[PR] RANGER-4511: Enable Parallel Compilation for Multiple Modules in Ranger [ranger]

2023-11-02 Thread via GitHub


JiaLiangC opened a new pull request, #289:
URL: https://github.com/apache/ranger/pull/289

   ## What changes were proposed in this pull request?
   Due to incorrect dependency settings in the distro module, Ranger cannot 
utilize multicore concurrent compilation. As a result, compiling Ranger is very 
slow each time, as all modules can only be compiled serially.
   With this patch, Ranger can be compiled in parallel, greatly speeding up the 
process. Compilation can now be completed in just a few minutes.
   
   
   
   
   ## How was this patch tested?
   manual tests
   mvn -T 8 clean  install -DskipTests=true -Dcheckstyle.skip=true 
-Djacoco.skip=true -Dpmd.skip=true -Drat.skip=true -Dspotbugs.skip=true 
-Dhadoop.version=3.3.5 -Dhbase.version=2.4.13 -Dhive.version=3.1.3 
-Dkafka.version=2.8.1 -Dsolr.version=8.11.2 -Dzookeeper.version=3.5.9
   
   ![Screen Shot 2023-11-03 at 11 34 
34](https://github.com/apache/ranger/assets/18082602/b625624e-d384-489d-9fe0-d61c24892933)
   
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@ranger.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



Review Request 74718: RANGER-4511: Enable Parallel Compilation for Multiple Modules in Ranger

2023-11-02 Thread jialiang cai

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74718/
---

Review request for ranger, Madhan Neethiraj, Ramesh Kumar Thangarajan, and 
Sidharth Mishra.


Bugs: RANGER-4511
https://issues.apache.org/jira/browse/RANGER-4511


Repository: ranger


Description
---

Enable Parallel Compilation for Multiple Modules in Ranger


Diffs
-

  distro/pom.xml b187297c4 


Diff: https://reviews.apache.org/r/74718/diff/1/


Testing
---

Due to incorrect dependency settings in the distro module, Ranger cannot 
utilize multicore concurrent compilation. As a result, compiling Ranger is very 
slow each time, as all modules can only be compiled serially.
With this patch, Ranger can be compiled in parallel, greatly speeding up the 
process. Compilation can now be completed in just a few minutes.

mvn -T 8 clean  install -DskipTests=true -Dcheckstyle.skip=true 
-Djacoco.skip=true -Dpmd.skip=true -Drat.skip=true -Dspotbugs.skip=true 
-Dhadoop.version=3.3.5 -Dhbase.version=2.4.13 -Dhive.version=3.1.3 
-Dkafka.version=2.8.1 -Dsolr.version=8.11.2 -Dzookeeper.version=3.5.9

test manually


Thanks,

jialiang cai



Review Request 74717: RANGER-4378: removed static PolicyEngine.impliedAccessGrants

2023-11-02 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74717/
---

Review request for ranger, Ankita Sinha, Abhay Kulkarni, Monika Kachhadiya, 
Ramesh Mani, Sailaja Polavarapu, and Subhrat Chaudhary.


Bugs: RANGER-4378
https://issues.apache.org/jira/browse/RANGER-4378


Repository: ranger


Description
---

Replaced use of PolicyEngine.getImpliedAccessGrants() with call to 
ServiceDefUtil.getExpandedImpliedGrants(). This eliminates the need for static 
member PolicyEngine.impliedAccessGrants.


Diffs
-

  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/PolicyEngine.java
 858c3f542 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerAbstractPolicyItemEvaluator.java
 a3e3806ec 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerAuditPolicyEvaluator.java
 9051a8ce4 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java
 bc627adf5 


Diff: https://reviews.apache.org/r/74717/diff/1/


Testing
---

- verified that all unit tests passed successfully


Thanks,

Madhan Neethiraj



[jira] [Updated] (RANGER-4511) Enable Parallel Compilation for Multiple Modules in Ranger

2023-11-02 Thread caijialiang (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4511?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

caijialiang updated RANGER-4511:

Attachment: patch1-RANGER-4511.diff

> Enable Parallel Compilation for Multiple Modules in Ranger
> --
>
> Key: RANGER-4511
> URL: https://issues.apache.org/jira/browse/RANGER-4511
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: caijialiang
>Assignee: caijialiang
>Priority: Major
> Attachments: image-2023-11-03-11-15-50-593.png, 
> patch1-RANGER-4511.diff
>
>
> "Due to incorrect dependency settings in the distro module, Ranger cannot 
> utilize multicore concurrent compilation. As a result, compiling Ranger is 
> very slow each time, as all modules can only be compiled serially.
> With this patch, Ranger can be compiled in parallel, greatly speeding up the 
> process. Compilation can now be completed in just a few minutes.
> !image-2023-11-03-11-15-50-593.png!



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4511) Enable Parallel Compilation for Multiple Modules in Ranger

2023-11-02 Thread caijialiang (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4511?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

caijialiang updated RANGER-4511:

Description: 
"Due to incorrect dependency settings in the distro module, Ranger cannot 
utilize multicore concurrent compilation. As a result, compiling Ranger is very 
slow each time, as all modules can only be compiled serially.
With this patch, Ranger can be compiled in parallel, greatly speeding up the 
process. Compilation can now be completed in just a few minutes.
!image-2023-11-03-11-15-50-593.png!

> Enable Parallel Compilation for Multiple Modules in Ranger
> --
>
> Key: RANGER-4511
> URL: https://issues.apache.org/jira/browse/RANGER-4511
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: caijialiang
>Assignee: caijialiang
>Priority: Major
> Attachments: image-2023-11-03-11-15-50-593.png
>
>
> "Due to incorrect dependency settings in the distro module, Ranger cannot 
> utilize multicore concurrent compilation. As a result, compiling Ranger is 
> very slow each time, as all modules can only be compiled serially.
> With this patch, Ranger can be compiled in parallel, greatly speeding up the 
> process. Compilation can now be completed in just a few minutes.
> !image-2023-11-03-11-15-50-593.png!



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4511) Enable Parallel Compilation for Multiple Modules in Ranger

2023-11-02 Thread caijialiang (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4511?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

caijialiang updated RANGER-4511:

Attachment: image-2023-11-03-11-15-50-593.png

> Enable Parallel Compilation for Multiple Modules in Ranger
> --
>
> Key: RANGER-4511
> URL: https://issues.apache.org/jira/browse/RANGER-4511
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: caijialiang
>Assignee: caijialiang
>Priority: Major
> Attachments: image-2023-11-03-11-15-50-593.png
>
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4511) Enable Parallel Compilation for Multiple Modules in Ranger

2023-11-02 Thread caijialiang (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4511?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

caijialiang reassigned RANGER-4511:
---

Assignee: caijialiang

> Enable Parallel Compilation for Multiple Modules in Ranger
> --
>
> Key: RANGER-4511
> URL: https://issues.apache.org/jira/browse/RANGER-4511
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: caijialiang
>Assignee: caijialiang
>Priority: Major
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-4511) Enable Parallel Compilation for Multiple Modules in Ranger

2023-11-02 Thread caijialiang (Jira)
caijialiang created RANGER-4511:
---

 Summary: Enable Parallel Compilation for Multiple Modules in Ranger
 Key: RANGER-4511
 URL: https://issues.apache.org/jira/browse/RANGER-4511
 Project: Ranger
  Issue Type: Improvement
  Components: Ranger
Reporter: caijialiang






--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 74697: RANGER:4494:get Dataset summary for logged in user based on dataset-policy.

2023-11-02 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74697/#review225929
---




security-admin/src/main/java/org/apache/ranger/biz/GdsDBStore.java
Lines 1228 (patched)


getUnscrubbedDatasets() already returns paginated list. Filtering in the 
following for loop might exclude some datasets, resulting in reduced page size. 
Please review and update.



security-admin/src/main/java/org/apache/ranger/biz/GdsDBStore.java
Lines 1417 (patched)


Instead of processing policyItems here, consider moving this to validator.

validator.isAccessibleByDatasetPolicy(policy, user);

Above method should also check if the policy is enabled.



security-admin/src/main/java/org/apache/ranger/validation/RangerGdsValidator.java
Lines 590 (patched)


to avoid retrieving groups and roles for each policyItem (i.e., each call 
to this method), consider sending these as parameter.


- Madhan Neethiraj


On Oct. 25, 2023, 12:07 p.m., Prashant Satam wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74697/
> ---
> 
> (Updated Oct. 25, 2023, 12:07 p.m.)
> 
> 
> Review request for ranger, Anand Nadar, Ankita Sinha, Madhan Neethiraj, 
> Monika Kachhadiya, and Subhrat Chaudhary.
> 
> 
> Bugs: RANGER-4494
> https://issues.apache.org/jira/browse/RANGER-4494
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> We need a new API URI--->(/dataset/summary/sharedwithme) to extend the 
> /dataset/summary API added in 
> https://issues.apache.org/jira/browse/RANGER-4446, to get the DatasetSummary 
> for datasets which are shared with the logged in user, based on policy.
> 
> Use of The API 
> 
> This API will return dataset summary objects which are accessible for the 
> logged in user by the dataset policy
> 
> 
> Diffs
> -
> 
>   security-admin/src/main/java/org/apache/ranger/biz/GdsDBStore.java 
> 4249b1121 
>   security-admin/src/main/java/org/apache/ranger/rest/GdsREST.java b1dc9d37d 
>   
> security-admin/src/main/java/org/apache/ranger/security/context/RangerAPIList.java
>  f21d445c4 
>   
> security-admin/src/main/java/org/apache/ranger/validation/RangerGdsValidator.java
>  6c55fd029 
> 
> 
> Diff: https://reviews.apache.org/r/74697/diff/1/
> 
> 
> Testing
> ---
> 
> 1)Create dataset attach dataShare and shared-resource to it 
> 2)create policy for the dataset and add the current logged in user in the 
> dataset-policy (can add user directly/via role/via group)
> 3)use GET-API --> (/service/gds/dataset/summary/sharedwithme) you 
> will only get dataset summary objects for whom the current user have access 
> by the dataset-policy
> 
> Request-> GET-API /service/gds/dataset/summary/sharedwithme
> Response --->
> {
> "startIndex": 0,
> "pageSize": 200,
> "totalCount": 1,
> "resultSize": 1,
> "sortType": "datasetId",
> "sortBy": "asc",
> "queryTimeMS": 1698235573851,
> "list": [
> {
> "id": 1,
> "guid": "d82106ea-191e-4f50-a3ac-45ba824bd293",
> "isEnabled": true,
> "createdBy": "Admin",
> "updatedBy": "Admin",
> "createTime": 1698220723000,
> "updateTime": 1698232342000,
> "version": 6,
> "name": "Test_GDS_Dataset19",
> "description": "This is GDS description",
> "permissionForCaller": "AUDIT",
> "principalsCount": {
> "ROLE": 0,
> "USER": 0,
> "GROUP": 0
> },
> "projectsCount": 0,
> "totalResourceCount": 2,
> "dataShares": [
> {
> "id": 1,
> "guid": "f635adcb-e77c-4a1d-a894-c8ceb9f8b577",
> "isEnabled": true,
> "createdBy": "Admin",
> "updatedBy": "Admin",
> "createTime": 1698220777000,
> "updateTime": 1698220777000,
> "version": 1,
> "dataShareId": 1,
> "dataShareName": "RangerDataShare1",
> "serviceId": 1,
> "serviceName": "Ranger_hive",
> "zoneId": 2,
> "zoneName": "Ranger_hive",
> "resourceCount": 1,
> "shareStatus": "NONE"
> },
> {
> "id": 2,
> "guid": "055f5f6f-6969-4226-825b-2c7607aeea7b",
> 

Re: Review Request 74715: RANGER-4432: Add a new new API for service lookup

2023-11-02 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74715/#review225923
---



Subhrat - consider using existing API endpoint 
"/api/zones/{zoneId}/service-headers". Though this API doesn't support lookup 
by zoneName, this shouldn't be needed for UI as it should already have the 
zoneId.

- Madhan Neethiraj


On Nov. 2, 2023, 2:03 p.m., Subhrat Chaudhary wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74715/
> ---
> 
> (Updated Nov. 2, 2023, 2:03 p.m.)
> 
> 
> Review request for ranger, Anand Nadar, Ankita Sinha, Madhan Neethiraj, 
> Monika Kachhadiya, Prashant Satam, and Siddhesh Phatak.
> 
> 
> Bugs: https://issues.apache.org/jira/browse/RANGER-4432
> 
> https://issues.apache.org/jira/browse/https://issues.apache.org/jira/browse/RANGER-4432
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> We need a new API for service lookup, with additional support for zoneId and 
> zoneName. This will be used in GDS >> DataShare Listing >> Create DataShare 
> >> Basic Details (Step 1) >> Select Zone >> Get all services related to the 
> security zone. Pagination support is also needed.
> 
> 
> Diffs
> -
> 
>   security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 
> 00a3d9c47 
>   security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java 
> 77ea510a7 
>   
> security-admin/src/main/java/org/apache/ranger/security/context/RangerAPIList.java
>  f21d445c4 
>   
> security-admin/src/main/java/org/apache/ranger/service/RangerServiceServiceBase.java
>  fa23b96d7 
> 
> 
> Diff: https://reviews.apache.org/r/74715/diff/1/
> 
> 
> Testing
> ---
> 
> Validations done:
> GET API /service/plugins/services/lookup
> 1. No query params: Validated all the available services are available in 
> response.
> 2. Validated query params: zoneId, zoneName, pageSize, startIndex.
> 
> 
> Thanks,
> 
> Subhrat Chaudhary
> 
>



Re: Review Request 74666: RANGER:4428:Need a new API to get list of zones mapped to a service

2023-11-02 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74666/#review225928
---



Subhrat - consider using existing API "GET 
/service/zones/zone-headers/for-service/{serviceId}" to retrieve zone header 
info for the given service.

- Madhan Neethiraj


On Oct. 13, 2023, 7:40 a.m., Prashant Satam wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74666/
> ---
> 
> (Updated Oct. 13, 2023, 7:40 a.m.)
> 
> 
> Review request for ranger, Anand Nadar, Madhan Neethiraj, Monika Kachhadiya, 
> and Subhrat Chaudhary.
> 
> 
> Bugs: RANGER-4428
> https://issues.apache.org/jira/browse/RANGER-4428
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Need a new API to get list of zones mapped to a service for the Create 
> Datashare >> Step 2 > Select Service >> Select Zone, It also has changes of 
> RR https://reviews.apache.org/r/74644/diff/2#index_header
> 
> 
> Diffs
> -
> 
>   security-admin/src/main/java/org/apache/ranger/biz/SecurityZoneDBStore.java 
> 77b89f1fb 
>   security-admin/src/main/java/org/apache/ranger/rest/SecurityZoneREST.java 
> f45cdd396 
>   
> security-admin/src/main/java/org/apache/ranger/service/RangerSecurityZoneServiceBase.java
>  586a6b705 
>   
> security-admin/src/main/java/org/apache/ranger/service/RangerSecurityZoneServiceService.java
>  d500acb8e 
> 
> 
> Diff: https://reviews.apache.org/r/74666/diff/2/
> 
> 
> Testing
> ---
> 
> Create Zones adding service to it you will get List of zones as response on 
> GET API -> (/service/zones/lookup)
> Query params -> serviceId,serivceNamePartial,zoneNamePartial
> Response-->
> {
> "startIndex": 0,
> "pageSize": 200,
> "totalCount": 2,
> "resultSize": 2,
> "sortType": "asc",
> "sortBy": "zoneId",
> "queryTimeMS": 1697102766898,
> "list": [
> {
> "id": 4,
> "isEnabled": true,
> "name": "Test-Zone-3"
> },
> {
> "id": 5,
> "isEnabled": true,
> "name": "Test-Zone4"
> }
> ],
> "listSize": 2
> }
> 
> 
> Thanks,
> 
> Prashant Satam
> 
>



Re: Review Request 74644: RANGER:4460:Pagination not working for SecurityZones

2023-11-02 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74644/#review225927
---



Prashant - API "GET /service/zones/zones" doesn't support pagination, as it 
returns a List. APIs that support pagination return PList.

If the caller needs only the summary, consider using API "GET 
/service/zones/summary"; this one supports pagination.

- Madhan Neethiraj


On Nov. 2, 2023, 9:24 a.m., Prashant Satam wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/74644/
> ---
> 
> (Updated Nov. 2, 2023, 9:24 a.m.)
> 
> 
> Review request for ranger, Anand Nadar, Madhan Neethiraj, Monika Kachhadiya, 
> and Subhrat Chaudhary.
> 
> 
> Bugs: RANGER-4460
> https://issues.apache.org/jira/browse/RANGER-4460
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> Pagination not working for API ===> service/zones/zones
> 
> 
> Diffs
> -
> 
>   security-admin/src/main/java/org/apache/ranger/rest/SecurityZoneREST.java 
> 6513ad6b5 
> 
> 
> Diff: https://reviews.apache.org/r/74644/diff/3/
> 
> 
> Testing
> ---
> 
> Add multiple securityZones we are able to fetch zones by query params 
> pageSize,startIndex for API ===> service/zones/zones
> Request-> (/service/zones/zones?pageSize=2=0) we should get 
> paginated list of security-zones 
> (i.e when pageSize=2 we should only receive 2 zone objects and when 
> startindex=0 it should fetch zone objects starting from position 0 from the 
> list in DB)
> Response>
> {
> "startIndex": 0,
> "pageSize": 0,
> "totalCount": 2,
> "resultSize": 2,
> "queryTimeMS": 1697171663643,
> "securityZones": [
> {
> "id": 2,
> "isEnabled": true,
> "createdBy": "Admin",
> "updatedBy": "Admin",
> "createTime": 1694692196000,
> "updateTime": 169607340,
> "name": "Gds_Security_Zone",
> "services": {
> "Resource_policy_Performance_test_50K": {
> "resources": [
> {
> "database": [
> "TT"
> ],
> "column": [
> "TT"
> ],
> "table": [
> "TT"
> ]
> }
> ]
> }
> },
> "tagServices": [
> "Resource_policy_Performance_test_tag"
> ],
> "adminUsers": [
> "admin"
> ],
> "adminUserGroups": [
> "public"
> ],
> "auditUsers": [
> "admin"
> ],
> "auditUserGroups": [
> "public"
> ]
> },
> {
> "id": 3,
> "isEnabled": true,
> "createdBy": "Admin",
> "updatedBy": "Admin",
> "createTime": 1694692284000,
> "updateTime": 1694692284000,
> "name": "Test-Zone-admin",
> "services": {
> "Resource_policy_Performance_test_50K": {
> "resources": [
> {
> "database": [
> "DD"
> ],
> "column": [
> "DD"
> ],
> "table": [
> "DD"
> ]
> }
> ]
> }
> },
> "adminUsers": [
> "rangerusersync"
> ],
> "adminUserGroups": [
> "public"
> ],
> "auditUsers": [
> "admin"
> ],
> "auditUserGroups": [
> "public"
> ],
> "description": "Test-Zone-admin"
> }
> ]
> }
> 
> 
> Thanks,
> 
> Prashant Satam
> 
>



Review Request 74715: RANGER-4432: Add a new new API for service lookup

2023-11-02 Thread Subhrat Chaudhary via Review Board

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74715/
---

Review request for ranger, Anand Nadar, Ankita Sinha, Madhan Neethiraj, Monika 
Kachhadiya, Prashant Satam, and Siddhesh Phatak.


Bugs: https://issues.apache.org/jira/browse/RANGER-4432

https://issues.apache.org/jira/browse/https://issues.apache.org/jira/browse/RANGER-4432


Repository: ranger


Description
---

We need a new API for service lookup, with additional support for zoneId and 
zoneName. This will be used in GDS >> DataShare Listing >> Create DataShare >> 
Basic Details (Step 1) >> Select Zone >> Get all services related to the 
security zone. Pagination support is also needed.


Diffs
-

  security-admin/src/main/java/org/apache/ranger/biz/ServiceDBStore.java 
00a3d9c47 
  security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java 
77ea510a7 
  
security-admin/src/main/java/org/apache/ranger/security/context/RangerAPIList.java
 f21d445c4 
  
security-admin/src/main/java/org/apache/ranger/service/RangerServiceServiceBase.java
 fa23b96d7 


Diff: https://reviews.apache.org/r/74715/diff/1/


Testing
---

Validations done:
GET API /service/plugins/services/lookup
1. No query params: Validated all the available services are available in 
response.
2. Validated query params: zoneId, zoneName, pageSize, startIndex.


Thanks,

Subhrat Chaudhary



[jira] [Created] (RANGER-4510) Ranger KMS - Upgrade Okhttp to 4.11.0 due to CVE-2023-0833 and CVE-2021-0341

2023-11-02 Thread Vikas Kumar (Jira)
Vikas Kumar created RANGER-4510:
---

 Summary: Ranger KMS - Upgrade Okhttp to 4.11.0 due to 
CVE-2023-0833 and CVE-2021-0341
 Key: RANGER-4510
 URL: https://issues.apache.org/jira/browse/RANGER-4510
 Project: Ranger
  Issue Type: Task
  Components: kms
Reporter: Vikas Kumar
Assignee: Vikas Kumar


Ranger KMS - Upgrade Okhttp to 4.11.0 due to CVE-2023-0833 and CVE-2021-0341



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4432) Need a new API for service lookup

2023-11-02 Thread Subhrat Chaudhary (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4432?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Subhrat Chaudhary reassigned RANGER-4432:
-

Assignee: Subhrat Chaudhary

> Need a new API for service lookup
> -
>
> Key: RANGER-4432
> URL: https://issues.apache.org/jira/browse/RANGER-4432
> Project: Ranger
>  Issue Type: Sub-task
>  Components: admin
>Reporter: Subhrat Chaudhary
>Assignee: Subhrat Chaudhary
>Priority: Major
>
> We need to new API to run lookup on ranger services, with support for 
> zoneName and zoneId as query-param. This will be used in GDS >> DataShare 
> Listing >> Create DataShare >> Basic Details (Step 1) >> Select Zone >> Get 
> all service related to zone



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4432) Need a new API for service lookup

2023-11-02 Thread Subhrat Chaudhary (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4432?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Subhrat Chaudhary updated RANGER-4432:
--
Description: We need to new API to run lookup on ranger services, with 
support for zoneName and zoneId as query-param. This will be used in GDS >> 
DataShare Listing >> Create DataShare >> Basic Details (Step 1) >> Select Zone 
>> Get all service related to zone  (was: We need to new API to run lookup on 
security-zones, with support for serviceName as query-param)

> Need a new API for service lookup
> -
>
> Key: RANGER-4432
> URL: https://issues.apache.org/jira/browse/RANGER-4432
> Project: Ranger
>  Issue Type: Sub-task
>  Components: admin
>Reporter: Subhrat Chaudhary
>Priority: Major
>
> We need to new API to run lookup on ranger services, with support for 
> zoneName and zoneId as query-param. This will be used in GDS >> DataShare 
> Listing >> Create DataShare >> Basic Details (Step 1) >> Select Zone >> Get 
> all service related to zone



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4432) Need a new API for service lookup

2023-11-02 Thread Subhrat Chaudhary (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4432?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Subhrat Chaudhary updated RANGER-4432:
--
Summary: Need a new API for service lookup  (was: Need a new API for 
security-zone lookup)

> Need a new API for service lookup
> -
>
> Key: RANGER-4432
> URL: https://issues.apache.org/jira/browse/RANGER-4432
> Project: Ranger
>  Issue Type: Sub-task
>  Components: admin
>Reporter: Subhrat Chaudhary
>Priority: Major
>
> We need to new API to run lookup on security-zones, with support for 
> serviceName as query-param



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4504) HBase shell revoke command failed with 'HTTP 400 Error: processSecureRevokeRequest processing failed'

2023-11-02 Thread Sanket Shelar (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4504?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sanket Shelar updated RANGER-4504:
--
Attachment: 0001-RANGER-4504.patch

> HBase shell revoke command failed with 'HTTP 400 Error: 
> processSecureRevokeRequest processing failed'
> -
>
> Key: RANGER-4504
> URL: https://issues.apache.org/jira/browse/RANGER-4504
> Project: Ranger
>  Issue Type: Bug
>  Components: Ranger
>Reporter: Sanket Shelar
>Assignee: Sanket Shelar
>Priority: Major
> Attachments: 0001-RANGER-4504.patch
>
>
> Steps to reproduce:
> Case 1 :
> Grant access request from shell command
> Revoke access twice 
> Case 2 :
> Grant access to user1 from shell command
> revoke access from user2 from shell command
> Case 3 :
> Ranger policy created at Group/Role access level 
> Revoke access request for user belongs to Group/Roles from shell command
> Case 4 :
> Grant access to user with Table from shell command
> revoke access from user without Table from shell command



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Review Request 74714: RANGER-4504: HBase shell revoke command failed with 'HTTP 400 Error: processSecureRevokeRequest processing failed'

2023-11-02 Thread sanket shelar

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74714/
---

Review request for ranger, Dineshkumar Yadav, Kishor Gollapalliwar, Abhay 
Kulkarni, Madhan Neethiraj, Mehul Parikh, Pradeep Agrawal, Sailaja Polavarapu, 
and Velmurugan Periasamy.


Bugs: RANGER-4504
https://issues.apache.org/jira/browse/RANGER-4504


Repository: ranger


Description
---

Steps to reproduce:
Case 1 :
Grant access request from shell command
Revoke access twice 

Case 2 :
Grant access to user1 from shell command
revoke access from user2 from shell command

Case 3 :
Ranger policy created at Group/Role access level 
Revoke access request for user belongs to Group/Roles from shell command

Case 4 :
Grant access to user with Table from shell command
revoke access from user without Table from shell command


Diffs
-

  security-admin/src/main/java/org/apache/ranger/rest/ServiceRESTUtil.java 
60e34c0c7 


Diff: https://reviews.apache.org/r/74714/diff/1/


Testing
---


Thanks,

sanket shelar



Re: Review Request 74644: RANGER:4460:Pagination not working for SecurityZones

2023-11-02 Thread Prashant Satam

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/74644/
---

(Updated Nov. 2, 2023, 9:24 a.m.)


Review request for ranger, Anand Nadar, Madhan Neethiraj, Monika Kachhadiya, 
and Subhrat Chaudhary.


Bugs: RANGER-4460
https://issues.apache.org/jira/browse/RANGER-4460


Repository: ranger


Description
---

Pagination not working for API ===> service/zones/zones


Diffs (updated)
-

  security-admin/src/main/java/org/apache/ranger/rest/SecurityZoneREST.java 
6513ad6b5 


Diff: https://reviews.apache.org/r/74644/diff/3/

Changes: https://reviews.apache.org/r/74644/diff/2-3/


Testing
---

Add multiple securityZones we are able to fetch zones by query params 
pageSize,startIndex for API ===> service/zones/zones
Request-> (/service/zones/zones?pageSize=2=0) we should get 
paginated list of security-zones 
(i.e when pageSize=2 we should only receive 2 zone objects and when 
startindex=0 it should fetch zone objects starting from position 0 from the 
list in DB)
Response>
{
"startIndex": 0,
"pageSize": 0,
"totalCount": 2,
"resultSize": 2,
"queryTimeMS": 1697171663643,
"securityZones": [
{
"id": 2,
"isEnabled": true,
"createdBy": "Admin",
"updatedBy": "Admin",
"createTime": 1694692196000,
"updateTime": 169607340,
"name": "Gds_Security_Zone",
"services": {
"Resource_policy_Performance_test_50K": {
"resources": [
{
"database": [
"TT"
],
"column": [
"TT"
],
"table": [
"TT"
]
}
]
}
},
"tagServices": [
"Resource_policy_Performance_test_tag"
],
"adminUsers": [
"admin"
],
"adminUserGroups": [
"public"
],
"auditUsers": [
"admin"
],
"auditUserGroups": [
"public"
]
},
{
"id": 3,
"isEnabled": true,
"createdBy": "Admin",
"updatedBy": "Admin",
"createTime": 1694692284000,
"updateTime": 1694692284000,
"name": "Test-Zone-admin",
"services": {
"Resource_policy_Performance_test_50K": {
"resources": [
{
"database": [
"DD"
],
"column": [
"DD"
],
"table": [
"DD"
]
}
]
}
},
"adminUsers": [
"rangerusersync"
],
"adminUserGroups": [
"public"
],
"auditUsers": [
"admin"
],
"auditUserGroups": [
"public"
],
"description": "Test-Zone-admin"
}
]
}


Thanks,

Prashant Satam



[jira] [Updated] (RANGER-4501) creating a service will throw NPE when using service.check.user parameter

2023-11-02 Thread Daqian Liao (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4501?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Daqian Liao updated RANGER-4501:

Attachment: create_user.patch

> creating a service will throw NPE when using service.check.user parameter
> -
>
> Key: RANGER-4501
> URL: https://issues.apache.org/jira/browse/RANGER-4501
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 2.4.0
>Reporter: Daqian Liao
>Priority: Major
> Attachments: NEP.png, create_user.patch
>
>
> !NEP.png|width=899,height=487!
>  
> {code:java}
> //代码占位符
> 2023-10-27 12:02:45,799 [http-nio-6080-exec-13] ERROR [ServiceREST.java:775] 
> createService(RangerService={id={null} guid={null} isEnabled={true} 
> createdBy={null} updatedBy={null} createTime={null} updateTime={null} 
> version={1} name={trino-service-check-user} 
> displayName={trino-service-check-user} type={trino} 
> description={trino-service-check-user} tagService={} configs={password={} 
> service.check.user={ii,oo} ranger.plugin.audit.filters={} 
> jdbc.driverClassName={io.trino.jdbc.TrinoDriver} 
> jdbc.url={jdbc:presto://localhost:9000} username={hadoop} } 
> policyVersion={null} policyUpdateTime={null} tagVersion={1} 
> tagUpdateTime={null} }) failed
> java.lang.NullPointerException: null
>         at 
> org.apache.ranger.biz.ServiceDBStore.populateDefaultPolicies(ServiceDBStore.java:3345)
>         at 
> org.apache.ranger.biz.ServiceDBStore.createDefaultPolicies(ServiceDBStore.java:3261)
>         at 
> org.apache.ranger.biz.ServiceDBStore.createService(ServiceDBStore.java:1576)
>         at 
> org.apache.ranger.rest.ServiceREST.createService(ServiceREST.java:771)
>         at 
> org.apache.ranger.rest.ServiceREST$$FastClassBySpringCGLIB$$92dab672.invoke()
>         at 
> org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.security.access.intercept.aopalliance.MethodSecurityInterceptor.invoke(MethodSecurityInterceptor.java:61)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.transaction.interceptor.TransactionInterceptor$1.proceedWithInvocation(TransactionInterceptor.java:123)
>         at 
> org.springframework.transaction.interceptor.TransactionAspectSupport.invokeWithinTransaction(TransactionAspectSupport.java:388)
>         at 
> org.springframework.transaction.interceptor.TransactionInterceptor.invoke(TransactionInterceptor.java:119)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698)
>         at 
> org.apache.ranger.rest.ServiceREST$$EnhancerBySpringCGLIB$$8c627be3.createService()
>         at sun.reflect.GeneratedMethodAccessor844.invoke(Unknown Source)
>         at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>         at java.lang.reflect.Method.invoke(Method.java:498)
>         at 
> com.sun.jersey.spi.container.JavaMethodInvokerFactory$1.invoke(JavaMethodInvokerFactory.java:60)
>         at 
> com.sun.jersey.server.impl.model.method.dispatch.AbstractResourceMethodDispatchProvider$TypeOutInvoker._dispatch(AbstractResourceMethodDispatchProvider.java:185)
>         at 
> com.sun.jersey.server.impl.model.method.dispatch.ResourceJavaMethodDispatcher.dispatch(ResourceJavaMethodDispatcher.java:75)
>         at 
> com.sun.jersey.server.impl.uri.rules.HttpMethodRule.accept(HttpMethodRule.java:302)
>         at 
> com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)
>         at 
> com.sun.jersey.server.impl.uri.rules.ResourceClassRule.accept(ResourceClassRule.java:108)
>         at 
> com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)
>         at 
> com.sun.jersey.server.impl.uri.rules.RootResourceClassesRule.accept(RootResourceClassesRule.java:84)
>         at 
> 

[jira] [Commented] (RANGER-4501) creating a service will throw NPE when using service.check.user parameter

2023-11-02 Thread Daqian Liao (Jira)


[ 
https://issues.apache.org/jira/browse/RANGER-4501?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17782031#comment-17782031
 ] 

Daqian Liao commented on RANGER-4501:
-

this patch can fix the bug [^create_user.patch]

> creating a service will throw NPE when using service.check.user parameter
> -
>
> Key: RANGER-4501
> URL: https://issues.apache.org/jira/browse/RANGER-4501
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 2.4.0
>Reporter: Daqian Liao
>Priority: Major
> Attachments: NEP.png, create_user.patch
>
>
> !NEP.png|width=899,height=487!
>  
> {code:java}
> //代码占位符
> 2023-10-27 12:02:45,799 [http-nio-6080-exec-13] ERROR [ServiceREST.java:775] 
> createService(RangerService={id={null} guid={null} isEnabled={true} 
> createdBy={null} updatedBy={null} createTime={null} updateTime={null} 
> version={1} name={trino-service-check-user} 
> displayName={trino-service-check-user} type={trino} 
> description={trino-service-check-user} tagService={} configs={password={} 
> service.check.user={ii,oo} ranger.plugin.audit.filters={} 
> jdbc.driverClassName={io.trino.jdbc.TrinoDriver} 
> jdbc.url={jdbc:presto://localhost:9000} username={hadoop} } 
> policyVersion={null} policyUpdateTime={null} tagVersion={1} 
> tagUpdateTime={null} }) failed
> java.lang.NullPointerException: null
>         at 
> org.apache.ranger.biz.ServiceDBStore.populateDefaultPolicies(ServiceDBStore.java:3345)
>         at 
> org.apache.ranger.biz.ServiceDBStore.createDefaultPolicies(ServiceDBStore.java:3261)
>         at 
> org.apache.ranger.biz.ServiceDBStore.createService(ServiceDBStore.java:1576)
>         at 
> org.apache.ranger.rest.ServiceREST.createService(ServiceREST.java:771)
>         at 
> org.apache.ranger.rest.ServiceREST$$FastClassBySpringCGLIB$$92dab672.invoke()
>         at 
> org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.security.access.intercept.aopalliance.MethodSecurityInterceptor.invoke(MethodSecurityInterceptor.java:61)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.transaction.interceptor.TransactionInterceptor$1.proceedWithInvocation(TransactionInterceptor.java:123)
>         at 
> org.springframework.transaction.interceptor.TransactionAspectSupport.invokeWithinTransaction(TransactionAspectSupport.java:388)
>         at 
> org.springframework.transaction.interceptor.TransactionInterceptor.invoke(TransactionInterceptor.java:119)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698)
>         at 
> org.apache.ranger.rest.ServiceREST$$EnhancerBySpringCGLIB$$8c627be3.createService()
>         at sun.reflect.GeneratedMethodAccessor844.invoke(Unknown Source)
>         at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>         at java.lang.reflect.Method.invoke(Method.java:498)
>         at 
> com.sun.jersey.spi.container.JavaMethodInvokerFactory$1.invoke(JavaMethodInvokerFactory.java:60)
>         at 
> com.sun.jersey.server.impl.model.method.dispatch.AbstractResourceMethodDispatchProvider$TypeOutInvoker._dispatch(AbstractResourceMethodDispatchProvider.java:185)
>         at 
> com.sun.jersey.server.impl.model.method.dispatch.ResourceJavaMethodDispatcher.dispatch(ResourceJavaMethodDispatcher.java:75)
>         at 
> com.sun.jersey.server.impl.uri.rules.HttpMethodRule.accept(HttpMethodRule.java:302)
>         at 
> com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)
>         at 
> com.sun.jersey.server.impl.uri.rules.ResourceClassRule.accept(ResourceClassRule.java:108)
>         at 
> com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)
>         at 
> com.sun.jersey.server.impl.uri.rules.RootResourceClassesRule.accept(RootResourceClassesRule.java:84)
>         at 
> 

[jira] [Updated] (RANGER-4501) creating a service will throw NPE when using service.check.user parameter

2023-11-02 Thread Daqian Liao (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4501?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Daqian Liao updated RANGER-4501:

Affects Version/s: 2.4.0
   (was: 2.3.0)

> creating a service will throw NPE when using service.check.user parameter
> -
>
> Key: RANGER-4501
> URL: https://issues.apache.org/jira/browse/RANGER-4501
> Project: Ranger
>  Issue Type: Bug
>  Components: admin
>Affects Versions: 2.4.0
>Reporter: Daqian Liao
>Priority: Major
> Attachments: NEP.png
>
>
> !NEP.png|width=899,height=487!
>  
> {code:java}
> //代码占位符
> 2023-10-27 12:02:45,799 [http-nio-6080-exec-13] ERROR [ServiceREST.java:775] 
> createService(RangerService={id={null} guid={null} isEnabled={true} 
> createdBy={null} updatedBy={null} createTime={null} updateTime={null} 
> version={1} name={trino-service-check-user} 
> displayName={trino-service-check-user} type={trino} 
> description={trino-service-check-user} tagService={} configs={password={} 
> service.check.user={ii,oo} ranger.plugin.audit.filters={} 
> jdbc.driverClassName={io.trino.jdbc.TrinoDriver} 
> jdbc.url={jdbc:presto://localhost:9000} username={hadoop} } 
> policyVersion={null} policyUpdateTime={null} tagVersion={1} 
> tagUpdateTime={null} }) failed
> java.lang.NullPointerException: null
>         at 
> org.apache.ranger.biz.ServiceDBStore.populateDefaultPolicies(ServiceDBStore.java:3345)
>         at 
> org.apache.ranger.biz.ServiceDBStore.createDefaultPolicies(ServiceDBStore.java:3261)
>         at 
> org.apache.ranger.biz.ServiceDBStore.createService(ServiceDBStore.java:1576)
>         at 
> org.apache.ranger.rest.ServiceREST.createService(ServiceREST.java:771)
>         at 
> org.apache.ranger.rest.ServiceREST$$FastClassBySpringCGLIB$$92dab672.invoke()
>         at 
> org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.security.access.intercept.aopalliance.MethodSecurityInterceptor.invoke(MethodSecurityInterceptor.java:61)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.transaction.interceptor.TransactionInterceptor$1.proceedWithInvocation(TransactionInterceptor.java:123)
>         at 
> org.springframework.transaction.interceptor.TransactionAspectSupport.invokeWithinTransaction(TransactionAspectSupport.java:388)
>         at 
> org.springframework.transaction.interceptor.TransactionInterceptor.invoke(TransactionInterceptor.java:119)
>         at 
> org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
>         at 
> org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753)
>         at 
> org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698)
>         at 
> org.apache.ranger.rest.ServiceREST$$EnhancerBySpringCGLIB$$8c627be3.createService()
>         at sun.reflect.GeneratedMethodAccessor844.invoke(Unknown Source)
>         at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>         at java.lang.reflect.Method.invoke(Method.java:498)
>         at 
> com.sun.jersey.spi.container.JavaMethodInvokerFactory$1.invoke(JavaMethodInvokerFactory.java:60)
>         at 
> com.sun.jersey.server.impl.model.method.dispatch.AbstractResourceMethodDispatchProvider$TypeOutInvoker._dispatch(AbstractResourceMethodDispatchProvider.java:185)
>         at 
> com.sun.jersey.server.impl.model.method.dispatch.ResourceJavaMethodDispatcher.dispatch(ResourceJavaMethodDispatcher.java:75)
>         at 
> com.sun.jersey.server.impl.uri.rules.HttpMethodRule.accept(HttpMethodRule.java:302)
>         at 
> com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)
>         at 
> com.sun.jersey.server.impl.uri.rules.ResourceClassRule.accept(ResourceClassRule.java:108)
>         at 
> com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)
>         at 
> com.sun.jersey.server.impl.uri.rules.RootResourceClassesRule.accept(RootResourceClassesRule.java:84)
>         at 
>