It would be great if you take a look at some of the Pull requests were raised by me if possible

2023-05-31 Thread Ramachandran Krishnan
Hi All,
Could you please take a look at the below-mentioned Pull requests if
possible

Bugs/Feature Review URL
RANGER-4195:Exposing the Ranger REST API is used to fetch the health check
status of
Ranger Admin https://reviews.apache.org/r/74405/
RANGER-4250 :Ranger throws BAD Request Error when we are not passing
exec user to the getRoles (/public/v2/api/roles/name/{name})
https://reviews.apache.org/r/74453/
RANGER-4133 Improvement in Ranger Roles Rest API's
https://reviews.apache.org/r/74349/
RANGER-4190: Apache Ranger does not recover from a recoverable SQL exception
https://reviews.apache.org/r/74398/Regards,
Ram


[GitHub] [ranger] kumaab commented on a diff in pull request #253: RANGER-4230: Add REST APIs to force delete external users & groups

2023-05-31 Thread via GitHub


kumaab commented on code in PR #253:
URL: https://github.com/apache/ranger/pull/253#discussion_r1212601478


##
security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java:
##
@@ -2400,6 +2426,31 @@ public synchronized void deleteXUser(Long id, boolean 
force) {
}
}
 
+   public void forceDeleteUsers(List users){
+   long startTime = Time.now();
+   for(VXUser user: users){
+   Long userId = user.getId();
+   TransactionTemplate txTemplate = new 
TransactionTemplate(txManager);
+   
txTemplate.setPropagationBehavior(TransactionDefinition.PROPAGATION_REQUIRES_NEW);
+   try {
+   txTemplate.execute(new 
TransactionCallback() {
+   @Override
+   public Object 
doInTransaction(TransactionStatus status) {
+   deleteXUser(userId, true);
+   return null;
+   }
+   });
+   } catch (Throwable ex) {
+   logger.error("forceDeleteUsers(): Failed to 
delete user id: " + userId + " ", ex);
+   throw new RuntimeException(ex);

Review Comment:
   Sure, I'll revise the PR to continue with deletes despite failures. 
   
   I believe getting the usernames for all users deleted/failed deletes is an 
overhead since this would result in another db call(with new jpa query), and 
ignoring the rare occurrence of transaction exceptions(in which we might not 
get the logs from deleteUser()), info regarding every user is already logged as 
part of deleteUser() where we print the username of the user getting deleted. 
For debugging purposes in case of transaction failures, username of the user is 
still retrievable using the userid in the catch block.
   




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@ranger.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [ranger] kumaab commented on a diff in pull request #253: RANGER-4230: Add REST APIs to force delete external users & groups

2023-05-31 Thread via GitHub


kumaab commented on code in PR #253:
URL: https://github.com/apache/ranger/pull/253#discussion_r1212180445


##
security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java:
##
@@ -863,6 +864,61 @@ public void deleteXUserByUserName(@PathParam("userName") 
String userName,
xUserMgr.deleteXUser(vxUser.getId(), forceDelete);
}
 
+
+   /**
+* Proceed with caution: Force deletes users from the ranger 
db,
+* Delete happens one at a time with immediate commit on the 
transaction.
+*/
+   @DELETE
+   @Path("/delete/external/users")
+   @PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
+   @Produces({ "application/json" })
+   public Response forceDeleteUsers(@Context HttpServletRequest request) {
+   SearchCriteria searchCriteria = new SearchCriteria();
+   searchUtil.extractString(
+   request, searchCriteria, "name", "User 
name",null);
+   searchUtil.extractString(
+   request, searchCriteria, "emailAddress", "Email 
Address", null);
+   searchUtil.extractInt(
+   request, searchCriteria, "userSource", "User 
Source");
+   searchUtil.extractInt(
+   request, searchCriteria, "isVisible", "User 
Visibility");
+   searchUtil.extractInt(
+   request, searchCriteria, "status", "User 
Status");
+   searchUtil.extractString(
+   request, searchCriteria, "syncSource", "Sync 
Source", null);
+   searchUtil.extractRoleString(
+   request, searchCriteria, "userRole", "Role", 
null);
+
+   VXUserList userList = xUserMgr.searchXUsers(searchCriteria);
+   xUserMgr.forceDeleteUsers(userList.getList());
+   return Response.ok(userList.getListSize() + " users deleted 
successfully").build();
+   }
+
+   /**
+* Proceed with caution: Force deletes groups from the ranger 
db,
+* Delete happens one at a time with immediate commit on the 
transaction.
+*/
+   @DELETE
+   @Path("/delete/external/groups")

Review Comment:
   The API is now specific to external groups, updated the PR sometime back.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@ranger.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [ranger] kumaab commented on a diff in pull request #253: RANGER-4230: Add REST APIs to force delete external users & groups

2023-05-31 Thread via GitHub


kumaab commented on code in PR #253:
URL: https://github.com/apache/ranger/pull/253#discussion_r1212180002


##
security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java:
##
@@ -863,6 +864,61 @@ public void deleteXUserByUserName(@PathParam("userName") 
String userName,
xUserMgr.deleteXUser(vxUser.getId(), forceDelete);
}
 
+
+   /**
+* Proceed with caution: Force deletes users from the ranger 
db,
+* Delete happens one at a time with immediate commit on the 
transaction.
+*/
+   @DELETE
+   @Path("/delete/external/users")

Review Comment:
   The API is now specific to external users, updated the PR sometime back.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@ranger.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[GitHub] [ranger] mneethiraj commented on a diff in pull request #253: RANGER-4230: Add REST APIs to force delete external users & groups

2023-05-31 Thread via GitHub


mneethiraj commented on code in PR #253:
URL: https://github.com/apache/ranger/pull/253#discussion_r1192692660


##
security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java:
##
@@ -863,6 +864,61 @@ public void deleteXUserByUserName(@PathParam("userName") 
String userName,
xUserMgr.deleteXUser(vxUser.getId(), forceDelete);
}
 
+
+   /**
+* Proceed with caution: Force deletes users from the ranger 
db,
+* Delete happens one at a time with immediate commit on the 
transaction.
+*/
+   @DELETE
+   @Path("/delete/external/users")

Review Comment:
   I suggest replacing `external` in the URI with `force', since this API is 
not specific to external users i.e., userSource query-param.



##
security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java:
##
@@ -863,6 +864,61 @@ public void deleteXUserByUserName(@PathParam("userName") 
String userName,
xUserMgr.deleteXUser(vxUser.getId(), forceDelete);
}
 
+
+   /**
+* Proceed with caution: Force deletes users from the ranger 
db,
+* Delete happens one at a time with immediate commit on the 
transaction.
+*/
+   @DELETE
+   @Path("/delete/external/users")
+   @PreAuthorize("hasRole('ROLE_SYS_ADMIN')")
+   @Produces({ "application/json" })
+   public Response forceDeleteUsers(@Context HttpServletRequest request) {
+   SearchCriteria searchCriteria = new SearchCriteria();
+   searchUtil.extractString(
+   request, searchCriteria, "name", "User 
name",null);
+   searchUtil.extractString(
+   request, searchCriteria, "emailAddress", "Email 
Address", null);
+   searchUtil.extractInt(
+   request, searchCriteria, "userSource", "User 
Source");
+   searchUtil.extractInt(
+   request, searchCriteria, "isVisible", "User 
Visibility");
+   searchUtil.extractInt(
+   request, searchCriteria, "status", "User 
Status");
+   searchUtil.extractString(
+   request, searchCriteria, "syncSource", "Sync 
Source", null);
+   searchUtil.extractRoleString(
+   request, searchCriteria, "userRole", "Role", 
null);
+
+   VXUserList userList = xUserMgr.searchXUsers(searchCriteria);
+   xUserMgr.forceDeleteUsers(userList.getList());
+   return Response.ok(userList.getListSize() + " users deleted 
successfully").build();
+   }
+
+   /**
+* Proceed with caution: Force deletes groups from the ranger 
db,
+* Delete happens one at a time with immediate commit on the 
transaction.
+*/
+   @DELETE
+   @Path("/delete/external/groups")

Review Comment:
   I suggest replacing `external` in the URI with `force', since this API is 
not specific to external group i.e., groupSource query-param.



##
security-admin/src/main/java/org/apache/ranger/biz/XUserMgr.java:
##
@@ -2400,6 +2426,31 @@ public synchronized void deleteXUser(Long id, boolean 
force) {
}
}
 
+   public void forceDeleteUsers(List users){
+   long startTime = Time.now();
+   for(VXUser user: users){
+   Long userId = user.getId();
+   TransactionTemplate txTemplate = new 
TransactionTemplate(txManager);
+   
txTemplate.setPropagationBehavior(TransactionDefinition.PROPAGATION_REQUIRES_NEW);
+   try {
+   txTemplate.execute(new 
TransactionCallback() {
+   @Override
+   public Object 
doInTransaction(TransactionStatus status) {
+   deleteXUser(userId, true);
+   return null;
+   }
+   });
+   } catch (Throwable ex) {
+   logger.error("forceDeleteUsers(): Failed to 
delete user id: " + userId + " ", ex);
+   throw new RuntimeException(ex);

Review Comment:
   This exception would cause delete operation to be aborted on the first 
failure, right? The response to the client wouldn't show that few users have 
been deleted. I would suggest the following changes:
   - instead of aborting on the first failure, this method should attempt to 
delete subsequent users as well
   - the return from this method should include list of users successfully 
deleted, and the list of users who couldn't be deleted
   
   Similar updates in forceDeleteGroups() as well.



-- 
This is an automated message from the Apache Git Service.
To respond to the 

Re: Review Request 74458: RANGER-4258: Ranger: Instead of limiting the listing to only 25, Ranger should provide a comprehensive list of maximum service definitions, services, and zones.

2023-05-31 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74458/#review225497
---


Ship it!




Ship It!

- Madhan Neethiraj


On May 31, 2023, 9:06 a.m., Nitin Galave wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74458/
> ---
> 
> (Updated May 31, 2023, 9:06 a.m.)
> 
> 
> Review request for ranger, Ankita Sinha, Dhaval Rajpara, and madhan.
> 
> 
> Bugs: RANGER-4258
> https://issues.apache.org/jira/browse/RANGER-4258
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum (at least 1000) service definitions, services, 
> and zones.
> 
> 
> Diffs
> -
> 
>   security-admin/src/main/webapp/scripts/controllers/Controller.js d984bac9d 
>   security-admin/src/main/webapp/scripts/utils/XAGlobals.js 4b0c98e30 
>   security-admin/src/main/webapp/scripts/views/policies/RangerPolicyCreate.js 
> e6c262235 
>   security-admin/src/main/webapp/scripts/views/policymanager/ServiceLayout.js 
> 6d2d94589 
>   
> security-admin/src/main/webapp/scripts/views/policymanager/ServiceLayoutSidebar.js
>  94fa3135d 
>   security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js 
> 4acebee98 
>   security-admin/src/main/webapp/scripts/views/reports/UserAccessLayout.js 
> 3b8d862a7 
> 
> 
> Diff: https://reviews.apache.org/r/74458/diff/1/
> 
> 
> Testing
> ---
> 
> Verified 
> 1. Service, policy, listing page (Resource/Tag)
> 2. Zone listing and create/update page.
> 3. Audit access tab
> 4. Reports
> 
> 
> Thanks,
> 
> Nitin Galave
> 
>



[jira] [Updated] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddhant Sontakke updated RANGER-4260:
--
Description: 
h4. In trino service while creating policy add permission is rendering 
incorrectly.

Actual : - 

!image-2023-05-31-14-45-34-388.png|width=669,height=304!

Expected : - 

!image-2023-05-31-14-41-35-775.png|width=664,height=298!

  was:
h4. In trino service while creating policy add permission is rendering 
incorrectly.

Actual : - 

!image-2023-05-31-14-45-34-388.png|width=693,height=315!

Expected : - 

!image-2023-05-31-14-41-35-775.png|width=684,height=307!


> In trino service while creating policy add permission is rendering 
> incorrectly.
> ---
>
> Key: RANGER-4260
> URL: https://issues.apache.org/jira/browse/RANGER-4260
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Siddhant Sontakke
>Assignee: Stalin Nadar
>Priority: Major
> Attachments: image-2023-05-31-14-41-35-775.png, 
> image-2023-05-31-14-45-34-388.png, scrnli_31_05_2023_14-39-04.webm
>
>
> h4. In trino service while creating policy add permission is rendering 
> incorrectly.
> Actual : - 
> !image-2023-05-31-14-45-34-388.png|width=669,height=304!
> Expected : - 
> !image-2023-05-31-14-41-35-775.png|width=664,height=298!



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddhant Sontakke updated RANGER-4260:
--
Description: 
h4. In trino service while creating policy add permission is rendering 
incorrectly.

Actual : - 

!image-2023-05-31-14-45-34-388.png|width=693,height=315!

Expected : - 

!image-2023-05-31-14-41-35-775.png|width=684,height=307!

  was:h1. In trino service while creating policy add permission is rendering 
incorrectly.


> In trino service while creating policy add permission is rendering 
> incorrectly.
> ---
>
> Key: RANGER-4260
> URL: https://issues.apache.org/jira/browse/RANGER-4260
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Siddhant Sontakke
>Assignee: Stalin Nadar
>Priority: Major
> Attachments: image-2023-05-31-14-41-35-775.png, 
> image-2023-05-31-14-45-34-388.png, scrnli_31_05_2023_14-39-04.webm
>
>
> h4. In trino service while creating policy add permission is rendering 
> incorrectly.
> Actual : - 
> !image-2023-05-31-14-45-34-388.png|width=693,height=315!
> Expected : - 
> !image-2023-05-31-14-41-35-775.png|width=684,height=307!



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddhant Sontakke updated RANGER-4260:
--
Attachment: image-2023-05-31-14-45-34-388.png

> In trino service while creating policy add permission is rendering 
> incorrectly.
> ---
>
> Key: RANGER-4260
> URL: https://issues.apache.org/jira/browse/RANGER-4260
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Siddhant Sontakke
>Assignee: Stalin Nadar
>Priority: Major
> Attachments: image-2023-05-31-14-41-35-775.png, 
> image-2023-05-31-14-45-34-388.png, scrnli_31_05_2023_14-39-04.webm
>
>
> h1. In trino service while creating policy add permission is rendering 
> incorrectly.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddhant Sontakke updated RANGER-4260:
--
Attachment: image-2023-05-31-14-41-35-775.png

> In trino service while creating policy add permission is rendering 
> incorrectly.
> ---
>
> Key: RANGER-4260
> URL: https://issues.apache.org/jira/browse/RANGER-4260
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Siddhant Sontakke
>Assignee: Stalin Nadar
>Priority: Major
> Attachments: image-2023-05-31-14-41-35-775.png, 
> scrnli_31_05_2023_14-39-04.webm
>
>
> h1. In trino service while creating policy add permission is rendering 
> incorrectly.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4258) Ranger: Instead of limiting the listing to only 25, Ranger should provide a comprehensive list of maximum service definitions, services, and zones.

2023-05-31 Thread Nitin Galave (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4258?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nitin Galave updated RANGER-4258:
-
Description: 
Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
comprehensive list of maximum (at least 1000) service definitions, services, 
and zones.

cc: [~mad...@apache.org]

  was:Ranger: Instead of limiting the listing to only 25, Ranger should provide 
a comprehensive list of maximum (at least 1000) service definitions, services, 
and zones.


> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum service definitions, services, and zones.
> ---
>
> Key: RANGER-4258
> URL: https://issues.apache.org/jira/browse/RANGER-4258
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Nitin Galave
>Assignee: Nitin Galave
>Priority: Minor
>
> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum (at least 1000) service definitions, services, 
> and zones.
> cc: [~mad...@apache.org]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (RANGER-4258) Ranger: Instead of limiting the listing to only 25, Ranger should provide a comprehensive list of maximum service definitions, services, and zones.

2023-05-31 Thread Nitin Galave (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-4258?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17727870#comment-17727870
 ] 

Nitin Galave commented on RANGER-4258:
--

[~Dhaval.Rajpara] Please review https://reviews.apache.org/r/74458/

> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum service definitions, services, and zones.
> ---
>
> Key: RANGER-4258
> URL: https://issues.apache.org/jira/browse/RANGER-4258
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Nitin Galave
>Assignee: Nitin Galave
>Priority: Minor
>
> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum (at least 1000) service definitions, services, 
> and zones.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (RANGER-4258) Ranger: Instead of limiting the listing to only 25, Ranger should provide a comprehensive list of maximum service definitions, services, and zones.

2023-05-31 Thread Nitin Galave (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-4258?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17727870#comment-17727870
 ] 

Nitin Galave edited comment on RANGER-4258 at 5/31/23 9:11 AM:
---

[~Dhaval.Rajpara] [~mad...@apache.org] Please review 
https://reviews.apache.org/r/74458/


was (Author: nitin.galave):
[~Dhaval.Rajpara] Please review https://reviews.apache.org/r/74458/

> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum service definitions, services, and zones.
> ---
>
> Key: RANGER-4258
> URL: https://issues.apache.org/jira/browse/RANGER-4258
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Nitin Galave
>Assignee: Nitin Galave
>Priority: Minor
>
> Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
> comprehensive list of maximum (at least 1000) service definitions, services, 
> and zones.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddhant Sontakke updated RANGER-4260:
--
Description: h1. In trino service while creating policy add permission is 
rendering incorrectly.

> In trino service while creating policy add permission is rendering 
> incorrectly.
> ---
>
> Key: RANGER-4260
> URL: https://issues.apache.org/jira/browse/RANGER-4260
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Siddhant Sontakke
>Assignee: Stalin Nadar
>Priority: Major
> Attachments: scrnli_31_05_2023_14-39-04.webm
>
>
> h1. In trino service while creating policy add permission is rendering 
> incorrectly.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddhant Sontakke updated RANGER-4260:
--
Attachment: scrnli_31_05_2023_14-39-04.webm

> In trino service while creating policy add permission is rendering 
> incorrectly.
> ---
>
> Key: RANGER-4260
> URL: https://issues.apache.org/jira/browse/RANGER-4260
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Siddhant Sontakke
>Assignee: Stalin Nadar
>Priority: Major
> Attachments: scrnli_31_05_2023_14-39-04.webm
>
>
> h1. In trino service while creating policy add permission is rendering 
> incorrectly.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Review Request 74458: RANGER-4258: Ranger: Instead of limiting the listing to only 25, Ranger should provide a comprehensive list of maximum service definitions, services, and zones.

2023-05-31 Thread Nitin Galave

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74458/
---

Review request for ranger, Ankita Sinha, Dhaval Rajpara, and madhan.


Bugs: RANGER-4258
https://issues.apache.org/jira/browse/RANGER-4258


Repository: ranger


Description
---

Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
comprehensive list of maximum (at least 1000) service definitions, services, 
and zones.


Diffs
-

  security-admin/src/main/webapp/scripts/controllers/Controller.js d984bac9d 
  security-admin/src/main/webapp/scripts/utils/XAGlobals.js 4b0c98e30 
  security-admin/src/main/webapp/scripts/views/policies/RangerPolicyCreate.js 
e6c262235 
  security-admin/src/main/webapp/scripts/views/policymanager/ServiceLayout.js 
6d2d94589 
  
security-admin/src/main/webapp/scripts/views/policymanager/ServiceLayoutSidebar.js
 94fa3135d 
  security-admin/src/main/webapp/scripts/views/reports/AuditLayout.js 4acebee98 
  security-admin/src/main/webapp/scripts/views/reports/UserAccessLayout.js 
3b8d862a7 


Diff: https://reviews.apache.org/r/74458/diff/1/


Testing
---

Verified 
1. Service, policy, listing page (Resource/Tag)
2. Zone listing and create/update page.
3. Audit access tab
4. Reports


Thanks,

Nitin Galave



[jira] [Created] (RANGER-4260) In trino service while creating policy add permission is rendering incorrectly.

2023-05-31 Thread Siddhant Sontakke (Jira)
Siddhant Sontakke created RANGER-4260:
-

 Summary: In trino service while creating policy add permission is 
rendering incorrectly.
 Key: RANGER-4260
 URL: https://issues.apache.org/jira/browse/RANGER-4260
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Reporter: Siddhant Sontakke
Assignee: Stalin Nadar






--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4259) Add flag based support for remote debugging dev-support containers

2023-05-31 Thread Mohit Ambalkar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4259?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Mohit Ambalkar reassigned RANGER-4259:
--

Assignee: Mohit Ambalkar

> Add flag based support for remote debugging dev-support containers
> --
>
> Key: RANGER-4259
> URL: https://issues.apache.org/jira/browse/RANGER-4259
> Project: Ranger
>  Issue Type: Improvement
>  Components: build-infra
>Reporter: Jai Patel
>Assignee: Mohit Ambalkar
>Priority: Minor
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-4259) Add flag based support for remote debugging dev-support containers

2023-05-31 Thread Jai Patel (Jira)
Jai Patel created RANGER-4259:
-

 Summary: Add flag based support for remote debugging dev-support 
containers
 Key: RANGER-4259
 URL: https://issues.apache.org/jira/browse/RANGER-4259
 Project: Ranger
  Issue Type: Improvement
  Components: build-infra
Reporter: Jai Patel






--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 74292: RANGER-4025: Ranger improvement - Roles Import/export API for ranger admin

2023-05-31 Thread Rakesh Gupta

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74292/
---

(Updated May 31, 2023, 8:14 a.m.)


Review request for ranger, Dineshkumar Yadav, Kishor Gollapalliwar, Abhay 
Kulkarni, Madhan Neethiraj, Mehul Parikh, Pradeep Agrawal, Ramesh Mani, sanket 
shelar, Sailaja Polavarapu, and Velmurugan Periasamy.


Bugs: RANGER-4025
https://issues.apache.org/jira/browse/RANGER-4025


Repository: ranger


Description
---

Provide API for Roles import/export.


Diffs (updated)
-

  agents-common/src/main/java/org/apache/ranger/plugin/model/RangerRole.java 
682bbd640 
  security-admin/src/main/java/org/apache/ranger/biz/RoleDBStore.java c19e3e1a1 
  security-admin/src/main/java/org/apache/ranger/biz/RoleRefUpdater.java 
421b2312d 
  security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 
04aee289e 
  security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java 4f0edd2b0 
  security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java 
3447eb20e 
  security-admin/src/main/java/org/apache/ranger/view/RangerExportRoleList.java 
PRE-CREATION 
  security-admin/src/main/java/org/apache/ranger/view/RangerPolicyList.java 
4799b3f03 
  security-admin/src/main/java/org/apache/ranger/view/RangerRoleList.java 
adbe93db6 
  security-admin/src/test/java/org/apache/ranger/rest/TestServiceREST.java 
9d17553a4 


Diff: https://reviews.apache.org/r/74292/diff/8/

Changes: https://reviews.apache.org/r/74292/diff/7-8/


Testing
---

Tested the below Rest API's for Roles import/export to make sure everything 
works fine.

RoleREST Rest API :GET /roles/roles/exportJson
RoleREST Rest API :GET 
/roles/roles/exportJson?roleName={rolename},{rolename},

RoleREST Rest API :GET /roles/roles/importRolesFromFile
RoleREST Rest API :GET /roles/roles/importRolesFromFile?updateIfExists=true
RoleREST Rest API :GET 
/roles/roles/importRolesFromFile?createNonExistUserGroupRole=true


Thanks,

Rakesh Gupta



[jira] [Updated] (RANGER-4025) Ranger improvement - Roles Import/export API for ranger admin

2023-05-31 Thread Rakesh Gupta (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rakesh Gupta updated RANGER-4025:
-
Attachment: 0008-RANGER-4025.patch

> Ranger improvement - Roles Import/export API for ranger admin
> -
>
> Key: RANGER-4025
> URL: https://issues.apache.org/jira/browse/RANGER-4025
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dineshkumar Yadav
>Assignee: Rakesh Gupta
>Priority: Major
> Attachments: 0008-RANGER-4025.patch
>
>
> Provide API for Roles import/export. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4025) Ranger improvement - Roles Import/export API for ranger admin

2023-05-31 Thread Rakesh Gupta (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4025?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rakesh Gupta updated RANGER-4025:
-
Attachment: (was: 0007-RANGER-4025.patch)

> Ranger improvement - Roles Import/export API for ranger admin
> -
>
> Key: RANGER-4025
> URL: https://issues.apache.org/jira/browse/RANGER-4025
> Project: Ranger
>  Issue Type: New Feature
>  Components: Ranger
>Reporter: Dineshkumar Yadav
>Assignee: Rakesh Gupta
>Priority: Major
>
> Provide API for Roles import/export. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (RANGER-4254) Allow metrics,roles, tagrest & xaudit Ranger Admin APIs via knox proxy

2023-05-31 Thread Rakesh Gupta (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4254?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Rakesh Gupta resolved RANGER-4254.
--
Resolution: Duplicate

> Allow metrics,roles, tagrest & xaudit Ranger Admin APIs via knox proxy
> --
>
> Key: RANGER-4254
> URL: https://issues.apache.org/jira/browse/RANGER-4254
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Rakesh Gupta
>Assignee: Rakesh Gupta
>Priority: Major
> Attachments: 0001-RANGER-4254.patch
>
>
> Adding Other List of APIs via knox 
>  - Tagrest Api
>  - xAudit Api 
> [https://ranger.apache.org/apidocs/resource_XAuditREST.html#resource_XAuditREST_searchXAccessAudits_GET]
>  - Role Api
>  - Ranger metrics APIs as well 
> /service/metrics/status



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4210) Use colors for allow/deny users in policy list

2023-05-31 Thread Stalin Nadar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4210?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Stalin Nadar reassigned RANGER-4210:


Assignee: Stalin Nadar

> Use colors for allow/deny users in policy list
> --
>
> Key: RANGER-4210
> URL: https://issues.apache.org/jira/browse/RANGER-4210
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Kai Voigt
>Assignee: Stalin Nadar
>Priority: Minor
> Attachments: ranger.png
>
>
> In the list of policies, the Users columns summarises all users affected by 
> each policy. It would be helpful to color code users with allow permissions 
> in green, and deny permissions in red.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-4258) Ranger: Instead of limiting the listing to only 25, Ranger should provide a comprehensive list of maximum service definitions, services, and zones.

2023-05-31 Thread Nitin Galave (Jira)
Nitin Galave created RANGER-4258:


 Summary: Ranger: Instead of limiting the listing to only 25, 
Ranger should provide a comprehensive list of maximum service definitions, 
services, and zones.
 Key: RANGER-4258
 URL: https://issues.apache.org/jira/browse/RANGER-4258
 Project: Ranger
  Issue Type: Improvement
  Components: Ranger
Reporter: Nitin Galave
Assignee: Nitin Galave


Ranger: Instead of limiting the listing to only 25, Ranger should provide a 
comprehensive list of maximum (at least 1000) service definitions, services, 
and zones.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)