Uploaded image for project: 'Apache HAWQ'
  1. Apache HAWQ
  2. HAWQ-256 Integrate Security with Apache Ranger
  3. HAWQ-1325

Allow queries related to pg_temp if ranger is enable

    XMLWordPrintableJSON

    Details

    • Type: Sub-task
    • Status: Resolved
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: None
    • Fix Version/s: 2.1.0.0-incubating
    • Component/s: Security
    • Labels:
      None

      Description

      Queries related to temp will send request to RPS, asking the privilege of schema "pg_temp_XXX", like this:

      ./hawq-2017-02-13_142852.csv:2017-02-13 14:29:29.718445 CST,"linw","postgres",p71787,th-1324481600,"[local]",,2017-02-13 14:29:01 CST, 8477,con13,cmd3,seg-1,,,x8477,sx1,"DEBUG3","00000","send json request to ranger : { ""requestId"": ""3"", ""user"": ""linw"", ""client Ip"": ""127.0.0.1"", ""context"": ""select * from temp1;"", ""access"": [ { ""resource"":

      { ""database"": ""postgres"", ""schema"": "" pg_temp_13"", ""table"": ""temp1"" }

      , ""privileges"": [ ""select"" ] } ] }",,,,,,"select * from temp1;",0,,"rangerrest.c",454,

      In order to better control, for pg_temp_XX schema and objects in that schema, we should fall back these checks to catalog without sending requests to RPS.

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                wlin Wen Lin
                Reporter:
                wlin Wen Lin
              • Votes:
                0 Vote for this issue
                Watchers:
                1 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: