Review Request 60061: Like security admin and usersync, the kms installer should chech whether the user group exists before creating the user group.

2017-06-13 Thread Qiang Zhang

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60061/
---

Review request for ranger, Alok Lal, Ankita Sinha, Don Bosco Durai, Colm O 
hEigeartaigh, Gautam Borad, Madhan Neethiraj, Ramesh Mani, Selvamohan 
Neethiraj, and Velmurugan Periasamy.


Bugs: RANGER-1641
https://issues.apache.org/jira/browse/RANGER-1641


Repository: ranger


Description
---

Like security admin and usersync, the kms installer should chech whether the 
user group exists before creating the user group.


Diffs
-

  kms/scripts/setup.sh c8d7519 


Diff: https://reviews.apache.org/r/60061/diff/1/


Testing
---


Thanks,

Qiang Zhang



[jira] [Updated] (RANGER-1641) Like security admin and usersync, the kms installer should chech whether the user group exists before creating the user group.

2017-06-13 Thread Qiang Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1641?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Qiang Zhang updated RANGER-1641:

Attachment: 0001-RANGER-1641-Like-security-admin-and-usersync-the-kms.patch

> Like security admin and usersync, the kms installer should chech whether the 
> user group exists before creating the user group.
> --
>
> Key: RANGER-1641
> URL: https://issues.apache.org/jira/browse/RANGER-1641
> Project: Ranger
>  Issue Type: Bug
>  Components: kms
>Reporter: Qiang Zhang
>Assignee: Qiang Zhang
>  Labels: patch
> Attachments: 
> 0001-RANGER-1641-Like-security-admin-and-usersync-the-kms.patch
>
>
> Like security admin and usersync, the kms installer should chech whether the 
> user group exists before creating the user group.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1641) Like security admin and usersync, the kms installer should chech whether the user group exists before creating the user group.

2017-06-13 Thread Qiang Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1641?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Qiang Zhang updated RANGER-1641:

Summary: Like security admin and usersync, the kms installer should chech 
whether the user group exists before creating the user group.  (was: Like 
security admin, the kms installer should chech whether the user group exists 
before creating the user group.)

> Like security admin and usersync, the kms installer should chech whether the 
> user group exists before creating the user group.
> --
>
> Key: RANGER-1641
> URL: https://issues.apache.org/jira/browse/RANGER-1641
> Project: Ranger
>  Issue Type: Bug
>  Components: kms
>Reporter: Qiang Zhang
>Assignee: Qiang Zhang
>  Labels: patch
>
> Like security admin, the kms installer should chech whether the user group 
> exists before creating the user group.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1641) Like security admin and usersync, the kms installer should chech whether the user group exists before creating the user group.

2017-06-13 Thread Qiang Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1641?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Qiang Zhang updated RANGER-1641:

Description: Like security admin and usersync, the kms installer should 
chech whether the user group exists before creating the user group.  (was: Like 
security admin, the kms installer should chech whether the user group exists 
before creating the user group.)

> Like security admin and usersync, the kms installer should chech whether the 
> user group exists before creating the user group.
> --
>
> Key: RANGER-1641
> URL: https://issues.apache.org/jira/browse/RANGER-1641
> Project: Ranger
>  Issue Type: Bug
>  Components: kms
>Reporter: Qiang Zhang
>Assignee: Qiang Zhang
>  Labels: patch
>
> Like security admin and usersync, the kms installer should chech whether the 
> user group exists before creating the user group.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Created] (RANGER-1641) Like security admin, the kms installer should chech whether the user group exists before creating the user group.

2017-06-13 Thread Qiang Zhang (JIRA)
Qiang Zhang created RANGER-1641:
---

 Summary: Like security admin, the kms installer should chech 
whether the user group exists before creating the user group.
 Key: RANGER-1641
 URL: https://issues.apache.org/jira/browse/RANGER-1641
 Project: Ranger
  Issue Type: Bug
  Components: kms
Reporter: Qiang Zhang
Assignee: Qiang Zhang


Like security admin, the kms installer should chech whether the user group 
exists before creating the user group.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Resolved] (RANGER-1636) Remove the pmd check error

2017-06-13 Thread Qiang Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1636?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Qiang Zhang resolved RANGER-1636.
-
   Resolution: Fixed
Fix Version/s: 1.0.0

> Remove the pmd check error
> --
>
> Key: RANGER-1636
> URL: https://issues.apache.org/jira/browse/RANGER-1636
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: peng.jianhua
>Assignee: peng.jianhua
>Priority: Minor
>  Labels: patch
> Fix For: 1.0.0
>
> Attachments: 0001-RANGER-1636-Remove-the-pmd-check-error.patch
>
>
> The following information will occur when using PMD tool to check code.
> 
> 
>  name="/submitranger/RangerCompile01/Ranger/agents-common/src/test/java/org/apache/ranger/plugin/errors/TestValidationErrorCode.java">
>  rule="UnusedImports" ruleset="Import Statements" 
> package="org.apache.ranger.plugin.errors" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/imports.html#UnusedImports";
>  priority="4">
> Avoid unused imports such as 
> 'org.apache.ranger.plugin.model.validation.ValidationFailureDetails'
> 
> 
>  name="/submitranger/RangerCompile01/Ranger/agents-common/src/test/java/org/apache/ranger/plugin/model/validation/TestRangerValidator.java">
>  rule="UnusedLocalVariable" ruleset="Unused Code" 
> package="org.apache.ranger.plugin.model.validation" 
> class="TestRangerValidator$RangerValidatorForTest" method="isValid" 
> variable="valid" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/unusedcode.html#UnusedLocalVariable";
>  priority="3">
> Avoid unused local variables such as 'valid'.
> 
> 
> 
> 
> 
>  name="/home/pengjianhua/gerrit/submitranger/RangerCompile/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java">
>  rule="UnusedFormalParameter" ruleset="Unused Code" 
> package="org.apache.hadoop.crypto.key" class="RangerKeyStore" 
> method="mapToEntityBean" variable="i" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/unusedcode.html#UnusedFormalParameter";
>  priority="3">
> Avoid unused method parameters such as 'i'.
> 
> 
> 



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Re: Review Request 60032: Remove the pmd check error

2017-06-13 Thread Qiang Zhang

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60032/#review177858
---


Ship it!




Ship It!

- Qiang Zhang


On 六月 13, 2017, 4:36 a.m., pengjianhua wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60032/
> ---
> 
> (Updated 六月 13, 2017, 4:36 a.m.)
> 
> 
> Review request for ranger, Alok Lal, Ankita Sinha, Don Bosco Durai, Colm O 
> hEigeartaigh, Gautam Borad, Madhan Neethiraj, Ramesh Mani, Selvamohan 
> Neethiraj, Velmurugan Periasamy, and Qiang Zhang.
> 
> 
> Bugs: RANGER-1636
> https://issues.apache.org/jira/browse/RANGER-1636
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> The following information will occur when using PMD tool to check code.
> 
> 
>  name="/submitranger/RangerCompile01/Ranger/agents-common/src/test/java/org/apache/ranger/plugin/errors/TestValidationErrorCode.java">
>  rule="UnusedImports" ruleset="Import Statements" 
> package="org.apache.ranger.plugin.errors" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/imports.html#UnusedImports";
>  priority="4">
> Avoid unused imports such as 
> 'org.apache.ranger.plugin.model.validation.ValidationFailureDetails'
> 
> 
>  name="/submitranger/RangerCompile01/Ranger/agents-common/src/test/java/org/apache/ranger/plugin/model/validation/TestRangerValidator.java">
>  rule="UnusedLocalVariable" ruleset="Unused Code" 
> package="org.apache.ranger.plugin.model.validation" 
> class="TestRangerValidator$RangerValidatorForTest" method="isValid" 
> variable="valid" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/unusedcode.html#UnusedLocalVariable";
>  priority="3">
> Avoid unused local variables such as 'valid'.
> 
> 
> 
> 
> 
>  name="/home/pengjianhua/gerrit/submitranger/RangerCompile/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java">
>  rule="UnusedFormalParameter" ruleset="Unused Code" 
> package="org.apache.hadoop.crypto.key" class="RangerKeyStore" 
> method="mapToEntityBean" variable="i" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/unusedcode.html#UnusedFormalParameter";
>  priority="3">
> Avoid unused method parameters such as 'i'.
> 
> 
> 
> 
> 
> Diffs
> -
> 
>   
> agents-common/src/test/java/org/apache/ranger/plugin/errors/TestValidationErrorCode.java
>  1b00c64 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60032/diff/1/
> 
> 
> Testing
> ---
> 
> 
> Thanks,
> 
> pengjianhua
> 
>



Re: Review Request 60046: RANGER-1640 - HBase Test Connection does not work when creating a service

2017-06-13 Thread Qiang Zhang

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60046/#review177857
---


Ship it!




Ship It!

- Qiang Zhang


On 六月 13, 2017, 12:10 p.m., Colm O hEigeartaigh wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60046/
> ---
> 
> (Updated 六月 13, 2017, 12:10 p.m.)
> 
> 
> Review request for ranger.
> 
> 
> Bugs: RANGER-1640
> https://issues.apache.org/jira/browse/RANGER-1640
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Testing a connection doesn't work with the HBase service on the first go in 
> the Admin UI, as the password is not yet encrypted
> 
> 
> Diffs
> -
> 
>   agents-common/src/main/java/org/apache/ranger/plugin/client/BaseClient.java 
> 485ac04e 
> 
> 
> Diff: https://reviews.apache.org/r/60046/diff/1/
> 
> 
> Testing
> ---
> 
> Tested that the connection works fine in the Admin UI when creating a service 
> and also when editing an already created service.
> 
> 
> Thanks,
> 
> Colm O hEigeartaigh
> 
>



[jira] [Commented] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16047800#comment-16047800
 ] 

Ankita Sinha commented on RANGER-1582:
--

Committed to ranger-0.7 : 
https://github.com/apache/ranger/commit/d4cf793efd2d5c1604e4404ad12f72252470c1cd

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1582.patch
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Re: Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Colm O hEigeartaigh


> On June 13, 2017, 12:20 p.m., Colm O hEigeartaigh wrote:
> > Ship It!

Actually, is it feasible to add some unit tests for this?


- Colm


---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/#review177731
---


On June 13, 2017, 12:06 p.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60043/
> ---
> 
> (Updated June 13, 2017, 12:06 p.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1639
> https://issues.apache.org/jira/browse/RANGER-1639
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> 
> Expected :
> Ranger KMS should validate key name before importing into DB.
> 
> 
> Diffs
> -
> 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60043/diff/2/
> 
> 
> Testing
> ---
> 
> Below steps were followed to test this scenario
> 
> 1. Installed Hadoop KMS
> 2. Created encryption keys with combination of special characters, alphabets 
> and numbers
> 3. Installed Ranger KMS
> 4. imported hadoop key jceks to Ranger KMS (Validation was successful)
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Re: Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Colm O hEigeartaigh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/#review177731
---


Ship it!




Ship It!

- Colm O hEigeartaigh


On June 13, 2017, 12:06 p.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60043/
> ---
> 
> (Updated June 13, 2017, 12:06 p.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1639
> https://issues.apache.org/jira/browse/RANGER-1639
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> 
> Expected :
> Ranger KMS should validate key name before importing into DB.
> 
> 
> Diffs
> -
> 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60043/diff/2/
> 
> 
> Testing
> ---
> 
> Below steps were followed to test this scenario
> 
> 1. Installed Hadoop KMS
> 2. Created encryption keys with combination of special characters, alphabets 
> and numbers
> 3. Installed Ranger KMS
> 4. imported hadoop key jceks to Ranger KMS (Validation was successful)
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



[jira] [Commented] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

[ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16047786#comment-16047786
 ] 

Ankita Sinha commented on RANGER-1582:
--

Committed to master : 
https://github.com/apache/ranger/commit/9a99e3f41cc2125295058a8fc32e5b9e53bb48a4

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1582.patch
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Review Request 60046: RANGER-1640 - HBase Test Connection does not work when creating a service

2017-06-13 Thread Colm O hEigeartaigh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60046/
---

Review request for ranger.


Bugs: RANGER-1640
https://issues.apache.org/jira/browse/RANGER-1640


Repository: ranger


Description
---

Testing a connection doesn't work with the HBase service on the first go in the 
Admin UI, as the password is not yet encrypted


Diffs
-

  agents-common/src/main/java/org/apache/ranger/plugin/client/BaseClient.java 
485ac04e 


Diff: https://reviews.apache.org/r/60046/diff/1/


Testing
---

Tested that the connection works fine in the Admin UI when creating a service 
and also when editing an already created service.


Thanks,

Colm O hEigeartaigh



[jira] [Updated] (RANGER-1640) HBase Test Connection does not work when creating a service

2017-06-13 Thread Colm O hEigeartaigh (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1640?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh updated RANGER-1640:

Attachment: 0001-RANGER-1640-HBase-Test-Connection-does-not-work-when.patch

> HBase Test Connection does not work when creating a service
> ---
>
> Key: RANGER-1640
> URL: https://issues.apache.org/jira/browse/RANGER-1640
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Reporter: Colm O hEigeartaigh
>Assignee: Colm O hEigeartaigh
> Fix For: 1.0.0
>
> Attachments: 
> 0001-RANGER-1640-HBase-Test-Connection-does-not-work-when.patch
>
>
> Testing a connection doesn't work with the HBase service on the first go in 
> the Admin UI, as the password is not yet encrypted.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Re: Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/
---

(Updated June 13, 2017, 12:06 p.m.)


Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
Polavarapu, and Velmurugan Periasamy.


Changes
---

Updated Review request with review comments


Bugs: RANGER-1639
https://issues.apache.org/jira/browse/RANGER-1639


Repository: ranger


Description
---

Actual :
Ranger KMS does not validate key name before importing into DB. So the imported 
key can have special characters in Key name.

Expected :
Ranger KMS should validate key name before importing into DB.


Diffs (updated)
-

  kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 


Diff: https://reviews.apache.org/r/60043/diff/2/

Changes: https://reviews.apache.org/r/60043/diff/1-2/


Testing
---

Below steps were followed to test this scenario

1. Installed Hadoop KMS
2. Created encryption keys with combination of special characters, alphabets 
and numbers
3. Installed Ranger KMS
4. imported hadoop key jceks to Ranger KMS (Validation was successful)


Thanks,

Ankita Sinha



Re: Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha


- Ankita


---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/#review177725
---


On June 13, 2017, 12:06 p.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60043/
> ---
> 
> (Updated June 13, 2017, 12:06 p.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1639
> https://issues.apache.org/jira/browse/RANGER-1639
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> 
> Expected :
> Ranger KMS should validate key name before importing into DB.
> 
> 
> Diffs
> -
> 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60043/diff/2/
> 
> 
> Testing
> ---
> 
> Below steps were followed to test this scenario
> 
> 1. Installed Hadoop KMS
> 2. Created encryption keys with combination of special characters, alphabets 
> and numbers
> 3. Installed Ranger KMS
> 4. imported hadoop key jceks to Ranger KMS (Validation was successful)
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Re: Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha


> On June 13, 2017, 10:31 a.m., Colm O hEigeartaigh wrote:
> > Instead of calling Pattern.compile for each check, it's better to make the 
> > Pattern static + call Pattern.compile once, as the regex itself is static 
> > and doesn't change.

Thanks, Updated the review request.


- Ankita


---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/#review177725
---


On June 13, 2017, 12:06 p.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60043/
> ---
> 
> (Updated June 13, 2017, 12:06 p.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1639
> https://issues.apache.org/jira/browse/RANGER-1639
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> 
> Expected :
> Ranger KMS should validate key name before importing into DB.
> 
> 
> Diffs
> -
> 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60043/diff/2/
> 
> 
> Testing
> ---
> 
> Below steps were followed to test this scenario
> 
> 1. Installed Hadoop KMS
> 2. Created encryption keys with combination of special characters, alphabets 
> and numbers
> 3. Installed Ranger KMS
> 4. imported hadoop key jceks to Ranger KMS (Validation was successful)
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



[jira] [Created] (RANGER-1640) HBase Test Connection does not work when creating a service

2017-06-13 Thread Colm O hEigeartaigh (JIRA)
Colm O hEigeartaigh created RANGER-1640:
---

 Summary: HBase Test Connection does not work when creating a 
service
 Key: RANGER-1640
 URL: https://issues.apache.org/jira/browse/RANGER-1640
 Project: Ranger
  Issue Type: Bug
  Components: admin
Reporter: Colm O hEigeartaigh
Assignee: Colm O hEigeartaigh
 Fix For: 1.0.0


Testing a connection doesn't work with the HBase service on the first go in the 
Admin UI, as the password is not yet encrypted.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: RANGER-1639.patch

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: (was: RANGER-1639.patch)

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Re: Review Request 60034: Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Velmurugan Periasamy

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60034/#review177727
---


Ship it!




Ship It!

- Velmurugan Periasamy


On June 13, 2017, 9:55 a.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60034/
> ---
> 
> (Updated June 13, 2017, 9:55 a.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1582
> https://issues.apache.org/jira/browse/RANGER-1582
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Currently Knox SSO is just supported from Ranger UI through web browser.
> 
> Expected :
> Support KNOX SSO Token based authentication on Ranger REST API calls.
> 
> 
> Diffs
> -
> 
>   
> security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
>  ffb60b9 
>   security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml 
> f0ccae1 
> 
> 
> Diff: https://reviews.apache.org/r/60034/diff/2/
> 
> 
> Testing
> ---
> 
> 1. Checked Knox SSO for REST API Calls
> 2. Knox SSO working as expected from Ranger UI
> 3. Tested in secure as well as simple environment.
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Re: Review Request 60034: Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Colm O hEigeartaigh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60034/#review177726
---


Ship it!




Ship It!

- Colm O hEigeartaigh


On June 13, 2017, 9:55 a.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60034/
> ---
> 
> (Updated June 13, 2017, 9:55 a.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1582
> https://issues.apache.org/jira/browse/RANGER-1582
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Currently Knox SSO is just supported from Ranger UI through web browser.
> 
> Expected :
> Support KNOX SSO Token based authentication on Ranger REST API calls.
> 
> 
> Diffs
> -
> 
>   
> security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
>  ffb60b9 
>   security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml 
> f0ccae1 
> 
> 
> Diff: https://reviews.apache.org/r/60034/diff/2/
> 
> 
> Testing
> ---
> 
> 1. Checked Knox SSO for REST API Calls
> 2. Knox SSO working as expected from Ranger UI
> 3. Tested in secure as well as simple environment.
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Re: Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Colm O hEigeartaigh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/#review177725
---



Instead of calling Pattern.compile for each check, it's better to make the 
Pattern static + call Pattern.compile once, as the regex itself is static and 
doesn't change.

- Colm O hEigeartaigh


On June 13, 2017, 10:07 a.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60043/
> ---
> 
> (Updated June 13, 2017, 10:07 a.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1639
> https://issues.apache.org/jira/browse/RANGER-1639
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> 
> Expected :
> Ranger KMS should validate key name before importing into DB.
> 
> 
> Diffs
> -
> 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60043/diff/1/
> 
> 
> Testing
> ---
> 
> Below steps were followed to test this scenario
> 
> 1. Installed Hadoop KMS
> 2. Created encryption keys with combination of special characters, alphabets 
> and numbers
> 3. Installed Ranger KMS
> 4. imported hadoop key jceks to Ranger KMS (Validation was successful)
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Review Request 60043: Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60043/
---

Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
Polavarapu, and Velmurugan Periasamy.


Bugs: RANGER-1639
https://issues.apache.org/jira/browse/RANGER-1639


Repository: ranger


Description
---

Actual :
Ranger KMS does not validate key name before importing into DB. So the imported 
key can have special characters in Key name.

Expected :
Ranger KMS should validate key name before importing into DB.


Diffs
-

  kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 


Diff: https://reviews.apache.org/r/60043/diff/1/


Testing
---

Below steps were followed to test this scenario

1. Installed Hadoop KMS
2. Created encryption keys with combination of special characters, alphabets 
and numbers
3. Installed Ranger KMS
4. imported hadoop key jceks to Ranger KMS (Validation was successful)


Thanks,

Ankita Sinha



[jira] [Updated] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1639?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1639:
-
Attachment: RANGER-1639.patch

> Ranger KMS should validate key name before importing into DB
> 
>
> Key: RANGER-1639
> URL: https://issues.apache.org/jira/browse/RANGER-1639
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1639.patch
>
>
> *Actual* : 
> Ranger KMS does not validate key name before importing into DB. So the 
> imported key can have special characters in Key name.
> *Expected* :
> Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Re: Review Request 60034: Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha


> On June 13, 2017, 8:49 a.m., Colm O hEigeartaigh wrote:
> > Please put curly brackets around the two one-line if statements: 
> > if(LOG.isDebugEnabled())

Thanks, updated with the suggested changes.


- Ankita


---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60034/#review177715
---


On June 13, 2017, 9:55 a.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60034/
> ---
> 
> (Updated June 13, 2017, 9:55 a.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1582
> https://issues.apache.org/jira/browse/RANGER-1582
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Currently Knox SSO is just supported from Ranger UI through web browser.
> 
> Expected :
> Support KNOX SSO Token based authentication on Ranger REST API calls.
> 
> 
> Diffs
> -
> 
>   
> security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
>  ffb60b9 
>   security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml 
> f0ccae1 
> 
> 
> Diff: https://reviews.apache.org/r/60034/diff/2/
> 
> 
> Testing
> ---
> 
> 1. Checked Knox SSO for REST API Calls
> 2. Knox SSO working as expected from Ranger UI
> 3. Tested in secure as well as simple environment.
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Re: Review Request 60034: Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60034/
---

(Updated June 13, 2017, 9:55 a.m.)


Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
Polavarapu, and Velmurugan Periasamy.


Changes
---

Included curly brackets around the two one-line if statements: 
if(LOG.isDebugEnabled())


Bugs: RANGER-1582
https://issues.apache.org/jira/browse/RANGER-1582


Repository: ranger


Description
---

Actual :
Currently Knox SSO is just supported from Ranger UI through web browser.

Expected :
Support KNOX SSO Token based authentication on Ranger REST API calls.


Diffs (updated)
-

  
security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
 ffb60b9 
  security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml 
f0ccae1 


Diff: https://reviews.apache.org/r/60034/diff/2/

Changes: https://reviews.apache.org/r/60034/diff/1-2/


Testing
---

1. Checked Knox SSO for REST API Calls
2. Knox SSO working as expected from Ranger UI
3. Tested in secure as well as simple environment.


Thanks,

Ankita Sinha



Re: Review Request 60032: Remove the pmd check error

2017-06-13 Thread Colm O hEigeartaigh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60032/#review177717
---


Ship it!




Ship It!

- Colm O hEigeartaigh


On June 13, 2017, 4:36 a.m., pengjianhua wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60032/
> ---
> 
> (Updated June 13, 2017, 4:36 a.m.)
> 
> 
> Review request for ranger, Alok Lal, Ankita Sinha, Don Bosco Durai, Colm O 
> hEigeartaigh, Gautam Borad, Madhan Neethiraj, Ramesh Mani, Selvamohan 
> Neethiraj, Velmurugan Periasamy, and Qiang Zhang.
> 
> 
> Bugs: RANGER-1636
> https://issues.apache.org/jira/browse/RANGER-1636
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> The following information will occur when using PMD tool to check code.
> 
> 
>  name="/submitranger/RangerCompile01/Ranger/agents-common/src/test/java/org/apache/ranger/plugin/errors/TestValidationErrorCode.java">
>  rule="UnusedImports" ruleset="Import Statements" 
> package="org.apache.ranger.plugin.errors" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/imports.html#UnusedImports";
>  priority="4">
> Avoid unused imports such as 
> 'org.apache.ranger.plugin.model.validation.ValidationFailureDetails'
> 
> 
>  name="/submitranger/RangerCompile01/Ranger/agents-common/src/test/java/org/apache/ranger/plugin/model/validation/TestRangerValidator.java">
>  rule="UnusedLocalVariable" ruleset="Unused Code" 
> package="org.apache.ranger.plugin.model.validation" 
> class="TestRangerValidator$RangerValidatorForTest" method="isValid" 
> variable="valid" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/unusedcode.html#UnusedLocalVariable";
>  priority="3">
> Avoid unused local variables such as 'valid'.
> 
> 
> 
> 
> 
>  name="/home/pengjianhua/gerrit/submitranger/RangerCompile/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java">
>  rule="UnusedFormalParameter" ruleset="Unused Code" 
> package="org.apache.hadoop.crypto.key" class="RangerKeyStore" 
> method="mapToEntityBean" variable="i" 
> externalInfoUrl="http://pmd.sourceforge.net/pmd-5.3.2/pmd-java/rules/java/unusedcode.html#UnusedFormalParameter";
>  priority="3">
> Avoid unused method parameters such as 'i'.
> 
> 
> 
> 
> 
> Diffs
> -
> 
>   
> agents-common/src/test/java/org/apache/ranger/plugin/errors/TestValidationErrorCode.java
>  1b00c64 
>   kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java c4f7267 
> 
> 
> Diff: https://reviews.apache.org/r/60032/diff/1/
> 
> 
> Testing
> ---
> 
> 
> Thanks,
> 
> pengjianhua
> 
>



[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Attachment: RANGER-1582.patch

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
> Attachments: RANGER-1582.patch
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Updated] (RANGER-1582) Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha (JIRA)

 [ 
https://issues.apache.org/jira/browse/RANGER-1582?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ankita Sinha updated RANGER-1582:
-
Attachment: (was: RANGER-1582.patch)

> Support KNOX SSO Token based authentication on Ranger REST API calls
> 
>
> Key: RANGER-1582
> URL: https://issues.apache.org/jira/browse/RANGER-1582
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Affects Versions: 1.0.0
>Reporter: Ankita Sinha
>Assignee: Ankita Sinha
> Fix For: 1.0.0
>
>
> *Actual* :
> Currently Knox SSO is just supported from Ranger UI through web browser. 
> *Expected* : 
> Support KNOX SSO Token based authentication on Ranger REST API calls.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


[jira] [Created] (RANGER-1639) Ranger KMS should validate key name before importing into DB

2017-06-13 Thread Ankita Sinha (JIRA)
Ankita Sinha created RANGER-1639:


 Summary: Ranger KMS should validate key name before importing into 
DB
 Key: RANGER-1639
 URL: https://issues.apache.org/jira/browse/RANGER-1639
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Affects Versions: 1.0.0
Reporter: Ankita Sinha
Assignee: Ankita Sinha
 Fix For: 1.0.0


*Actual* : 
Ranger KMS does not validate key name before importing into DB. So the imported 
key can have special characters in Key name.

*Expected* :
Ranger KMS should validate key name before importing into DB.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)


Re: Review Request 60034: Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Colm O hEigeartaigh

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60034/#review177715
---



Please put curly brackets around the two one-line if statements: 
if(LOG.isDebugEnabled())

- Colm O hEigeartaigh


On June 13, 2017, 8:23 a.m., Ankita Sinha wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/60034/
> ---
> 
> (Updated June 13, 2017, 8:23 a.m.)
> 
> 
> Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
> Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
> Polavarapu, and Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-1582
> https://issues.apache.org/jira/browse/RANGER-1582
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Actual :
> Currently Knox SSO is just supported from Ranger UI through web browser.
> 
> Expected :
> Support KNOX SSO Token based authentication on Ranger REST API calls.
> 
> 
> Diffs
> -
> 
>   
> security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
>  ffb60b9 
>   security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml 
> 4f5f1d3 
> 
> 
> Diff: https://reviews.apache.org/r/60034/diff/1/
> 
> 
> Testing
> ---
> 
> 1. Checked Knox SSO for REST API Calls
> 2. Knox SSO working as expected from Ranger UI
> 3. Tested in secure as well as simple environment.
> 
> 
> Thanks,
> 
> Ankita Sinha
> 
>



Review Request 60034: Support KNOX SSO Token based authentication on Ranger REST API calls

2017-06-13 Thread Ankita Sinha

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/60034/
---

Review request for ranger, Don Bosco Durai, Gautam Borad, Abhay Kulkarni, 
Madhan Neethiraj, Pradeep Agrawal, Ramesh Mani, Selvamohan Neethiraj, Sailaja 
Polavarapu, and Velmurugan Periasamy.


Bugs: RANGER-1582
https://issues.apache.org/jira/browse/RANGER-1582


Repository: ranger


Description
---

Actual :
Currently Knox SSO is just supported from Ranger UI through web browser.

Expected :
Support KNOX SSO Token based authentication on Ranger REST API calls.


Diffs
-

  
security-admin/src/main/java/org/apache/ranger/security/web/filter/RangerSSOAuthenticationFilter.java
 ffb60b9 
  security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml 
4f5f1d3 


Diff: https://reviews.apache.org/r/60034/diff/1/


Testing
---

1. Checked Knox SSO for REST API Calls
2. Knox SSO working as expected from Ranger UI
3. Tested in secure as well as simple environment.


Thanks,

Ankita Sinha