Uploaded image for project: 'Apache HAWQ (Retired)'
  1. Apache HAWQ (Retired)
  2. HAWQ-256 Integrate Security with Apache Ranger
  3. HAWQ-1325

Allow queries related to pg_temp if ranger is enable

    XMLWordPrintableJSON

Details

    • Sub-task
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • None
    • 2.1.0.0-incubating
    • Security
    • None

    Description

      Queries related to temp will send request to RPS, asking the privilege of schema "pg_temp_XXX", like this:

      ./hawq-2017-02-13_142852.csv:2017-02-13 14:29:29.718445 CST,"linw","postgres",p71787,th-1324481600,"[local]",,2017-02-13 14:29:01 CST, 8477,con13,cmd3,seg-1,,,x8477,sx1,"DEBUG3","00000","send json request to ranger : { ""requestId"": ""3"", ""user"": ""linw"", ""client Ip"": ""127.0.0.1"", ""context"": ""select * from temp1;"", ""access"": [ { ""resource"":

      { ""database"": ""postgres"", ""schema"": "" pg_temp_13"", ""table"": ""temp1"" }

      , ""privileges"": [ ""select"" ] } ] }",,,,,,"select * from temp1;",0,,"rangerrest.c",454,

      In order to better control, for pg_temp_XX schema and objects in that schema, we should fall back these checks to catalog without sending requests to RPS.

      Attachments

        Issue Links

          Activity

            People

              wlin Wen Lin
              wlin Wen Lin
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: