package org.apache.ranger.patch; +import org.apache.commons.collections.CollectionUtils; import org.apache.commons.lang.StringUtils; import org.apache.log4j.Logger; import org.apache.ranger.authorization.utils.JsonUtils; @@ -266,7 +267,7 @@ public class PatchForKafkaServiceDefUpdate_J10033 extends BaseLoader { Long xServiceDefId = xXServiceDefObj.getId(); List xxServices = daoMgr.getXXService().findByServiceDefId(xServiceDefId); - + for (XXService xxService : xxServices) { int resourceMapOrder = 0; XXPolicy xxPolicy = new XXPolicy(); @@ -284,105 +285,133 @@ public class PatchForKafkaServiceDefUpdate_J10033 extends BaseLoader { xxPolicy.setPolicyText(JsonUtils.objectToJson(rangerPolicy)); xxPolicy.setResourceSignature(rangerPolicy.getResourceSignature()); xxPolicy.setZoneId(1L); - XXPolicy createdPolicy = daoMgr.getXXPolicy().create(xxPolicy); - - XXPolicyItem xxPolicyItem = new XXPolicyItem(); - xxPolicyItem.setIsEnabled(Boolean.TRUE); - xxPolicyItem.setDelegateAdmin(Boolean.TRUE); - xxPolicyItem.setItemType(0); - xxPolicyItem.setOrder(0); - xxPolicyItem.setAddedByUserId(currentUserId); - xxPolicyItem.setUpdatedByUserId(currentUserId); - xxPolicyItem.setPolicyId(createdPolicy.getId()); - XXPolicyItem createdXXPolicyItem = daoMgr.getXXPolicyItem().create(xxPolicyItem); - - List accessTypes = getAccessTypes(); - for (int i = 0; i < accessTypes.size(); i++) { - XXAccessTypeDef xAccTypeDef = daoMgr.getXXAccessTypeDef().findByNameAndServiceId(accessTypes.get(i), - xxPolicy.getService()); - if (xAccTypeDef == null) { - throw new RuntimeException(accessTypes.get(i) + ": is not a valid access-type. policy='" - + xxPolicy.getName() + "' service='" + xxPolicy.getService() + "'"); - } - XXPolicyItemAccess xPolItemAcc = new XXPolicyItemAccess(); - xPolItemAcc.setIsAllowed(Boolean.TRUE); - xPolItemAcc.setType(xAccTypeDef.getId()); - xPolItemAcc.setOrder(i); - xPolItemAcc.setAddedByUserId(currentUserId); - xPolItemAcc.setUpdatedByUserId(currentUserId); - xPolItemAcc.setPolicyitemid(createdXXPolicyItem.getId()); - daoMgr.getXXPolicyItemAccess().create(xPolItemAcc); - } + boolean policyExist = false; + try { + List rangerpolicies = svcDBStore.getPoliciesByResourceSignature(xxService.getName(), + rangerPolicy.getResourceSignature(), true); + if (CollectionUtils.isNotEmpty(rangerpolicies)) { + for (RangerPolicy rPolicy : rangerpolicies) { + if (rangerPolicy != null) { + if (logger.isDebugEnabled()) { + logger.debug("print Policy: " + rPolicy); + logger.debug("pol
[ranger] 03/03: RANGER-3149 : Adding exisitng policy check for PatchForKafkaServiceDefUpdate_J10033
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit a37e5da68d0724056147542dc29bf7909dca5460 Author: Dhaval B. Shah AuthorDate: Tue Jan 12 21:50:32 2021 +0530 RANGER-3149 : Adding exisitng policy check for PatchForKafkaServiceDefUpdate_J10033 Signed-off-by: Velmurugan Periasamy --- .../PatchForKafkaServiceDefUpdate_J10033.java | 207 - 1 file changed, 118 insertions(+), 89 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java b/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java index 5b80cc2..6a869ce 100644 --- a/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java +++ b/security-admin/src/main/java/org/apache/ranger/patch/PatchForKafkaServiceDefUpdate_J10033.java @@ -17,6 +17,7 @@ package org.apache.ranger.patch; +import org.apache.commons.collections.CollectionUtils; import org.apache.commons.lang.StringUtils; import org.apache.log4j.Logger; import org.apache.ranger.authorization.utils.JsonUtils; @@ -266,7 +267,7 @@ public class PatchForKafkaServiceDefUpdate_J10033 extends BaseLoader { Long xServiceDefId = xXServiceDefObj.getId(); List xxServices = daoMgr.getXXService().findByServiceDefId(xServiceDefId); - + for (XXService xxService : xxServices) { int resourceMapOrder = 0; XXPolicy xxPolicy = new XXPolicy(); @@ -284,105 +285,133 @@ public class PatchForKafkaServiceDefUpdate_J10033 extends BaseLoader { xxPolicy.setPolicyText(JsonUtils.objectToJson(rangerPolicy)); xxPolicy.setResourceSignature(rangerPolicy.getResourceSignature()); xxPolicy.setZoneId(1L); - XXPolicy createdPolicy = daoMgr.getXXPolicy().create(xxPolicy); - - XXPolicyItem xxPolicyItem = new XXPolicyItem(); - xxPolicyItem.setIsEnabled(Boolean.TRUE); - xxPolicyItem.setDelegateAdmin(Boolean.TRUE); - xxPolicyItem.setItemType(0); - xxPolicyItem.setOrder(0); - xxPolicyItem.setAddedByUserId(currentUserId); - xxPolicyItem.setUpdatedByUserId(currentUserId); - xxPolicyItem.setPolicyId(createdPolicy.getId()); - XXPolicyItem createdXXPolicyItem = daoMgr.getXXPolicyItem().create(xxPolicyItem); - - List accessTypes = getAccessTypes(); - for (int i = 0; i < accessTypes.size(); i++) { - XXAccessTypeDef xAccTypeDef = daoMgr.getXXAccessTypeDef().findByNameAndServiceId(accessTypes.get(i), - xxPolicy.getService()); - if (xAccTypeDef == null) { - throw new RuntimeException(accessTypes.get(i) + ": is not a valid access-type. policy='" - + xxPolicy.getName() + "' service='" + xxPolicy.getService() + "'"); - } - XXPolicyItemAccess xPolItemAcc = new XXPolicyItemAccess(); - xPolItemAcc.setIsAllowed(Boolean.TRUE); - xPolItemAcc.setType(xAccTypeDef.getId()); - xPolItemAcc.setOrder(i); - xPolItemAcc.setAddedByUserId(currentUserId); - xPolItemAcc.setUpdatedByUserId(currentUserId); - xPolItemAcc.setPolicyitemid(createdXXPolicyItem.getId()); - daoMgr.getXXPolicyItemAccess().create(xPolItemAcc); - } + boolean policyExist = false; + try { + List rangerpolicies = svcDBStore.getPoliciesByResourceSignature(xxService.getName(), + rangerPolicy.getResourceSignature(), true); + if (CollectionUtils.isNotEmpty(rangerpolicies)) { + for (RangerPolicy rPolicy : rangerpolicies) { + if (rangerPolicy != null) { + if (logger.isDebugEnabled()) { + logger.debug("print Policy: " + rPolicy); + logger.debug("pol
[ranger] 02/03: RANGER-3105 : Upgrade Ranger Tomcat to 8.5 or 9.0
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit c7694deaab53fd0563193cfb8935213258352447 Author: mateenmansoori AuthorDate: Thu Jan 21 15:39:34 2021 +0530 RANGER-3105 : Upgrade Ranger Tomcat to 8.5 or 9.0 Signed-off-by: Velmurugan Periasamy --- embeddedwebserver/pom.xml | 10 -- .../java/org/apache/ranger/server/tomcat/EmbeddedServer.java | 2 +- pom.xml| 2 +- security-admin/src/main/webapp/META-INF/context.xml| 6 +++--- 4 files changed, 5 insertions(+), 15 deletions(-) diff --git a/embeddedwebserver/pom.xml b/embeddedwebserver/pom.xml index a982f84..2d14f3a 100644 --- a/embeddedwebserver/pom.xml +++ b/embeddedwebserver/pom.xml @@ -50,16 +50,6 @@ org.apache.tomcat.embed -tomcat-embed-logging-juli -${tomcat.embed.version} - - -org.apache.tomcat.embed -tomcat-embed-logging-log4j -${tomcat.embed.version} - - -org.apache.tomcat.embed tomcat-embed-websocket ${tomcat.embed.version} diff --git a/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java b/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java index 8edcbbb..b1b242d 100644 --- a/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java +++ b/embeddedwebserver/src/main/java/org/apache/ranger/server/tomcat/EmbeddedServer.java @@ -388,7 +388,6 @@ public class EmbeddedServer { server.getConnector().setAllowTrace(Boolean.valueOf(EmbeddedServerUtil.getConfig("ranger.service.http.connector.attrib.allowTrace", "false"))); server.getConnector().setAsyncTimeout(EmbeddedServerUtil.getLongConfig("ranger.service.http.connector.attrib.asyncTimeout", 1L)); server.getConnector().setEnableLookups(Boolean.valueOf(EmbeddedServerUtil.getConfig("ranger.service.http.connector.attrib.enableLookups", "false"))); - server.getConnector().setMaxHeaderCount(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxHeaderCount", 100)); server.getConnector().setMaxParameterCount(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxParameterCount", 1)); server.getConnector().setMaxPostSize(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxPostSize", 2097152)); server.getConnector().setMaxSavePostSize(EmbeddedServerUtil.getIntConfig("ranger.service.http.connector.attrib.maxSavePostSize", 4096)); @@ -396,6 +395,7 @@ public class EmbeddedServer { server.getConnector().setURIEncoding(EmbeddedServerUtil.getConfig("ranger.service.http.connector.attrib.URIEncoding", "UTF-8")); server.getConnector().setXpoweredBy(false); server.getConnector().setAttribute("server", "Apache Ranger"); + server.getConnector().setProperty("sendReasonPhrase",EmbeddedServerUtil.getConfig("ranger.service.http.connector.property.sendReasonPhrase", "true")); Iterator iterator = EmbeddedServerUtil.getRangerConfigProperties().keySet().iterator(); String key = null; String property = null; diff --git a/pom.xml b/pom.xml index b495809..b41b697 100644 --- a/pom.xml +++ b/pom.xml @@ -189,7 +189,7 @@ 1.99.7 1.2.0 1.19 -7.0.105 +8.5.61 6.9.4 1.7 3.4.14 diff --git a/security-admin/src/main/webapp/META-INF/context.xml b/security-admin/src/main/webapp/META-INF/context.xml index 9c7ea95..30c37cb 100644 --- a/security-admin/src/main/webapp/META-INF/context.xml +++ b/security-admin/src/main/webapp/META-INF/context.xml @@ -14,7 +14,7 @@ See the License for the specific language governing permissions and limitations under the License. --> - - + + +
[ranger] branch master updated (5df5124 -> a37e5da)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git. from 5df5124 RANGER-3153: Updated TLS version to 1.2 for ranger new 56fb23a RANGER-3124: Search filter with user name having non latin character is not working on Audit>>Access tab new c7694de RANGER-3105 : Upgrade Ranger Tomcat to 8.5 or 9.0 new a37e5da RANGER-3149 : Adding exisitng policy check for PatchForKafkaServiceDefUpdate_J10033 The 3 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: embeddedwebserver/pom.xml | 10 - .../ranger/server/tomcat/EmbeddedServer.java | 2 +- pom.xml| 2 +- .../java/org/apache/ranger/common/StringUtil.java | 4 +- .../PatchForKafkaServiceDefUpdate_J10033.java | 207 - .../src/main/webapp/META-INF/context.xml | 6 +- 6 files changed, 125 insertions(+), 106 deletions(-)
[ranger] 01/03: RANGER-3124: Search filter with user name having non latin character is not working on Audit>>Access tab
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit 56fb23aa39c828084fea85db2b25a4408a94bbf1 Author: BHAGYASHRI KOKATE AuthorDate: Wed Dec 23 12:10:51 2020 +0530 RANGER-3124: Search filter with user name having non latin character is not working on Audit>>Access tab Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/java/org/apache/ranger/common/StringUtil.java | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java b/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java index 97f0d2a..eec6c40 100644 --- a/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java +++ b/security-admin/src/main/java/org/apache/ranger/common/StringUtil.java @@ -37,8 +37,8 @@ public class StringUtil implements Serializable { static final public int MIN_PASSWORD_LENGTH = 8; -static final public String VALIDATION_NAME = "^([A-Za-z0-9_]|[\u00C0-\u017F])([a-zA-Z0-9\\s_. -@]|[\u00C0-\u017F])+$"; - static final public String VALIDATION_TEXT = "[a-zA-Z0-9\\ \"!@#$%^*()-_=+;:'|~`?/{}\\.\\,\\-\\?<>]*"; + static final public String VALIDATION_NAME = "^([A-Za-z0-9_]|[\u00C0-\u017F])([a-zA-Z0-9\\s_. -@]|[\u00C0-\u017F])+$"; + static final public String VALIDATION_TEXT = "[a-zA-Z0-9\\ \"!@#$%^*()-_=+;:'|~`?/{}\\.\\,\\-\\?<>\\x00-\\x7F\\p{L}-]*"; static final public String VALIDATION_LOGINID = "^([A-Za-z0-9_]|[\u00C0-\u017F])([a-z0-9,._\\-+/@= ]|[\u00C0-\u017F])+$"; static final public String VALIDATION_ALPHA = "[a-z,A-Z]*";
[ranger] branch ranger-2.2 updated: RANGER-3090: KMS setup.sh fails due to blank property value of ranger.ks.db.ssl.certificateFile
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new 94e3476 RANGER-3090: KMS setup.sh fails due to blank property value of ranger.ks.db.ssl.certificateFile 94e3476 is described below commit 94e347647b87096cb3ce8e7ed51f9cd27b795388 Author: Mahesh Bandal AuthorDate: Wed Nov 25 22:02:18 2020 +0530 RANGER-3090: KMS setup.sh fails due to blank property value of ranger.ks.db.ssl.certificateFile Signed-off-by: Velmurugan Periasamy --- kms/scripts/db_setup.py| 4 ++-- kms/scripts/setup.sh | 9 ++--- security-admin/scripts/db_setup.py | 4 ++-- security-admin/scripts/setup.sh| 9 ++--- 4 files changed, 16 insertions(+), 10 deletions(-) diff --git a/kms/scripts/db_setup.py b/kms/scripts/db_setup.py index c1f8523..2548025 100644 --- a/kms/scripts/db_setup.py +++ b/kms/scripts/db_setup.py @@ -637,7 +637,7 @@ def main(argv): if not os.path.exists(javax_net_ssl_trustStore): log("[E] Invalid file Name! Unable to find truststore file:"+javax_net_ssl_trustStore,"error") sys.exit(1) - if javax_net_ssl_trustStorePassword =="": + if javax_net_ssl_trustStorePassword is None or javax_net_ssl_trustStorePassword =="": log("[E] Invalid ssl truststore password!","error") sys.exit(1) if db_ssl_auth_type == '2-way': @@ -650,7 +650,7 @@ def main(argv): if not os.path.exists(javax_net_ssl_keyStore): log("[E] Invalid file Name! Unable to find keystore file:"+javax_net_ssl_keyStore,"error") sys.exit(1) - if javax_net_ssl_keyStorePassword =="": + if javax_net_ssl_keyStorePassword is None or javax_net_ssl_keyStorePassword =="": log("[E] Invalid ssl keystore password!","error") sys.exit(1) diff --git a/kms/scripts/setup.sh b/kms/scripts/setup.sh index a7691f3..60c026b 100755 --- a/kms/scripts/setup.sh +++ b/kms/scripts/setup.sh @@ -502,9 +502,12 @@ update_properties() { newPropertyValue="${db_ssl_auth_type}" updatePropertyToFilePy $propertyName $newPropertyValue $to_file - propertyName=ranger.ks.db.ssl.certificateFile - newPropertyValue="${db_ssl_certificate_file}" - updatePropertyToFilePy $propertyName $newPropertyValue $to_file + if [ "${db_ssl_certificate_file}" != "" ] + then + propertyName=ranger.ks.db.ssl.certificateFile + newPropertyValue="${db_ssl_certificate_file}" + updatePropertyToFilePy $propertyName $newPropertyValue $to_file + fi propertyName=ranger.truststore.file.type newPropertyValue="${javax_net_ssl_trustStore_type}" diff --git a/security-admin/scripts/db_setup.py b/security-admin/scripts/db_setup.py index b6c2e85..724a47b 100644 --- a/security-admin/scripts/db_setup.py +++ b/security-admin/scripts/db_setup.py @@ -1158,7 +1158,7 @@ def main(argv): if not os.path.exists(javax_net_ssl_trustStore): log("[E] Invalid file Name! Unable to find truststore file:"+javax_net_ssl_trustStore,"error") sys.exit(1) - if javax_net_ssl_trustStorePassword =="": + if javax_net_ssl_trustStorePassword is None or javax_net_ssl_trustStorePassword =="": log("[E] Invalid ssl truststore password!","error") sys.exit(1) if db_ssl_auth_type == '2-way': @@ -1171,7 +1171,7 @@ def main(argv): if not os.path.exists
[ranger] branch master updated: RANGER-3090: KMS setup.sh fails due to blank property value of ranger.ks.db.ssl.certificateFile
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 7d82160 RANGER-3090: KMS setup.sh fails due to blank property value of ranger.ks.db.ssl.certificateFile 7d82160 is described below commit 7d821605e7f3ac2916970a8a75c67ec649135813 Author: Mahesh Bandal AuthorDate: Wed Nov 25 22:02:18 2020 +0530 RANGER-3090: KMS setup.sh fails due to blank property value of ranger.ks.db.ssl.certificateFile Signed-off-by: Velmurugan Periasamy --- kms/scripts/db_setup.py| 4 ++-- kms/scripts/setup.sh | 9 ++--- security-admin/scripts/db_setup.py | 4 ++-- security-admin/scripts/setup.sh| 9 ++--- 4 files changed, 16 insertions(+), 10 deletions(-) diff --git a/kms/scripts/db_setup.py b/kms/scripts/db_setup.py index c1f8523..2548025 100644 --- a/kms/scripts/db_setup.py +++ b/kms/scripts/db_setup.py @@ -637,7 +637,7 @@ def main(argv): if not os.path.exists(javax_net_ssl_trustStore): log("[E] Invalid file Name! Unable to find truststore file:"+javax_net_ssl_trustStore,"error") sys.exit(1) - if javax_net_ssl_trustStorePassword =="": + if javax_net_ssl_trustStorePassword is None or javax_net_ssl_trustStorePassword =="": log("[E] Invalid ssl truststore password!","error") sys.exit(1) if db_ssl_auth_type == '2-way': @@ -650,7 +650,7 @@ def main(argv): if not os.path.exists(javax_net_ssl_keyStore): log("[E] Invalid file Name! Unable to find keystore file:"+javax_net_ssl_keyStore,"error") sys.exit(1) - if javax_net_ssl_keyStorePassword =="": + if javax_net_ssl_keyStorePassword is None or javax_net_ssl_keyStorePassword =="": log("[E] Invalid ssl keystore password!","error") sys.exit(1) diff --git a/kms/scripts/setup.sh b/kms/scripts/setup.sh index a7691f3..60c026b 100755 --- a/kms/scripts/setup.sh +++ b/kms/scripts/setup.sh @@ -502,9 +502,12 @@ update_properties() { newPropertyValue="${db_ssl_auth_type}" updatePropertyToFilePy $propertyName $newPropertyValue $to_file - propertyName=ranger.ks.db.ssl.certificateFile - newPropertyValue="${db_ssl_certificate_file}" - updatePropertyToFilePy $propertyName $newPropertyValue $to_file + if [ "${db_ssl_certificate_file}" != "" ] + then + propertyName=ranger.ks.db.ssl.certificateFile + newPropertyValue="${db_ssl_certificate_file}" + updatePropertyToFilePy $propertyName $newPropertyValue $to_file + fi propertyName=ranger.truststore.file.type newPropertyValue="${javax_net_ssl_trustStore_type}" diff --git a/security-admin/scripts/db_setup.py b/security-admin/scripts/db_setup.py index b6c2e85..724a47b 100644 --- a/security-admin/scripts/db_setup.py +++ b/security-admin/scripts/db_setup.py @@ -1158,7 +1158,7 @@ def main(argv): if not os.path.exists(javax_net_ssl_trustStore): log("[E] Invalid file Name! Unable to find truststore file:"+javax_net_ssl_trustStore,"error") sys.exit(1) - if javax_net_ssl_trustStorePassword =="": + if javax_net_ssl_trustStorePassword is None or javax_net_ssl_trustStorePassword =="": log("[E] Invalid ssl truststore password!","error") sys.exit(1) if db_ssl_auth_type == '2-way': @@ -1171,7 +1171,7 @@ def main(argv): if not os.path.exists
[ranger] branch ranger-2.2 updated: RANGER-3087 : Making db_setup.py fool-proof and robust
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new 2bacdc6 RANGER-3087 : Making db_setup.py fool-proof and robust 2bacdc6 is described below commit 2bacdc639c87773daf53f872137c2ebaee2c03cf Author: Vishal Suvagia AuthorDate: Tue Nov 24 22:35:03 2020 +0530 RANGER-3087 : Making db_setup.py fool-proof and robust Issue: When a user configures a small heap size in install.properties, vm creation in db_setup.py fails to apply the java patches with Error in creating VM. Changes: Added checks for heap-size and set the default heap-size Testing: Validated changes for fresh install and upgrade from ranger-1.0 to master and ranger-2.2 to master Signed-off-by: Velmurugan Periasamy --- security-admin/scripts/db_setup.py | 10 ++ 1 file changed, 10 insertions(+) diff --git a/security-admin/scripts/db_setup.py b/security-admin/scripts/db_setup.py index 09fab95..b6c2e85 100644 --- a/security-admin/scripts/db_setup.py +++ b/security-admin/scripts/db_setup.py @@ -90,6 +90,16 @@ def populate_global_dict(): globalDict[key] = value if 'ranger_admin_max_heap_size' not in globalDict: globalDict['ranger_admin_max_heap_size']='1g' + elif 'ranger_admin_max_heap_size' in globalDict: + ranger_admin_heap_size = globalDict['ranger_admin_max_heap_size'] + if str(ranger_admin_heap_size.lower()).endswith("g"): + ranger_admin_heap_size_numeric = int(str(ranger_admin_heap_size).lower().rstrip("g")) + if ranger_admin_heap_size_numeric < 1: + globalDict['ranger_admin_max_heap_size']='1g' + if str(ranger_admin_heap_size.lower()).endswith("m"): + ranger_admin_heap_size_numeric = int(str(ranger_admin_heap_size).lower().rstrip("m")) + if ranger_admin_heap_size_numeric < 1024: + globalDict['ranger_admin_max_heap_size']='1g' def jisql_log(query, db_password): if jisql_debug == True:
[ranger] branch ranger-2.2 updated: RANGER-3084: Ranger database connection fails when postgres is SSL enabled & postgresql-42.2.14 driver jar is used
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.2 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.2 by this push: new d551135 RANGER-3084: Ranger database connection fails when postgres is SSL enabled & postgresql-42.2.14 driver jar is used d551135 is described below commit d5511352c63466a603a7090b7ee1b54b0a17060f Author: Mahesh Bandal AuthorDate: Sat Nov 21 12:51:01 2020 +0530 RANGER-3084: Ranger database connection fails when postgres is SSL enabled & postgresql-42.2.14 driver jar is used Signed-off-by: Velmurugan Periasamy --- kms/config/kms-webapp/dbks-site.xml| 12 + kms/scripts/db_setup.py| 56 ++ kms/scripts/install.properties | 7 +++ kms/scripts/setup.sh | 53 +--- .../org/apache/hadoop/crypto/key/RangerKMSDB.java | 19 security-admin/scripts/db_setup.py | 56 ++ security-admin/scripts/install.properties | 6 +++ security-admin/scripts/setup.sh| 51 ++-- .../org/apache/ranger/common/PropertiesUtil.java | 28 +++ .../conf.dist/ranger-admin-default-site.xml| 12 + 10 files changed, 233 insertions(+), 67 deletions(-) diff --git a/kms/config/kms-webapp/dbks-site.xml b/kms/config/kms-webapp/dbks-site.xml index 6990fb7..75f21c8 100755 --- a/kms/config/kms-webapp/dbks-site.xml +++ b/kms/config/kms-webapp/dbks-site.xml @@ -341,4 +341,16 @@ ranger.ks.db.ssl.auth.type 2-way + + ranger.ks.db.ssl.certificateFile + + + + ranger.truststore.file.type + jks + + + ranger.keystore.file.type + jks + diff --git a/kms/scripts/db_setup.py b/kms/scripts/db_setup.py index 9928f46..c1f8523 100644 --- a/kms/scripts/db_setup.py +++ b/kms/scripts/db_setup.py @@ -292,7 +292,7 @@ class OracleConf(BaseDB): class PostgresConf(BaseDB): # Constructor - def __init__(self, host,SQL_CONNECTOR_JAR,JAVA_BIN,db_ssl_enabled,db_ssl_required,db_ssl_verifyServerCertificate,javax_net_ssl_keyStore,javax_net_ssl_keyStorePassword,javax_net_ssl_trustStore,javax_net_ssl_trustStorePassword,db_ssl_auth_type): + def __init__(self, host,SQL_CONNECTOR_JAR,JAVA_BIN,db_ssl_enabled,db_ssl_required,db_ssl_verifyServerCertificate,javax_net_ssl_keyStore,javax_net_ssl_keyStorePassword,javax_net_ssl_trustStore,javax_net_ssl_trustStorePassword,db_ssl_auth_type,db_ssl_certificate_file,javax_net_ssl_trustStore_type,javax_net_ssl_keyStore_type): self.host = host self.SQL_CONNECTOR_JAR = SQL_CONNECTOR_JAR self.JAVA_BIN = JAVA_BIN @@ -300,10 +300,13 @@ class PostgresConf(BaseDB): self.db_ssl_required=db_ssl_required.lower() self.db_ssl_verifyServerCertificate=db_ssl_verifyServerCertificate.lower() self.db_ssl_auth_type=db_ssl_auth_type.lower() + self.db_ssl_certificate_file=db_ssl_certificate_file self.javax_net_ssl_keyStore=javax_net_ssl_keyStore self.javax_net_ssl_keyStorePassword=javax_net_ssl_keyStorePassword + self.javax_net_ssl_keyStore_type=javax_net_ssl_keyStore_type.lower() self.javax_net_ssl_trustStore=javax_net_ssl_trustStore self.javax_net_ssl_trustStorePassword=javax_net_ssl_trustStorePassword + self.javax_net_ssl_trustStore_type=javax_net_ssl_trustStore_type.lower() def get_jisql_cmd(self, user, password, db_name): #TODO: User array for forming command @@ -312,15 +315,16 @@ class PostgresConf(BaseDB): db_ssl_param='' db_ssl_cert_param='' if self.db_ssl_enabled == 'true': - db_ssl_param="?ssl=%s" %(self.db_ssl_enabled) - if self.db_ssl_verifyServerCertificate == 'true' or self.db_ssl_required == 'true': - db_ssl_param="?ssl=%s" %(self.db_ssl_enabled) + if self.db_ssl_certificate_file != "": + db_ssl_param="?ssl=%s=verify-full=%s" %(self.db_ssl_enabled,self.db_ssl_certificate_file) + elif self.db_ssl_verifyServerCertificate == 'true' or self.db_ssl_required == 'true': + db_ssl_param="?ssl=%s=verify-full=org.postgresql.ssl.DefaultJavaSSLFactory" %(self.db_ssl_enabled) if self.db_ssl_auth_type == '1-way': - db_ssl_cert_param=" -Djavax.net.ssl.trustStore=%s -Djavax.net.ssl.trustStorePassword=%s " %(self.javax_net_ssl_trustStore,self.javax_net_ssl_trustStor
[ranger] branch master updated: RANGER-3084: Ranger database connection fails when postgres is SSL enabled & postgresql-42.2.14 driver jar is used
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 3a21d6a RANGER-3084: Ranger database connection fails when postgres is SSL enabled & postgresql-42.2.14 driver jar is used 3a21d6a is described below commit 3a21d6a30232ee44d375a2fad5764798afb74f7e Author: Mahesh Bandal AuthorDate: Sat Nov 21 12:51:01 2020 +0530 RANGER-3084: Ranger database connection fails when postgres is SSL enabled & postgresql-42.2.14 driver jar is used Signed-off-by: Velmurugan Periasamy --- kms/config/kms-webapp/dbks-site.xml| 12 + kms/scripts/db_setup.py| 56 ++ kms/scripts/install.properties | 7 +++ kms/scripts/setup.sh | 53 +--- .../org/apache/hadoop/crypto/key/RangerKMSDB.java | 19 security-admin/scripts/db_setup.py | 56 ++ security-admin/scripts/install.properties | 6 +++ security-admin/scripts/setup.sh| 51 ++-- .../org/apache/ranger/common/PropertiesUtil.java | 28 +++ .../conf.dist/ranger-admin-default-site.xml| 12 + 10 files changed, 233 insertions(+), 67 deletions(-) diff --git a/kms/config/kms-webapp/dbks-site.xml b/kms/config/kms-webapp/dbks-site.xml index 6990fb7..75f21c8 100755 --- a/kms/config/kms-webapp/dbks-site.xml +++ b/kms/config/kms-webapp/dbks-site.xml @@ -341,4 +341,16 @@ ranger.ks.db.ssl.auth.type 2-way + + ranger.ks.db.ssl.certificateFile + + + + ranger.truststore.file.type + jks + + + ranger.keystore.file.type + jks + diff --git a/kms/scripts/db_setup.py b/kms/scripts/db_setup.py index 9928f46..c1f8523 100644 --- a/kms/scripts/db_setup.py +++ b/kms/scripts/db_setup.py @@ -292,7 +292,7 @@ class OracleConf(BaseDB): class PostgresConf(BaseDB): # Constructor - def __init__(self, host,SQL_CONNECTOR_JAR,JAVA_BIN,db_ssl_enabled,db_ssl_required,db_ssl_verifyServerCertificate,javax_net_ssl_keyStore,javax_net_ssl_keyStorePassword,javax_net_ssl_trustStore,javax_net_ssl_trustStorePassword,db_ssl_auth_type): + def __init__(self, host,SQL_CONNECTOR_JAR,JAVA_BIN,db_ssl_enabled,db_ssl_required,db_ssl_verifyServerCertificate,javax_net_ssl_keyStore,javax_net_ssl_keyStorePassword,javax_net_ssl_trustStore,javax_net_ssl_trustStorePassword,db_ssl_auth_type,db_ssl_certificate_file,javax_net_ssl_trustStore_type,javax_net_ssl_keyStore_type): self.host = host self.SQL_CONNECTOR_JAR = SQL_CONNECTOR_JAR self.JAVA_BIN = JAVA_BIN @@ -300,10 +300,13 @@ class PostgresConf(BaseDB): self.db_ssl_required=db_ssl_required.lower() self.db_ssl_verifyServerCertificate=db_ssl_verifyServerCertificate.lower() self.db_ssl_auth_type=db_ssl_auth_type.lower() + self.db_ssl_certificate_file=db_ssl_certificate_file self.javax_net_ssl_keyStore=javax_net_ssl_keyStore self.javax_net_ssl_keyStorePassword=javax_net_ssl_keyStorePassword + self.javax_net_ssl_keyStore_type=javax_net_ssl_keyStore_type.lower() self.javax_net_ssl_trustStore=javax_net_ssl_trustStore self.javax_net_ssl_trustStorePassword=javax_net_ssl_trustStorePassword + self.javax_net_ssl_trustStore_type=javax_net_ssl_trustStore_type.lower() def get_jisql_cmd(self, user, password, db_name): #TODO: User array for forming command @@ -312,15 +315,16 @@ class PostgresConf(BaseDB): db_ssl_param='' db_ssl_cert_param='' if self.db_ssl_enabled == 'true': - db_ssl_param="?ssl=%s" %(self.db_ssl_enabled) - if self.db_ssl_verifyServerCertificate == 'true' or self.db_ssl_required == 'true': - db_ssl_param="?ssl=%s" %(self.db_ssl_enabled) + if self.db_ssl_certificate_file != "": + db_ssl_param="?ssl=%s=verify-full=%s" %(self.db_ssl_enabled,self.db_ssl_certificate_file) + elif self.db_ssl_verifyServerCertificate == 'true' or self.db_ssl_required == 'true': + db_ssl_param="?ssl=%s=verify-full=org.postgresql.ssl.DefaultJavaSSLFactory" %(self.db_ssl_enabled) if self.db_ssl_auth_type == '1-way': - db_ssl_cert_param=" -Djavax.net.ssl.trustStore=%s -Djavax.net.ssl.trustStorePassword=%s " %(self.javax_net_ssl_trustStore,self.javax_net_ssl_trustStor
[ranger] branch master updated: RANGER-2772 : Adding the functionality of merging the policy
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new d65abd8 RANGER-2772 : Adding the functionality of merging the policy d65abd8 is described below commit d65abd8c4f7a5297f376c167f5f31b57e68bf601 Author: Dineshkumar Yadav AuthorDate: Wed Apr 1 13:39:16 2020 +0530 RANGER-2772 : Adding the functionality of merging the policy Signed-off-by: Velmurugan Periasamy --- .../main/java/org/apache/ranger/rest/ServiceREST.java | 18 ++ 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java b/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java index 8618f32..38b4982 100644 --- a/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java +++ b/security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java @@ -1660,7 +1660,8 @@ public class ServiceREST { deleteExactMatchPolicyForResource(policies, request.getRemoteUser(), null); } boolean updateIfExists=("true".equalsIgnoreCase(StringUtils.trimToEmpty(request.getParameter(PARAM_UPDATE_IF_EXISTS ? true : false ; - if(updateIfExists) { + boolean mergeIfExists = "true".equalsIgnoreCase(StringUtils.trimToEmpty(request.getParameter(PARAM_MERGE_IF_EXISTS))) ? true : false; + if(updateIfExists || mergeIfExists) { RangerPolicy existingPolicy = null; String serviceName = request.getParameter(PARAM_SERVICE_NAME); if (serviceName == null) { @@ -1698,11 +1699,20 @@ public class ServiceREST { } try { if (existingPolicy != null) { - policy.setId(existingPolicy.getId()); - ret = updatePolicy(policy); + if (updateIfExists) { + policy.setId(existingPolicy.getId()); + ret = updatePolicy(policy); + } else if(mergeIfExists){ + ServiceRESTUtil.mergeExactMatchPolicyForResource(existingPolicy, policy); + ret = updatePolicy(existingPolicy); + } } } catch (Exception excp){ - LOG.error("updatePolicy(" + policy + ") failed", excp); + if(updateIfExists) { + LOG.error("updatePolicy(" + policy + ") failed", excp); + }else if(mergeIfExists) { + LOG.error("updatePolicy for merge (" + existingPolicy + ") failed", excp); + } throw restErrorUtil.createRESTException(excp.getMessage()); } }
[ranger] branch master updated: RANGER-2758 : Option to create missing users/groups while creating/updating roles
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 10f4cff RANGER-2758 : Option to create missing users/groups while creating/updating roles 10f4cff is described below commit 10f4cff27b703ffbb18e77ac9bd08d4b61e63813 Author: Dineshkumar Yadav AuthorDate: Mon Mar 16 13:11:49 2020 +0530 RANGER-2758 : Option to create missing users/groups while creating/updating roles Signed-off-by: Velmurugan Periasamy --- .../model/validation/RangerRoleValidator.java | 5 +- .../org/apache/ranger/plugin/store/RoleStore.java | 4 +- .../org/apache/ranger/biz/PolicyRefUpdater.java| 2 +- .../java/org/apache/ranger/biz/RoleDBStore.java| 8 ++-- .../java/org/apache/ranger/biz/RoleRefUpdater.java | 56 ++ .../java/org/apache/ranger/rest/PublicAPIsv2.java | 12 +++-- .../main/java/org/apache/ranger/rest/RoleREST.java | 26 +- 7 files changed, 81 insertions(+), 32 deletions(-) diff --git a/agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerRoleValidator.java b/agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerRoleValidator.java index bc34598..54ca93f 100644 --- a/agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerRoleValidator.java +++ b/agents-common/src/main/java/org/apache/ranger/plugin/model/validation/RangerRoleValidator.java @@ -172,7 +172,10 @@ public class RangerRoleValidator extends RangerValidator { } Long id = rangerRole.getId(); - RangerRole existingRangerRole = getRangerRole(id); + RangerRole existingRangerRole = null; + if (null != id) { + existingRangerRole = getRangerRole(id); + } if (action == Action.CREATE) { if (existingRangerRole != null) { diff --git a/agents-common/src/main/java/org/apache/ranger/plugin/store/RoleStore.java b/agents-common/src/main/java/org/apache/ranger/plugin/store/RoleStore.java index 7da43d5..22e1e6e 100644 --- a/agents-common/src/main/java/org/apache/ranger/plugin/store/RoleStore.java +++ b/agents-common/src/main/java/org/apache/ranger/plugin/store/RoleStore.java @@ -29,9 +29,9 @@ public interface RoleStore { void init() throws Exception; -RangerRole createRole(RangerRole role) throws Exception; +RangerRole createRole(RangerRole role, Boolean createNonExistUserGroup) throws Exception; -RangerRole updateRole(RangerRole role) throws Exception; +RangerRole updateRole(RangerRole role, Boolean createNonExistUserGroup) throws Exception; void deleteRole(String roleName) throws Exception; diff --git a/security-admin/src/main/java/org/apache/ranger/biz/PolicyRefUpdater.java b/security-admin/src/main/java/org/apache/ranger/biz/PolicyRefUpdater.java index baacfa4..f978d5d 100644 --- a/security-admin/src/main/java/org/apache/ranger/biz/PolicyRefUpdater.java +++ b/security-admin/src/main/java/org/apache/ranger/biz/PolicyRefUpdater.java @@ -311,7 +311,7 @@ public class PolicyRefUpdater { xUserMgr.checkAdminAccess(); - RangerRole createdRole= roleStore.createRole(rRole); + RangerRole createdRole= roleStore.createRole(rRole, false); return createdRole.getId(); } diff --git a/security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java b/security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java index 5be8d9d..c4a32e4 100644 --- a/security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java +++ b/security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java @@ -94,7 +94,7 @@ public class RoleDBStore implements RoleStore { } @Override -public RangerRole createRole(RangerRole role) throws Exception { +public RangerRole createRole(RangerRole role, Boolean createNonExistUserGroup) throws Exception { if (LOG.isDebugEnabled()) { LOG.debug("==> RoleDBStore.createRole()"); } @@ -112,7 +112,7 @@ public class RoleDBStore implements RoleStore { throw new Exception("Cannot create role:[" + role + "]"); } -roleRefUpdater.createNewRoleMappingForRefTable(createdRole); +roleRefUpdater.createNewRoleMappingForRefTable(createdRole, createNonExistUserGroup); List trxLogList = roleService.getTransactionLog(createdRole, null, "create"); bizUtil.createTrxLog(trxLogList); @@ -120,7 +120,7 @@ public class RoleDBStore implements RoleStore { } @Override -public RangerRole updateRole(RangerRole role
[ranger] branch master updated: RANGER-2717 : Edit repo/service fails(Knox proxy)
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 6cd9c14 RANGER-2717 : Edit repo/service fails(Knox proxy) 6cd9c14 is described below commit 6cd9c1416d1540a6ae36640153e7c3f7c01c9e5f Author: Nitin Galave AuthorDate: Fri Jan 31 17:15:41 2020 +0530 RANGER-2717 : Edit repo/service fails(Knox proxy) Signed-off-by: Velmurugan Periasamy --- security-admin/src/main/webapp/scripts/models/RangerServiceDef.js | 2 +- security-admin/src/main/webapp/scripts/utils/XAUtils.js | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js b/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js index 6812a48..aeb581e 100644 --- a/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js +++ b/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js @@ -99,7 +99,7 @@ define(function(require){ allowClear: true, initSelection : function (element, callback) { var rangerService = new RangerService() -rangerService.url = '/service/plugins/services/name/'+element.val(); +rangerService.url = XAUtils.getServiceByName(element.val()); rangerService.fetch( { cache : false, async : false, diff --git a/security-admin/src/main/webapp/scripts/utils/XAUtils.js b/security-admin/src/main/webapp/scripts/utils/XAUtils.js index 0b172eb..ab38fc9 100644 --- a/security-admin/src/main/webapp/scripts/utils/XAUtils.js +++ b/security-admin/src/main/webapp/scripts/utils/XAUtils.js @@ -1791,7 +1791,7 @@ define(function(require) { //Get service details By Service name XAUtils.getServiceByName = function(name) { -return "/service/plugins/services/name/" + name +return "service/plugins/services/name/" + name }; //Add visual search query parameter to URL
[ranger] branch master updated: Revert "RANGER-2647 : Show display name instead of name in UI"
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new a6f6f1f Revert "RANGER-2647 : Show display name instead of name in UI" a6f6f1f is described below commit a6f6f1f8cbd5c7d8b12631c2c8bdf1acb6c32555 Author: Velmurugan Periasamy AuthorDate: Fri Nov 22 17:58:59 2019 -0500 Revert "RANGER-2647 : Show display name instead of name in UI" This reverts commit 51349e296be6cf83da1f775138b51b175f1f47e7. --- .../main/webapp/scripts/models/RangerServiceDef.js | 27 +++--- .../src/main/webapp/scripts/modules/XALinks.js | 4 ++-- .../webapp/scripts/modules/globalize/message/en.js | 1 - .../scripts/views/policymanager/ServiceLayout.js | 1 - .../views/service/RangerServiceViewDetail.js | 24 --- .../webapp/scripts/views/service/ServiceForm.js| 4 ++-- .../policies/RangerPolicyTableLayout_tmpl.html | 2 +- .../service/RangerServiceViewDetail_tmpl.html | 8 +++ 8 files changed, 27 insertions(+), 44 deletions(-) diff --git a/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js b/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js index 9a89960..e5a28e8 100644 --- a/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js +++ b/security-admin/src/main/webapp/scripts/models/RangerServiceDef.js @@ -25,7 +25,6 @@ define(function(require){ var XAUtils = require('utils/XAUtils'); var XAEnums = require('utils/XAEnums'); var localization= require('utils/XALangSupport'); - var RangerService = require('models/RangerService'); var RangerServiceDef = RangerServiceDefBase.extend( /** @lends RangerServiceDef.prototype */ @@ -55,16 +54,15 @@ define(function(require){ // Overwrite your schema definition here return _.extend(attrs,{ + displayName : { + type : 'Text', + title : 'Display Name' + }, name : { type: 'Text', title : 'Service Name *', -validators : ['required',{type:'regexp', regexp:/^[a-zA-Z0-9_-][a-zA-Z0-9\s_-]{0,254}$/,message : localization.tt("validationMessages.nameValidationMsg")}], - }, - displayName : { - type : 'Text', - title : 'Display Name', - validators : [{type:'regexp', regexp:/^[a-zA-Z0-9_-][a-zA-Z0-9\s_-]{0,254}$/, message :'Invalid email address', message : localization.tt("validationMessages.nameValidationMsg")}] +validators : ['required',{type:'regexp',regexp:/^[a-zA-Z0-9_-][a-zA-Z0-9\s_-]{0,254}$/,message : localization.tt("validationMessages.nameValidationMsg")}], }, description : { type: 'TextArea', @@ -98,14 +96,7 @@ define(function(require){ width :'220px', allowClear: true, initSelection : function (element, callback) { - var rangerService = new RangerService() - rangerService.url = '/service/plugins/services/name/'+element.val(); - rangerService.fetch( { - cache : false, - async : false, - }).done(function(m) { - callback( { id:_.escape(m.get('name')), text:_.escape(m.get('displayName')) }) - }) +callback( { id:_.escape(element.val()), text:_.escape(element.val()) }) }, ajax: { url: "service/plugins/services", @@ -116,10 +107,8 @@ define(function(require){ results: function (data, page) { var results = []; if(data.resultSize != "0"){ - results = data.services.map(function(m
[ranger] branch master updated: RANGER-2636 Modifying NiFi and NiFi Registry service def and clients to allow using Ranger's default SSL context
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 7638d8b RANGER-2636 Modifying NiFi and NiFi Registry service def and clients to allow using Ranger's default SSL context 7638d8b is described below commit 7638d8b9af163484ff1718880356a23328c4904d Author: Bryan Bende AuthorDate: Mon Nov 4 16:55:48 2019 -0500 RANGER-2636 Modifying NiFi and NiFi Registry service def and clients to allow using Ranger's default SSL context Signed-off-by: Velmurugan Periasamy --- .../ranger-servicedef-nifi-registry.json | 12 + .../service-defs/ranger-servicedef-nifi.json | 12 + .../nifi/registry/client/NiFiRegistryConfigs.java | 2 + .../registry/client/NiFiRegistryConnectionMgr.java | 57 +++--- .../ranger/services/nifi/client/NiFiConfigs.java | 2 + .../services/nifi/client/NiFiConnectionMgr.java| 57 +++--- 6 files changed, 108 insertions(+), 34 deletions(-) diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json index 8235edc..ef5f7cf 100644 --- a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json @@ -70,6 +70,18 @@ "defaultValue": "NONE" }, { + "itemId": 411, + "name": "nifi.registry.ssl.use.default.context", + "type": "bool", + "subType": "YesTrue:NoFalse", + "mandatory": true, + "defaultValue": "false", + "validationRegEx": "", + "validationMessage": "", + "uiHint": "{\"TextFieldWithIcon\":true, \"info\": \"If true, then Ranger's keystore and truststore will be used to communicate with NiFi Registry. If false, the keystore and truststore properties must be provided.\"}", + "label": "Use Ranger's Default SSL Context" +}, +{ "itemId":500, "name":"nifi.registry.ssl.keystore", "type":"string", diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json index 5f1e46f..400e516 100644 --- a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json @@ -65,6 +65,18 @@ "defaultValue": "NONE" }, { + "itemId": 411, + "name": "nifi.ssl.use.default.context", + "type": "bool", + "subType": "YesTrue:NoFalse", + "mandatory": true, + "defaultValue": "false", + "validationRegEx": "", + "validationMessage": "", + "uiHint": "{\"TextFieldWithIcon\":true, \"info\": \"If true, then Ranger's keystore and truststore will be used to communicate with NiFi. If false, the keystore and truststore properties must be provided.\"}", + "label": "Use Ranger's Default SSL Context" +}, +{ "itemId":500, "name":"nifi.ssl.keystore", "type":"string", diff --git a/plugin-nifi-registry/src/main/java/org/apache/ranger/services/nifi/registry/client/NiFiRegistryConfigs.java b/plugin-nifi-registry/src/main/java/org/apache/ranger/services/nifi/registry/client/NiFiRegistryConfigs.java index ea91ca4..248d061 100644 --- a/plugin-nifi-registry/src/main/java/org/apache/ranger/services/nifi/registry/client/NiFiRegistryConfigs.java +++ b/plugin-nifi-registry/src/main/java/org/apache/ranger/services/nifi/registry/client/NiFiRegistryConfigs.java @@ -34,4 +34,6 @@ public interface NiFiRegistryConfigs { String NIFI_REG_SSL_TRUSTSTORE_TYPE = "nifi.registry.ssl.truststoreType"; String NIFI_REG_SSL_TRUSTSTORE_PASSWORD = "nifi.registry.ssl.truststorePassword"; +String NIFI_REG_SSL_USER_DEFAULT_CONTEXT = "nifi.registry.ssl.use.default.context"; + } diff --git a/plugin-nifi-registry/src/main/java/org/apache/ranger/services/nifi/registry/client/NiFiRegistryConnectionMgr.java b/plugin-nifi-registry/src/main/java/org/apache/ranger/services/nifi/registry/client/NiFiRegistryConnectionMgr.java index d606d25..412fcdd 100644 --- a/plugin-nifi-registry
[ranger] 01/03: RANGER-2608 Adding profile to build security-admin assembly
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit 3145c50365e91a741b1dfaa994afdb964d36799b Author: Bryan Bende AuthorDate: Tue Oct 8 10:28:20 2019 -0400 RANGER-2608 Adding profile to build security-admin assembly Signed-off-by: Velmurugan Periasamy --- pom.xml | 20 1 file changed, 20 insertions(+) diff --git a/pom.xml b/pom.xml index 6c94995..2140028 100644 --- a/pom.xml +++ b/pom.xml @@ -304,6 +304,26 @@ +ranger-admin + +agents-common +security-admin + + + + +maven-assembly-plugin +2.2-beta-5 + + + src/main/assembly/admin-web.xml + + + + + + + ranger-hdfs-plugin agents-audit
[ranger] branch master updated (49d092a -> d12f94f)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git. from 49d092a RANGER-2605 : Update maven version to 3.6.2 new 3145c50 RANGER-2608 Adding profile to build security-admin assembly new 41b459b RANGER-2584 Disable deny and exception in policies for NiFi new d12f94f RANGER-2607 Disable deny and exception in policies for NiFi Registry The 3 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .../ranger-servicedef-nifi-registry.json | 3 +++ .../service-defs/ranger-servicedef-nifi.json | 3 +++ pom.xml | 20 3 files changed, 26 insertions(+)
[ranger] 02/03: RANGER-2584 Disable deny and exception in policies for NiFi
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit 41b459b0642cbce5fc63d1b0db04d4e06738cef9 Author: Bryan Bende AuthorDate: Tue Oct 8 10:36:08 2019 -0400 RANGER-2584 Disable deny and exception in policies for NiFi Signed-off-by: Velmurugan Periasamy --- .../src/main/resources/service-defs/ranger-servicedef-nifi.json| 3 +++ 1 file changed, 3 insertions(+) diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json index 697a6b1..5f1e46f 100644 --- a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi.json @@ -153,6 +153,9 @@ "defaultIndex": 0 } ], + "options": { +"enableDenyAndExceptionsInPolicies": "false" + }, "contextEnrichers":[ ],
[ranger] 03/03: RANGER-2607 Disable deny and exception in policies for NiFi Registry
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit d12f94f681c8406e16d5c0591019dae7ce2d3541 Author: Bryan Bende AuthorDate: Tue Oct 8 10:40:36 2019 -0400 RANGER-2607 Disable deny and exception in policies for NiFi Registry Signed-off-by: Velmurugan Periasamy --- .../main/resources/service-defs/ranger-servicedef-nifi-registry.json | 3 +++ 1 file changed, 3 insertions(+) diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json index 868543d..8235edc 100644 --- a/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-nifi-registry.json @@ -158,6 +158,9 @@ "defaultIndex": 0 } ], + "options": { +"enableDenyAndExceptionsInPolicies": "false" + }, "contextEnrichers":[ ],
[ranger] branch master updated (0011a44 -> 49d092a)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git. from 0011a44 RANGER-2599. Add more audit data to HBase grant/revoke events new 0d5fa49 RANGER-2606: Added all modules to the sign-artifacts profile to fix this issue (master branch) new 49d092a RANGER-2605 : Update maven version to 3.6.2 The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: pom.xml | 158 ++-- 1 file changed, 105 insertions(+), 53 deletions(-)
[ranger] 02/02: RANGER-2605 : Update maven version to 3.6.2
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit 49d092acfd4c4aea86d9ddb64995e61c61828442 Author: Velmurugan Periasamy AuthorDate: Mon Oct 7 10:38:40 2019 -0400 RANGER-2605 : Update maven version to 3.6.2 Signed-off-by: Velmurugan Periasamy --- pom.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pom.xml b/pom.xml index 61c755b..6c94995 100644 --- a/pom.xml +++ b/pom.xml @@ -69,7 +69,7 @@ -3.3.3 +3.6.2 1.8 1.8 1.8
[ranger] 01/02: RANGER-2606: Added all modules to the sign-artifacts profile to fix this issue (master branch)
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git commit 0d5fa49f90881fb27b464c25ec28535da036adcd Author: Selvamohan Neethiraj AuthorDate: Mon Oct 7 21:55:22 2019 -0400 RANGER-2606: Added all modules to the sign-artifacts profile to fix this issue (master branch) Signed-off-by: Velmurugan Periasamy --- pom.xml | 156 ++-- 1 file changed, 104 insertions(+), 52 deletions(-) diff --git a/pom.xml b/pom.xml index bb2e847..61c755b 100644 --- a/pom.xml +++ b/pom.xml @@ -117,7 +117,7 @@ 2.2.4 4.0 3.1.1 - 0.4.0-alpha +0.4.0-alpha 1.3 2.0.2 3.1.0 @@ -184,12 +184,12 @@ 1.7 3.4.14 3.1.4 - 5.0.3 - 2.9.9 +5.0.3 +2.9.9 2.9.9.3 - 0.0.2 - 5.2.0 - 5.2.0 +0.0.2 +5.2.0 +5.2.0 0.178 2.0.0 @@ -197,7 +197,7 @@ 26.0-jre 2.0.1.Final - + 1.22.0 1.2.1 1.22.0 @@ -231,7 +231,7 @@ knox-agent storm-agent plugin-yarn - plugin-ozone +plugin-ozone security-admin plugin-kafka plugin-solr @@ -251,7 +251,7 @@ ranger-hbase-plugin-shim ranger-knox-plugin-shim ranger-yarn-plugin-shim - ranger-ozone-plugin-shim +ranger-ozone-plugin-shim ranger-storm-plugin-shim ranger-kafka-plugin-shim ranger-solr-plugin-shim @@ -282,7 +282,7 @@ src/main/assembly/storm-agent.xml src/main/assembly/plugin-kafka.xml src/main/assembly/plugin-yarn.xml - src/main/assembly/plugin-ozone.xml + src/main/assembly/plugin-ozone.xml src/main/assembly/plugin-solr.xml src/main/assembly/admin-web.xml src/main/assembly/solr_audit_conf.xml @@ -465,7 +465,7 @@ - + ranger-ozone-plugin agents-audit @@ -716,7 +716,7 @@ - jisql +jisql agents-audit agents-common agents-cred @@ -773,7 +773,7 @@ maven-assembly-plugin 2.2-beta-5 - + src/main/assembly/hdfs-agent.xml src/main/assembly/hive-agent.xml @@ -809,9 +809,9 @@ linux - - /usr/include/security/pam_appl.h - + +/usr/include/security/pam_appl.h + unixauthpam @@ -825,6 +825,58 @@ true + +jisql +agents-audit +agents-common +agents-cred +agents-installer +credentialbuilder +embeddedwebserver +kms +hbase-agent +hdfs-agent +hive-agent +knox-agent +storm-agent +plugin-yarn +plugin-ozone +security-admin +plugin-kafka +plugin-solr +plugin-nifi +plugin-nifi-registry +plugin-presto +ugsync +ugsync/ldapconfigchecktool/ldapconfigcheck +unixauthclient +unixauthservice +ranger-util +plugin-kms +tagsync +ranger-hdfs-plugin-shim +ranger-plugin-classloader +ranger-hive-plugin-shim +ranger-hbase-plugin-shim +ranger-knox-plugin-shim +ranger-yarn-plugin-shim +ranger-ozone-plugin-shim +ranger-storm-plugin-shim +ranger-kafka-plugin-shim +ranger-solr-plugin-shim +ranger-atlas-plugin-shim +ranger-kms-plugin-shim +ranger-presto-plugin-shim +ranger
[ranger] branch master updated: RANGER-2534: Updating Ranger Logo for ranger.apache.org
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new e5b7838 RANGER-2534: Updating Ranger Logo for ranger.apache.org e5b7838 is described below commit e5b7838f490d6d526974bf2c6cd24917d2209693 Author: Velmurugan Periasamy AuthorDate: Mon Sep 30 14:04:50 2019 -0400 RANGER-2534: Updating Ranger Logo for ranger.apache.org --- docs/src/site/resources/ranger.jpg | Bin 71292 -> 70852 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/docs/src/site/resources/ranger.jpg b/docs/src/site/resources/ranger.jpg index f92839c..7bdca9a 100644 Binary files a/docs/src/site/resources/ranger.jpg and b/docs/src/site/resources/ranger.jpg differ
svn commit: r1867791 - /ranger/site/trunk/ranger.jpg
Author: vel Date: Mon Sep 30 18:01:40 2019 New Revision: 1867791 URL: http://svn.apache.org/viewvc?rev=1867791=rev Log: Updated Ranger Logo Modified: ranger/site/trunk/ranger.jpg Modified: ranger/site/trunk/ranger.jpg URL: http://svn.apache.org/viewvc/ranger/site/trunk/ranger.jpg?rev=1867791=1867790=1867791=diff == Binary files - no diff available.
[ranger] branch master updated: RANGER-2452: Updated docs with 2.0.0 release info
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 27948b8 RANGER-2452: Updated docs with 2.0.0 release info 27948b8 is described below commit 27948b8fcceab4d615600d5de41df285027caa4a Author: Velmurugan Periasamy AuthorDate: Wed Aug 7 14:52:49 2019 -0400 RANGER-2452: Updated docs with 2.0.0 release info --- docs/pom.xml | 2 +- docs/src/site/site.xml | 1 + docs/src/site/xdoc/download.xml | 12 +++- docs/src/site/xdoc/quick_start_guide.xml | 2 +- 4 files changed, 14 insertions(+), 3 deletions(-) diff --git a/docs/pom.xml b/docs/pom.xml index 42cc84a..0d592eb 100644 --- a/docs/pom.xml +++ b/docs/pom.xml @@ -24,7 +24,7 @@ http://ranger.apache.org/ 4.0.0 org.apache.ranger -2.0.0-SNAPSHOT +2.1.0-SNAPSHOT ranger pom diff --git a/docs/src/site/site.xml b/docs/src/site/site.xml index 19c7bee..5e3b3f4 100644 --- a/docs/src/site/site.xml +++ b/docs/src/site/site.xml @@ -62,6 +62,7 @@ under the License. https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger; /> +https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+2.0.0+-+Release+Notes; /> https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+1.2.0+-+Release+Notes; /> https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+1.1.0+-+Release+Notes; /> https://cwiki.apache.org/confluence/display/RANGER/1.0.0+Release+-+Apache+Ranger; /> diff --git a/docs/src/site/xdoc/download.xml b/docs/src/site/xdoc/download.xml index 1b672ec..cf595ef 100644 --- a/docs/src/site/xdoc/download.xml +++ b/docs/src/site/xdoc/download.xml @@ -31,7 +31,17 @@ LICENSE.txt and NOTICE.txt files contained in each release artifact. -Current Stable release is Apache Ranger 1.2.0: +Current Stable release is Apache Ranger 2.0.0: + + +https://www.apache.org/dyn/closer.lua/ranger/2.0.0/apache-ranger-2.0.0.tar.gz;>apache-ranger-2.0.0.tar.gz +(https://www.apache.org/dist/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.asc;>PGP) +(https://www.apache.org/dist/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha512;>Digest) + + + + +An older branch release is Apache Ranger 1.2.0: https://www.apache.org/dyn/closer.lua/ranger/1.2.0/apache-ranger-1.2.0.tar.gz;>apache-ranger-1.2.0.tar.gz diff --git a/docs/src/site/xdoc/quick_start_guide.xml b/docs/src/site/xdoc/quick_start_guide.xml index eaa2889..91c9fd8 100644 --- a/docs/src/site/xdoc/quick_start_guide.xml +++ b/docs/src/site/xdoc/quick_start_guide.xml @@ -112,7 +112,7 @@ 3. Get the keys used to sign the releases for verification. https://dist.apache.org/repos/dist/release/ranger/KEYS $ gpg --import KEYS - $ gpg --fingerprint + $ gpg --fingerprint key-id
svn commit: r1864668 - in /ranger/site/trunk: download.html faq.html index.html quick_start_guide.html
Author: vel Date: Wed Aug 7 18:58:49 2019 New Revision: 1864668 URL: http://svn.apache.org/viewvc?rev=1864668=rev Log: Updated version in docs Modified: ranger/site/trunk/download.html ranger/site/trunk/faq.html ranger/site/trunk/index.html ranger/site/trunk/quick_start_guide.html Modified: ranger/site/trunk/download.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/download.html?rev=1864668=1864667=1864668=diff == --- ranger/site/trunk/download.html (original) +++ ranger/site/trunk/download.html Wed Aug 7 18:58:49 2019 @@ -26,7 +26,7 @@ Last Published: 2019-08-07| - Version: 2.0.0-SNAPSHOT| + Version: 2.1.0-SNAPSHOT| Ranger/ Modified: ranger/site/trunk/faq.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/faq.html?rev=1864668=1864667=1864668=diff == --- ranger/site/trunk/faq.html (original) +++ ranger/site/trunk/faq.html Wed Aug 7 18:58:49 2019 @@ -26,7 +26,7 @@ Last Published: 2019-08-07| - Version: 2.0.0-SNAPSHOT| + Version: 2.1.0-SNAPSHOT| Ranger/ Frequently Asked Questions Modified: ranger/site/trunk/index.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/index.html?rev=1864668=1864667=1864668=diff == --- ranger/site/trunk/index.html (original) +++ ranger/site/trunk/index.html Wed Aug 7 18:58:49 2019 @@ -28,7 +28,7 @@ Last Published: 2019-08-07| - Version: 2.0.0-SNAPSHOT| + Version: 2.1.0-SNAPSHOT| Ranger/ Introduction Modified: ranger/site/trunk/quick_start_guide.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/quick_start_guide.html?rev=1864668=1864667=1864668=diff == --- ranger/site/trunk/quick_start_guide.html (original) +++ ranger/site/trunk/quick_start_guide.html Wed Aug 7 18:58:49 2019 @@ -27,7 +27,7 @@ Last Published: 2019-08-07| - Version: 2.0.0-SNAPSHOT| + Version: 2.1.0-SNAPSHOT| Ranger/ Build and Check Release
svn commit: r1864666 [13/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_TagREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_TagREST.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/resource_TagREST.html (original) +++ ranger/site/trunk/apidocs/resource_TagREST.html Wed Aug 7 18:46:37 2019 @@ -143,165 +143,165 @@ Content-Type: application/json { - tagUpdateTime : 12345, - serviceName : ..., - resourceToTagIds : { -property1 : [ 12345, 12345 ], -property2 : [ 12345, 12345 ] - }, tags : { property1 : { + type : ..., validityPeriods : [ { recurrences : [ { }, { } ], -timeZone : ..., endTime : ..., -startTime : ... +startTime : ..., +timeZone : ... }, { recurrences : [ { }, { } ], -timeZone : ..., endTime : ..., -startTime : ... +startTime : ..., +timeZone : ... } ], - type : ..., - options : { -property1 : { }, -property2 : { } - }, - owner : 12345, attributes : { property1 : ..., property2 : ... }, - version : 12345, + owner : 12345, + options : { +property1 : { }, +property2 : { } + }, createTime : 12345, - isEnabled : true, + updatedBy : ..., + version : 12345, + updateTime : 12345, + id : 12345, createdBy : ..., guid : ..., - id : 12345, - updatedBy : ..., - updateTime : 12345 + isEnabled : true }, property2 : { + type : ..., validityPeriods : [ { recurrences : [ { }, { } ], -timeZone : ..., endTime : ..., -startTime : ... +startTime : ..., +timeZone : ... }, { recurrences : [ { }, { } ], -timeZone : ..., endTime : ..., -startTime : ... +startTime : ..., +timeZone : ... } ], - type : ..., - options : { -property1 : { }, -property2 : { } - }, - owner : 12345, attributes : { property1 : ..., property2 : ... }, - version : 12345, + owner : 12345, + options : { +property1 : { }, +property2 : { } + }, createTime : 12345, - isEnabled : true, - createdBy : ..., - guid : ..., - id : 12345, updatedBy : ..., - updateTime : 12345 -} - }, - op : ..., - tagDefinitions : { -property1 : { - name : ..., - attributeDefs : [ { -name : ..., -type : ... - }, { -name : ..., -type : ... - } ], - source : ..., version : 12345, - createTime : 12345, - isEnabled : true, - createdBy : ..., - guid : ..., + updateTime : 12345, id : 12345, - updatedBy : ..., - updateTime : 12345 -}, -property2 : { - name : ..., - attributeDefs : [ { -name : ..., -type : ... - }, { -name : ..., -type : ... - } ], - source : ..., - version : 12345, - createTime : 12345, - isEnabled : true, createdBy : ..., guid : ..., - id : 12345, - updatedBy : ..., - updateTime : 12345 + isEnabled : true } }, - tagVersion : 12345, serviceResources : [ { resourceSignature : ..., resourceElements : { property1 : { +isExcludes : true, values : [ ..., ... ], -isRecursive : true, -isExcludes : true +isRecursive : true }, property2 : { +isExcludes : true, values : [ ..., ... ], -isRecursive : true, -isExcludes : true +isRecursive : true } }, serviceName : ..., -version : 12345, createTime : 12345, -isEnabled : true, +updatedBy : ..., +version : 12345, +updateTime : 12345, +id : 12345, createdBy : ..., guid : ..., -id : 12345, -updatedBy : ..., -updateTime : 12345 +isEnabled : true }, { resourceSignature : ..., resourceElements : { property1 : { +isExcludes : true, values : [ ..., ... ], -isRecursive : true, -isExcludes : true +isRecursive : true }, property2 : { +isExcludes : true, values : [ ..., ... ], -isRecursive : true, -isExcludes : true +isRecursive : true } }, serviceName : ..., -version : 12345, createTime : 12345, -isEnabled : true, +updatedBy : ..., +version : 12345, +updateTime : 12345, +id : 12345, createdBy : ..., guid : ..., -id : 12345, -updatedBy : ..., -updateTime : 12345 - } ] +isEnabled : true + } ], + tagVersion : 12345, + serviceName :
svn commit: r1864666 [10/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_PublicAPIsv2.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_PublicAPIsv2.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/resource_PublicAPIsv2.html (original) +++ ranger/site/trunk/apidocs/resource_PublicAPIsv2.html Wed Aug 7 18:46:37 2019 @@ -221,12 +221,17 @@ Content-Type: application/json [ { - resourceSignature : ..., - description : ..., - rowFilterPolicyItems : [ { -rowFilterInfo : { - filterExpr : ... -}, + policyItems : [ { +roles : [ ..., ... ], +groups : [ ..., ... ], +conditions : [ { + type : ..., + values : [ ..., ... ] +}, { + type : ..., + values : [ ..., ... ] +} ], +delegateAdmin : true, accesses : [ { type : ..., isAllowed : true @@ -234,21 +239,18 @@ Content-Type: application/json type : ..., isAllowed : true } ], -users : [ ..., ... ], -delegateAdmin : true, +users : [ ..., ... ] + }, { +roles : [ ..., ... ], +groups : [ ..., ... ], conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -roles : [ ..., ... ], -groups : [ ..., ... ] - }, { -rowFilterInfo : { - filterExpr : ... -}, +delegateAdmin : true, accesses : [ { type : ..., isAllowed : true @@ -256,19 +258,19 @@ Content-Type: application/json type : ..., isAllowed : true } ], -users : [ ..., ... ], -delegateAdmin : true, +users : [ ..., ... ] + } ], + allowExceptions : [ { +roles : [ ..., ... ], +groups : [ ..., ... ], conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -roles : [ ..., ... ], -groups : [ ..., ... ] - } ], - policyItems : [ { +delegateAdmin : true, accesses : [ { type : ..., isAllowed : true @@ -276,18 +278,18 @@ Content-Type: application/json type : ..., isAllowed : true } ], -users : [ ..., ... ], -delegateAdmin : true, +users : [ ..., ... ] + }, { +roles : [ ..., ... ], +groups : [ ..., ... ], conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -roles : [ ..., ... ], -groups : [ ..., ... ] - }, { +delegateAdmin : true, accesses : [ { type : ..., isAllowed : true @@ -295,20 +297,37 @@ Content-Type: application/json type : ..., isAllowed : true } ], -users : [ ..., ... ], -delegateAdmin : true, +users : [ ..., ... ] + } ], + service : ..., + conditions : [ { +type : ..., +values : [ ..., ... ] + }, { +type : ..., +values : [ ..., ... ] + } ], + resourceSignature : ..., + policyLabels : [ ..., ... ], + name : ..., + options : { +property1 : { }, +property2 : { } + }, + rowFilterPolicyItems : [ { +rowFilterInfo : { + filterExpr : ... +}, +roles : [ ..., ... ], +groups : [ ..., ... ], conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -roles : [ ..., ... ], -groups : [ ..., ... ] - } ], - policyType : 12345, - allowExceptions : [ { +delegateAdmin : true, accesses : [ { type : ..., isAllowed : true @@ -316,18 +335,21 @@ Content-Type: application/json type : ..., isAllowed : true } ], -users : [ ..., ... ], -delegateAdmin : true, +users : [ ..., ... ] + }, { +rowFilterInfo : { + filterExpr : ... +}, +roles : [ ..., ... ], +groups : [ ..., ... ], conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -roles : [ ..., ... ], -groups : [ ..., ... ] - }, { +delegateAdmin : true, accesses : [ { type : ..., isAllowed : true @@ -335,20 +357,56 @@ Content-Type: application/json type : ..., isAllowed : true } ], -users : [ ..., ... ], -delegateAdmin : true, -conditions : [ { +users : [ ..., ... ] + } ], + resources : { +property1 : { + isExcludes : true, values : [ ..., ... ], - type :
svn commit: r1864666 [9/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/ns0.xsd URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/ns0.xsd?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/ns0.xsd (original) +++ ranger/site/trunk/apidocs/ns0.xsd Wed Aug 7 18:46:37 2019 @@ -216,28 +216,28 @@ - - - - + + + + - + + + - - - + @@ -3550,30 +3550,30 @@ - - - + - + - + + + - + @@ -3591,25 +3591,31 @@ - - + + + + - + - - + + + + + + @@ -3626,20 +3632,14 @@ - - - - - - - - - - + + + + @@ -3647,23 +3647,7 @@ - - - - - - - - - - - - - - - - - + @@ -3679,7 +3663,17 @@ - + + + + + + + + + + + @@ -3695,23 +3689,29 @@ - + + + + + + + - + - + - + - + - + @@ -3733,13 +3733,13 @@ - + - + @@ -3766,12 +3766,12 @@ - - + + @@ -3784,11 +3784,11 @@ - + - + @@ -3806,12 +3806,12 @@ + + - - @@ -3819,17 +3819,13 @@ - - - - - + - + - + @@ -3845,6 +3841,10 @@ + + + + @@ -3852,10 +3852,10 @@ - - + + @@ -3863,6 +3863,14 @@ + + + + + + + + @@ -3877,20 +3885,12 @@ - +
svn commit: r1864666 [7/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_ServicePolicies.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_ServicePolicies.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_ServicePolicies.html (original) +++ ranger/site/trunk/apidocs/json_ServicePolicies.html Wed Aug 7 18:46:37 2019 @@ -79,9 +79,9 @@ -policyDeltas +userRoles -array of RangerPolicyDelta +map of array of string @@ -97,90 +97,90 @@ -auditMode +securityZones -string +map of SecurityZoneInfo -policyVersion +serviceDef -number +RangerServiceDef -serviceDef +policies -RangerServiceDef +array of RangerPolicy -securityZones +policyVersion -map of SecurityZoneInfo +number -policyUpdateTime +groupRoles -number +map of array of string -groupRoles +tagPolicies -map of array of string +TagPolicies -serviceName +policyDeltas -string +array of RangerPolicyDelta -userRoles +policyUpdateTime -map of array of string +number -tagPolicies +serviceName -TagPolicies +string -policies +auditMode -array of RangerPolicy +string @@ -192,878 +192,878 @@ Example { - policyDeltas : [ { -policy : { - resourceSignature : ..., - description : ..., - rowFilterPolicyItems : [ { }, { } ], - policyItems : [ { }, { } ], - policyType : 12345, - allowExceptions : [ { }, { } ], - service : ..., - denyExceptions : [ { }, { } ], - conditions : [ { }, { } ], - policyPriority : 12345, - serviceType : ..., - policyLabels : [ ..., ... ], - isDenyAllElse : true, - dataMaskPolicyItems : [ { }, { } ], - validitySchedules : [ { }, { } ], - resources : { -property1 : { }, -property2 : { } - }, - denyPolicyItems : [ { }, { } ], - zoneName : ..., - options : { -property1 : { }, -property2 : { } - }, - name : ..., - isAuditEnabled : true, - version : 12345, - createTime : 12345, - isEnabled : true, - createdBy : ..., - guid : ..., - id : 12345, - updatedBy : ..., - updateTime : 12345 -}, -id : 12345, -changeType : 12345 - }, { -policy : { - resourceSignature : ..., - description : ..., - rowFilterPolicyItems : [ { }, { } ], - policyItems : [ { }, { } ], - policyType : 12345, - allowExceptions : [ { }, { } ], - service : ..., - denyExceptions : [ { }, { } ], - conditions : [ { }, { } ], - policyPriority : 12345, - serviceType : ..., - policyLabels : [ ..., ... ], - isDenyAllElse : true, - dataMaskPolicyItems : [ { }, { } ], - validitySchedules : [ { }, { } ], - resources : { -property1 : { }, -property2 : { } - }, - denyPolicyItems : [ { }, { } ], - zoneName : ..., - options : { -property1 : { }, -property2 : { } - }, - name : ..., - isAuditEnabled : true, - version : 12345, - createTime : 12345, - isEnabled : true, - createdBy : ..., - guid : ..., - id : 12345, - updatedBy : ..., - updateTime : 12345 -}, -id : 12345, -changeType : 12345 - } ], + userRoles : { +property1 : [ ..., ... ], +property2 : [ ..., ... ] + }, serviceId : 12345, - auditMode : ..., - policyVersion : 12345, - serviceDef : { -enums : [ { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -}, { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -} ], -rbKeyLabel : ..., -dataMaskDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ], - maskTypes : [ { }, { } ] + securityZones : { +property1 : { + policies : [ { +policyItems : [ { }, { } ], +allowExceptions : [ { }, { } ], +service : ..., +conditions
svn commit: r1864666 [3/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerPolicy.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerPolicy.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_RangerPolicy.html (original) +++ ranger/site/trunk/apidocs/json_RangerPolicy.html Wed Aug 7 18:46:37 2019 @@ -79,61 +79,61 @@ -resourceSignature +policyItems -string +array of RangerPolicyItem -description +allowExceptions -string +array of RangerPolicyItem -rowFilterPolicyItems +service -array of RangerRowFilterPolicyItem +string -policyItems +conditions -array of RangerPolicyItem +array of RangerPolicyItemCondition -policyType +resourceSignature -number +string -allowExceptions +policyLabels -array of RangerPolicyItem +array of string -service +name string @@ -142,115 +142,115 @@ -denyExceptions +options -array of RangerPolicyItem +map of object -conditions +rowFilterPolicyItems -array of RangerPolicyItemCondition +array of RangerRowFilterPolicyItem -policyPriority +resources -number +map of RangerPolicyResource -serviceType +isDenyAllElse -string +boolean -policyLabels +isAuditEnabled -array of string +boolean -isDenyAllElse +validitySchedules -boolean +array of RangerValiditySchedule -dataMaskPolicyItems +denyExceptions -array of RangerDataMaskPolicyItem +array of RangerPolicyItem -validitySchedules +policyType -array of RangerValiditySchedule +number -resources +zoneName -map of RangerPolicyResource +string -denyPolicyItems +dataMaskPolicyItems -array of RangerPolicyItem +array of RangerDataMaskPolicyItem -zoneName +denyPolicyItems -string +array of RangerPolicyItem -options +policyPriority -map of object +number -name +description string @@ -259,9 +259,9 @@ -isAuditEnabled +serviceType -boolean +string @@ -273,50 +273,50 @@ - version + createTime number - createTime - number + updatedBy + string - isEnabled - boolean + version + number - createdBy - string + updateTime + number - guid - string + id + number - id - number + createdBy + string - updatedBy + guid string - updateTime - number + isEnabled + boolean @@ -326,12 +326,17 @@ Example { - resourceSignature : ..., - description : ..., - rowFilterPolicyItems : [ { -rowFilterInfo : { - filterExpr : ... -}, + policyItems : [ { +roles : [ ..., ... ], +groups : [ ..., ... ], +conditions : [ { + type : ..., + values : [ ..., ... ] +}, { + type : ..., + values : [ ..., ... ] +} ], +delegateAdmin : true, accesses : [ {
svn commit: r1864666 [14/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/ui/swagger.json URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/ui/swagger.json?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/ui/swagger.json (original) +++ ranger/site/trunk/apidocs/ui/swagger.json Wed Aug 7 18:46:37 2019 @@ -60,6 +60,12 @@ "type" : "object", "title" : "AccessResult", "properties" : { +"result" : { +"readOnly" : false, +"description" : "", +"type" : "integer", +"format" : "int32" +}, "isFinal" : { "readOnly" : false, "description" : "", @@ -68,166 +74,160 @@ "policy" : { "readOnly" : false, "$ref" : "#/definitions/json_RangerPolicy" -}, -"result" : { -"readOnly" : false, -"description" : "", -"type" : "integer", -"format" : "int32" } }, "example" : { + "result" : 12345, "isFinal" : true, "policy" : { -"resourceSignature" : "...", -"description" : "...", -"rowFilterPolicyItems" : [ { - "rowFilterInfo" : { }, - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, - "conditions" : [ { }, { } ], +"policyItems" : [ { "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -}, { - "rowFilterInfo" : { }, - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, + "groups" : [ "...", "..." ], "conditions" : [ { }, { } ], - "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -} ], -"policyItems" : [ { - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ], - "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -}, { "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, - "conditions" : [ { }, { } ], + "users" : [ "...", "..." ] +}, { "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] + "groups" : [ "...", "..." ], + "conditions" : [ { }, { } ], + "delegateAdmin" : true, + "accesses" : [ { }, { } ], + "users" : [ "...", "..." ] } ], -"policyType" : 12345, "allowExceptions" : [ { - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, - "conditions" : [ { }, { } ], "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -}, { - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, + "groups" : [ "...", "..." ], "conditions" : [ { }, { } ], - "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -} ], -"service" : "...", -"denyExceptions" : [ { - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ], - "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -}, { "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, - "conditions" : [ { }, { } ], + "users" : [ "...", "..." ] +}, { "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] + "groups" : [ "...", "..." ], + "conditions" : [ { }, { } ], + "delegateAdmin" : true, + "accesses" : [ { }, { } ], + "users" : [ "...", "..." ] } ], +"service" : "...", "conditions" : [ { - "values" : [ "...", "..." ], - "type" : "..." + "type" : "...", + "values" : [ "...", "..." ] }, { - "values" : [ "...", "..." ], - "type" : "..." + "type" : "...", + "values" : [ "...", "..." ] } ], -"policyPriority" : 12345, -"serviceType" : "...", +"resourceSignature" : "...", "policyLabels" : [ "...", "..." ], -"isDenyAllElse" : true, -"dataMaskPolicyItems" : [ { - "dataMaskInfo" : { }, - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, - "conditions" : [ { }, { } ], +"name" : "...", +"options" : { + "property1" : { }, + "property2" : { } +}, +"rowFilterPolicyItems" : [ { + "rowFilterInfo" : { }, "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -}, { - "dataMaskInfo" : { }, - "accesses" : [ { }, { } ], - "users" : [ "...", "..." ], - "delegateAdmin" : true, + "groups" : [ "...", "..." ], "conditions" : [ { }, { } ], - "roles" : [ "...", "..." ], - "groups" : [ "...", "..." ] -} ], -"validitySchedules" : [ { - "recurrences" : [ { }, { } ], - "timeZone" : "...", - "endTime" : "...", - "startTime" : "..." + "delegateAdmin" : true, + "accesses" : [ { }, {
svn commit: r1864666 [5/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerServiceDefList.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerServiceDefList.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_RangerServiceDefList.html (original) +++ ranger/site/trunk/apidocs/json_RangerServiceDefList.html Wed Aug 7 18:46:37 2019 @@ -147,373 +147,373 @@ { serviceDefs : [ { -enums : [ { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -}, { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -} ], -rbKeyLabel : ..., -dataMaskDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ], - maskTypes : [ { }, { } ] -}, -label : ..., -description : ..., -name : ..., -rbKeyDescription : ..., +implClass : ..., contextEnrichers : [ { enricherOptions : { property1 : ..., property2 : ... }, - enricher : ..., name : ..., - itemId : 12345 + itemId : 12345, + enricher : ... }, { enricherOptions : { property1 : ..., property2 : ... }, - enricher : ..., name : ..., - itemId : 12345 + itemId : 12345, + enricher : ... } ], -implClass : ..., -policyConditions : [ { +rbKeyDescription : ..., +configs : [ { name : ..., - description : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - validationMessage : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., - label : ..., - uiHint : ..., + mandatory : true, itemId : 12345, - rbKeyLabel : ..., - rbKeyDescription : ..., - evaluator : ... -}, { - name : ..., - description : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - validationMessage : ..., - rbKeyValidationMessage : ..., validationRegEx : ..., - label : ..., + type : ..., + validationMessage : ..., + subType : ..., uiHint : ..., - itemId : 12345, - rbKeyLabel : ..., rbKeyDescription : ..., - evaluator : ... -} ], -accessTypes : [ { - name : ..., + defaultValue : ..., rbKeyLabel : ..., label : ..., - impliedGrants : [ ..., ... ], - itemId : 12345 + description : ..., + rbKeyValidationMessage : ... }, { name : ..., - rbKeyLabel : ..., - label : ..., - impliedGrants : [ ..., ... ], - itemId : 12345 -} ], -rowFilterDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ] -}, -configs : [ { - rbKeyValidationMessage : ..., - rbKeyDescription : ..., - description : ..., + mandatory : true, itemId : 12345, - validationMessage : ..., - label : ..., - name : ..., + validationRegEx : ..., type : ..., - mandatory : true, - defaultValue : ..., - rbKeyLabel : ..., + validationMessage : ..., subType : ..., uiHint : ..., - validationRegEx : ... -}, { - rbKeyValidationMessage : ..., rbKeyDescription : ..., - description : ..., - itemId : 12345, - validationMessage : ..., - label : ..., - name : ..., - type : ..., - mandatory : true, defaultValue : ..., rbKeyLabel : ..., - subType : ..., - uiHint : ..., - validationRegEx : ... + label : ..., + description : ..., + rbKeyValidationMessage : ... +} ], +rbKeyLabel : ..., +name : ..., +enums : [ { + defaultIndex : 12345, + elements : [ { }, { } ], + itemId : 12345, + name : ... +}, { + defaultIndex : 12345, + elements : [ { }, { } ], + itemId : 12345, + name : ... } ], resources : [ { lookupSupported : true, - rbKeyValidationMessage : ..., - validationMessage : ..., - itemId : 12345, + name : ..., + description : ..., isValidLeaf : true, + uiHint : ..., matcher : ..., + accessTypeRestrictions : [ ..., ... ], + validationMessage : ..., excludesSupported : true, - name : ..., - rbKeyLabel : ..., + type : ..., + rbKeyValidationMessage : ..., + validationRegEx : ..., + itemId : 12345, recursiveSupported : true, - description : ..., level : 12345, - uiHint : ..., - label : ..., - accessTypeRestrictions : [ ..., ... ], matcherOptions : { property1 : ..., property2 : ... }, - parent : ..., - validationRegEx : ..., rbKeyDescription : ..., - type : ..., + parent : ..., +
svn commit: r1864666 [12/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_ServiceREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_ServiceREST.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/resource_ServiceREST.html (original) +++ ranger/site/trunk/apidocs/resource_ServiceREST.html Wed Aug 7 18:46:37 2019 @@ -271,373 +271,373 @@ Content-Type: application/json { serviceDefs : [ { -enums : [ { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -}, { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -} ], -rbKeyLabel : ..., -dataMaskDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ], - maskTypes : [ { }, { } ] -}, -label : ..., -description : ..., -name : ..., -rbKeyDescription : ..., +implClass : ..., contextEnrichers : [ { enricherOptions : { property1 : ..., property2 : ... }, - enricher : ..., name : ..., - itemId : 12345 + itemId : 12345, + enricher : ... }, { enricherOptions : { property1 : ..., property2 : ... }, - enricher : ..., name : ..., - itemId : 12345 + itemId : 12345, + enricher : ... } ], -implClass : ..., -policyConditions : [ { +rbKeyDescription : ..., +configs : [ { name : ..., - description : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - validationMessage : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., - label : ..., - uiHint : ..., + mandatory : true, itemId : 12345, - rbKeyLabel : ..., - rbKeyDescription : ..., - evaluator : ... -}, { - name : ..., - description : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - validationMessage : ..., - rbKeyValidationMessage : ..., validationRegEx : ..., - label : ..., + type : ..., + validationMessage : ..., + subType : ..., uiHint : ..., - itemId : 12345, - rbKeyLabel : ..., rbKeyDescription : ..., - evaluator : ... -} ], -accessTypes : [ { - name : ..., + defaultValue : ..., rbKeyLabel : ..., label : ..., - impliedGrants : [ ..., ... ], - itemId : 12345 + description : ..., + rbKeyValidationMessage : ... }, { name : ..., - rbKeyLabel : ..., - label : ..., - impliedGrants : [ ..., ... ], - itemId : 12345 -} ], -rowFilterDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ] -}, -configs : [ { - rbKeyValidationMessage : ..., - rbKeyDescription : ..., - description : ..., + mandatory : true, itemId : 12345, - validationMessage : ..., - label : ..., - name : ..., + validationRegEx : ..., type : ..., - mandatory : true, - defaultValue : ..., - rbKeyLabel : ..., + validationMessage : ..., subType : ..., uiHint : ..., - validationRegEx : ... -}, { - rbKeyValidationMessage : ..., rbKeyDescription : ..., - description : ..., - itemId : 12345, - validationMessage : ..., - label : ..., - name : ..., - type : ..., - mandatory : true, defaultValue : ..., rbKeyLabel : ..., - subType : ..., - uiHint : ..., - validationRegEx : ... + label : ..., + description : ..., + rbKeyValidationMessage : ... +} ], +rbKeyLabel : ..., +name : ..., +enums : [ { + defaultIndex : 12345, + elements : [ { }, { } ], + itemId : 12345, + name : ... +}, { + defaultIndex : 12345, + elements : [ { }, { } ], + itemId : 12345, + name : ... } ], resources : [ { lookupSupported : true, - rbKeyValidationMessage : ..., - validationMessage : ..., - itemId : 12345, + name : ..., + description : ..., isValidLeaf : true, + uiHint : ..., matcher : ..., + accessTypeRestrictions : [ ..., ... ], + validationMessage : ..., excludesSupported : true, - name : ..., - rbKeyLabel : ..., + type : ..., + rbKeyValidationMessage : ..., + validationRegEx : ..., + itemId : 12345, recursiveSupported : true, - description : ..., level : 12345, - uiHint : ..., - label : ..., - accessTypeRestrictions : [ ..., ... ], matcherOptions : { property1 : ..., property2 : ... }, - parent : ..., - validationRegEx : ..., rbKeyDescription : ..., - type : ..., + parent : ...,
svn commit: r1864666 [8/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_TagPolicies.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_TagPolicies.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_TagPolicies.html (original) +++ ranger/site/trunk/apidocs/json_TagPolicies.html Wed Aug 7 18:46:37 2019 @@ -79,52 +79,52 @@ -policies +auditMode -array of RangerPolicy +string -serviceDef +policyUpdateTime -RangerServiceDef +number -policyUpdateTime +policies -number +array of RangerPolicy -serviceId +serviceDef -number +RangerServiceDef -serviceName +policyVersion -string +number -auditMode +serviceName string @@ -133,7 +133,7 @@ -policyVersion +serviceId number @@ -147,493 +147,493 @@ Example { + auditMode : ..., + policyUpdateTime : 12345, policies : [ { -resourceSignature : ..., -description : ..., -rowFilterPolicyItems : [ { - rowFilterInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], +policyItems : [ { roles : [ ..., ... ], - groups : [ ..., ... ] -}, { - rowFilterInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, + groups : [ ..., ... ], conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -} ], -policyItems : [ { - accesses : [ { }, { } ], - users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -}, { accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], + users : [ ..., ... ] +}, { roles : [ ..., ... ], - groups : [ ..., ... ] + groups : [ ..., ... ], + conditions : [ { }, { } ], + delegateAdmin : true, + accesses : [ { }, { } ], + users : [ ..., ... ] } ], -policyType : 12345, allowExceptions : [ { - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], roles : [ ..., ... ], - groups : [ ..., ... ] -}, { - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, + groups : [ ..., ... ], conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -} ], -service : ..., -denyExceptions : [ { - accesses : [ { }, { } ], - users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -}, { accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], + users : [ ..., ... ] +}, { roles : [ ..., ... ], - groups : [ ..., ... ] + groups : [ ..., ... ], + conditions : [ { }, { } ], + delegateAdmin : true, + accesses : [ { }, { } ], + users : [ ..., ... ] } ], +service : ..., conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -policyPriority : 12345, -serviceType : ..., +resourceSignature : ..., policyLabels : [ ..., ... ], -isDenyAllElse : true, -dataMaskPolicyItems : [ { - dataMaskInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], +name : ..., +options : { + property1 : { }, + property2 : { } +}, +rowFilterPolicyItems : [ { + rowFilterInfo : { }, roles : [ ..., ... ], - groups : [ ..., ... ] -}, { - dataMaskInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, + groups : [ ..., ... ], conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -} ], -validitySchedules : [ { - recurrences : [ { }, { } ], - timeZone : ..., - endTime : ..., - startTime : ... + delegateAdmin : true, + accesses : [ { }, { } ], + users : [ ..., ... ]
svn commit: r1864666 [11/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_RoleREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_RoleREST.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/resource_RoleREST.html (original) +++ ranger/site/trunk/apidocs/resource_RoleREST.html Wed Aug 7 18:46:37 2019 @@ -133,79 +133,79 @@ Content-Type: application/json { roles : [ { +options : { + property1 : { }, + property2 : { } +}, +createdByUser : ..., +groups : [ { + isAdmin : true, + name : ... +}, { + isAdmin : true, + name : ... +} ], +description : ..., roles : [ { - name : ..., - isAdmin : true + isAdmin : true, + name : ... }, { - name : ..., - isAdmin : true + isAdmin : true, + name : ... } ], users : [ { - name : ..., - isAdmin : true + isAdmin : true, + name : ... }, { - name : ..., - isAdmin : true + isAdmin : true, + name : ... } ], name : ..., -groups : [ { - name : ..., - isAdmin : true -}, { - name : ..., - isAdmin : true -} ], +createTime : 12345, +updatedBy : ..., +version : 12345, +updateTime : 12345, +id : 12345, +createdBy : ..., +guid : ..., +isEnabled : true + }, { options : { property1 : { }, property2 : { } }, createdByUser : ..., +groups : [ { + isAdmin : true, + name : ... +}, { + isAdmin : true, + name : ... +} ], description : ..., -version : 12345, -createTime : 12345, -isEnabled : true, -createdBy : ..., -guid : ..., -id : 12345, -updatedBy : ..., -updateTime : 12345 - }, { roles : [ { - name : ..., - isAdmin : true + isAdmin : true, + name : ... }, { - name : ..., - isAdmin : true + isAdmin : true, + name : ... } ], users : [ { - name : ..., - isAdmin : true + isAdmin : true, + name : ... }, { - name : ..., - isAdmin : true + isAdmin : true, + name : ... } ], name : ..., -groups : [ { - name : ..., - isAdmin : true -}, { - name : ..., - isAdmin : true -} ], -options : { - property1 : { }, - property2 : { } -}, -createdByUser : ..., -description : ..., -version : 12345, createTime : 12345, -isEnabled : true, +updatedBy : ..., +version : 12345, +updateTime : 12345, +id : 12345, createdBy : ..., guid : ..., -id : 12345, -updatedBy : ..., -updateTime : 12345 +isEnabled : true } ], listSize : 12345, list : [ { }, { } ], @@ -304,42 +304,42 @@ Accept: application/json { + options : { +property1 : { }, +property2 : { } + }, + createdByUser : ..., + groups : [ { +isAdmin : true, +name : ... + }, { +isAdmin : true, +name : ... + } ], + description : ..., roles : [ { -name : ..., -isAdmin : true +isAdmin : true, +name : ... }, { -name : ..., -isAdmin : true +isAdmin : true, +name : ... } ], users : [ { -name : ..., -isAdmin : true +isAdmin : true, +name : ... }, { -name : ..., -isAdmin : true +isAdmin : true, +name : ... } ], name : ..., - groups : [ { -name : ..., -isAdmin : true - }, { -name : ..., -isAdmin : true - } ], - options : { -property1 : { }, -property2 : { } - }, - createdByUser : ..., - description : ..., - version : 12345, createTime : 12345, - isEnabled : true, + updatedBy : ..., + version : 12345, + updateTime : 12345, + id : 12345, createdBy : ..., guid : ..., - id : 12345, - updatedBy : ..., - updateTime : 12345 + isEnabled : true } @@ -352,42 +352,42 @@ Content-Type: application/json { + options : { +property1 : { }, +property2 : { } + }, + createdByUser : ..., + groups : [ { +isAdmin : true, +name : ... + }, { +isAdmin : true, +name : ... + } ], + description : ..., roles : [ { -name : ..., -isAdmin : true +isAdmin : true, +name : ... }, { -name : ..., -isAdmin : true +isAdmin : true, +name : ... } ], users : [ { -name : ..., -isAdmin : true +isAdmin : true, +name : ... }, { -name : ..., -isAdmin : true +isAdmin : true, +name : ... } ], name : ..., - groups : [ { -name : ..., -isAdmin : true - }, { -name : ..., -isAdmin : true - } ], - options : { -property1 : { }, -property2 : { } - }, - createdByUser : ..., - description : ..., - version : 12345, createTime : 12345, - isEnabled : true, + updatedBy : ..., +
svn commit: r1864666 [15/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html Wed Aug 7 18:46:37 2019 @@ -163,16 +163,16 @@ Example r- - statusCode.../statusCode - msgDesc.../msgDesc messageList -message.../message +fieldName.../fieldName +rbKey.../rbKey name.../name objectId.../objectId -rbKey.../rbKey -fieldName.../fieldName +message.../message /messageList + statusCode.../statusCode httpStatusCode.../httpStatusCode + msgDesc.../msgDesc /r- Modified: ranger/site/trunk/apidocs/xml_ns0_accessResult.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_accessResult.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/xml_ns0_accessResult.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_accessResult.html Wed Aug 7 18:46:37 2019 @@ -146,78 +146,78 @@ accessResult isFinal.../isFinal - result.../result policy -policyType.../policyType -service.../service -policyPriority.../policyPriority -isDenyAllElse.../isDenyAllElse +policyLabels.../policyLabels +resources.../resources +rowFilterPolicyItems + rowFilterInfo/ +/rowFilterPolicyItems +policyItems + groups.../groups + accesses/ + delegateAdmin.../delegateAdmin + users.../users + conditions/ + roles.../roles +/policyItems dataMaskPolicyItems dataMaskInfo/ /dataMaskPolicyItems -zoneName.../zoneName -name.../name -resourceSignature.../resourceSignature +isAuditEnabled.../isAuditEnabled serviceType.../serviceType -resources.../resources +validitySchedules + timeZone.../timeZone + startTime.../startTime + recurrences/ + endTime.../endTime +/validitySchedules +options.../options +zoneName.../zoneName conditions type.../type values.../values /conditions -options.../options -policyItems +denyPolicyItems groups.../groups - conditions/ + accesses/ delegateAdmin.../delegateAdmin users.../users - accesses/ + conditions/ roles.../roles -/policyItems +/denyPolicyItems +isDenyAllElse.../isDenyAllElse description.../description allowExceptions groups.../groups - conditions/ + accesses/ delegateAdmin.../delegateAdmin users.../users - accesses/ + conditions/ roles.../roles /allowExceptions -isAuditEnabled.../isAuditEnabled -rowFilterPolicyItems - rowFilterInfo/ -/rowFilterPolicyItems +policyPriority.../policyPriority +policyType.../policyType denyExceptions groups.../groups - conditions/ - delegateAdmin.../delegateAdmin - users.../users accesses/ - roles.../roles -/denyExceptions -denyPolicyItems - groups.../groups - conditions/ delegateAdmin.../delegateAdmin users.../users - accesses/ + conditions/ roles.../roles -/denyPolicyItems -validitySchedules - timeZone.../timeZone - endTime.../endTime - recurrences/ - startTime.../startTime -/validitySchedules -policyLabels.../policyLabels +/denyExceptions +name.../name +service.../service +resourceSignature.../resourceSignature createTime.../createTime -isEnabled.../isEnabled updateTime.../updateTime +id.../id guid.../guid +version.../version createdBy.../createdBy -id.../id +isEnabled.../isEnabled updatedBy.../updatedBy -version.../version /policy + result.../result /accessResult Modified: ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html Wed Aug 7 18:46:37 2019 @@ -397,23 +397,23 @@ Example grantRevokeRequest - isRecursive.../isRecursive - replaceExistingPermissions.../replaceExistingPermissions - clientType.../clientType + clusterName.../clusterName grantor.../grantor + zoneName.../zoneName groups.../groups + grantorGroups.../grantorGroups delegateAdmin.../delegateAdmin + enableAudit.../enableAudit + roles.../roles accessTypes.../accessTypes + clientType.../clientType + isRecursive.../isRecursive +
svn commit: r1864666 [2/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerAccessResourceReadOnly.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerAccessResourceReadOnly.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_RangerAccessResourceReadOnly.html (original) +++ ranger/site/trunk/apidocs/json_RangerAccessResourceReadOnly.html Wed Aug 7 18:46:37 2019 @@ -81,7 +81,7 @@ -cacheKey +asString string @@ -90,34 +90,34 @@ -serviceDef +keys -RangerServiceDef +array of string -readOnlyCopy +leafName -RangerAccessResource +string -leafName +readOnlyCopy -string +RangerAccessResource -ownerUser +cacheKey string @@ -126,7 +126,7 @@ -asString +ownerUser string @@ -144,9 +144,9 @@ -keys +serviceDef -array of string +RangerServiceDef @@ -158,240 +158,240 @@ Example { - cacheKey : ..., - serviceDef : { -enums : [ { - name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -}, { + asString : ..., + keys : [ ..., ... ], + leafName : ..., + readOnlyCopy : { +ownerUser : ..., +asMap : { + property1 : { }, + property2 : { } +}, +readOnlyCopy : { }, +keys : [ ..., ... ], +serviceDef : { + implClass : ..., + contextEnrichers : [ { }, { } ], + rbKeyDescription : ..., + configs : [ { }, { } ], + rbKeyLabel : ..., name : ..., - defaultIndex : 12345, - itemId : 12345, - elements : [ { }, { } ] -} ], -rbKeyLabel : ..., -dataMaskDef : { + enums : [ { }, { } ], resources : [ { }, { } ], + dataMaskDef : { }, + policyConditions : [ { }, { } ], + label : ..., accessTypes : [ { }, { } ], - maskTypes : [ { }, { } ] + description : ..., + rowFilterDef : { }, + options : { +property1 : ..., +property2 : ... + }, + createTime : 12345, + updatedBy : ..., + version : 12345, + updateTime : 12345, + id : 12345, + createdBy : ..., + guid : ..., + isEnabled : true }, -label : ..., -description : ..., -name : ..., -rbKeyDescription : ..., +leafName : ..., +cacheKey : ..., +asString : ... + }, + cacheKey : ..., + ownerUser : ..., + asMap : { +property1 : { }, +property2 : { } + }, + serviceDef : { +implClass : ..., contextEnrichers : [ { enricherOptions : { property1 : ..., property2 : ... }, - enricher : ..., name : ..., - itemId : 12345 + itemId : 12345, + enricher : ... }, { enricherOptions : { property1 : ..., property2 : ... }, - enricher : ..., name : ..., - itemId : 12345 + itemId : 12345, + enricher : ... } ], -implClass : ..., -policyConditions : [ { +rbKeyDescription : ..., +configs : [ { name : ..., - description : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - validationMessage : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., - label : ..., - uiHint : ..., + mandatory : true, itemId : 12345, - rbKeyLabel : ..., - rbKeyDescription : ..., - evaluator : ... -}, { - name : ..., - description : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - validationMessage : ..., - rbKeyValidationMessage : ..., validationRegEx : ..., - label : ..., + type : ..., + validationMessage : ..., + subType : ..., uiHint : ..., - itemId : 12345, - rbKeyLabel : ..., rbKeyDescription : ..., - evaluator : ... -} ], -accessTypes : [ { - name : ..., + defaultValue : ..., rbKeyLabel : ..., label : ..., - impliedGrants : [ ..., ... ], - itemId : 12345 + description : ..., + rbKeyValidationMessage : ... }, { name : ..., - rbKeyLabel : ..., - label : ..., - impliedGrants : [ ..., ... ], - itemId : 12345 -} ], -rowFilterDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ] -}, -configs : [ { - rbKeyValidationMessage : ..., - rbKeyDescription : ..., -
svn commit: r1864666 [4/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerResourceDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerResourceDef.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_RangerResourceDef.html (original) +++ ranger/site/trunk/apidocs/json_RangerResourceDef.html Wed Aug 7 18:46:37 2019 @@ -88,7 +88,7 @@ -rbKeyValidationMessage +name string @@ -97,7 +97,7 @@ -validationMessage +description string @@ -106,18 +106,18 @@ -itemId +isValidLeaf -number +boolean -isValidLeaf +uiHint -boolean +string @@ -133,16 +133,16 @@ -excludesSupported +accessTypeRestrictions -boolean +array of string -name +validationMessage string @@ -151,25 +151,25 @@ -rbKeyLabel +excludesSupported -string +boolean -recursiveSupported +type -boolean +string -description +rbKeyValidationMessage string @@ -178,36 +178,36 @@ -level +validationRegEx -number +string -uiHint +itemId -string +number -label +recursiveSupported -string +boolean -accessTypeRestrictions +level -array of string +number @@ -223,7 +223,7 @@ -parent +rbKeyDescription string @@ -232,7 +232,7 @@ -validationRegEx +parent string @@ -241,7 +241,7 @@ -rbKeyDescription +rbKeyLabel string @@ -250,7 +250,7 @@ -type +label string @@ -274,28 +274,28 @@ { lookupSupported : true, - rbKeyValidationMessage : ..., - validationMessage : ..., - itemId : 12345, + name : ..., + description : ..., isValidLeaf : true, + uiHint : ..., matcher : ..., + accessTypeRestrictions : [ ..., ... ], + validationMessage : ..., excludesSupported : true, - name : ..., - rbKeyLabel : ..., + type : ..., + rbKeyValidationMessage : ..., + validationRegEx : ..., + itemId : 12345, recursiveSupported : true, - description : ..., level : 12345, - uiHint : ..., - label : ..., - accessTypeRestrictions : [ ..., ... ], matcherOptions : { property1 : ..., property2 : ... }, - parent : ..., - validationRegEx : ..., rbKeyDescription : ..., - type : ..., + parent : ..., + rbKeyLabel : ..., + label : ..., mandatory : true } Modified: ranger/site/trunk/apidocs/json_RangerRole.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerRole.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_RangerRole.html (original) +++ ranger/site/trunk/apidocs/json_RangerRole.html Wed Aug 7 18:46:37 2019 @@ -79,61 +79,61 @@ -roles +options -array of RoleMember +map of object -users +createdByUser -array of RoleMember +string -name +groups -string +array of RoleMember -groups +description -array of RoleMember +string -options +roles -map of object +array of RoleMember -createdByUser +users -string +array of RoleMember -description +name string @@ -147,50 +147,50 @@ - version + createTime number - createTime - number
svn commit: r1864666 [6/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_SecurityZoneInfo.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_SecurityZoneInfo.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/json_SecurityZoneInfo.html (original) +++ ranger/site/trunk/apidocs/json_SecurityZoneInfo.html Wed Aug 7 18:46:37 2019 @@ -79,45 +79,45 @@ -containsAssociatedTagService +policies -boolean +array of RangerPolicy -policies +resources -array of RangerPolicy +array of map of array of object -resources +policyDeltas -array of map of array of object +array of RangerPolicyDelta -zoneName +containsAssociatedTagService -string +boolean -policyDeltas +zoneName -array of RangerPolicyDelta +string @@ -129,303 +129,302 @@ Example { - containsAssociatedTagService : true, policies : [ { -resourceSignature : ..., -description : ..., -rowFilterPolicyItems : [ { - rowFilterInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], +policyItems : [ { roles : [ ..., ... ], - groups : [ ..., ... ] -}, { - rowFilterInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, + groups : [ ..., ... ], conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -} ], -policyItems : [ { - accesses : [ { }, { } ], - users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -}, { accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], + users : [ ..., ... ] +}, { roles : [ ..., ... ], - groups : [ ..., ... ] + groups : [ ..., ... ], + conditions : [ { }, { } ], + delegateAdmin : true, + accesses : [ { }, { } ], + users : [ ..., ... ] } ], -policyType : 12345, allowExceptions : [ { - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], roles : [ ..., ... ], - groups : [ ..., ... ] -}, { - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, + groups : [ ..., ... ], conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -} ], -service : ..., -denyExceptions : [ { - accesses : [ { }, { } ], - users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -}, { accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], + users : [ ..., ... ] +}, { roles : [ ..., ... ], - groups : [ ..., ... ] + groups : [ ..., ... ], + conditions : [ { }, { } ], + delegateAdmin : true, + accesses : [ { }, { } ], + users : [ ..., ... ] } ], +service : ..., conditions : [ { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] }, { - values : [ ..., ... ], - type : ... + type : ..., + values : [ ..., ... ] } ], -policyPriority : 12345, -serviceType : ..., +resourceSignature : ..., policyLabels : [ ..., ... ], -isDenyAllElse : true, -dataMaskPolicyItems : [ { - dataMaskInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ], +name : ..., +options : { + property1 : { }, + property2 : { } +}, +rowFilterPolicyItems : [ { + rowFilterInfo : { }, roles : [ ..., ... ], - groups : [ ..., ... ] -}, { - dataMaskInfo : { }, - accesses : [ { }, { } ], - users : [ ..., ... ], - delegateAdmin : true, + groups : [ ..., ... ], conditions : [ { }, { } ], - roles : [ ..., ... ], - groups : [ ..., ... ] -} ], -validitySchedules : [ { - recurrences : [ { }, { } ], - timeZone : ..., - endTime : ..., - startTime : ... + delegateAdmin : true, + accesses : [ { }, { } ], + users : [ ..., ... ] }, { - recurrences : [ { }, { } ], - timeZone : ..., - endTime : ..., - startTime
svn commit: r1864666 [16/16] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/xml_ns0_rangerServiceDefList.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_rangerServiceDefList.html?rev=1864666=1864665=1864666=diff == --- ranger/site/trunk/apidocs/xml_ns0_rangerServiceDefList.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_rangerServiceDefList.html Wed Aug 7 18:46:37 2019 @@ -187,102 +187,102 @@ rangerServiceDefList serviceDefs -rbKeyLabel.../rbKeyLabel -label.../label -configs - description.../description +resources + matcher.../matcher + level.../level + type.../type + recursiveSupported.../recursiveSupported label.../label - validationRegEx.../validationRegEx + matcherOptions.../matcherOptions + lookupSupported.../lookupSupported + mandatory.../mandatory rbKeyDescription.../rbKeyDescription - rbKeyLabel.../rbKeyLabel - type.../type - name.../name - uiHint.../uiHint itemId.../itemId - subType.../subType - validationMessage.../validationMessage - defaultValue.../defaultValue - mandatory.../mandatory - rbKeyValidationMessage.../rbKeyValidationMessage -/configs -resources uiHint.../uiHint excludesSupported.../excludesSupported + validationRegEx.../validationRegEx + parent.../parent + accessTypeRestrictions.../accessTypeRestrictions + validationMessage.../validationMessage isValidLeaf.../isValidLeaf - mandatory.../mandatory name.../name - recursiveSupported.../recursiveSupported - parent.../parent - validationRegEx.../validationRegEx - matcher.../matcher - rbKeyDescription.../rbKeyDescription - itemId.../itemId - label.../label - matcherOptions.../matcherOptions - lookupSupported.../lookupSupported - level.../level - rbKeyLabel.../rbKeyLabel - description.../description rbKeyValidationMessage.../rbKeyValidationMessage - type.../type - validationMessage.../validationMessage - accessTypeRestrictions.../accessTypeRestrictions + description.../description + rbKeyLabel.../rbKeyLabel /resources name.../name -implClass.../implClass -policyConditions +configs + mandatory.../mandatory label.../label - itemId.../itemId - description.../description - uiHint.../uiHint - evaluatorOptions.../evaluatorOptions - rbKeyValidationMessage.../rbKeyValidationMessage - name.../name - validationRegEx.../validationRegEx rbKeyDescription.../rbKeyDescription - validationMessage.../validationMessage + uiHint.../uiHint + defaultValue.../defaultValue + type.../type rbKeyLabel.../rbKeyLabel - evaluator.../evaluator -/policyConditions -rowFilterDef - resources/ - accessTypes/ -/rowFilterDef -description.../description -enums + validationMessage.../validationMessage + subType.../subType + validationRegEx.../validationRegEx + description.../description + rbKeyValidationMessage.../rbKeyValidationMessage itemId.../itemId name.../name - defaultIndex.../defaultIndex - elements/ -/enums +/configs accessTypes impliedGrants.../impliedGrants - rbKeyLabel.../rbKeyLabel - label.../label itemId.../itemId name.../name + rbKeyLabel.../rbKeyLabel + label.../label /accessTypes -options.../options +label.../label +policyConditions + validationRegEx.../validationRegEx + evaluator.../evaluator + rbKeyLabel.../rbKeyLabel + name.../name + rbKeyValidationMessage.../rbKeyValidationMessage + label.../label + rbKeyDescription.../rbKeyDescription + evaluatorOptions.../evaluatorOptions + description.../description + itemId.../itemId + validationMessage.../validationMessage + uiHint.../uiHint +/policyConditions contextEnrichers itemId.../itemId - enricher.../enricher - enricherOptions.../enricherOptions name.../name + enricherOptions.../enricherOptions + enricher.../enricher /contextEnrichers +options.../options +rbKeyDescription.../rbKeyDescription dataMaskDef + accessTypes/ resources/ maskTypes/ - accessTypes/ /dataMaskDef -rbKeyDescription.../rbKeyDescription +implClass.../implClass +enums + elements/ + defaultIndex.../defaultIndex + itemId.../itemId + name.../name +/enums +description.../description +rbKeyLabel.../rbKeyLabel +rowFilterDef + accessTypes/ + resources/ +/rowFilterDef createTime.../createTime -isEnabled.../isEnabled updateTime.../updateTime +id.../id guid.../guid +version.../version
svn commit: r1864664 [4/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerPolicyItemDataMaskInfo.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerPolicyItemDataMaskInfo.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_RangerPolicyItemDataMaskInfo.html (original) +++ ranger/site/trunk/apidocs/json_RangerPolicyItemDataMaskInfo.html Wed Aug 7 18:15:52 2019 @@ -79,7 +79,7 @@ -dataMaskType +valueExpr string @@ -97,7 +97,7 @@ -valueExpr +dataMaskType string @@ -111,9 +111,9 @@ Example { - dataMaskType : ..., + valueExpr : ..., conditionExpr : ..., - valueExpr : ... + dataMaskType : ... } Modified: ranger/site/trunk/apidocs/json_RangerPolicyList.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerPolicyList.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_RangerPolicyList.html (original) +++ ranger/site/trunk/apidocs/json_RangerPolicyList.html Wed Aug 7 18:15:52 2019 @@ -149,299 +149,301 @@ { policies : [ { -zoneName : ..., -policyLabels : [ ..., ... ], -denyPolicyItems : [ { - users : [ ..., ... ], +resourceSignature : ..., +description : ..., +rowFilterPolicyItems : [ { + rowFilterInfo : { }, accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], + rowFilterInfo : { }, accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -resources : { - property1 : { -isRecursive : true, -values : [ ..., ... ], -isExcludes : true - }, - property2 : { -isRecursive : true, -values : [ ..., ... ], -isExcludes : true - } -}, -description : ..., policyItems : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -validitySchedules : [ { - timeZone : ..., - endTime : ..., - recurrences : [ { }, { } ], - startTime : ... -}, { - timeZone : ..., - endTime : ..., - recurrences : [ { }, { } ], - startTime : ... + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -isAuditEnabled : true, -policyPriority : 12345, -service : ..., +policyType : 12345, allowExceptions : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -conditions : [ { - type : ..., - values : [ ..., ... ] -}, { - type : ..., - values : [ ..., ... ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], +service : ..., denyExceptions : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ] -}, { users : [ ..., ... ], - accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -rowFilterPolicyItems : [ { - rowFilterInfo : { }, - users : [ ..., ... ], - accesses : [ { }, { } ], - groups : [ ..., ... ], + conditions : [ { }, { } ], roles : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ] +
svn commit: r1864664 [12/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_ServiceREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_ServiceREST.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/resource_ServiceREST.html (original) +++ ranger/site/trunk/apidocs/resource_ServiceREST.html Wed Aug 7 18:15:52 2019 @@ -272,143 +272,89 @@ Content-Type: application/json { serviceDefs : [ { enums : [ { + name : ..., defaultIndex : 12345, - elements : [ { }, { } ], itemId : 12345, - name : ... + elements : [ { }, { } ] }, { + name : ..., defaultIndex : 12345, - elements : [ { }, { } ], itemId : 12345, - name : ... + elements : [ { }, { } ] } ], +rbKeyLabel : ..., +dataMaskDef : { + resources : [ { }, { } ], + accessTypes : [ { }, { } ], + maskTypes : [ { }, { } ] +}, +label : ..., +description : ..., name : ..., +rbKeyDescription : ..., contextEnrichers : [ { enricherOptions : { property1 : ..., property2 : ... }, - itemId : 12345, enricher : ..., - name : ... + name : ..., + itemId : 12345 }, { enricherOptions : { property1 : ..., property2 : ... }, - itemId : 12345, enricher : ..., - name : ... + name : ..., + itemId : 12345 } ], -options : { - property1 : ..., - property2 : ... -}, -resources : [ { - validationMessage : ..., - label : ..., - excludesSupported : true, - uiHint : ..., - isValidLeaf : true, - type : ..., - level : 12345, - description : ..., - rbKeyDescription : ..., - recursiveSupported : true, - lookupSupported : true, - rbKeyLabel : ..., - matcher : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., - mandatory : true, - parent : ..., +implClass : ..., +policyConditions : [ { name : ..., - accessTypeRestrictions : [ ..., ... ], - itemId : 12345, - matcherOptions : { + description : ..., + evaluatorOptions : { property1 : ..., property2 : ... - } -}, { + }, validationMessage : ..., - label : ..., - excludesSupported : true, - uiHint : ..., - isValidLeaf : true, - type : ..., - level : 12345, - description : ..., - rbKeyDescription : ..., - recursiveSupported : true, - lookupSupported : true, - rbKeyLabel : ..., - matcher : ..., rbKeyValidationMessage : ..., validationRegEx : ..., - mandatory : true, - parent : ..., - name : ..., - accessTypeRestrictions : [ ..., ... ], - itemId : 12345, - matcherOptions : { -property1 : ..., -property2 : ... - } -} ], -accessTypes : [ { - name : ..., label : ..., + uiHint : ..., itemId : 12345, rbKeyLabel : ..., - impliedGrants : [ ..., ... ] + rbKeyDescription : ..., + evaluator : ... }, { name : ..., - label : ..., - itemId : 12345, - rbKeyLabel : ..., - impliedGrants : [ ..., ... ] -} ], -rbKeyDescription : ..., -description : ..., -rbKeyLabel : ..., -label : ..., -dataMaskDef : { - accessTypes : [ { }, { } ], - resources : [ { }, { } ], - maskTypes : [ { }, { } ] -}, -policyConditions : [ { - label : ..., - uiHint : ..., - name : ..., + description : ..., evaluatorOptions : { property1 : ..., property2 : ... }, - description : ..., - itemId : 12345, - rbKeyDescription : ..., + validationMessage : ..., rbKeyValidationMessage : ..., validationRegEx : ..., - rbKeyLabel : ..., - evaluator : ..., - validationMessage : ... -}, { label : ..., uiHint : ..., - name : ..., - evaluatorOptions : { -property1 : ..., -property2 : ... - }, - description : ..., itemId : 12345, + rbKeyLabel : ..., rbKeyDescription : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., + evaluator : ... +} ], +accessTypes : [ { + name : ..., + rbKeyLabel : ..., + label : ..., + impliedGrants : [ ..., ... ], + itemId : 12345 +}, { + name : ..., rbKeyLabel : ..., - evaluator : ..., - validationMessage : ... + label : ..., + impliedGrants : [ ..., ... ], + itemId : 12345 } ], rowFilterDef : { resources : [ { }, { } ], @@ -416,183 +362,183 @@ Content-Type: application/json }, configs : [ { rbKeyValidationMessage : ..., - validationRegEx : ..., - mandatory : true, +
svn commit: r1864664 [9/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/ns0.xsd URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/ns0.xsd?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/ns0.xsd (original) +++ ranger/site/trunk/apidocs/ns0.xsd Wed Aug 7 18:15:52 2019 @@ -135,6 +135,7 @@ + @@ -215,11 +216,11 @@ - + - + @@ -232,11 +233,11 @@ - + - + @@ -3549,69 +3550,67 @@ - + + + - + - - - - - + - + - + + + - - - + - + - + - + - + + + - - - + @@ -3627,16 +3626,20 @@ - - - + - + + + + + + + @@ -3646,67 +3649,69 @@ - + - + - + + + + + + + - + - + - + - + - + - + - - - - - - - - - - - + - + + + - + + + + + @@ -3728,16 +3733,16 @@ - - - - + + + + @@ -3752,19 +3757,19 @@ - - + + - - + + @@ -3779,10 +3784,10 @@ - - + + @@ -3814,10 +3819,18 @@ - + + + + + + + + + @@ -3832,12 +3845,6 @@ - - - - - - @@ -3856,8 +3863,6 @@ - - @@ -3872,17 +3877,19 @@ - + + + - +
svn commit: r1864664 [13/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_TagREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_TagREST.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/resource_TagREST.html (original) +++ ranger/site/trunk/apidocs/resource_TagREST.html Wed Aug 7 18:15:52 2019 @@ -143,165 +143,165 @@ Content-Type: application/json { + tagUpdateTime : 12345, serviceName : ..., + resourceToTagIds : { +property1 : [ 12345, 12345 ], +property2 : [ 12345, 12345 ] + }, + tags : { +property1 : { + validityPeriods : [ { +recurrences : [ { }, { } ], +timeZone : ..., +endTime : ..., +startTime : ... + }, { +recurrences : [ { }, { } ], +timeZone : ..., +endTime : ..., +startTime : ... + } ], + type : ..., + options : { +property1 : { }, +property2 : { } + }, + owner : 12345, + attributes : { +property1 : ..., +property2 : ... + }, + version : 12345, + createTime : 12345, + isEnabled : true, + createdBy : ..., + guid : ..., + id : 12345, + updatedBy : ..., + updateTime : 12345 +}, +property2 : { + validityPeriods : [ { +recurrences : [ { }, { } ], +timeZone : ..., +endTime : ..., +startTime : ... + }, { +recurrences : [ { }, { } ], +timeZone : ..., +endTime : ..., +startTime : ... + } ], + type : ..., + options : { +property1 : { }, +property2 : { } + }, + owner : 12345, + attributes : { +property1 : ..., +property2 : ... + }, + version : 12345, + createTime : 12345, + isEnabled : true, + createdBy : ..., + guid : ..., + id : 12345, + updatedBy : ..., + updateTime : 12345 +} + }, + op : ..., tagDefinitions : { property1 : { name : ..., - source : ..., attributeDefs : [ { -type : ..., -name : ... +name : ..., +type : ... }, { -type : ..., -name : ... +name : ..., +type : ... } ], + source : ..., version : 12345, + createTime : 12345, + isEnabled : true, createdBy : ..., - updatedBy : ..., - id : 12345, guid : ..., - updateTime : 12345, - isEnabled : true, - createTime : 12345 + id : 12345, + updatedBy : ..., + updateTime : 12345 }, property2 : { name : ..., - source : ..., attributeDefs : [ { -type : ..., -name : ... +name : ..., +type : ... }, { -type : ..., -name : ... +name : ..., +type : ... } ], + source : ..., version : 12345, + createTime : 12345, + isEnabled : true, createdBy : ..., - updatedBy : ..., - id : 12345, guid : ..., - updateTime : 12345, - isEnabled : true, - createTime : 12345 + id : 12345, + updatedBy : ..., + updateTime : 12345 } }, - tagUpdateTime : 12345, + tagVersion : 12345, serviceResources : [ { resourceSignature : ..., -serviceName : ..., resourceElements : { property1 : { -isRecursive : true, values : [ ..., ... ], +isRecursive : true, isExcludes : true }, property2 : { -isRecursive : true, values : [ ..., ... ], +isRecursive : true, isExcludes : true } }, +serviceName : ..., version : 12345, +createTime : 12345, +isEnabled : true, createdBy : ..., -updatedBy : ..., -id : 12345, guid : ..., -updateTime : 12345, -isEnabled : true, -createTime : 12345 +id : 12345, +updatedBy : ..., +updateTime : 12345 }, { resourceSignature : ..., -serviceName : ..., resourceElements : { property1 : { -isRecursive : true, values : [ ..., ... ], +isRecursive : true, isExcludes : true }, property2 : { -isRecursive : true, values : [ ..., ... ], +isRecursive : true, isExcludes : true } }, +serviceName : ..., version : 12345, +createTime : 12345, +isEnabled : true, createdBy : ..., -updatedBy : ..., -id : 12345, guid : ..., -updateTime : 12345, -isEnabled : true, -createTime : 12345 - } ], - tagVersion : 12345, - op : ..., - resourceToTagIds : { -property1 : [ 12345, 12345 ], -property2 : [ 12345, 12345 ] - }, - tags : { -property1 : { - type : ..., - attributes : { -property1 : ..., -property2 : ... - }, - options : { -
svn commit: r1864664 [11/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_RoleREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_RoleREST.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/resource_RoleREST.html (original) +++ ranger/site/trunk/apidocs/resource_RoleREST.html Wed Aug 7 18:15:52 2019 @@ -52,11 +52,15 @@ GET /roles/roles POST /roles/roles + GET /roles/roles/names DELETE /roles/roles/{id} GET /roles/roles/{id} PUT /roles/roles/{id} + PUT /roles/roles/grant/{serviceName} DELETE /roles/roles/name/{name} GET /roles/roles/name/{name} + PUT /roles/roles/revoke/{serviceName} + GET /roles/roles/user/{user} PUT /roles/roles/{id}/addUsersAndGroups PUT /roles/roles/{id}/removeAdminFromUsersAndGroups PUT /roles/roles/{id}/removeUsersAndGroups @@ -129,77 +133,79 @@ Content-Type: application/json { roles : [ { -groups : [ { +roles : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], -roles : [ { +users : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], -options : { - property1 : { }, - property2 : { } -}, name : ..., -users : [ { +groups : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], +options : { + property1 : { }, + property2 : { } +}, +createdByUser : ..., description : ..., version : 12345, +createTime : 12345, +isEnabled : true, createdBy : ..., -updatedBy : ..., -id : 12345, guid : ..., -updateTime : 12345, -isEnabled : true, -createTime : 12345 +id : 12345, +updatedBy : ..., +updateTime : 12345 }, { -groups : [ { +roles : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], -roles : [ { +users : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], -options : { - property1 : { }, - property2 : { } -}, name : ..., -users : [ { +groups : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], +options : { + property1 : { }, + property2 : { } +}, +createdByUser : ..., description : ..., version : 12345, +createTime : 12345, +isEnabled : true, createdBy : ..., -updatedBy : ..., -id : 12345, guid : ..., -updateTime : 12345, -isEnabled : true, -createTime : 12345 +id : 12345, +updatedBy : ..., +updateTime : 12345 } ], listSize : 12345, list : [ { }, { } ], @@ -222,6 +228,24 @@ Content-Type: application/json + + Request Parameters + + +name +type +description + + + + +serviceName +query + + + + + Request Body @@ -280,41 +304,42 @@ Accept: application/json { - groups : [ { + roles : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], - roles : [ { + users : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], - options : { -property1 : { }, -property2 : { } - }, name : ..., - users : [ { + groups : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], + options : { +property1 : { }, +property2 : { } + }, + createdByUser : ..., description : ..., version : 12345, + createTime : 12345, + isEnabled : true, createdBy : ..., - updatedBy : ..., - id : 12345, guid : ..., - updateTime : 12345, - isEnabled : true, - createTime : 12345 + id : 12345, + updatedBy : ..., + updateTime : 12345 } @@ -327,41 +352,42 @@ Content-Type: application/json { - groups : [ { + roles : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], - roles : [ { + users : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], - options : { -property1 : { }, -property2 : { } - }, name : ..., - users : [ { + groups : [ { name : ..., isAdmin : true }, { name : ..., isAdmin : true } ], + options : { +property1 : { }, +property2 : { } + }, + createdByUser : ..., description : ..., version : 12345, + createTime : 12345, + isEnabled : true, createdBy : ..., - updatedBy :
svn commit: r1864664 [6/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerTagResource.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerTagResource.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_RangerTagResource.html (original) +++ ranger/site/trunk/apidocs/json_RangerTagResource.html Wed Aug 7 18:15:52 2019 @@ -86,50 +86,50 @@ - asString - string + asMap + map of object - keys - array of string + readOnlyCopy + RangerAccessResource - ownerUser - string + keys + array of string - serviceDef - RangerServiceDef + cacheKey + string - readOnlyCopy - RangerAccessResource + leafName + string - leafName - string + serviceDef + RangerServiceDef - cacheKey + ownerUser string - asMap - map of object + asString + string @@ -139,148 +139,138 @@ Example { - asString : ..., + asMap : { +property1 : { }, +property2 : { } + }, + readOnlyCopy : { +readOnlyCopy : { }, +asMap : { + property1 : { }, + property2 : { } +}, +ownerUser : ..., +serviceDef : { + enums : [ { }, { } ], + rbKeyLabel : ..., + dataMaskDef : { }, + label : ..., + description : ..., + name : ..., + rbKeyDescription : ..., + contextEnrichers : [ { }, { } ], + implClass : ..., + policyConditions : [ { }, { } ], + accessTypes : [ { }, { } ], + rowFilterDef : { }, + configs : [ { }, { } ], + resources : [ { }, { } ], + options : { +property1 : ..., +property2 : ... + }, + version : 12345, + createTime : 12345, + isEnabled : true, + createdBy : ..., + guid : ..., + id : 12345, + updatedBy : ..., + updateTime : 12345 +}, +asString : ..., +leafName : ..., +keys : [ ..., ... ], +cacheKey : ... + }, keys : [ ..., ... ], - ownerUser : ..., + cacheKey : ..., + leafName : ..., serviceDef : { enums : [ { + name : ..., defaultIndex : 12345, - elements : [ { }, { } ], itemId : 12345, - name : ... + elements : [ { }, { } ] }, { + name : ..., defaultIndex : 12345, - elements : [ { }, { } ], itemId : 12345, - name : ... + elements : [ { }, { } ] } ], +rbKeyLabel : ..., +dataMaskDef : { + resources : [ { }, { } ], + accessTypes : [ { }, { } ], + maskTypes : [ { }, { } ] +}, +label : ..., +description : ..., name : ..., +rbKeyDescription : ..., contextEnrichers : [ { enricherOptions : { property1 : ..., property2 : ... }, - itemId : 12345, enricher : ..., - name : ... + name : ..., + itemId : 12345 }, { enricherOptions : { property1 : ..., property2 : ... }, - itemId : 12345, enricher : ..., - name : ... + name : ..., + itemId : 12345 } ], -options : { - property1 : ..., - property2 : ... -}, -resources : [ { - validationMessage : ..., - label : ..., - excludesSupported : true, - uiHint : ..., - isValidLeaf : true, - type : ..., - level : 12345, - description : ..., - rbKeyDescription : ..., - recursiveSupported : true, - lookupSupported : true, - rbKeyLabel : ..., - matcher : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., - mandatory : true, - parent : ..., +implClass : ..., +policyConditions : [ { name : ..., - accessTypeRestrictions : [ ..., ... ], - itemId : 12345, - matcherOptions : { + description : ..., + evaluatorOptions : { property1 : ..., property2 : ... - } -}, { + }, validationMessage : ..., - label : ..., - excludesSupported : true, - uiHint : ..., - isValidLeaf : true, - type : ..., - level : 12345, - description : ..., - rbKeyDescription : ..., - recursiveSupported : true, - lookupSupported : true, - rbKeyLabel : ..., - matcher : ..., rbKeyValidationMessage : ..., validationRegEx : ..., - mandatory : true, - parent : ..., - name : ..., - accessTypeRestrictions : [ ..., ... ], - itemId : 12345, -
svn commit: r1864664 [15/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/syntax_json.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/syntax_json.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/syntax_json.html (original) +++ ranger/site/trunk/apidocs/syntax_json.html Wed Aug 7 18:15:52 2019 @@ -82,6 +82,12 @@ + +GrantRevokeRoleRequest + + + + MatchType Modified: ranger/site/trunk/apidocs/syntax_xml.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/syntax_xml.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/syntax_xml.html (original) +++ ranger/site/trunk/apidocs/syntax_xml.html Wed Aug 7 18:15:52 2019 @@ -917,6 +917,12 @@ + +grantRevokeRoleRequest + + + + rangerRequestedResources
svn commit: r1864664 [10/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_PublicAPIsv2.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_PublicAPIsv2.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/resource_PublicAPIsv2.html (original) +++ ranger/site/trunk/apidocs/resource_PublicAPIsv2.html Wed Aug 7 18:15:52 2019 @@ -66,6 +66,7 @@ DELETE /public/v2/api/policy/{id} GET /public/v2/api/policy/{id} PUT /public/v2/api/policy/{id} + GET /public/v2/api/roles/names DELETE /public/v2/api/roles/{id} GET /public/v2/api/roles/{id} PUT /public/v2/api/roles/{id} @@ -80,8 +81,11 @@ GET /public/v2/api/zones/{id} PUT /public/v2/api/zones/{id} GET /public/v2/api/policies/{serviceDefName}/for-resource + PUT /public/v2/api/roles/grant/{serviceName} DELETE /public/v2/api/roles/name/{name} GET /public/v2/api/roles/name/{name} + PUT /public/v2/api/roles/revoke/{serviceName} + GET /public/v2/api/roles/user/{user} PUT /public/v2/api/roles/{id}/addUsersAndGroups PUT /public/v2/api/roles/{id}/removeAdminFromUsersAndGroups PUT /public/v2/api/roles/{id}/removeUsersAndGroups @@ -217,10 +221,12 @@ Content-Type: application/json [ { - zoneName : ..., - policyLabels : [ ..., ... ], - denyPolicyItems : [ { -users : [ ..., ... ], + resourceSignature : ..., + description : ..., + rowFilterPolicyItems : [ { +rowFilterInfo : { + filterExpr : ... +}, accesses : [ { type : ..., isAllowed : true @@ -228,18 +234,21 @@ Content-Type: application/json type : ..., isAllowed : true } ], -groups : [ ..., ... ], -roles : [ ..., ... ], +users : [ ..., ... ], delegateAdmin : true, conditions : [ { - type : ..., - values : [ ..., ... ] + values : [ ..., ... ], + type : ... }, { - type : ..., - values : [ ..., ... ] -} ] + values : [ ..., ... ], + type : ... +} ], +roles : [ ..., ... ], +groups : [ ..., ... ] }, { -users : [ ..., ... ], +rowFilterInfo : { + filterExpr : ... +}, accesses : [ { type : ..., isAllowed : true @@ -247,32 +256,19 @@ Content-Type: application/json type : ..., isAllowed : true } ], -groups : [ ..., ... ], -roles : [ ..., ... ], +users : [ ..., ... ], delegateAdmin : true, conditions : [ { - type : ..., - values : [ ..., ... ] -}, { - type : ..., - values : [ ..., ... ] -} ] - } ], - resources : { -property1 : { - isRecursive : true, values : [ ..., ... ], - isExcludes : true -}, -property2 : { - isRecursive : true, + type : ... +}, { values : [ ..., ... ], - isExcludes : true -} - }, - description : ..., + type : ... +} ], +roles : [ ..., ... ], +groups : [ ..., ... ] + } ], policyItems : [ { -users : [ ..., ... ], accesses : [ { type : ..., isAllowed : true @@ -280,18 +276,18 @@ Content-Type: application/json type : ..., isAllowed : true } ], -groups : [ ..., ... ], -roles : [ ..., ... ], +users : [ ..., ... ], delegateAdmin : true, conditions : [ { - type : ..., - values : [ ..., ... ] + values : [ ..., ... ], + type : ... }, { - type : ..., - values : [ ..., ... ] -} ] + values : [ ..., ... ], + type : ... +} ], +roles : [ ..., ... ], +groups : [ ..., ... ] }, { -users : [ ..., ... ], accesses : [ { type : ..., isAllowed : true @@ -299,45 +295,20 @@ Content-Type: application/json type : ..., isAllowed : true } ], -groups : [ ..., ... ], -roles : [ ..., ... ], +users : [ ..., ... ], delegateAdmin : true, conditions : [ { - type : ..., - values : [ ..., ... ] -}, { - type : ..., - values : [ ..., ... ] -} ] - } ], - validitySchedules : [ { -timeZone : ..., -endTime : ..., -recurrences : [ { - schedule : { }, - interval : { } -}, { - schedule : { }, - interval : { } -} ], -startTime : ... - }, { -timeZone : ..., -endTime : ..., -recurrences : [ { - schedule : { }, - interval : { } + values : [ ..., ... ], + type : ... }, { - schedule : { }, - interval : { } + values : [ ..., ... ], + type : ... } ], -startTime : ... +roles : [ ..., ... ], +groups : [ ..., ... ] } ], - isAuditEnabled : true, - policyPriority : 12345, - service : ..., + policyType : 12345, allowExceptions : [ { -users : [ ..., ... ], accesses : [ { type :
svn commit: r1864664 [1/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Author: vel Date: Wed Aug 7 18:15:52 2019 New Revision: 1864664 URL: http://svn.apache.org/viewvc?rev=1864664=rev Log: Publishing with Apache Ranger 2.0.0 information Added: ranger/site/trunk/apidocs/json_GrantRevokeRoleRequest.html ranger/site/trunk/apidocs/json_RangerPolicyCondition.html (with props) ranger/site/trunk/apidocs/xml_ns0_grantRevokeRoleRequest.html ranger/site/trunk/apidocs/xml_ns0_rangerPolicyCondition.html (with props) ranger/site/trunk/kms/apidocs/xml_ns0_grantRevokeRoleRequest.html Modified: ranger/site/trunk/apidocs/application.wadl ranger/site/trunk/apidocs/data.html ranger/site/trunk/apidocs/downloads.html ranger/site/trunk/apidocs/index.html ranger/site/trunk/apidocs/json_AccessResult.html ranger/site/trunk/apidocs/json_GrantRevokeRequest.html ranger/site/trunk/apidocs/json_Message.html ranger/site/trunk/apidocs/json_RESTResponse.html ranger/site/trunk/apidocs/json_RangerAccessResource.html ranger/site/trunk/apidocs/json_RangerAccessResourceImpl.html ranger/site/trunk/apidocs/json_RangerAccessResourceReadOnly.html ranger/site/trunk/apidocs/json_RangerAccessTypeDef.html ranger/site/trunk/apidocs/json_RangerBaseModelObject.html ranger/site/trunk/apidocs/json_RangerContextEnricherDef.html ranger/site/trunk/apidocs/json_RangerDataMaskDef.html ranger/site/trunk/apidocs/json_RangerDataMaskPolicyItem.html ranger/site/trunk/apidocs/json_RangerDataMaskTypeDef.html ranger/site/trunk/apidocs/json_RangerEnumDef.html ranger/site/trunk/apidocs/json_RangerEnumElementDef.html ranger/site/trunk/apidocs/json_RangerExportPolicyList.html ranger/site/trunk/apidocs/json_RangerPluginInfo.html ranger/site/trunk/apidocs/json_RangerPluginInfoList.html ranger/site/trunk/apidocs/json_RangerPolicy.html ranger/site/trunk/apidocs/json_RangerPolicyConditionDef.html ranger/site/trunk/apidocs/json_RangerPolicyDelta.html ranger/site/trunk/apidocs/json_RangerPolicyItem.html ranger/site/trunk/apidocs/json_RangerPolicyItemCondition.html ranger/site/trunk/apidocs/json_RangerPolicyItemDataMaskInfo.html ranger/site/trunk/apidocs/json_RangerPolicyList.html ranger/site/trunk/apidocs/json_RangerPolicyResource.html ranger/site/trunk/apidocs/json_RangerRequestedResources.html ranger/site/trunk/apidocs/json_RangerResourceDef.html ranger/site/trunk/apidocs/json_RangerRole.html ranger/site/trunk/apidocs/json_RangerRoleList.html ranger/site/trunk/apidocs/json_RangerRowFilterDef.html ranger/site/trunk/apidocs/json_RangerRowFilterPolicyItem.html ranger/site/trunk/apidocs/json_RangerSecurityZone.html ranger/site/trunk/apidocs/json_RangerSecurityZoneList.html ranger/site/trunk/apidocs/json_RangerService.html ranger/site/trunk/apidocs/json_RangerServiceConfigDef.html ranger/site/trunk/apidocs/json_RangerServiceDef.html ranger/site/trunk/apidocs/json_RangerServiceDefList.html ranger/site/trunk/apidocs/json_RangerServiceList.html ranger/site/trunk/apidocs/json_RangerServiceResource.html ranger/site/trunk/apidocs/json_RangerTag.html ranger/site/trunk/apidocs/json_RangerTagAttributeDef.html ranger/site/trunk/apidocs/json_RangerTagDef.html ranger/site/trunk/apidocs/json_RangerTagForEval.html ranger/site/trunk/apidocs/json_RangerTagResource.html ranger/site/trunk/apidocs/json_RangerTagResourceMap.html ranger/site/trunk/apidocs/json_RangerValidityRecurrence.html ranger/site/trunk/apidocs/json_RangerValiditySchedule.html ranger/site/trunk/apidocs/json_RecurrenceSchedule.html ranger/site/trunk/apidocs/json_ResourceLookupContext.html ranger/site/trunk/apidocs/json_SecurityZoneInfo.html ranger/site/trunk/apidocs/json_ServicePolicies.html ranger/site/trunk/apidocs/json_ServiceTags.html ranger/site/trunk/apidocs/json_TagPolicies.html ranger/site/trunk/apidocs/json_ValidityInterval.html ranger/site/trunk/apidocs/json_XXDBBase.html ranger/site/trunk/apidocs/ns0.xsd ranger/site/trunk/apidocs/resource_PublicAPIsv2.html ranger/site/trunk/apidocs/resource_RoleREST.html ranger/site/trunk/apidocs/resource_SecurityZoneREST.html ranger/site/trunk/apidocs/resource_ServiceREST.html ranger/site/trunk/apidocs/resource_TagREST.html ranger/site/trunk/apidocs/resources.html ranger/site/trunk/apidocs/security-admin-web-gwt-json-overlay.jar ranger/site/trunk/apidocs/security-admin-web-js.zip ranger/site/trunk/apidocs/security-admin-web-json-client-json-sources.jar ranger/site/trunk/apidocs/security-admin-web-json-client.jar ranger/site/trunk/apidocs/security-admin-web-php.zip ranger/site/trunk/apidocs/security-admin-web-xml-client-xml-sources.jar ranger/site/trunk/apidocs/security-admin-web-xml-client.jar ranger/site/trunk/apidocs/security-admin-web.rb ranger/site/trunk/apidocs/syntax_json.html ranger/site/trunk/apidocs/syntax_xml.html
svn commit: r1864664 [3/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerExportPolicyList.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerExportPolicyList.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_RangerExportPolicyList.html (original) +++ ranger/site/trunk/apidocs/json_RangerExportPolicyList.html Wed Aug 7 18:15:52 2019 @@ -162,299 +162,301 @@ property2 : { } }, policies : [ { -zoneName : ..., -policyLabels : [ ..., ... ], -denyPolicyItems : [ { - users : [ ..., ... ], +resourceSignature : ..., +description : ..., +rowFilterPolicyItems : [ { + rowFilterInfo : { }, accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], + rowFilterInfo : { }, accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -resources : { - property1 : { -isRecursive : true, -values : [ ..., ... ], -isExcludes : true - }, - property2 : { -isRecursive : true, -values : [ ..., ... ], -isExcludes : true - } -}, -description : ..., policyItems : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -validitySchedules : [ { - timeZone : ..., - endTime : ..., - recurrences : [ { }, { } ], - startTime : ... -}, { - timeZone : ..., - endTime : ..., - recurrences : [ { }, { } ], - startTime : ... + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -isAuditEnabled : true, -policyPriority : 12345, -service : ..., +policyType : 12345, allowExceptions : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -conditions : [ { - type : ..., - values : [ ..., ... ] -}, { - type : ..., - values : [ ..., ... ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], +service : ..., denyExceptions : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ] -}, { users : [ ..., ... ], - accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -rowFilterPolicyItems : [ { - rowFilterInfo : { }, - users : [ ..., ... ], - accesses : [ { }, { } ], - groups : [ ..., ... ], + conditions : [ { }, { } ], roles : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ] + groups : [ ..., ... ] }, { - rowFilterInfo : { }, - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -name : ..., -resourceSignature : ..., +conditions : [ { + values : [ ..., ... ], + type : ... +}, { + values : [ ..., ... ], + type : ... +} ], +policyPriority : 12345, +serviceType : ..., +policyLabels : [ ..., ... ], +isDenyAllElse : true, dataMaskPolicyItems : [ { dataMaskInfo : { }, - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ...,
svn commit: r1864664 [21/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/kms/apidocs/xml_ns0_servicePolicies.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/kms/apidocs/xml_ns0_servicePolicies.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/kms/apidocs/xml_ns0_servicePolicies.html (original) +++ ranger/site/trunk/kms/apidocs/xml_ns0_servicePolicies.html Wed Aug 7 18:15:52 2019 @@ -307,254 +307,257 @@ Example servicePolicies - serviceDef -label.../label -policyConditions - itemId.../itemId - validationRegEx.../validationRegEx - uiHint.../uiHint - rbKeyValidationMessage.../rbKeyValidationMessage + userRoles.../userRoles + tagPolicies +serviceDef + configs/ + description.../description + resources/ + rbKeyDescription.../rbKeyDescription + rowFilterDef/ + contextEnrichers/ + options.../options + implClass.../implClass + name.../name + dataMaskDef/ + accessTypes/ + policyConditions/ + enums/ label.../label + rbKeyLabel.../rbKeyLabel +/serviceDef +policies + policyItems/ + denyPolicyItems/ + isDenyAllElse.../isDenyAllElse + policyLabels.../policyLabels + service.../service + allowExceptions/ + resources.../resources + validitySchedules/ + serviceType.../serviceType + options.../options + resourceSignature.../resourceSignature + conditions/ + dataMaskPolicyItems/ + description.../description + denyExceptions/ + policyPriority.../policyPriority + isAuditEnabled.../isAuditEnabled + policyType.../policyType + name.../name + rowFilterPolicyItems/ + zoneName.../zoneName +/policies +serviceId.../serviceId +serviceName.../serviceName +auditMode.../auditMode +policyUpdateTime.../policyUpdateTime +policyVersion.../policyVersion + /tagPolicies + securityZones.../securityZones + policyVersion.../policyVersion + serviceDef +configs + mandatory.../mandatory name.../name validationMessage.../validationMessage + defaultValue.../defaultValue + itemId.../itemId + description.../description + type.../type + subType.../subType + rbKeyValidationMessage.../rbKeyValidationMessage + uiHint.../uiHint rbKeyLabel.../rbKeyLabel + label.../label + validationRegEx.../validationRegEx rbKeyDescription.../rbKeyDescription +/configs +description.../description +resources + accessTypeRestrictions.../accessTypeRestrictions description.../description - evaluatorOptions.../evaluatorOptions - evaluator.../evaluator -/policyConditions -dataMaskDef - maskTypes/ + mandatory.../mandatory + rbKeyDescription.../rbKeyDescription + validationRegEx.../validationRegEx + rbKeyValidationMessage.../rbKeyValidationMessage + lookupSupported.../lookupSupported + uiHint.../uiHint + isValidLeaf.../isValidLeaf + recursiveSupported.../recursiveSupported + validationMessage.../validationMessage + matcherOptions.../matcherOptions + rbKeyLabel.../rbKeyLabel + label.../label + type.../type + parent.../parent + level.../level + excludesSupported.../excludesSupported + name.../name + itemId.../itemId + matcher.../matcher +/resources +rbKeyDescription.../rbKeyDescription +rowFilterDef resources/ accessTypes/ -/dataMaskDef +/rowFilterDef contextEnrichers enricher.../enricher - itemId.../itemId name.../name enricherOptions.../enricherOptions + itemId.../itemId /contextEnrichers options.../options -enums - defaultIndex.../defaultIndex - name.../name - itemId.../itemId - elements/ -/enums -description.../description +implClass.../implClass +name.../name +dataMaskDef + maskTypes/ + accessTypes/ + resources/ +/dataMaskDef accessTypes - label.../label name.../name - impliedGrants.../impliedGrants rbKeyLabel.../rbKeyLabel + impliedGrants.../impliedGrants + label.../label itemId.../itemId /accessTypes -rbKeyLabel.../rbKeyLabel -resources - accessTypeRestrictions.../accessTypeRestrictions - name.../name - mandatory.../mandatory - validationRegEx.../validationRegEx - parent.../parent - type.../type - excludesSupported.../excludesSupported - level.../level - rbKeyLabel.../rbKeyLabel - recursiveSupported.../recursiveSupported - matcherOptions.../matcherOptions - matcher.../matcher +policyConditions + itemId.../itemId description.../description uiHint.../uiHint - lookupSupported.../lookupSupported - rbKeyValidationMessage.../rbKeyValidationMessage -
svn commit: r1864664 [14/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/security-admin-web.rb URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/security-admin-web.rb?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/security-admin-web.rb (original) +++ ranger/site/trunk/apidocs/security-admin-web.rb Wed Aug 7 18:15:52 2019 @@ -89,27 +89,27 @@ module Model class RecurrenceSchedule # (no documentation provided) -attr_accessor :dayOfMonth -# (no documentation provided) -attr_accessor :year -# (no documentation provided) -attr_accessor :month -# (no documentation provided) attr_accessor :minute # (no documentation provided) attr_accessor :dayOfWeek # (no documentation provided) +attr_accessor :year +# (no documentation provided) attr_accessor :hour +# (no documentation provided) +attr_accessor :month +# (no documentation provided) +attr_accessor :dayOfMonth # the json hash for this RecurrenceSchedule def to_jaxb_json_hash _h = {} - _h['dayOfMonth'] = dayOfMonth.to_jaxb_json_hash unless dayOfMonth.nil? - _h['year'] = year.to_jaxb_json_hash unless year.nil? - _h['month'] = month.to_jaxb_json_hash unless month.nil? _h['minute'] = minute.to_jaxb_json_hash unless minute.nil? _h['dayOfWeek'] = dayOfWeek.to_jaxb_json_hash unless dayOfWeek.nil? + _h['year'] = year.to_jaxb_json_hash unless year.nil? _h['hour'] = hour.to_jaxb_json_hash unless hour.nil? + _h['month'] = month.to_jaxb_json_hash unless month.nil? + _h['dayOfMonth'] = dayOfMonth.to_jaxb_json_hash unless dayOfMonth.nil? return _h end @@ -120,118 +120,118 @@ module Model #initializes this RecurrenceSchedule with a json hash def init_jaxb_json_hash(_o) -if !_o['dayOfMonth'].nil? - _oa = _o['dayOfMonth'] +if !_o['minute'].nil? + _oa = _o['minute'] if(_oa.is_a? Hash) - @dayOfMonth = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class'] - @dayOfMonth = String.from_json(_oa) unless _oa['@class'] + @minute = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class'] + @minute = String.from_json(_oa) unless _oa['@class'] elsif (_oa.is_a? Array) #an array(of hashes hopefully) or scalar - @dayOfMonth = Array.new + @minute = Array.new _oa.each { | _item | if ((_item.nil? || _item['@class'].nil?)rescue true) - @dayOfMonth.push String.from_json(_item) + @minute.push String.from_json(_item) else - @dayOfMonth.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item) + @minute.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item) end } else -@dayOfMonth = _oa +@minute = _oa end end -if !_o['year'].nil? - _oa = _o['year'] +if !_o['dayOfWeek'].nil? + _oa = _o['dayOfWeek'] if(_oa.is_a? Hash) - @year = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class'] - @year = String.from_json(_oa) unless _oa['@class'] + @dayOfWeek = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class'] + @dayOfWeek = String.from_json(_oa) unless _oa['@class'] elsif (_oa.is_a? Array) #an array(of hashes hopefully) or scalar - @year = Array.new + @dayOfWeek = Array.new _oa.each { | _item | if ((_item.nil? || _item['@class'].nil?)rescue true) - @year.push String.from_json(_item) + @dayOfWeek.push String.from_json(_item) else - @year.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item) + @dayOfWeek.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item) end } else -@year = _oa +@dayOfWeek = _oa end end -if !_o['month'].nil? - _oa = _o['month'] +if !_o['year'].nil? + _oa = _o['year'] if(_oa.is_a? Hash) - @month = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class'] - @month = String.from_json(_oa) unless _oa['@class'] + @year = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class'] + @year = String.from_json(_oa) unless _oa['@class'] elsif (_oa.is_a? Array) #an array(of hashes hopefully) or scalar - @month = Array.new + @year = Array.new _oa.each { | _item | if ((_item.nil? ||
svn commit: r1864664 [7/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_ServicePolicies.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_ServicePolicies.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_ServicePolicies.html (original) +++ ranger/site/trunk/apidocs/json_ServicePolicies.html Wed Aug 7 18:15:52 2019 @@ -79,16 +79,16 @@ -securityZones +policyDeltas -map of SecurityZoneInfo +array of RangerPolicyDelta -policyUpdateTime +serviceId number @@ -97,90 +97,90 @@ -serviceDef +auditMode -RangerServiceDef +string -userRoles +policyVersion -map of array of string +number -policies +serviceDef -array of RangerPolicy +RangerServiceDef -auditMode +securityZones -string +map of SecurityZoneInfo -groupRoles +policyUpdateTime -map of array of string +number -serviceName +groupRoles -string +map of array of string -serviceId +serviceName -number +string -policyVersion +userRoles -number +map of array of string -policyDeltas +tagPolicies -array of RangerPolicyDelta +TagPolicies -tagPolicies +policies -TagPolicies +array of RangerPolicy @@ -192,330 +192,175 @@ Example { - securityZones : { -property1 : { - resources : [ { -property1 : [ ], -property2 : [ ] - }, { -property1 : [ ], -property2 : [ ] - } ], - policies : [ { -zoneName : ..., -policyLabels : [ ..., ... ], -denyPolicyItems : [ { }, { } ], -resources : { - property1 : { }, - property2 : { } -}, -description : ..., -policyItems : [ { }, { } ], -validitySchedules : [ { }, { } ], -isAuditEnabled : true, -policyPriority : 12345, -service : ..., -allowExceptions : [ { }, { } ], -conditions : [ { }, { } ], -denyExceptions : [ { }, { } ], -rowFilterPolicyItems : [ { }, { } ], -name : ..., -resourceSignature : ..., -dataMaskPolicyItems : [ { }, { } ], -options : { - property1 : { }, - property2 : { } -}, -policyType : 12345, -serviceType : ..., -version : 12345, -createdBy : ..., -updatedBy : ..., -id : 12345, -guid : ..., -updateTime : 12345, -isEnabled : true, -createTime : 12345 - }, { -zoneName : ..., -policyLabels : [ ..., ... ], -denyPolicyItems : [ { }, { } ], -resources : { - property1 : { }, - property2 : { } -}, -description : ..., -policyItems : [ { }, { } ], -validitySchedules : [ { }, { } ], -isAuditEnabled : true, -policyPriority : 12345, -service : ..., -allowExceptions : [ { }, { } ], -conditions : [ { }, { } ], -denyExceptions : [ { }, { } ], -rowFilterPolicyItems : [ { }, { } ], -name : ..., -resourceSignature : ..., -dataMaskPolicyItems : [ { }, { } ], -options : { - property1 : { }, - property2 : { } -}, -policyType : 12345, -serviceType : ..., -version : 12345, -createdBy : ..., -updatedBy : ..., -id : 12345, -guid : ..., -updateTime : 12345, -isEnabled : true, -createTime : 12345 - } ], - containsAssociatedTagService : true, - zoneName : ..., - policyDeltas : [ { -id : 12345, -changeType : 12345, -policy : { } - }, { -id : 12345, -changeType : 12345, -policy : { } - } ] -}, -property2 : { - resources : [ { -property1 : [ ], -property2 : [ ] - }, { -property1 : [ ], -property2 : [ ] - } ], - policies : [ { -zoneName : ..., -
svn commit: r1864664 [17/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_RESTResponse.html Wed Aug 7 18:15:52 2019 @@ -163,15 +163,15 @@ Example r- + statusCode.../statusCode + msgDesc.../msgDesc messageList message.../message name.../name -fieldName.../fieldName -rbKey.../rbKey objectId.../objectId +rbKey.../rbKey +fieldName.../fieldName /messageList - msgDesc.../msgDesc - statusCode.../statusCode httpStatusCode.../httpStatusCode /r- Modified: ranger/site/trunk/apidocs/xml_ns0_accessResult.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_accessResult.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/xml_ns0_accessResult.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_accessResult.html Wed Aug 7 18:15:52 2019 @@ -145,77 +145,78 @@ Example accessResult - result.../result isFinal.../isFinal + result.../result policy policyType.../policyType -rowFilterPolicyItems - rowFilterInfo/ -/rowFilterPolicyItems -isAuditEnabled.../isAuditEnabled -policyLabels.../policyLabels +service.../service +policyPriority.../policyPriority +isDenyAllElse.../isDenyAllElse +dataMaskPolicyItems + dataMaskInfo/ +/dataMaskPolicyItems +zoneName.../zoneName +name.../name resourceSignature.../resourceSignature -denyPolicyItems +serviceType.../serviceType +resources.../resources +conditions + type.../type + values.../values +/conditions +options.../options +policyItems groups.../groups - accesses/ conditions/ delegateAdmin.../delegateAdmin - roles.../roles users.../users -/denyPolicyItems -options.../options + accesses/ + roles.../roles +/policyItems +description.../description allowExceptions groups.../groups - accesses/ conditions/ delegateAdmin.../delegateAdmin - roles.../roles users.../users + accesses/ + roles.../roles /allowExceptions -resources.../resources -name.../name -dataMaskPolicyItems - dataMaskInfo/ -/dataMaskPolicyItems -serviceType.../serviceType -validitySchedules - startTime.../startTime - endTime.../endTime - timeZone.../timeZone - recurrences/ -/validitySchedules -policyItems +isAuditEnabled.../isAuditEnabled +rowFilterPolicyItems + rowFilterInfo/ +/rowFilterPolicyItems +denyExceptions groups.../groups - accesses/ conditions/ delegateAdmin.../delegateAdmin - roles.../roles users.../users -/policyItems -conditions - values.../values - type.../type -/conditions -description.../description -policyPriority.../policyPriority -zoneName.../zoneName -denyExceptions - groups.../groups accesses/ + roles.../roles +/denyExceptions +denyPolicyItems + groups.../groups conditions/ delegateAdmin.../delegateAdmin - roles.../roles users.../users -/denyExceptions -service.../service -version.../version -updateTime.../updateTime -isEnabled.../isEnabled -id.../id -createdBy.../createdBy + accesses/ + roles.../roles +/denyPolicyItems +validitySchedules + timeZone.../timeZone + endTime.../endTime + recurrences/ + startTime.../startTime +/validitySchedules +policyLabels.../policyLabels createTime.../createTime +isEnabled.../isEnabled +updateTime.../updateTime guid.../guid +createdBy.../createdBy +id.../id updatedBy.../updatedBy +version.../version /policy /accessResult Modified: ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_grantRevokeRequest.html Wed Aug 7 18:15:52 2019 @@ -320,6 +320,24 @@ +roles + +list of string + + +element + + + + + +0/unbounded + + + + + + sessionId string @@ -379,22 +397,23 @@ Example grantRevokeRequest - users.../users - delegateAdmin.../delegateAdmin
svn commit: r1864664 [16/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/ui/swagger.json URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/ui/swagger.json?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/ui/swagger.json (original) +++ ranger/site/trunk/apidocs/ui/swagger.json Wed Aug 7 18:15:52 2019 @@ -6,7 +6,7 @@ "url" : "http://www.apache.org/licenses/LICENSE-2.0.html;, "name" : "Apache 2.0 License" }, -"version" : "2.0.0", +"version" : "2.1.0-SNAPSHOT", "title" : "Ranger REST API" }, "schemes" : [], @@ -60,15 +60,15 @@ "type" : "object", "title" : "AccessResult", "properties" : { -"policy" : { -"readOnly" : false, -"$ref" : "#/definitions/json_RangerPolicy" -}, "isFinal" : { "readOnly" : false, "description" : "", "type" : "boolean" }, +"policy" : { +"readOnly" : false, +"$ref" : "#/definitions/json_RangerPolicy" +}, "result" : { "readOnly" : false, "description" : "", @@ -77,155 +77,156 @@ } }, "example" : { + "isFinal" : true, "policy" : { -"zoneName" : "...", -"policyLabels" : [ "...", "..." ], -"denyPolicyItems" : [ { - "users" : [ "...", "..." ], +"resourceSignature" : "...", +"description" : "...", +"rowFilterPolicyItems" : [ { + "rowFilterInfo" : { }, "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], + "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ] + "conditions" : [ { }, { } ], + "roles" : [ "...", "..." ], + "groups" : [ "...", "..." ] }, { - "users" : [ "...", "..." ], + "rowFilterInfo" : { }, "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], + "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ] + "conditions" : [ { }, { } ], + "roles" : [ "...", "..." ], + "groups" : [ "...", "..." ] } ], -"resources" : { - "property1" : { -"isRecursive" : true, -"values" : [ "...", "..." ], -"isExcludes" : true - }, - "property2" : { -"isRecursive" : true, -"values" : [ "...", "..." ], -"isExcludes" : true - } -}, -"description" : "...", "policyItems" : [ { - "users" : [ "...", "..." ], "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], + "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ] + "conditions" : [ { }, { } ], + "roles" : [ "...", "..." ], + "groups" : [ "...", "..." ] }, { - "users" : [ "...", "..." ], "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], + "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ] -} ], -"validitySchedules" : [ { - "timeZone" : "...", - "endTime" : "...", - "recurrences" : [ { }, { } ], - "startTime" : "..." -}, { - "timeZone" : "...", - "endTime" : "...", - "recurrences" : [ { }, { } ], - "startTime" : "..." + "conditions" : [ { }, { } ], + "roles" : [ "...", "..." ], + "groups" : [ "...", "..." ] } ], -"isAuditEnabled" : true, -"policyPriority" : 12345, -"service" : "...", +"policyType" : 12345, "allowExceptions" : [ { - "users" : [ "...", "..." ], "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], + "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ] + "conditions" : [ { }, { } ], + "roles" : [ "...", "..." ], + "groups" : [ "...", "..." ] }, { - "users" : [ "...", "..." ], "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], + "users" : [ "...", "..." ], "delegateAdmin" : true, - "conditions" : [ { }, { } ] -} ], -"conditions" : [ { - "type" : "...", - "values" : [ "...", "..." ] -}, { - "type" : "...", - "values" : [ "...", "..." ] + "conditions" : [ { }, { } ], + "roles" : [ "...", "..." ], + "groups" : [ "...", "..." ] } ], +"service" : "...", "denyExceptions" : [ { - "users" : [ "...", "..." ], "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ], - "delegateAdmin" : true, - "conditions" : [ { }, { } ] -}, { "users" : [ "...", "..." ], - "accesses" : [ { }, { } ], - "groups" : [ "...", "..." ], - "roles" : [ "...", "..." ],
svn commit: r1864664 [2/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerAccessResource.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerAccessResource.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_RangerAccessResource.html (original) +++ ranger/site/trunk/apidocs/json_RangerAccessResource.html Wed Aug 7 18:15:52 2019 @@ -83,25 +83,25 @@ -serviceDef +readOnlyCopy -RangerServiceDef +RangerAccessResource -ownerUser +asMap -string +map of object -cacheKey +ownerUser string @@ -110,9 +110,9 @@ -leafName +serviceDef -string +RangerServiceDef @@ -128,27 +128,27 @@ -asMap +leafName -map of object +string -readOnlyCopy +keys -RangerAccessResource +array of string -keys +cacheKey -array of string +string @@ -162,145 +162,136 @@ This data type is abstract. The example below may be incomplete. More accurate examples can be found in subtypes pages. { + readOnlyCopy : { +readOnlyCopy : { }, +asMap : { + property1 : { }, + property2 : { } +}, +ownerUser : ..., +serviceDef : { + enums : [ { }, { } ], + rbKeyLabel : ..., + dataMaskDef : { }, + label : ..., + description : ..., + name : ..., + rbKeyDescription : ..., + contextEnrichers : [ { }, { } ], + implClass : ..., + policyConditions : [ { }, { } ], + accessTypes : [ { }, { } ], + rowFilterDef : { }, + configs : [ { }, { } ], + resources : [ { }, { } ], + options : { +property1 : ..., +property2 : ... + }, + version : 12345, + createTime : 12345, + isEnabled : true, + createdBy : ..., + guid : ..., + id : 12345, + updatedBy : ..., + updateTime : 12345 +}, +asString : ..., +leafName : ..., +keys : [ ..., ... ], +cacheKey : ... + }, + asMap : { +property1 : { }, +property2 : { } + }, + ownerUser : ..., serviceDef : { enums : [ { + name : ..., defaultIndex : 12345, - elements : [ { }, { } ], itemId : 12345, - name : ... + elements : [ { }, { } ] }, { + name : ..., defaultIndex : 12345, - elements : [ { }, { } ], itemId : 12345, - name : ... + elements : [ { }, { } ] } ], +rbKeyLabel : ..., +dataMaskDef : { + resources : [ { }, { } ], + accessTypes : [ { }, { } ], + maskTypes : [ { }, { } ] +}, +label : ..., +description : ..., name : ..., +rbKeyDescription : ..., contextEnrichers : [ { enricherOptions : { property1 : ..., property2 : ... }, - itemId : 12345, enricher : ..., - name : ... + name : ..., + itemId : 12345 }, { enricherOptions : { property1 : ..., property2 : ... }, - itemId : 12345, enricher : ..., - name : ... + name : ..., + itemId : 12345 } ], -options : { - property1 : ..., - property2 : ... -}, -resources : [ { - validationMessage : ..., - label : ..., - excludesSupported : true, - uiHint : ..., - isValidLeaf : true, - type : ..., - level : 12345, - description : ..., - rbKeyDescription : ..., - recursiveSupported : true, - lookupSupported : true, - rbKeyLabel : ..., - matcher : ..., - rbKeyValidationMessage : ..., - validationRegEx : ..., - mandatory : true, - parent : ..., +implClass : ..., +policyConditions : [ { name : ..., - accessTypeRestrictions : [ ..., ... ], - itemId : 12345, - matcherOptions : { + description : ..., + evaluatorOptions : { property1 : ..., property2 : ... - } -}, { + }, validationMessage : ..., - label : ..., - excludesSupported : true, - uiHint : ..., - isValidLeaf : true, - type : ..., - level : 12345, - description : ..., - rbKeyDescription : ..., - recursiveSupported : true, - lookupSupported : true, - rbKeyLabel : ..., - matcher : ..., rbKeyValidationMessage : ..., validationRegEx : ..., - mandatory : true, - parent : ..., - name : ..., - accessTypeRestrictions :
svn commit: r1864664 [5/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_RangerServiceDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_RangerServiceDef.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_RangerServiceDef.html (original) +++ ranger/site/trunk/apidocs/json_RangerServiceDef.html Wed Aug 7 18:15:52 2019 @@ -88,7 +88,7 @@ -name +rbKeyLabel string @@ -97,36 +97,36 @@ -contextEnrichers +dataMaskDef -array of RangerContextEnricherDef +RangerDataMaskDef -options +label -map of string +string -resources +description -array of RangerResourceDef +string -accessTypes +name -array of RangerAccessTypeDef +string @@ -142,16 +142,16 @@ -description +contextEnrichers -string +array of RangerContextEnricherDef -rbKeyLabel +implClass string @@ -160,54 +160,54 @@ -label +policyConditions -string +array of RangerPolicyConditionDef -dataMaskDef +accessTypes -RangerDataMaskDef +array of RangerAccessTypeDef -policyConditions +rowFilterDef -array of RangerPolicyConditionDef +RangerRowFilterDef -rowFilterDef +configs -RangerRowFilterDef +array of RangerServiceConfigDef -configs +resources -array of RangerServiceConfigDef +array of RangerResourceDef -implClass +options -string +map of string @@ -225,20 +225,20 @@ - createdBy - string + createTime + number - updatedBy - string + isEnabled + boolean - id - number + createdBy + string @@ -249,19 +249,19 @@ - updateTime + id number - isEnabled - boolean + updatedBy + string - createTime + updateTime number @@ -273,356 +273,356 @@ { enums : [ { +name : ..., defaultIndex : 12345, -elements : [ { - rbKeyLabel : ..., - label : ..., - name : ..., - itemId : 12345 -}, { - rbKeyLabel : ..., - label : ..., - name : ..., - itemId : 12345 -} ], itemId : 12345, -name : ... - }, { -defaultIndex : 12345, elements : [ { - rbKeyLabel : ..., - label : ..., + itemId : 12345, name : ..., - itemId : 12345 -}, { - rbKeyLabel : ..., label : ..., + rbKeyLabel : ... +}, { + itemId : 12345, name : ..., - itemId : 12345 -} ], -itemId : 12345, -name : ... - } ], - name : ..., - contextEnrichers : [ { -enricherOptions : { - property1 : ..., - property2 : ... -}, -itemId : 12345, -enricher : ..., -name : ... - }, { -enricherOptions : { - property1 : ..., - property2 : ... -}, -itemId : 12345, -enricher : ..., -name : ... - } ], - options : { -property1 : ..., -property2 : ... - }, - resources : [ { -validationMessage : ..., -label : ..., -excludesSupported : true, -uiHint : ..., -isValidLeaf : true, -type : ..., -level : 12345, -description : ..., -rbKeyDescription : ..., -recursiveSupported : true, -lookupSupported : true, -rbKeyLabel : ..., -matcher : ..., -rbKeyValidationMessage : ..., -validationRegEx : ..., -mandatory : true, -parent : ..., -name : ..., -accessTypeRestrictions : [ ..., ... ], -itemId : 12345, -matcherOptions : { - property1 : ..., - property2 : ... -} - }, { -validationMessage : ..., -label : ..., -excludesSupported : true, -uiHint : ..., -isValidLeaf : true, -type : ..., -level :
svn commit: r1864664 [20/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskDef.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskDef.html (original) +++ ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskDef.html Wed Aug 7 18:15:52 2019 @@ -146,45 +146,45 @@ rangerDataMaskDef maskTypes -dataMaskOptions.../dataMaskOptions itemId.../itemId -rbKeyLabel.../rbKeyLabel rbKeyDescription.../rbKeyDescription -label.../label -transformer.../transformer name.../name +transformer.../transformer +label.../label +dataMaskOptions.../dataMaskOptions description.../description +rbKeyLabel.../rbKeyLabel /maskTypes - resources -accessTypeRestrictions.../accessTypeRestrictions + accessTypes name.../name -mandatory.../mandatory -validationRegEx.../validationRegEx -parent.../parent -type.../type -excludesSupported.../excludesSupported -level.../level rbKeyLabel.../rbKeyLabel -recursiveSupported.../recursiveSupported -matcherOptions.../matcherOptions -matcher.../matcher -description.../description -uiHint.../uiHint -lookupSupported.../lookupSupported -rbKeyValidationMessage.../rbKeyValidationMessage +impliedGrants.../impliedGrants label.../label itemId.../itemId + /accessTypes + resources +accessTypeRestrictions.../accessTypeRestrictions +description.../description +mandatory.../mandatory rbKeyDescription.../rbKeyDescription -validationMessage.../validationMessage +validationRegEx.../validationRegEx +rbKeyValidationMessage.../rbKeyValidationMessage +lookupSupported.../lookupSupported +uiHint.../uiHint isValidLeaf.../isValidLeaf - /resources - accessTypes +recursiveSupported.../recursiveSupported +validationMessage.../validationMessage +matcherOptions.../matcherOptions +rbKeyLabel.../rbKeyLabel label.../label +type.../type +parent.../parent +level.../level +excludesSupported.../excludesSupported name.../name -impliedGrants.../impliedGrants -rbKeyLabel.../rbKeyLabel itemId.../itemId - /accessTypes +matcher.../matcher + /resources /rangerDataMaskDef Modified: ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskPolicyItem.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskPolicyItem.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskPolicyItem.html (original) +++ ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskPolicyItem.html Wed Aug 7 18:15:52 2019 @@ -187,22 +187,22 @@ rangerDataMaskPolicyItem dataMaskInfo -valueExpr.../valueExpr -conditionExpr.../conditionExpr dataMaskType.../dataMaskType +conditionExpr.../conditionExpr +valueExpr.../valueExpr /dataMaskInfo + groups.../groups + users.../users + roles.../roles accesses -isAllowed.../isAllowed type.../type +isAllowed.../isAllowed /accesses - delegateAdmin.../delegateAdmin - roles.../roles - groups.../groups - users.../users conditions -type.../type values.../values +type.../type /conditions + delegateAdmin.../delegateAdmin /rangerDataMaskPolicyItem Modified: ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskTypeDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskTypeDef.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskTypeDef.html (original) +++ ranger/site/trunk/kms/apidocs/xml_ns0_rangerDataMaskTypeDef.html Wed Aug 7 18:15:52 2019 @@ -235,14 +235,14 @@ Example rangerDataMaskTypeDef - dataMaskOptions.../dataMaskOptions itemId.../itemId - rbKeyLabel.../rbKeyLabel rbKeyDescription.../rbKeyDescription - label.../label - transformer.../transformer name.../name + transformer.../transformer + label.../label + dataMaskOptions.../dataMaskOptions description.../description + rbKeyLabel.../rbKeyLabel /rangerDataMaskTypeDef Modified: ranger/site/trunk/kms/apidocs/xml_ns0_rangerEnumDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/kms/apidocs/xml_ns0_rangerEnumDef.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/kms/apidocs/xml_ns0_rangerEnumDef.html (original) +++ ranger/site/trunk/kms/apidocs/xml_ns0_rangerEnumDef.html Wed Aug 7 18:15:52 2019 @@ -163,15 +163,15 @@ Example rangerEnumDef - defaultIndex.../defaultIndex -
svn commit: r1864664 [19/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/kms/apidocs/ns0.xsd URL: http://svn.apache.org/viewvc/ranger/site/trunk/kms/apidocs/ns0.xsd?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/kms/apidocs/ns0.xsd (original) +++ ranger/site/trunk/kms/apidocs/ns0.xsd Wed Aug 7 18:15:52 2019 @@ -47,6 +47,7 @@ + @@ -134,6 +135,8 @@ + + @@ -148,12 +151,6 @@ - - - - - - @@ -168,39 +165,37 @@ + + + + + + - + - - - + - + - - - - - - - + @@ -220,8 +215,16 @@ + + + + + + + + @@ -229,69 +232,71 @@ - + - + - + - + - + + + + + - + - - - - - - - - - - - + - + - + - + - + - + - + - + - + - + + + + + + + + + @@ -311,46 +316,46 @@ - + - + - - - + + + - - + + - - + + - + - + @@ -399,14 +404,6 @@ - - - - - - - - @@ -423,6 +420,16 @@ + + + + + + + + + + @@ -430,10 +437,10 @@ - - + + @@ -441,6 +448,16 @@ + + + + + + + + + + @@ -459,16 +476,6 @@ - - - - - - - - - - @@ -497,12 +504,6 @@ - - - - - - @@ -517,15 +518,21 @@ + + + +
svn commit: r1864664 [8/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/json_TagPolicies.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/json_TagPolicies.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/json_TagPolicies.html (original) +++ ranger/site/trunk/apidocs/json_TagPolicies.html Wed Aug 7 18:15:52 2019 @@ -79,18 +79,18 @@ -policyVersion +policies -number +array of RangerPolicy -serviceId +serviceDef -number +RangerServiceDef @@ -106,16 +106,16 @@ -policies +serviceId -array of RangerPolicy +number -auditMode +serviceName string @@ -124,7 +124,7 @@ -serviceName +auditMode string @@ -133,9 +133,9 @@ -serviceDef +policyVersion -RangerServiceDef +number @@ -147,445 +147,388 @@ Example { - policyVersion : 12345, - serviceId : 12345, - policyUpdateTime : 12345, policies : [ { -zoneName : ..., -policyLabels : [ ..., ... ], -denyPolicyItems : [ { - users : [ ..., ... ], +resourceSignature : ..., +description : ..., +rowFilterPolicyItems : [ { + rowFilterInfo : { }, accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], + rowFilterInfo : { }, accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -resources : { - property1 : { -isRecursive : true, -values : [ ..., ... ], -isExcludes : true - }, - property2 : { -isRecursive : true, -values : [ ..., ... ], -isExcludes : true - } -}, -description : ..., policyItems : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -validitySchedules : [ { - timeZone : ..., - endTime : ..., - recurrences : [ { }, { } ], - startTime : ... -}, { - timeZone : ..., - endTime : ..., - recurrences : [ { }, { } ], - startTime : ... + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], -isAuditEnabled : true, -policyPriority : 12345, -service : ..., +policyType : 12345, allowExceptions : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] }, { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], + users : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -conditions : [ { - type : ..., - values : [ ..., ... ] -}, { - type : ..., - values : [ ..., ... ] + conditions : [ { }, { } ], + roles : [ ..., ... ], + groups : [ ..., ... ] } ], +service : ..., denyExceptions : [ { - users : [ ..., ... ], accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], - delegateAdmin : true, - conditions : [ { }, { } ] -}, { users : [ ..., ... ], - accesses : [ { }, { } ], - groups : [ ..., ... ], - roles : [ ..., ... ], delegateAdmin : true, - conditions : [ { }, { } ] -} ], -rowFilterPolicyItems : [ { - rowFilterInfo : { }, - users : [ ..., ... ], - accesses : [ { }, { } ], - groups : [ ..., ... ], + conditions : [ { }, { } ], roles : [ ..., ... ], - delegateAdmin :
svn commit: r1864664 [18/21] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Modified: ranger/site/trunk/apidocs/xml_ns0_rangerServiceConfigDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_rangerServiceConfigDef.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/xml_ns0_rangerServiceConfigDef.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_rangerServiceConfigDef.html Wed Aug 7 18:15:52 2019 @@ -343,20 +343,20 @@ Example rangerServiceConfigDef - validationRegEx.../validationRegEx description.../description - rbKeyValidationMessage.../rbKeyValidationMessage label.../label - validationMessage.../validationMessage - subType.../subType + validationRegEx.../validationRegEx + rbKeyDescription.../rbKeyDescription + rbKeyLabel.../rbKeyLabel + type.../type + name.../name uiHint.../uiHint - mandatory.../mandatory itemId.../itemId - name.../name - type.../type + subType.../subType + validationMessage.../validationMessage defaultValue.../defaultValue - rbKeyLabel.../rbKeyLabel - rbKeyDescription.../rbKeyDescription + mandatory.../mandatory + rbKeyValidationMessage.../rbKeyValidationMessage /rangerServiceConfigDef Modified: ranger/site/trunk/apidocs/xml_ns0_rangerServiceDef.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/xml_ns0_rangerServiceDef.html?rev=1864664=1864663=1864664=diff == --- ranger/site/trunk/apidocs/xml_ns0_rangerServiceDef.html (original) +++ ranger/site/trunk/apidocs/xml_ns0_rangerServiceDef.html Wed Aug 7 18:15:52 2019 @@ -462,172 +462,172 @@ Example rangerServiceDef - contextEnrichers -enricherOptions.../enricherOptions -enricher.../enricher + rbKeyLabel.../rbKeyLabel + label.../label + configs +description.../description +label.../label +validationRegEx.../validationRegEx +rbKeyDescription.../rbKeyDescription +rbKeyLabel.../rbKeyLabel +type.../type name.../name +uiHint.../uiHint itemId.../itemId - /contextEnrichers - rbKeyLabel.../rbKeyLabel - rbKeyDescription.../rbKeyDescription +subType.../subType +validationMessage.../validationMessage +defaultValue.../defaultValue +mandatory.../mandatory +rbKeyValidationMessage.../rbKeyValidationMessage + /configs + resources +uiHint.../uiHint +excludesSupported.../excludesSupported +isValidLeaf.../isValidLeaf +mandatory.../mandatory +name.../name +recursiveSupported.../recursiveSupported +parent.../parent +validationRegEx.../validationRegEx +matcher.../matcher +rbKeyDescription.../rbKeyDescription +itemId.../itemId +label.../label +matcherOptions.../matcherOptions +lookupSupported.../lookupSupported +level.../level +rbKeyLabel.../rbKeyLabel +description.../description +rbKeyValidationMessage.../rbKeyValidationMessage +type.../type +validationMessage.../validationMessage +accessTypeRestrictions.../accessTypeRestrictions + /resources name.../name + implClass.../implClass + policyConditions +label.../label +itemId.../itemId +description.../description +uiHint.../uiHint +evaluatorOptions.../evaluatorOptions +rbKeyValidationMessage.../rbKeyValidationMessage +name.../name +validationRegEx.../validationRegEx +rbKeyDescription.../rbKeyDescription +validationMessage.../validationMessage +rbKeyLabel.../rbKeyLabel +evaluator.../evaluator + /policyConditions rowFilterDef resources + uiHint.../uiHint excludesSupported.../excludesSupported - matcher.../matcher - rbKeyDescription.../rbKeyDescription - type.../type - mandatory.../mandatory - label.../label - accessTypeRestrictions.../accessTypeRestrictions - lookupSupported.../lookupSupported - description.../description isValidLeaf.../isValidLeaf - matcherOptions.../matcherOptions - validationMessage.../validationMessage + mandatory.../mandatory + name.../name recursiveSupported.../recursiveSupported + parent.../parent validationRegEx.../validationRegEx + matcher.../matcher + rbKeyDescription.../rbKeyDescription itemId.../itemId - rbKeyValidationMessage.../rbKeyValidationMessage - uiHint.../uiHint - name.../name + label.../label + matcherOptions.../matcherOptions + lookupSupported.../lookupSupported level.../level rbKeyLabel.../rbKeyLabel - parent.../parent + description.../description + rbKeyValidationMessage.../rbKeyValidationMessage + type.../type + validationMessage.../validationMessage + accessTypeRestrictions.../accessTypeRestrictions /resources accessTypes - name.../name - itemId.../itemId impliedGrants.../impliedGrants rbKeyLabel.../rbKeyLabel
[ranger] branch ranger-2.0 updated: RANGER-2452: Update version to 2.0.1-SNAPSHOT in ranger-2.0 branch
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.0 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.0 by this push: new b29e6e3 RANGER-2452: Update version to 2.0.1-SNAPSHOT in ranger-2.0 branch b29e6e3 is described below commit b29e6e377c719cb2a218baeaf38fa0dbf6492baf Author: Velmurugan Periasamy AuthorDate: Wed Aug 7 13:11:51 2019 -0400 RANGER-2452: Update version to 2.0.1-SNAPSHOT in ranger-2.0 branch --- agents-audit/pom.xml | 2 +- agents-common/pom.xml | 2 +- agents-cred/pom.xml| 2 +- agents-installer/pom.xml | 2 +- credentialbuilder/pom.xml | 2 +- embeddedwebserver/pom.xml | 2 +- hbase-agent/pom.xml| 2 +- hdfs-agent/pom.xml | 2 +- hive-agent/pom.xml | 2 +- jisql/pom.xml | 2 +- kms/pom.xml| 2 +- knox-agent/pom.xml | 2 +- plugin-atlas/pom.xml | 2 +- plugin-elasticsearch/pom.xml | 2 +- plugin-kafka/pom.xml | 2 +- plugin-kms/pom.xml | 2 +- plugin-kylin/pom.xml | 2 +- plugin-nifi-registry/pom.xml | 2 +- plugin-nifi/pom.xml| 2 +- plugin-ozone/pom.xml | 2 +- plugin-presto/pom.xml | 2 +- plugin-solr/pom.xml| 2 +- plugin-sqoop/pom.xml | 2 +- plugin-yarn/pom.xml| 2 +- pom.xml| 2 +- ranger-atlas-plugin-shim/pom.xml | 2 +- ranger-elasticsearch-plugin-shim/pom.xml | 2 +- ranger-examples/conditions-enrichers/pom.xml | 2 +- ranger-examples/plugin-sampleapp/pom.xml | 2 +- ranger-examples/pom.xml| 2 +- ranger-examples/sampleapp/pom.xml | 2 +- ranger-hbase-plugin-shim/pom.xml | 2 +- ranger-hdfs-plugin-shim/pom.xml| 2 +- ranger-hive-plugin-shim/pom.xml| 2 +- ranger-kafka-plugin-shim/pom.xml | 2 +- ranger-kms-plugin-shim/pom.xml | 2 +- ranger-knox-plugin-shim/pom.xml| 2 +- ranger-kylin-plugin-shim/pom.xml | 2 +- ranger-ozone-plugin-shim/pom.xml | 2 +- ranger-plugin-classloader/pom.xml | 2 +- ranger-presto-plugin-shim/pom.xml | 2 +- ranger-solr-plugin-shim/pom.xml| 2 +- ranger-sqoop-plugin-shim/pom.xml | 2 +- ranger-storm-plugin-shim/pom.xml | 2 +- ranger-tools/pom.xml | 2 +- ranger-util/pom.xml| 2 +- ranger-yarn-plugin-shim/pom.xml| 2 +- security-admin/pom.xml | 2 +- storm-agent/pom.xml| 2 +- tagsync/pom.xml| 2 +- ugsync/ldapconfigchecktool/ldapconfigcheck/pom.xml | 2 +- ugsync/pom.xml | 2 +- unixauthclient/pom.xml | 2 +- unixauthnative/pom.xml | 2 +- unixauthpam/pom.xml| 2 +- unixauthservice/pom.xml| 2 +- 56 files changed, 56 insertions(+), 56 deletions(-) diff --git a/agents-audit/pom.xml b/agents-audit/pom.xml index 866b29c..6bf9fb3 100644 --- a/agents-audit/pom.xml +++ b/agents-audit/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -2.0.0 +2.0.1-SNAPSHOT .. diff --git a/agents-common/pom.xml b/agents-common/pom.xml index 13c16f5..dfecf31 100644 --- a/agents-common/pom.xml +++ b/agents-common/pom.xml @@ -39,7 +39,7 @@ org.apache.ranger ranger -2.0.0 +2.0.1-SNAPSHOT .. diff --git a/agents-cred/pom.xml b/agents-cred/pom.xml index df260ac..2e956ac 100644 --- a/agents-cred/pom.xml +++ b/agents-cred/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -2.0.0 +2.0.1-SNAPSHOT .. diff --git a/agents-installer/pom.xml b/agents-installer/pom.xml index eaa3ceb..efb479b 100644 --- a/agents-installer/pom.xml +++ b/agents-installer/pom.xml @@ -24,7 +24,7 @@ org.apache.ranger ranger -2.0.0 +2.0.1-SNAPSHOT
[ranger] annotated tag release-ranger-2.0.0 created (now 1fdecab)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to annotated tag release-ranger-2.0.0 in repository https://gitbox.apache.org/repos/asf/ranger.git. at 1fdecab (tag) tagging 2a97668824d6a05f97193f3bf21d1bbe50a48330 (commit) by Velmurugan Periasamy on Wed Aug 7 13:00:35 2019 -0400 - Log - Ranger 2.0.0 release -BEGIN PGP SIGNATURE- Comment: GPGTools - https://gpgtools.org iQIzBAABCgAdFiEEoEYFtFWOgQWxgLpd60IAu9Q5PegFAl1LA7QACgkQ60IAu9Q5 Peh5Pw/+JeCapuSmlHa5k3+5+9YBRmk/mLDL6FO3NYJ6cGi6JOlUNkqqsSw9pXgs 0cbeVAS1+AkGQ7QDJVBLF3Hp/hVOEOau04GI6xNvVgWzNIkiwsttjbNjyOhxwuvI nwOjC4NaGYi5yaZhZpSaz0kucY8dk0ianSubbEzPwMUpVxG3F60YaaBA3hU3DgCt ZkHY9BxcznoviCqa/+8rUfmIyjb5r7X3yOlBcTFuLMx9t3El4mWPrHgJy5u6ivYu fzPgn9JZCnfglpwrKLf8hczhATdq5XAFF3RMyRy63JPUiDIkPIYChQnDruTGJJo7 DaUBECMIw8RJLwwyZp66gIQoxQY4MSlfPbD2L+AcgU1gVVRazouhE3/ezZZSBqIR 0bxw+Zhcag4BpjCaWnpoxsfE24Ll0Zb3L5yZyO74LeLEcQ2Krlq4mjPwoyxFaaVn QTD/H4dDEzlUv+oOd1viQRrty+fFrBGMKNYvgdQcxzQEafJzNNdN7Hj8flCYQSe2 EfqB7NGXkb5UuH4Ni3mGs+mBtZTT9fPdi2z8nWxLoUuGfukVUZ9JelDzghjVTRXb z5Xzy1lz1P4QvsUXiSllK8a6LEwA4y0Ksoq067Usub/iv+UBps7R/pXqB1xEknY5 VjNWLv4Dx13tpc4Oz9p43fuvoVj5x0K6ay4ajdLiGqeVH9LoUpg= =N0lY -END PGP SIGNATURE- --- No new revisions were added by this update.
svn commit: r35167 - in /release/ranger/2.0.0: ./ apache-ranger-2.0.0.tar.gz apache-ranger-2.0.0.tar.gz.asc apache-ranger-2.0.0.tar.gz.sha256 apache-ranger-2.0.0.tar.gz.sha512
Author: vel Date: Wed Aug 7 16:57:29 2019 New Revision: 35167 Log: Adding Apache Ranger 2.0.0 release artifacts Added: release/ranger/2.0.0/ release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz (with props) release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.asc release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha256 release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha512 Added: release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz == Binary file - no diff available. Propchange: release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz -- svn:mime-type = application/octet-stream Added: release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.asc == --- release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.asc (added) +++ release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.asc Wed Aug 7 16:57:29 2019 @@ -0,0 +1,17 @@ +-BEGIN PGP SIGNATURE- +Comment: GPGTools - https://gpgtools.org + +iQIzBAABCgAdFiEEoEYFtFWOgQWxgLpd60IAu9Q5PegFAl1Ebb0ACgkQ60IAu9Q5 +Peiwdg/9ERoNtJXexHuSdb8hMZDh1z0HNVkcSuLZtkAI+nu44DpQADw8gaDKXE/m +ytPeePyIfypYyNXayzeIM1qhOJSKllw8xXHTJ0PB6mOm7i4L+ojsrMlXpBsQAFe1 +p4kEoyy8OybxLhVlf/Nh/yZOzYUE8t8WrdZfjnx3kcwHPO0sayLopg4EONSoMiHO +/DBoTSiBPQ9h4ZuMz1QYO65q1njX0t9YxJbFfw0GCBQg/7APZlbhRfE3HwsFU/ia +yMQfsKS+0riUQHtXand/kJ0HrTE1KH46b+ZUQU4ZI3C0pnDslbePkE/Ewr0ab4WL +XRvj2m6JpNLPhZ7Vz0RxrEY3ghBJKYV29sd+sC9GDzDDdeI/S94W7zCNX0eZSRm4 +THdMfYE9yVkyQ/awNQ1LpRkI6AmJLjsWDNUgkuownW6HJGhXqqA5p7Ohy7Do7rmY +7lV6Szo01XsZOs29dU6J57J/QbsdSD2xwnNW4TfHADZHHk3oX2vZFaaqYIANuiJW +mkVkdvSMzK/Na1DGBsDz3cxPA/kr+gConhShuRsECuyXQE1NeRWxay0OL3RapSjj +Xojrrq16HkwYHbU+AQohygXbGTbRDFHGoKHJZ4DMJFWuR7mtt2oSK2dI4xJBpFIP +h9fPx+bKTXSnTpbRvf8tf8EGRt0rvqMOiXTBf8npl3IQmIPjmh8= +=cpoQ +-END PGP SIGNATURE- Added: release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha256 == --- release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha256 (added) +++ release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha256 Wed Aug 7 16:57:29 2019 @@ -0,0 +1,2 @@ +apache-ranger-2.0.0.tar.gz: 120D40CD B3E674FD E0F34F35 B5F66FBC 5E3EE442 +91EC3669 DC9A66A1 F47425B5 Added: release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha512 == --- release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha512 (added) +++ release/ranger/2.0.0/apache-ranger-2.0.0.tar.gz.sha512 Wed Aug 7 16:57:29 2019 @@ -0,0 +1,4 @@ +apache-ranger-2.0.0.tar.gz: B5B1C30F 15DFB7D2 ADA57E11 4F6AE471 05434E0B +1C5D3997 7E82C57F 1709C836 9452DBB3 C125601C +CA8803CB C2363C04 D16E0A7D 993813D5 82A7E985 +97B83311
svn commit: r35119 - in /dev/ranger/2.0.0-rc1: ./ apache-ranger-2.0.0.tar.gz apache-ranger-2.0.0.tar.gz.asc apache-ranger-2.0.0.tar.gz.sha256 apache-ranger-2.0.0.tar.gz.sha512
Author: vel Date: Fri Aug 2 20:00:52 2019 New Revision: 35119 Log: Uploading Apache Ranger 2.0.0-rc1 artifacts Added: dev/ranger/2.0.0-rc1/ dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz (with props) dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.asc dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha256 dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha512 Added: dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz == Binary file - no diff available. Propchange: dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz -- svn:mime-type = application/octet-stream Added: dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.asc == --- dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.asc (added) +++ dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.asc Fri Aug 2 20:00:52 2019 @@ -0,0 +1,17 @@ +-BEGIN PGP SIGNATURE- +Comment: GPGTools - https://gpgtools.org + +iQIzBAABCgAdFiEEoEYFtFWOgQWxgLpd60IAu9Q5PegFAl1Ebb0ACgkQ60IAu9Q5 +Peiwdg/9ERoNtJXexHuSdb8hMZDh1z0HNVkcSuLZtkAI+nu44DpQADw8gaDKXE/m +ytPeePyIfypYyNXayzeIM1qhOJSKllw8xXHTJ0PB6mOm7i4L+ojsrMlXpBsQAFe1 +p4kEoyy8OybxLhVlf/Nh/yZOzYUE8t8WrdZfjnx3kcwHPO0sayLopg4EONSoMiHO +/DBoTSiBPQ9h4ZuMz1QYO65q1njX0t9YxJbFfw0GCBQg/7APZlbhRfE3HwsFU/ia +yMQfsKS+0riUQHtXand/kJ0HrTE1KH46b+ZUQU4ZI3C0pnDslbePkE/Ewr0ab4WL +XRvj2m6JpNLPhZ7Vz0RxrEY3ghBJKYV29sd+sC9GDzDDdeI/S94W7zCNX0eZSRm4 +THdMfYE9yVkyQ/awNQ1LpRkI6AmJLjsWDNUgkuownW6HJGhXqqA5p7Ohy7Do7rmY +7lV6Szo01XsZOs29dU6J57J/QbsdSD2xwnNW4TfHADZHHk3oX2vZFaaqYIANuiJW +mkVkdvSMzK/Na1DGBsDz3cxPA/kr+gConhShuRsECuyXQE1NeRWxay0OL3RapSjj +Xojrrq16HkwYHbU+AQohygXbGTbRDFHGoKHJZ4DMJFWuR7mtt2oSK2dI4xJBpFIP +h9fPx+bKTXSnTpbRvf8tf8EGRt0rvqMOiXTBf8npl3IQmIPjmh8= +=cpoQ +-END PGP SIGNATURE- Added: dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha256 == --- dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha256 (added) +++ dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha256 Fri Aug 2 20:00:52 2019 @@ -0,0 +1,2 @@ +apache-ranger-2.0.0.tar.gz: 120D40CD B3E674FD E0F34F35 B5F66FBC 5E3EE442 +91EC3669 DC9A66A1 F47425B5 Added: dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha512 == --- dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha512 (added) +++ dev/ranger/2.0.0-rc1/apache-ranger-2.0.0.tar.gz.sha512 Fri Aug 2 20:00:52 2019 @@ -0,0 +1,4 @@ +apache-ranger-2.0.0.tar.gz: B5B1C30F 15DFB7D2 ADA57E11 4F6AE471 05434E0B +1C5D3997 7E82C57F 1709C836 9452DBB3 C125601C +CA8803CB C2363C04 D16E0A7D 993813D5 82A7E985 +97B83311
[ranger] tag ranger-2.0.0-rc1 created (now 2a97668)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to tag ranger-2.0.0-rc1 in repository https://gitbox.apache.org/repos/asf/ranger.git. at 2a97668 (commit) No new revisions were added by this update.
[ranger] 02/02: RANGER-2520 : Prevent Roles to be saved in Ranger Role Management page when user or groups are not added to the role.
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.0 in repository https://gitbox.apache.org/repos/asf/ranger.git commit 2a97668824d6a05f97193f3bf21d1bbe50a48330 Author: Nitin Galave AuthorDate: Wed Jul 31 19:13:02 2019 +0530 RANGER-2520 : Prevent Roles to be saved in Ranger Role Management page when user or groups are not added to the role. (cherry picked from commit 716591dec8a80ac50d4fc0ff4a1c3337404e3ec7) --- .../webapp/scripts/modules/globalize/message/en.js | 1 + .../src/main/webapp/scripts/utils/XAUtils.js | 26 +++-- .../views/policies/RangerPolicyTableLayout.js | 2 +- .../views/reports/PlugableServiceDiffDetail.js | 1 + .../scripts/views/users/AddUsersOrGroupsList.js| 3 + .../main/webapp/scripts/views/users/RoleCreate.js | 4 + .../main/webapp/scripts/views/users/RoleForm.js| 16 +++ .../webapp/scripts/views/users/UserTableLayout.js | 35 +++--- .../PlugableServicePolicyDeleteDiff_tmpl.html | 54 + .../reports/PlugableServicePolicyDiff_tmpl.html| 126 +--- .../PlugableServicePolicyUpdateDiff_tmpl.html | 130 +++-- 11 files changed, 317 insertions(+), 81 deletions(-) diff --git a/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js b/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js index c320fdb..4096020 100644 --- a/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js +++ b/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js @@ -476,6 +476,7 @@ define(function(require) { noDeleteRoleRow :'Please select ranger role first to delete.', addRolePermission : 'Please add permission(s) for the selected role, else role will not be added.', addRole : 'Please select role for the selected permission(s), else role will not be added.', +addSelectedUserGroupRoles : 'Please add selected user/group/roles to there respective table else user/group/roles will not be added.' }, plcHldr : { diff --git a/security-admin/src/main/webapp/scripts/utils/XAUtils.js b/security-admin/src/main/webapp/scripts/utils/XAUtils.js index 5fca82c..80277f6 100644 --- a/security-admin/src/main/webapp/scripts/utils/XAUtils.js +++ b/security-admin/src/main/webapp/scripts/utils/XAUtils.js @@ -466,40 +466,40 @@ define(function(require) { options = _.isUndefined(options) ? Opt : options; $.msg(options); }; - XAUtils.showGroups = function(rawValue) { +XAUtils.showMoreLessBtnForGroupsUsersRoles = function(rawValue , type) { var showMoreLess = false, id; if (_.isArray(rawValue)) rawValue = new Backbone.Collection(rawValue); if (!_.isUndefined(rawValue) && rawValue.models.length > 0) { var groupArr = _.uniq(_.compact(_.map(rawValue.models, function(m, i) { - if (m.has('groupName')) - return _.escape(m.get('groupName')); +if (m.has('entityName')) +return _.escape(m.get('entityName')); }))); if (groupArr.length > 0) { if (rawValue.first().has('resourceId')) id = rawValue.first().get('resourceId'); else - id = rawValue.first().get('userId'); +id = rawValue.first().get('modelId'); } var newGroupArr = _.map(groupArr, function(name, i) { if (i >= 4) - return '' + name + ''; else if (i == 3 && groupArr.length > 4) { showMoreLess = true; - return '' + name + ''; } else - return '' + name + ''; }); if (showMoreLess) { newGroupArr - .push(' + More.. + More.. - Less..'); } @@ -1729,6 +1729,14 @@ define(function(require) { }); } +//Scroll up for roles create page +XAUtils.scrollToRolesField = function(field) { +$("html, body").animate({ +scrollTop : field.position().top - 150 +}, 1100, function() { +field.focus();
[ranger] branch ranger-2.0 updated (54f4aac -> 2a97668)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to branch ranger-2.0 in repository https://gitbox.apache.org/repos/asf/ranger.git. from 54f4aac RANGER-2516 : addednum change new 77e70cb RANGER-2517: UI changes for policy to implicitly deny all accesses not explicitly allowed by it. new 2a97668 RANGER-2520 : Prevent Roles to be saved in Ranger Role Management page when user or groups are not added to the role. The 2 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference. Summary of changes: .../webapp/scripts/modules/globalize/message/en.js | 2 + .../src/main/webapp/scripts/utils/XAUtils.js | 26 +++-- .../scripts/views/policies/RangerPolicyForm.js | 50 +++- .../scripts/views/policies/RangerPolicyRO.js | 11 +- .../views/policies/RangerPolicyTableLayout.js | 2 +- .../views/reports/PlugableServiceDiffDetail.js | 1 + .../scripts/views/users/AddUsersOrGroupsList.js| 3 + .../main/webapp/scripts/views/users/RoleCreate.js | 4 + .../main/webapp/scripts/views/users/RoleForm.js| 16 +++ .../webapp/scripts/views/users/UserTableLayout.js | 35 +++--- security-admin/src/main/webapp/styles/xa.css | 6 + .../templates/policies/RangerPolicyForm_tmpl.html | 6 + .../templates/policies/RangerPolicyRO_tmpl.html| 42 --- .../PlugableServicePolicyDeleteDiff_tmpl.html | 54 + .../reports/PlugableServicePolicyDiff_tmpl.html| 126 +--- .../PlugableServicePolicyUpdateDiff_tmpl.html | 130 +++-- 16 files changed, 412 insertions(+), 102 deletions(-)
[ranger] 01/02: RANGER-2517: UI changes for policy to implicitly deny all accesses not explicitly allowed by it.
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.0 in repository https://gitbox.apache.org/repos/asf/ranger.git commit 77e70cbbc29c23657d41a231927d559cc349aead Author: Nitin Galave AuthorDate: Wed Jul 31 18:29:08 2019 +0530 RANGER-2517: UI changes for policy to implicitly deny all accesses not explicitly allowed by it. (cherry picked from commit 630d4b7cd112094df1ac9fe55261c112094a9d97) --- .../webapp/scripts/modules/globalize/message/en.js | 1 + .../scripts/views/policies/RangerPolicyForm.js | 50 +++--- .../scripts/views/policies/RangerPolicyRO.js | 11 - security-admin/src/main/webapp/styles/xa.css | 6 +++ .../templates/policies/RangerPolicyForm_tmpl.html | 6 +++ .../templates/policies/RangerPolicyRO_tmpl.html| 42 -- 6 files changed, 95 insertions(+), 21 deletions(-) diff --git a/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js b/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js index 8078829..c320fdb 100644 --- a/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js +++ b/security-admin/src/main/webapp/scripts/modules/globalize/message/en.js @@ -64,6 +64,7 @@ define(function(require) { groups : 'Groups', group : 'Groups', auditLogging: 'Audit Logging', + isDenyAllElse : 'Deny All Other Accesses', encrypted : 'Encrypt', resourceType: 'Resource Type', description : 'Description', diff --git a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js index a862dde..e2bd6ed 100644 --- a/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js +++ b/security-admin/src/main/webapp/scripts/views/policies/RangerPolicyForm.js @@ -113,7 +113,8 @@ define(function(require){ 'allowExcludePerm' : '[data-js="allowExcludePerm"]', 'policyTimeBtn' : '[data-js="policyTimeBtn"]', 'policyConditions' : '[data-js="customPolicyConditions"]', -'conditionData' : '[data-id="conditionData"]' +'conditionData' : '[data-id="conditionData"]', +'isDenyAllElse' : '[data-js="isDenyAllElse"]', }, /** fields for the form */ @@ -142,10 +143,13 @@ define(function(require){ if(!_.isUndefined(this.initilializePathPlugin) && this.initilializePathPlugin){ this.initializePathPlugins(this.pathPluginOpts); } - this.renderCustomFields(); + if(XAUtil.isAccessPolicy(this.model.get('policyType'))){ + this.evdenyAccessChange(); + } if(!this.model.isNew()){ this.setUpSwitches(); } + this.renderCustomFields(); //checkParent this.renderParentChildHideShow(); @@ -321,6 +325,22 @@ define(function(require){ evIsEnabledChange : function(form, fieldEditor){ XAUtil.checkDirtyFieldForToggle(fieldEditor.$el); }, + evdenyAccessChange : function(){ + var that =this; + this.$el.find(this.ui.isDenyAllElse).toggles({ + on : that.model.has('isDenyAllElse') ? that.model.get('isDenyAllElse') : false, + text : {on : 'True', off : 'False' }, + width : 80, + }).on('click', function(e){ + XAUtil.checkDirtyFieldForToggle(that.$el.find(that.ui.isDenyAllElse)); + if(that.$el.find(that.ui.isDenyAllElse).find('.toggle-slide').hasClass('active')) { + that.$el.find(that.ui.denyConditionItems).hide(); + } else { + that.$el.find(that.ui.denyConditionItems).show(); + } + }); + + }, setupForm : function() { if(!this.model.isNew()){ this.sele
[ranger] branch master updated: RANGER-2452: Updated version to 2.1.0-SNAPSHOT in master branch
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new fa58e98 RANGER-2452: Updated version to 2.1.0-SNAPSHOT in master branch fa58e98 is described below commit fa58e9878c4e1bcfa48d6532dec9d47306c199cc Author: Velmurugan Periasamy AuthorDate: Wed Jul 31 13:25:49 2019 -0400 RANGER-2452: Updated version to 2.1.0-SNAPSHOT in master branch --- agents-audit/pom.xml | 2 +- agents-common/pom.xml | 2 +- agents-cred/pom.xml| 2 +- agents-installer/pom.xml | 2 +- credentialbuilder/pom.xml | 2 +- embeddedwebserver/pom.xml | 2 +- hbase-agent/pom.xml| 2 +- hdfs-agent/pom.xml | 2 +- hive-agent/pom.xml | 2 +- jisql/pom.xml | 2 +- kms/pom.xml| 2 +- knox-agent/pom.xml | 2 +- plugin-atlas/pom.xml | 2 +- plugin-elasticsearch/pom.xml | 2 +- plugin-kafka/pom.xml | 2 +- plugin-kms/pom.xml | 2 +- plugin-kylin/pom.xml | 2 +- plugin-nifi-registry/pom.xml | 2 +- plugin-nifi/pom.xml| 2 +- plugin-ozone/pom.xml | 2 +- plugin-presto/pom.xml | 2 +- plugin-solr/pom.xml| 2 +- plugin-sqoop/pom.xml | 2 +- plugin-yarn/pom.xml| 2 +- pom.xml| 2 +- ranger-atlas-plugin-shim/pom.xml | 2 +- ranger-elasticsearch-plugin-shim/pom.xml | 2 +- ranger-examples/conditions-enrichers/pom.xml | 2 +- ranger-examples/plugin-sampleapp/pom.xml | 2 +- ranger-examples/pom.xml| 2 +- ranger-examples/sampleapp/pom.xml | 2 +- ranger-hbase-plugin-shim/pom.xml | 2 +- ranger-hdfs-plugin-shim/pom.xml| 2 +- ranger-hive-plugin-shim/pom.xml| 2 +- ranger-kafka-plugin-shim/pom.xml | 2 +- ranger-kms-plugin-shim/pom.xml | 2 +- ranger-knox-plugin-shim/pom.xml| 2 +- ranger-kylin-plugin-shim/pom.xml | 2 +- ranger-ozone-plugin-shim/pom.xml | 2 +- ranger-plugin-classloader/pom.xml | 2 +- ranger-presto-plugin-shim/pom.xml | 2 +- ranger-solr-plugin-shim/pom.xml| 2 +- ranger-sqoop-plugin-shim/pom.xml | 2 +- ranger-storm-plugin-shim/pom.xml | 2 +- ranger-tools/pom.xml | 2 +- ranger-util/pom.xml| 2 +- ranger-yarn-plugin-shim/pom.xml| 2 +- security-admin/pom.xml | 2 +- storm-agent/pom.xml| 2 +- tagsync/pom.xml| 2 +- ugsync/ldapconfigchecktool/ldapconfigcheck/pom.xml | 2 +- ugsync/pom.xml | 2 +- unixauthclient/pom.xml | 2 +- unixauthnative/pom.xml | 2 +- unixauthpam/pom.xml| 2 +- unixauthservice/pom.xml| 2 +- 56 files changed, 56 insertions(+), 56 deletions(-) diff --git a/agents-audit/pom.xml b/agents-audit/pom.xml index 4aaec09..8ac1edf 100644 --- a/agents-audit/pom.xml +++ b/agents-audit/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.1.0-SNAPSHOT .. diff --git a/agents-common/pom.xml b/agents-common/pom.xml index 27be45f..c78dc5f 100644 --- a/agents-common/pom.xml +++ b/agents-common/pom.xml @@ -39,7 +39,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.1.0-SNAPSHOT .. diff --git a/agents-cred/pom.xml b/agents-cred/pom.xml index c622683..cd1b8f3 100644 --- a/agents-cred/pom.xml +++ b/agents-cred/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.1.0-SNAPSHOT .. diff --git a/agents-installer/pom.xml b/agents-installer/pom.xml index 20902cb..cbda5dd 100644 --- a/agents-installer/pom.xml +++ b/agents-installer/pom.xml @@ -24,7 +24,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT
[ranger] branch ranger-2.0 updated: RANGER-2452: Updating version to 2.0.0
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch ranger-2.0 in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/ranger-2.0 by this push: new 89c5ac6 RANGER-2452: Updating version to 2.0.0 89c5ac6 is described below commit 89c5ac6b48b9f4adf68e90b116906932667512fd Author: Velmurugan Periasamy AuthorDate: Wed Jul 31 13:21:20 2019 -0400 RANGER-2452: Updating version to 2.0.0 --- agents-audit/pom.xml | 2 +- agents-common/pom.xml | 2 +- agents-cred/pom.xml| 2 +- agents-installer/pom.xml | 2 +- credentialbuilder/pom.xml | 2 +- embeddedwebserver/pom.xml | 2 +- hbase-agent/pom.xml| 2 +- hdfs-agent/pom.xml | 2 +- hive-agent/pom.xml | 2 +- jisql/pom.xml | 2 +- kms/pom.xml| 2 +- knox-agent/pom.xml | 2 +- plugin-atlas/pom.xml | 2 +- plugin-elasticsearch/pom.xml | 2 +- plugin-kafka/pom.xml | 2 +- plugin-kms/pom.xml | 2 +- plugin-kylin/pom.xml | 2 +- plugin-nifi-registry/pom.xml | 2 +- plugin-nifi/pom.xml| 2 +- plugin-ozone/pom.xml | 2 +- plugin-presto/pom.xml | 2 +- plugin-solr/pom.xml| 2 +- plugin-sqoop/pom.xml | 2 +- plugin-yarn/pom.xml| 2 +- pom.xml| 2 +- ranger-atlas-plugin-shim/pom.xml | 2 +- ranger-elasticsearch-plugin-shim/pom.xml | 2 +- ranger-examples/conditions-enrichers/pom.xml | 2 +- ranger-examples/plugin-sampleapp/pom.xml | 2 +- ranger-examples/pom.xml| 2 +- ranger-examples/sampleapp/pom.xml | 2 +- ranger-hbase-plugin-shim/pom.xml | 2 +- ranger-hdfs-plugin-shim/pom.xml| 2 +- ranger-hive-plugin-shim/pom.xml| 2 +- ranger-kafka-plugin-shim/pom.xml | 2 +- ranger-kms-plugin-shim/pom.xml | 2 +- ranger-knox-plugin-shim/pom.xml| 2 +- ranger-kylin-plugin-shim/pom.xml | 2 +- ranger-ozone-plugin-shim/pom.xml | 2 +- ranger-plugin-classloader/pom.xml | 2 +- ranger-presto-plugin-shim/pom.xml | 2 +- ranger-solr-plugin-shim/pom.xml| 2 +- ranger-sqoop-plugin-shim/pom.xml | 2 +- ranger-storm-plugin-shim/pom.xml | 2 +- ranger-tools/pom.xml | 2 +- ranger-util/pom.xml| 2 +- ranger-yarn-plugin-shim/pom.xml| 2 +- security-admin/pom.xml | 2 +- storm-agent/pom.xml| 2 +- tagsync/pom.xml| 2 +- ugsync/ldapconfigchecktool/ldapconfigcheck/pom.xml | 2 +- ugsync/pom.xml | 2 +- unixauthclient/pom.xml | 2 +- unixauthnative/pom.xml | 2 +- unixauthpam/pom.xml| 2 +- unixauthservice/pom.xml| 2 +- 56 files changed, 56 insertions(+), 56 deletions(-) diff --git a/agents-audit/pom.xml b/agents-audit/pom.xml index 4aaec09..866b29c 100644 --- a/agents-audit/pom.xml +++ b/agents-audit/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.0.0 .. diff --git a/agents-common/pom.xml b/agents-common/pom.xml index 27be45f..13c16f5 100644 --- a/agents-common/pom.xml +++ b/agents-common/pom.xml @@ -39,7 +39,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.0.0 .. diff --git a/agents-cred/pom.xml b/agents-cred/pom.xml index c622683..df260ac 100644 --- a/agents-cred/pom.xml +++ b/agents-cred/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.0.0 .. diff --git a/agents-installer/pom.xml b/agents-installer/pom.xml index 20902cb..eaa3ceb 100644 --- a/agents-installer/pom.xml +++ b/agents-installer/pom.xml @@ -24,7 +24,7 @@ org.apache.ranger ranger -2.0.0-SNAPSHOT +2.0.0 .. diff --git a/credentialbuilder/pom.xml
[ranger] branch ranger-2.0 created (now 0ffdf13)
This is an automated email from the ASF dual-hosted git repository. vel pushed a change to branch ranger-2.0 in repository https://gitbox.apache.org/repos/asf/ranger.git. at 0ffdf13 RANGER-2406 : rangerusersync open too many session for ldap sync No new revisions were added by this update.
[ranger] branch master updated: RANGER-2502 : Correct service definition for presto
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new a4d1bed RANGER-2502 : Correct service definition for presto a4d1bed is described below commit a4d1bed527007bcf0c95d9ec7b741cb058e9576c Author: Bolke de Bruin AuthorDate: Mon Jul 8 22:05:21 2019 +0200 RANGER-2502 : Correct service definition for presto The service definition for Presto was using update instead of insert which is not supported by the code nor Presto. Signed-off-by: Velmurugan Periasamy --- .../src/main/resources/service-defs/ranger-servicedef-presto.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-presto.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-presto.json index f0ecf6b..151c7d2 100644 --- a/agents-common/src/main/resources/service-defs/ranger-servicedef-presto.json +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-presto.json @@ -102,8 +102,8 @@ }, { "itemId": 2, - "name": "update", - "label": "Update" + "name": "insert", + "label": "Insert" }, { "itemId": 3, @@ -136,7 +136,7 @@ "label": "All", "impliedGrants": [ "select", -"update", +"insert", "create", "drop", "use",
svn commit: r1862834 - /ranger/site/trunk/quick_start_guide.html
Author: vel Date: Tue Jul 9 20:31:37 2019 New Revision: 1862834 URL: http://svn.apache.org/viewvc?rev=1862834=rev Log: Updated doc Modified: ranger/site/trunk/quick_start_guide.html Modified: ranger/site/trunk/quick_start_guide.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/quick_start_guide.html?rev=1862834=1862833=1862834=diff == --- ranger/site/trunk/quick_start_guide.html (original) +++ ranger/site/trunk/quick_start_guide.html Tue Jul 9 20:31:37 2019 @@ -218,14 +218,24 @@ - 3. Execute the following command to verify the release + 3. Get the keys used to sign the releases for verification. https://dist.apache.org/repos/dist/release/ranger/KEYS + + + $ gpg --import KEYS + $ gpg --fingerprint key-id + + + + + + 4. Execute the following command to verify the release $ gpg --verify apache-ranger-%version-number%.tar.gz.asc apache-ranger-%version-number%.tar.gz -4. Download MD5/SHA hash for apache-ranger-%version-number%.tar.gz which usaully named as apache-ranger-%version-number%.tar.gz.mds (from URL provided in the release email) +5. Download MD5/SHA hash for apache-ranger-%version-number%.tar.gz which usaully named as apache-ranger-%version-number%.tar.gz.mds (from URL provided in the release email) $ gpg --print-mds apache-ranger-%version-number%.tar.gz Compare MD5, SHA hash generated from the above command and the signature available in the apache-ranger-%version-number%.tar.gz.mds.
svn commit: r1862832 - /ranger/site/trunk/team-list.html
Author: vel Date: Tue Jul 9 18:47:46 2019 New Revision: 1862832 URL: http://svn.apache.org/viewvc?rev=1862832=rev Log: Updated organization info. Modified: ranger/site/trunk/team-list.html Modified: ranger/site/trunk/team-list.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/team-list.html?rev=1862832=1862831=1862832=diff == --- ranger/site/trunk/team-list.html (original) +++ ranger/site/trunk/team-list.html Tue Jul 9 18:47:46 2019 @@ -383,7 +383,7 @@ - Dhaval Rajpara -- +Freestone Dongying Jiao -
svn commit: r1862826 - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/ kms/apidocs/ kms/apidocs/ui/
Author: vel Date: Tue Jul 9 17:18:00 2019 New Revision: 1862826 URL: http://svn.apache.org/viewvc?rev=1862826=rev Log: Publishing updated docs. [This commit notification would consist of 63 parts, which exceeds the limit of 50 ones, so it was shortened to the summary.]
[ranger] branch master updated: RANGER-2469: Adding absolute-ordering to web.xml to fix More than one fragment error during Ranger start
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new 581422c RANGER-2469: Adding absolute-ordering to web.xml to fix More than one fragment error during Ranger start 581422c is described below commit 581422ce16d696a8d50ff1a25fb2e3bcc7d3ab9f Author: Velmurugan Periasamy AuthorDate: Thu Jun 13 16:35:27 2019 -0400 RANGER-2469: Adding absolute-ordering to web.xml to fix More than one fragment error during Ranger start Signed-off-by: Velmurugan Periasamy --- kms/src/main/resources/WEB-INF/web.xml | 1 + kms/src/main/webapp/WEB-INF/web.xml| 1 + security-admin/src/main/webapp/WEB-INF/web.xml | 1 + 3 files changed, 3 insertions(+) diff --git a/kms/src/main/resources/WEB-INF/web.xml b/kms/src/main/resources/WEB-INF/web.xml index 5061a15..5e2d489 100644 --- a/kms/src/main/resources/WEB-INF/web.xml +++ b/kms/src/main/resources/WEB-INF/web.xml @@ -18,6 +18,7 @@ http://java.sun.com/xml/ns/j2ee;> ranger-kms + org.apache.hadoop.crypto.key.kms.server.KMSWebApp diff --git a/kms/src/main/webapp/WEB-INF/web.xml b/kms/src/main/webapp/WEB-INF/web.xml index 815e2bd..c3a35bc 100644 --- a/kms/src/main/webapp/WEB-INF/web.xml +++ b/kms/src/main/webapp/WEB-INF/web.xml @@ -19,6 +19,7 @@ http://java.sun.com/xml/ns/j2ee;> ranger-kms + org.apache.hadoop.crypto.key.kms.server.KMSWebApp diff --git a/security-admin/src/main/webapp/WEB-INF/web.xml b/security-admin/src/main/webapp/WEB-INF/web.xml index bd29a3e..806a066 100644 --- a/security-admin/src/main/webapp/WEB-INF/web.xml +++ b/security-admin/src/main/webapp/WEB-INF/web.xml @@ -17,6 +17,7 @@ --> http://www.w3.org/2001/XMLSchema-instance; xmlns="http://java.sun.com/xml/ns/javaee; xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_3_0.xsd; id="WebApp_ID" version="3.0"> org.apache.ranger + index.html
[ranger] branch master updated: RANGER-2313: tagsync fails to authenticate with ranger in kerberized cluster when using ranger-tagsync-update.sh script
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new a97f094 RANGER-2313: tagsync fails to authenticate with ranger in kerberized cluster when using ranger-tagsync-update.sh script a97f094 is described below commit a97f0947e192ea67cba64a9ae4be18f6375b2dc3 Author: Abhay Kulkarni <> AuthorDate: Thu Dec 27 10:18:22 2018 -0800 RANGER-2313: tagsync fails to authenticate with ranger in kerberized cluster when using ranger-tagsync-update.sh script Signed-off-by: Velmurugan Periasamy --- .../ranger/tagsync/process/TagSynchronizer.java| 2 +- .../source/atlas/EntityNotificationWrapper.java| 4 +- .../source/atlasrest/AtlasRESTTagSource.java | 177 + .../ranger/tagsync/source/file/FileTagSource.java | 31 ++-- 4 files changed, 129 insertions(+), 85 deletions(-) diff --git a/tagsync/src/main/java/org/apache/ranger/tagsync/process/TagSynchronizer.java b/tagsync/src/main/java/org/apache/ranger/tagsync/process/TagSynchronizer.java index 49ff76f..8806c74 100644 --- a/tagsync/src/main/java/org/apache/ranger/tagsync/process/TagSynchronizer.java +++ b/tagsync/src/main/java/org/apache/ranger/tagsync/process/TagSynchronizer.java @@ -353,7 +353,7 @@ public class TagSynchronizer { return tagSource; } - private static boolean initializeKerberosIdentity(Properties props) { + public static boolean initializeKerberosIdentity(Properties props) { if (LOG.isDebugEnabled()) { LOG.debug("==> TagSynchronizer.initializeKerberosIdentity()"); } diff --git a/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlas/EntityNotificationWrapper.java b/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlas/EntityNotificationWrapper.java index adaa2f9..9781aa6 100644 --- a/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlas/EntityNotificationWrapper.java +++ b/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlas/EntityNotificationWrapper.java @@ -93,7 +93,7 @@ public class EntityNotificationWrapper { isEntityTypeHandled= isEntityActive && AtlasResourceMapperUtil.isEntityTypeHandled(entityTypeName); isEntityDeleteOp = EntityNotificationV2.OperationType.ENTITY_DELETE == v2Notification.getOperationType(); isEntityCreateOp = EntityNotificationV2.OperationType.ENTITY_CREATE == v2Notification.getOperationType(); -isEmptyClassifications = CollectionUtils.isNotEmpty(atlasEntity.getClassifications()); +isEmptyClassifications = CollectionUtils.isEmpty(atlasEntity.getClassifications()); List allClassifications = atlasEntity.getClassifications(); @@ -166,7 +166,7 @@ public class EntityNotificationWrapper { isEntityTypeHandled= isEntityActive && AtlasResourceMapperUtil.isEntityTypeHandled(entityTypeName); isEntityDeleteOp = EntityNotificationV1.OperationType.ENTITY_DELETE == v1Notification.getOperationType(); isEntityCreateOp = EntityNotificationV1.OperationType.ENTITY_CREATE == v1Notification.getOperationType(); -isEmptyClassifications = CollectionUtils.isNotEmpty(v1Notification.getAllTraits()); +isEmptyClassifications = CollectionUtils.isEmpty(v1Notification.getAllTraits()); List allTraits = ((EntityNotificationV1) notification).getAllTraits(); diff --git a/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlasrest/AtlasRESTTagSource.java b/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlasrest/AtlasRESTTagSource.java index 2b4a668..8b12aff 100644 --- a/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlasrest/AtlasRESTTagSource.java +++ b/tagsync/src/main/java/org/apache/ranger/tagsync/source/atlasrest/AtlasRESTTagSource.java @@ -69,7 +69,8 @@ import java.util.TimeZone; public class AtlasRESTTagSource extends AbstractTagSource implements Runnable { private static final Log LOG = LogFactory.getLog(AtlasRESTTagSource.class); -private static final ThreadLocal DATE_FORMATTER = new ThreadLocal() { + private static final int REQUESTED_ENTITIES_LIMIT_MAX = 1; + private static final ThreadLocal DATE_FORMATTER = new ThreadLocal() { @Override protected DateFormat initialValue() { SimpleDateFormat dateFormat = new SimpleDateFormat(AtlasBaseTypeDef.SERIALIZED_DATE_FORMAT_STR); @@ -97,26 +98,34 @@ public class AtlasRESTTagSource extends AbstractTagSource implements Runnable { TagSynchronizer.printConfigurationProperties(props); - TagSink tagSink = TagS
[ranger] branch master updated: Updating year in NOTICE.txt
This is an automated email from the ASF dual-hosted git repository. vel pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ranger.git The following commit(s) were added to refs/heads/master by this push: new f65be02 Updating year in NOTICE.txt f65be02 is described below commit f65be02bac380b681b204a0880c5cf5ea3f7c37e Author: Velmurugan Periasamy AuthorDate: Mon Dec 17 15:32:43 2018 -0500 Updating year in NOTICE.txt --- NOTICE.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/NOTICE.txt b/NOTICE.txt index 4a9bf3e..a82c1f0 100644 --- a/NOTICE.txt +++ b/NOTICE.txt @@ -1,5 +1,5 @@ Apache Ranger -Copyright 2014-2018 The Apache Software Foundation +Copyright 2014-2019 The Apache Software Foundation This product includes software developed at The Apache Software Foundation (http://www.apache.org/). This product includes software developed by Spring Security Project (http://www.springframework.org/security)
ranger git commit: RANGER-2209: Added Ranger service definition for ABFS
Repository: ranger Updated Branches: refs/heads/ranger-1.2 7828421f7 -> 77aa4abf6 RANGER-2209: Added Ranger service definition for ABFS Signed-off-by: Velmurugan Periasamy (cherry picked from commit db7e261448411eabe233bf34631ea209ab6a42bb) Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/77aa4abf Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/77aa4abf Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/77aa4abf Branch: refs/heads/ranger-1.2 Commit: 77aa4abf63020905ba6ed33342832c0e061a375c Parents: 7828421 Author: Yuan Gao Authored: Tue Oct 9 16:34:52 2018 -0700 Committer: Velmurugan Periasamy Committed: Tue Oct 16 16:53:00 2018 -0400 -- .../plugin/store/EmbeddedServiceDefsUtil.java | 5 + .../service-defs/ranger-servicedef-abfs.json| 123 +++ 2 files changed, 128 insertions(+) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/77aa4abf/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java -- diff --git a/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java index 75dc128..118af1f 100755 --- a/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java +++ b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java @@ -67,6 +67,7 @@ public class EmbeddedServiceDefsUtil { public static final String EMBEDDED_SERVICEDEF_WASB_NAME = "wasb"; public static final String EMBEDDED_SERVICEDEF_SQOOP_NAME = "sqoop"; public static final String EMBEDDED_SERVICEDEF_KYLIN_NAME = "kylin"; + public static final String EMBEDDED_SERVICEDEF_ABFS_NAME = "abfs"; public static final String PROPERTY_CREATE_EMBEDDED_SERVICE_DEFS = "ranger.service.store.create.embedded.service-defs"; @@ -100,6 +101,7 @@ public class EmbeddedServiceDefsUtil { private RangerServiceDef wasbServiceDef; private RangerServiceDef sqoopServiceDef; private RangerServiceDef kylinServiceDef; + private RangerServiceDef abfsServiceDef; private RangerServiceDef tagServiceDef; @@ -142,6 +144,7 @@ public class EmbeddedServiceDefsUtil { wasbServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_WASB_NAME); sqoopServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_SQOOP_NAME); kylinServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_KYLIN_NAME); + abfsServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_ABFS_NAME); // Ensure that tag service def is updated with access types of all service defs store.updateTagServiceDefForAccessTypes(); @@ -212,6 +215,8 @@ public class EmbeddedServiceDefsUtil { public long getWasbServiceDefId() { return getId(wasbServiceDef); } + public long getAbfsServiceDefId() { return getId(abfsServiceDef); } + public RangerServiceDef getEmbeddedServiceDef(String defType) throws Exception { RangerServiceDef serviceDef=null; if(StringUtils.isNotEmpty(defType)){ http://git-wip-us.apache.org/repos/asf/ranger/blob/77aa4abf/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json -- diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json new file mode 100644 index 000..18454de --- /dev/null +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json @@ -0,0 +1,123 @@ +{ + "id":103, + "name": "abfs", + "implClass": "", + "label": "Azure Blob File System", + "description": "Ranger plugin for ABFS", + "guid":"", + "options": { "enableDenyAndExceptionsInPolicies": "true" }, + "resources": [ +{ + "itemId": 1, + "name": "storageaccount", + "type": "string", + "parent": "", + "level": 10, + "mandatory": true, + "lookupSupported": false, + "excludesSupported": false, + "matcher": "org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher", + "matcherOptions": {"wildCard":true, "ignoreCase":false}, + "validationRegEx": "", + "validationMessage": "", + "uiHint": "", + "label": "Storage Account", + "description": "Storage Account for the Path" +}, +{ + "itemId":2, + "name": "container", + "type": "string", + "parent": "storageaccount", + "level":20,
ranger git commit: RANGER-2209: Added Ranger service definition for ABFS
Repository: ranger Updated Branches: refs/heads/ranger-1.1 452bf480c -> 9e783c5b0 RANGER-2209: Added Ranger service definition for ABFS Signed-off-by: Velmurugan Periasamy (cherry picked from commit db7e261448411eabe233bf34631ea209ab6a42bb) Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/9e783c5b Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/9e783c5b Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/9e783c5b Branch: refs/heads/ranger-1.1 Commit: 9e783c5b0a3634e9781c50f641ccbd88d6033297 Parents: 452bf48 Author: Yuan Gao Authored: Tue Oct 9 16:34:52 2018 -0700 Committer: Velmurugan Periasamy Committed: Tue Oct 16 16:53:16 2018 -0400 -- .../plugin/store/EmbeddedServiceDefsUtil.java | 5 + .../service-defs/ranger-servicedef-abfs.json| 123 +++ 2 files changed, 128 insertions(+) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/9e783c5b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java -- diff --git a/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java index 75dc128..118af1f 100755 --- a/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java +++ b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java @@ -67,6 +67,7 @@ public class EmbeddedServiceDefsUtil { public static final String EMBEDDED_SERVICEDEF_WASB_NAME = "wasb"; public static final String EMBEDDED_SERVICEDEF_SQOOP_NAME = "sqoop"; public static final String EMBEDDED_SERVICEDEF_KYLIN_NAME = "kylin"; + public static final String EMBEDDED_SERVICEDEF_ABFS_NAME = "abfs"; public static final String PROPERTY_CREATE_EMBEDDED_SERVICE_DEFS = "ranger.service.store.create.embedded.service-defs"; @@ -100,6 +101,7 @@ public class EmbeddedServiceDefsUtil { private RangerServiceDef wasbServiceDef; private RangerServiceDef sqoopServiceDef; private RangerServiceDef kylinServiceDef; + private RangerServiceDef abfsServiceDef; private RangerServiceDef tagServiceDef; @@ -142,6 +144,7 @@ public class EmbeddedServiceDefsUtil { wasbServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_WASB_NAME); sqoopServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_SQOOP_NAME); kylinServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_KYLIN_NAME); + abfsServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_ABFS_NAME); // Ensure that tag service def is updated with access types of all service defs store.updateTagServiceDefForAccessTypes(); @@ -212,6 +215,8 @@ public class EmbeddedServiceDefsUtil { public long getWasbServiceDefId() { return getId(wasbServiceDef); } + public long getAbfsServiceDefId() { return getId(abfsServiceDef); } + public RangerServiceDef getEmbeddedServiceDef(String defType) throws Exception { RangerServiceDef serviceDef=null; if(StringUtils.isNotEmpty(defType)){ http://git-wip-us.apache.org/repos/asf/ranger/blob/9e783c5b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json -- diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json new file mode 100644 index 000..18454de --- /dev/null +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json @@ -0,0 +1,123 @@ +{ + "id":103, + "name": "abfs", + "implClass": "", + "label": "Azure Blob File System", + "description": "Ranger plugin for ABFS", + "guid":"", + "options": { "enableDenyAndExceptionsInPolicies": "true" }, + "resources": [ +{ + "itemId": 1, + "name": "storageaccount", + "type": "string", + "parent": "", + "level": 10, + "mandatory": true, + "lookupSupported": false, + "excludesSupported": false, + "matcher": "org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher", + "matcherOptions": {"wildCard":true, "ignoreCase":false}, + "validationRegEx": "", + "validationMessage": "", + "uiHint": "", + "label": "Storage Account", + "description": "Storage Account for the Path" +}, +{ + "itemId":2, + "name": "container", + "type": "string", + "parent": "storageaccount", + "level":20,
ranger git commit: RANGER-2209: Added Ranger service definition for ABFS
Repository: ranger Updated Branches: refs/heads/ranger-1 7097163ab -> 883f6bf3d RANGER-2209: Added Ranger service definition for ABFS Signed-off-by: Velmurugan Periasamy (cherry picked from commit db7e261448411eabe233bf34631ea209ab6a42bb) Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/883f6bf3 Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/883f6bf3 Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/883f6bf3 Branch: refs/heads/ranger-1 Commit: 883f6bf3d07ff7845a0a2ed0e6eabc70e7cd994a Parents: 7097163 Author: Yuan Gao Authored: Tue Oct 9 16:34:52 2018 -0700 Committer: Velmurugan Periasamy Committed: Tue Oct 16 16:52:36 2018 -0400 -- .../plugin/store/EmbeddedServiceDefsUtil.java | 5 + .../service-defs/ranger-servicedef-abfs.json| 123 +++ 2 files changed, 128 insertions(+) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/883f6bf3/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java -- diff --git a/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java index 75dc128..118af1f 100755 --- a/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java +++ b/agents-common/src/main/java/org/apache/ranger/plugin/store/EmbeddedServiceDefsUtil.java @@ -67,6 +67,7 @@ public class EmbeddedServiceDefsUtil { public static final String EMBEDDED_SERVICEDEF_WASB_NAME = "wasb"; public static final String EMBEDDED_SERVICEDEF_SQOOP_NAME = "sqoop"; public static final String EMBEDDED_SERVICEDEF_KYLIN_NAME = "kylin"; + public static final String EMBEDDED_SERVICEDEF_ABFS_NAME = "abfs"; public static final String PROPERTY_CREATE_EMBEDDED_SERVICE_DEFS = "ranger.service.store.create.embedded.service-defs"; @@ -100,6 +101,7 @@ public class EmbeddedServiceDefsUtil { private RangerServiceDef wasbServiceDef; private RangerServiceDef sqoopServiceDef; private RangerServiceDef kylinServiceDef; + private RangerServiceDef abfsServiceDef; private RangerServiceDef tagServiceDef; @@ -142,6 +144,7 @@ public class EmbeddedServiceDefsUtil { wasbServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_WASB_NAME); sqoopServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_SQOOP_NAME); kylinServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_KYLIN_NAME); + abfsServiceDef = getOrCreateServiceDef(store, EMBEDDED_SERVICEDEF_ABFS_NAME); // Ensure that tag service def is updated with access types of all service defs store.updateTagServiceDefForAccessTypes(); @@ -212,6 +215,8 @@ public class EmbeddedServiceDefsUtil { public long getWasbServiceDefId() { return getId(wasbServiceDef); } + public long getAbfsServiceDefId() { return getId(abfsServiceDef); } + public RangerServiceDef getEmbeddedServiceDef(String defType) throws Exception { RangerServiceDef serviceDef=null; if(StringUtils.isNotEmpty(defType)){ http://git-wip-us.apache.org/repos/asf/ranger/blob/883f6bf3/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json -- diff --git a/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json new file mode 100644 index 000..18454de --- /dev/null +++ b/agents-common/src/main/resources/service-defs/ranger-servicedef-abfs.json @@ -0,0 +1,123 @@ +{ + "id":103, + "name": "abfs", + "implClass": "", + "label": "Azure Blob File System", + "description": "Ranger plugin for ABFS", + "guid":"", + "options": { "enableDenyAndExceptionsInPolicies": "true" }, + "resources": [ +{ + "itemId": 1, + "name": "storageaccount", + "type": "string", + "parent": "", + "level": 10, + "mandatory": true, + "lookupSupported": false, + "excludesSupported": false, + "matcher": "org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher", + "matcherOptions": {"wildCard":true, "ignoreCase":false}, + "validationRegEx": "", + "validationMessage": "", + "uiHint": "", + "label": "Storage Account", + "description": "Storage Account for the Path" +}, +{ + "itemId":2, + "name": "container", + "type": "string", + "parent": "storageaccount", + "level":20, +
ranger git commit: RANGER-2241: Removed mds and sha1 generation
Repository: ranger Updated Branches: refs/heads/ranger-1 06f0a3477 -> 028de96b8 RANGER-2241: Removed mds and sha1 generation Signed-off-by: Velmurugan Periasamy (cherry picked from commit e2fa2e2f70ca9bcef33466dc82d4a40b6d13e4fe) Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/028de96b Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/028de96b Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/028de96b Branch: refs/heads/ranger-1 Commit: 028de96b8f011d5c967ecc709a7d7f4d023cea7b Parents: 06f0a34 Author: Velmurugan Periasamy Authored: Thu Oct 4 15:16:54 2018 -0400 Committer: Velmurugan Periasamy Committed: Fri Oct 5 15:35:37 2018 -0400 -- release-build.xml | 11 --- 1 file changed, 11 deletions(-) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/028de96b/release-build.xml -- diff --git a/release-build.xml b/release-build.xml index 752a57e..81fcdb3 100644 --- a/release-build.xml +++ b/release-build.xml @@ -60,17 +60,6 @@ - - - - - - - - - - -
ranger git commit: RANGER-2241: Removed mds and sha1 generation
Repository: ranger Updated Branches: refs/heads/ranger-1.1 7af849c21 -> 8544b5792 RANGER-2241: Removed mds and sha1 generation Signed-off-by: Velmurugan Periasamy (cherry picked from commit e2fa2e2f70ca9bcef33466dc82d4a40b6d13e4fe) Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/8544b579 Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/8544b579 Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/8544b579 Branch: refs/heads/ranger-1.1 Commit: 8544b5792d13f22e9ff03e796bafc50fe877e2bd Parents: 7af849c Author: Velmurugan Periasamy Authored: Thu Oct 4 15:16:54 2018 -0400 Committer: Velmurugan Periasamy Committed: Fri Oct 5 15:34:44 2018 -0400 -- release-build.xml | 11 --- 1 file changed, 11 deletions(-) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/8544b579/release-build.xml -- diff --git a/release-build.xml b/release-build.xml index 752a57e..81fcdb3 100644 --- a/release-build.xml +++ b/release-build.xml @@ -60,17 +60,6 @@ - - - - - - - - - - -
ranger git commit: RANGER-2241: Removed mds and sha1 generation
Repository: ranger Updated Branches: refs/heads/ranger-1.2 3217909b4 -> 19f33f235 RANGER-2241: Removed mds and sha1 generation Signed-off-by: Velmurugan Periasamy (cherry picked from commit e2fa2e2f70ca9bcef33466dc82d4a40b6d13e4fe) Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/19f33f23 Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/19f33f23 Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/19f33f23 Branch: refs/heads/ranger-1.2 Commit: 19f33f2353a796193fba61239294ad3f7269a7da Parents: 3217909 Author: Velmurugan Periasamy Authored: Thu Oct 4 15:16:54 2018 -0400 Committer: Velmurugan Periasamy Committed: Fri Oct 5 15:34:06 2018 -0400 -- release-build.xml | 11 --- 1 file changed, 11 deletions(-) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/19f33f23/release-build.xml -- diff --git a/release-build.xml b/release-build.xml index 752a57e..81fcdb3 100644 --- a/release-build.xml +++ b/release-build.xml @@ -60,17 +60,6 @@ - - - - - - - - - - -
svn commit: r1842832 [8/13] - in /ranger/site/trunk: ./ apidocs/ apidocs/ui/
Modified: ranger/site/trunk/apidocs/resource_ServiceREST.html URL: http://svn.apache.org/viewvc/ranger/site/trunk/apidocs/resource_ServiceREST.html?rev=1842832=1842831=1842832=diff == --- ranger/site/trunk/apidocs/resource_ServiceREST.html (original) +++ ranger/site/trunk/apidocs/resource_ServiceREST.html Thu Oct 4 17:23:58 2018 @@ -269,373 +269,373 @@ Content-Type: application/json { serviceDefs : [ { -accessTypes : [ { - impliedGrants : [ ..., ... ], - rbKeyLabel : ..., +configs : [ { itemId : 12345, + name : ..., + rbKeyDescription : ..., + rbKeyValidationMessage : ..., + validationMessage : ..., + type : ..., label : ..., - name : ... -}, { - impliedGrants : [ ..., ... ], + validationRegEx : ..., + mandatory : true, + subType : ..., + uiHint : ..., rbKeyLabel : ..., - itemId : 12345, - label : ..., - name : ... -} ], -dataMaskDef : { - maskTypes : [ { }, { } ], - resources : [ { }, { } ], - accessTypes : [ { }, { } ] -}, -contextEnrichers : [ { - itemId : 12345, - enricher : ..., - enricherOptions : { -property1 : ..., -property2 : ... - }, - name : ... + defaultValue : ..., + description : ... }, { itemId : 12345, - enricher : ..., - enricherOptions : { -property1 : ..., -property2 : ... - }, - name : ... + name : ..., + rbKeyDescription : ..., + rbKeyValidationMessage : ..., + validationMessage : ..., + type : ..., + label : ..., + validationRegEx : ..., + mandatory : true, + subType : ..., + uiHint : ..., + rbKeyLabel : ..., + defaultValue : ..., + description : ... } ], -description : ..., -rbKeyLabel : ..., -rbKeyDescription : ..., policyConditions : [ { - label : ..., - rbKeyDescription : ..., + rbKeyLabel : ..., uiHint : ..., + validationMessage : ..., + rbKeyDescription : ..., evaluatorOptions : { property1 : ..., property2 : ... }, - name : ..., rbKeyValidationMessage : ..., - rbKeyLabel : ..., - validationMessage : ..., - itemId : 12345, description : ..., + validationRegEx : ..., + name : ..., + label : ..., evaluator : ..., - validationRegEx : ... + itemId : 12345 }, { - label : ..., - rbKeyDescription : ..., + rbKeyLabel : ..., uiHint : ..., + validationMessage : ..., + rbKeyDescription : ..., evaluatorOptions : { property1 : ..., property2 : ... }, - name : ..., rbKeyValidationMessage : ..., - rbKeyLabel : ..., - validationMessage : ..., - itemId : 12345, description : ..., + validationRegEx : ..., + name : ..., + label : ..., evaluator : ..., - validationRegEx : ... + itemId : 12345 } ], -rowFilterDef : { - resources : [ { }, { } ], - accessTypes : [ { }, { } ] -}, options : { property1 : ..., property2 : ... }, +rbKeyLabel : ..., +dataMaskDef : { + accessTypes : [ { }, { } ], + resources : [ { }, { } ], + maskTypes : [ { }, { } ] +}, +rbKeyDescription : ..., label : ..., -enums : [ { - elements : [ { }, { } ], - defaultIndex : 12345, - itemId : 12345, - name : ... -}, { - elements : [ { }, { } ], - defaultIndex : 12345, - itemId : 12345, - name : ... -} ], -configs : [ { - rbKeyLabel : ..., - subType : ..., +contextEnrichers : [ { + enricher : ..., name : ..., - description : ..., - type : ..., - rbKeyDescription : ..., - label : ..., - validationMessage : ..., - rbKeyValidationMessage : ..., - itemId : 12345, - uiHint : ..., - mandatory : true, - defaultValue : ..., - validationRegEx : ... + enricherOptions : { +property1 : ..., +property2 : ... + }, + itemId : 12345 }, { - rbKeyLabel : ..., - subType : ..., + enricher : ..., name : ..., - description : ..., - type : ..., - rbKeyDescription : ..., - label : ..., - validationMessage : ..., - rbKeyValidationMessage : ..., - itemId : 12345, - uiHint : ..., - mandatory : true, - defaultValue : ..., - validationRegEx : ... + enricherOptions : { +property1 : ..., +property2 : ... + }, + itemId : 12345 } ], -implClass : ..., -name : ..., resources : [ { - type : ..., - mandatory : true, - excludesSupported : true, - validationRegEx : ..., matcherOptions : {
ranger git commit: RANGER-2228: Setting version for 1.2.1-SNAPSHOT
Repository: ranger Updated Branches: refs/heads/ranger-1.2 39ec5a389 -> 3217909b4 RANGER-2228: Setting version for 1.2.1-SNAPSHOT Project: http://git-wip-us.apache.org/repos/asf/ranger/repo Commit: http://git-wip-us.apache.org/repos/asf/ranger/commit/3217909b Tree: http://git-wip-us.apache.org/repos/asf/ranger/tree/3217909b Diff: http://git-wip-us.apache.org/repos/asf/ranger/diff/3217909b Branch: refs/heads/ranger-1.2 Commit: 3217909b4a9cd3ba523ee06c6140a914d68d5952 Parents: 39ec5a3 Author: Velmurugan Periasamy Authored: Thu Oct 4 14:14:07 2018 -0400 Committer: Velmurugan Periasamy Committed: Thu Oct 4 14:14:07 2018 -0400 -- agents-audit/pom.xml | 2 +- agents-common/pom.xml | 2 +- agents-cred/pom.xml| 2 +- agents-installer/pom.xml | 2 +- credentialbuilder/pom.xml | 2 +- embeddedwebserver/pom.xml | 2 +- hbase-agent/pom.xml| 2 +- hdfs-agent/pom.xml | 2 +- hive-agent/pom.xml | 2 +- jisql/pom.xml | 2 +- kms/pom.xml| 2 +- knox-agent/pom.xml | 2 +- plugin-atlas/pom.xml | 2 +- plugin-kafka/pom.xml | 2 +- plugin-kms/pom.xml | 2 +- plugin-kylin/pom.xml | 2 +- plugin-nifi-registry/pom.xml | 2 +- plugin-nifi/pom.xml| 2 +- plugin-solr/pom.xml| 2 +- plugin-sqoop/pom.xml | 2 +- plugin-yarn/pom.xml| 2 +- pom.xml| 2 +- ranger-atlas-plugin-shim/pom.xml | 2 +- ranger-examples/conditions-enrichers/pom.xml | 2 +- ranger-examples/plugin-sampleapp/pom.xml | 2 +- ranger-examples/pom.xml| 2 +- ranger-examples/sampleapp/pom.xml | 2 +- ranger-hbase-plugin-shim/pom.xml | 2 +- ranger-hdfs-plugin-shim/pom.xml| 2 +- ranger-hive-plugin-shim/pom.xml| 2 +- ranger-kafka-plugin-shim/pom.xml | 2 +- ranger-kms-plugin-shim/pom.xml | 2 +- ranger-knox-plugin-shim/pom.xml| 2 +- ranger-kylin-plugin-shim/pom.xml | 2 +- ranger-plugin-classloader/pom.xml | 2 +- ranger-solr-plugin-shim/pom.xml| 2 +- ranger-sqoop-plugin-shim/pom.xml | 2 +- ranger-storm-plugin-shim/pom.xml | 2 +- ranger-tools/pom.xml | 2 +- ranger-util/pom.xml| 2 +- ranger-yarn-plugin-shim/pom.xml| 2 +- security-admin/pom.xml | 2 +- storm-agent/pom.xml| 2 +- tagsync/pom.xml| 2 +- ugsync/ldapconfigchecktool/ldapconfigcheck/pom.xml | 2 +- ugsync/pom.xml | 2 +- unixauthclient/pom.xml | 2 +- unixauthnative/pom.xml | 2 +- unixauthpam/pom.xml| 2 +- unixauthservice/pom.xml| 2 +- 50 files changed, 50 insertions(+), 50 deletions(-) -- http://git-wip-us.apache.org/repos/asf/ranger/blob/3217909b/agents-audit/pom.xml -- diff --git a/agents-audit/pom.xml b/agents-audit/pom.xml index 46a06e6..be8d150 100644 --- a/agents-audit/pom.xml +++ b/agents-audit/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -1.2.0 +1.2.1-SNAPSHOT .. http://git-wip-us.apache.org/repos/asf/ranger/blob/3217909b/agents-common/pom.xml -- diff --git a/agents-common/pom.xml b/agents-common/pom.xml index 3826c57..5ae5082 100644 --- a/agents-common/pom.xml +++ b/agents-common/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -1.2.0 +1.2.1-SNAPSHOT .. http://git-wip-us.apache.org/repos/asf/ranger/blob/3217909b/agents-cred/pom.xml -- diff --git a/agents-cred/pom.xml b/agents-cred/pom.xml index c7072a6..105576a 100644 --- a/agents-cred/pom.xml +++ b/agents-cred/pom.xml @@ -27,7 +27,7 @@ org.apache.ranger ranger -