[jira] [Assigned] (RANGER-4820) Support authorization of multiple accesses grouped by access groups in one policy engine call

2024-06-12 Thread Abhay Kulkarni (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4820?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Abhay Kulkarni reassigned RANGER-4820:
--

Assignee: Abhay Kulkarni

> Support authorization of multiple accesses grouped by access groups in one 
> policy engine call
> -
>
> Key: RANGER-4820
> URL: https://issues.apache.org/jira/browse/RANGER-4820
> Project: Ranger
>  Issue Type: Improvement
>  Components: Ranger
>Reporter: Abhay Kulkarni
>Assignee: Abhay Kulkarni
>Priority: Major
>
> Currently, Ranger policy engine supports authorization of multiple accesses 
> for a given resource in a single call to the Ranger plugin's 
> isAccessAllowed() API. However, it has some limitations which are addressed 
> by this JIRA.
> Limitation: If multiple accesses are to be authorized, then the current 
> authorization logic in Ranger policy engine is designed to allow the request 
> to succeed (that is, grant access) only if all requested accesses are granted.
> This Jira supports organizing  accesses in groups where each group is granted 
> access if any access in the group is allowed, and the request is successful 
> (that is, user is allowed access) only if all groups are granted access.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Review Request 75047: RANGER-4820: Support authorization of multiple accesses grouped by access groups in one policy engine call

2024-06-12 Thread Abhay Kulkarni

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/75047/
---

Review request for ranger, Dineshkumar Yadav, madhan, Madhan Neethiraj, Pradeep 
Agrawal, Ramesh Mani, and Velmurugan Periasamy.


Bugs: RANGER-4820
https://issues.apache.org/jira/browse/RANGER-4820


Repository: ranger


Description
---

Currently, Ranger policy engine supports authorization of multiple accesses for 
a given resource in a single call to the Ranger plugin's isAccessAllowed() API. 
However, it has some limitations which are addressed by this JIRA.

Limitation: If multiple accesses are to be authorized, then the current 
authorization logic in Ranger policy engine is designed to allow the request to 
succeed (that is, grant access) only if all requested accesses are granted.

This Jira supports organizing  accesses in groups where each group is granted 
access if any access in the group is allowed, and the request is successful 
(that is, user is allowed access) only if all groups are granted access.


Diffs
-

  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/RangerPolicyEngineImpl.java
 b0dc7a461 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyengine/gds/GdsPolicyEngine.java
 6a6709254 
  
agents-common/src/main/java/org/apache/ranger/plugin/policyevaluator/RangerDefaultPolicyEvaluator.java
 c43ec4c2f 
  
agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java
 df0352ca9 
  
agents-common/src/test/resources/policyengine/test_policyengine_hdfs_multiple_accesses.json
 8962c5a3f 
  
hdfs-agent/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java
 c892bced3 


Diff: https://reviews.apache.org/r/75047/diff/1/


Testing
---

Updated the unit tests for muliple access 
(agents-common/src/test/resources/policyengine/test_policyengine_hdfs_multiple_accesses.json).

Ran all unit tests successfully.


Thanks,

Abhay Kulkarni



[jira] [Created] (RANGER-4820) Support authorization of multiple accesses grouped by access groups in one policy engine call

2024-06-12 Thread Abhay Kulkarni (Jira)
Abhay Kulkarni created RANGER-4820:
--

 Summary: Support authorization of multiple accesses grouped by 
access groups in one policy engine call
 Key: RANGER-4820
 URL: https://issues.apache.org/jira/browse/RANGER-4820
 Project: Ranger
  Issue Type: Improvement
  Components: Ranger
Reporter: Abhay Kulkarni


Currently, Ranger policy engine supports authorization of multiple accesses for 
a given resource in a single call to the Ranger plugin's isAccessAllowed() API. 
However, it has some limitations which are addressed by this JIRA.

Limitation: If multiple accesses are to be authorized, then the current 
authorization logic in Ranger policy engine is designed to allow the request to 
succeed (that is, grant access) only if all requested accesses are granted.

This Jira supports organizing  accesses in groups where each group is granted 
access if any access in the group is allowed, and the request is successful 
(that is, user is allowed access) only if all groups are granted access.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


Re: Review Request 75045: RANGER-4817: Optimize Ranger HDFS Authorization by combining multiple authorization calls

2024-06-12 Thread Madhan Neethiraj

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/75045/#review226539
---


Ship it!




Ship It!

- Madhan Neethiraj


On June 12, 2024, 4:42 p.m., Abhay Kulkarni wrote:
> 
> ---
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/75045/
> ---
> 
> (Updated June 12, 2024, 4:42 p.m.)
> 
> 
> Review request for ranger, madhan, Madhan Neethiraj, Ramesh Mani, and 
> Velmurugan Periasamy.
> 
> 
> Bugs: RANGER-4817
> https://issues.apache.org/jira/browse/RANGER-4817
> 
> 
> Repository: ranger
> 
> 
> Description
> ---
> 
> The focus of optimizations described below is to minimize the number of times 
> the Ranger policy-engine is called to authorize a NameNode RPC without 
> modifying the Namenode authorization interface or authorization call sequence.
> 
> This optimization is possible as the Namenode calls the authorizer more than 
> once to authorize some RPCs, as observed during the testing.
> 
> The following boolean valued config parameter - 
> "ranger.hdfs.authz.enable.optimization" control the optimization behaviour; 
> default value is false which disables the optimization.
> 
> 
> Diffs
> -
> 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/service/RangerBasePlugin.java
>  6a614bf2d 
>   
> agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java
>  a56ecb268 
>   
> hdfs-agent/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java
>  b11ee62a3 
>   
> ranger-hdfs-plugin-shim/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java
>  22d0b450d 
> 
> 
> Diff: https://reviews.apache.org/r/75045/diff/2/
> 
> 
> Testing
> ---
> 
> Passes all unit tests.
> Verified the optimization by setting the config parameter 
> "ranger.hdfs.authz.enable.optimization" to true.
> 
> 
> Thanks,
> 
> Abhay Kulkarni
> 
>



Re: Review Request 75045: RANGER-4817: Optimize Ranger HDFS Authorization by combining multiple authorization calls

2024-06-12 Thread Abhay Kulkarni

---
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/75045/
---

(Updated June 12, 2024, 4:42 p.m.)


Review request for ranger, madhan, Madhan Neethiraj, Ramesh Mani, and 
Velmurugan Periasamy.


Changes
---

Addressed review comments


Bugs: RANGER-4817
https://issues.apache.org/jira/browse/RANGER-4817


Repository: ranger


Description
---

The focus of optimizations described below is to minimize the number of times 
the Ranger policy-engine is called to authorize a NameNode RPC without 
modifying the Namenode authorization interface or authorization call sequence.

This optimization is possible as the Namenode calls the authorizer more than 
once to authorize some RPCs, as observed during the testing.

The following boolean valued config parameter - 
"ranger.hdfs.authz.enable.optimization" control the optimization behaviour; 
default value is false which disables the optimization.


Diffs (updated)
-

  
agents-common/src/main/java/org/apache/ranger/plugin/service/RangerBasePlugin.java
 6a614bf2d 
  
agents-common/src/main/java/org/apache/ranger/plugin/util/RangerAccessRequestUtil.java
 a56ecb268 
  
hdfs-agent/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java
 b11ee62a3 
  
ranger-hdfs-plugin-shim/src/main/java/org/apache/ranger/authorization/hadoop/RangerHdfsAuthorizer.java
 22d0b450d 


Diff: https://reviews.apache.org/r/75045/diff/2/

Changes: https://reviews.apache.org/r/75045/diff/1-2/


Testing
---

Passes all unit tests.
Verified the optimization by setting the config parameter 
"ranger.hdfs.authz.enable.optimization" to true.


Thanks,

Abhay Kulkarni



[jira] [Updated] (RANGER-4816) build Trino Ranger plugin in Trino project

2024-06-12 Thread Madhan Neethiraj (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4816?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Madhan Neethiraj updated RANGER-4816:
-
Attachment: (was: RANGER-4810.patch)

> build Trino Ranger plugin in Trino project
> --
>
> Key: RANGER-4816
> URL: https://issues.apache.org/jira/browse/RANGER-4816
> Project: Ranger
>  Issue Type: Sub-task
>  Components: plugins
>Reporter: Madhan Neethiraj
>Assignee: Madhan Neethiraj
>Priority: Major
> Attachments: RANGER-4810-trino-repo.patch
>
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (RANGER-4816) build Trino Ranger plugin in Trino project

2024-06-12 Thread Madhan Neethiraj (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4816?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Madhan Neethiraj updated RANGER-4816:
-
Attachment: RANGER-4810-trino-repo.patch

> build Trino Ranger plugin in Trino project
> --
>
> Key: RANGER-4816
> URL: https://issues.apache.org/jira/browse/RANGER-4816
> Project: Ranger
>  Issue Type: Sub-task
>  Components: plugins
>Reporter: Madhan Neethiraj
>Assignee: Madhan Neethiraj
>Priority: Major
> Attachments: RANGER-4810-trino-repo.patch, RANGER-4810.patch
>
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4777) Improve API /public/v2/api/service-headers to filter services depending on user role

2024-06-12 Thread Dineshkumar Yadav (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4777?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dineshkumar Yadav reassigned RANGER-4777:
-

Assignee: Rakesh Gupta  (was: Madhan Neethiraj)

> Improve API /public/v2/api/service-headers to filter services depending on 
> user role
> 
>
> Key: RANGER-4777
> URL: https://issues.apache.org/jira/browse/RANGER-4777
> Project: Ranger
>  Issue Type: Bug
>  Components: admin, Ranger
>Reporter: Mugdha Varadkar
>Assignee: Rakesh Gupta
>Priority: Major
>
> Need to update the API - "/public/v2/api/service-headers" introduce in 
> RANGER-4533  with below :
> # The API should be accessible for non-admin users as well. @PreAuthrize 
> annotation can be removed.
> # Filtering of services depending on user role like done for existing API - 
> "/plugins/services"
> cc [~dineshkumar-yadav] / [~Dhaval.Rajpara]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (RANGER-4711) Show grant on table command is not audited by ranger

2024-06-12 Thread Guru Thejus (Jira)


 [ 
https://issues.apache.org/jira/browse/RANGER-4711?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Guru Thejus reassigned RANGER-4711:
---

Assignee: Guru Thejus

> Show grant on table command is not audited by ranger
> 
>
> Key: RANGER-4711
> URL: https://issues.apache.org/jira/browse/RANGER-4711
> Project: Ranger
>  Issue Type: Bug
>  Components: audit
>Reporter: suja s
>Assignee: Guru Thejus
>Priority: Major
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Created] (RANGER-4819) Proposal to Upgrade All React.js Dependent Libraries

2024-06-12 Thread Dhaval Rajpara (Jira)
Dhaval Rajpara created RANGER-4819:
--

 Summary:  Proposal to Upgrade All React.js Dependent Libraries
 Key: RANGER-4819
 URL: https://issues.apache.org/jira/browse/RANGER-4819
 Project: Ranger
  Issue Type: Bug
  Components: Ranger
Reporter: Dhaval Rajpara
Assignee: Dhaval Rajpara


Upgrading all dependent libraries for React.js in our project. This will ensure 
we are using the latest versions, improving security, performance, and 
compatibility with new features.
# babel/traverse
# axios
# braces
# follow-redirects
# json5
# loader-utils
# minimist
# moment
# terser
# webpack
# webpack-dev-middleware



--
This message was sent by Atlassian Jira
(v8.20.10#820010)