Share this search by emailing other users Share
Export - CSV (All fields)
Export - CSV (Current fields)
- HAWQ-1493
Integrate Ranger lookup JAAS configuration in ranger-admin plugin jar - HAWQ-1485
Use user/password instead of credentials cache in Ranger lookup for HAWQ with Kerberos enabled. - HAWQ-1477
Ranger-plugin connect to Ranger admin under kerberos security. - HAWQ-1476
Augment enable-ranger-plugin.sh to support kerberos. - HAWQ-1469
Don't expose RPS warning messages to command line - HAWQ-1456
Copy RPS configuration files to standby in specific scenarios - HAWQ-1452
Remove hawq_rps_address_suffix and hawq_rps_address_host in hawq-site.xml to simplify configuration for RPS High Availability - HAWQ-1451
HAWQ state should be able to report the status of both RPS and standby RPS - HAWQ-1449
HAWQ start/stop cluster should be able to start/stop RPS on standby node - HAWQ-1443
Implement Ranger lookup for HAWQ with Kerberos enabled. - HAWQ-1441
Implement SSL Access from RPS to Ranger - HAWQ-1436
Implement RPS High availability on HAWQ - HAWQ-1422
Provide user-group membership in RPS when requesting access - HAWQ-1419
RPS test RangerHawqAuthorizerServiceNameTest fails sometimes - HAWQ-1415
Set JAVA_HOME / JRE_HOME for RPS in the scripts - HAWQ-1410
Add basic test case for hcatalog with ranger - HAWQ-1396
HAWQ Sends Wrong Request to RPS for PXF Hcatalog - HAWQ-1380
Keep hawq_toolkit schema check in HAWQ native side - HAWQ-1362
Add RPS start/stop script in HAWQ start/stop script - HAWQ-1359
Add policy test for HAWQ with Ranger enabled. - HAWQ-1354
Externalize JVM params from rps.sh into rps.properties - HAWQ-1353
Provide template for Ranger access audit to Solr from RPS - HAWQ-1350
Add --enable-rps option to build ranger-plugin when build hawq. - HAWQ-1329
pg_catalog view fallback failed - HAWQ-1328
Add deny and exclude policy template for hawq service in ranger. - HAWQ-1325
Allow queries related to pg_temp if ranger is enable - HAWQ-1322
Change RPM name for RPS to hawq-ranger-plugin - HAWQ-1312
Forbid grant/revoke command in HAWQ side once Ranger is configured. - HAWQ-1311
Optimize the performance of hawq with ranger enabled. - HAWQ-1298
Package all configuration files for RPS and Tomcat into hawq-ranger-plugin.rpm - HAWQ-1294
Remove ALL privilege for HAWQ service in Ranger - HAWQ-1292
Change GUC enable_ranger(bool) to a text GUC(hawq_acl_type), which can allow other kinds of ACL. - HAWQ-1286
Reduce unnecessary calls of namespace check when run \d - HAWQ-1281
Add integration tests to Ranger Plugin Service project - HAWQ-1279
Force to recompute namespace_path when enable_ranger - HAWQ-1276
The error message is not friendly when ranger plugin service is unavailable. - HAWQ-1275
Check build-in catalogs, tables and functions in native aclcheck. - HAWQ-1257
If user doesn't have privileges on certain objects, need return user which specific table he doesn't have right. - HAWQ-1256
Enhance libcurl connection to RPS(Ranger Plugin Service), keep it as a long-live connection in session level - HAWQ-1249
Don't do ACL checks on segments - HAWQ-1246
Add generation of RequestID, ClientIP, queryContext(SQL Statement) in HAWQ , and encapsulate these contents to JSON request to RPS - HAWQ-1220
Support ranger plugin server HA in hawq side. - HAWQ-1207
Gpadmin super user processing on ACL - HAWQ-1206
Process catalog table ACL on Ranger. - HAWQ-1205
Change hawq start script once finding enable_ranger GUC is on. - HAWQ-1204
Add one option in Ambari to enable user to specify whether they want enable Ranger for ACL check - HAWQ-1203
Implement Ranger Plugin Service which holds HAWQ Ranger Plugin and provide REST Service - HAWQ-1026
HAWQ sync user information from LDAP - HAWQ-1004
Implement calling Ranger REST Service using libcurl. - HAWQ-1003
Implement batched ACL check through Ranger.
{"errorMessages":["jqlTooComplex"],"errors":{}}
[{"id":-1,"name":"My open issues","jql":"assignee = currentUser() AND resolution = Unresolved order by updated DESC","isSystem":true,"sharePermissions":[],"requiresLogin":true},{"id":-2,"name":"Reported by me","jql":"reporter = currentUser() order by created DESC","isSystem":true,"sharePermissions":[],"requiresLogin":true},{"id":-4,"name":"All issues","jql":"order by created DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false},{"id":-5,"name":"Open issues","jql":"resolution = Unresolved order by priority DESC,updated DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false},{"id":-9,"name":"Done issues","jql":"statusCategory = Done order by updated DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false},{"id":-3,"name":"Viewed recently","jql":"issuekey in issueHistory() order by lastViewed DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false},{"id":-6,"name":"Created recently","jql":"created >= -1w order by created DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false},{"id":-7,"name":"Resolved recently","jql":"resolutiondate >= -1w order by updated DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false},{"id":-8,"name":"Updated recently","jql":"updated >= -1w order by updated DESC","isSystem":true,"sharePermissions":[],"requiresLogin":false}]
0.3
0