[JBoss JIRA] (TEIID-5753) Please add extension metadata support to allow for an invisibility option on single foreign tables/views for odata layer
by Steven Hawkins (Jira)
[ https://issues.jboss.org/browse/TEIID-5753?page=com.atlassian.jira.plugin... ]
Steven Hawkins commented on TEIID-5753:
---------------------------------------
The most general solution is to add the visible flag to schema objects as well. However there are quite a few changes that are needed for that - teiid system metadata, odata metadata, even places in pg metadata.
Alternatively a grant based approach would be an exception to the deny all assumption - that is there is an implicit permission in odata that makes stuff visible and you have to issue an explicit deny to remove it.
The final approach is extension metadata specific to the odata interface - which is the most informal.
I'm not quite sure yet which of these makes the most sense.
> Please add extension metadata support to allow for an invisibility option on single foreign tables/views for odata layer
> ------------------------------------------------------------------------------------------------------------------------
>
> Key: TEIID-5753
> URL: https://issues.jboss.org/browse/TEIID-5753
> Project: Teiid
> Issue Type: Enhancement
> Components: OData
> Reporter: Christoph John
> Assignee: Steven Hawkins
> Priority: Major
> Fix For: 13.0
>
>
> The issue arose from the discussion at
> https://developer.jboss.org/message/989502#989502
> > Every tables and view I specify is becoming visible in the odata service. Of course I can use GRANT to resctrict access, however, it would be more nice to not export the tables in the odata layer in the first place. Would it be possible to add some kind of per table/view INVISIBLE OPTION for odata, or could I reach the same result in a different way and how would this look like?
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
6 years, 6 months
[JBoss JIRA] (TEIID-5823) CVE's in jboss-fuse/teiid
by Van Halbert (Jira)
[ https://issues.jboss.org/browse/TEIID-5823?page=com.atlassian.jira.plugin... ]
Van Halbert updated TEIID-5823:
-------------------------------
Description:
*Branch/Tag*: 12.3.1.fuse-750011-redhat-00001
* *Severity*: {color:#f9423a}High{color}
1. apache commons collections
* Vulnerability ID: CVE-2015-6420
2. org.apache.lucene:lucene-queryparser - Remote Code Execution (RCE)
* Vulnerability ID: CVE-2017-12629
3. org.slf4j:slf4j-ext - Access Restriction Bypass
* Vulnerability ID: CVE-2018-8088
These changes will be committed to the teiid/teiid product branch 7.5-12.3.x and to master.
was:
*Branch/Tag*: 12.3.1.fuse-750011-redhat-00001
* *Severity*: {color:#f9423a}High{color}
1. apache commons collections
* Vulnerability ID: CVE-2015-6420
2. org.apache.lucene:lucene-queryparser - Remote Code Execution (RCE)
* Vulnerability ID: CVE-2017-12629
3. org.slf4j:slf4j-ext - Access Restriction Bypass
* Vulnerability ID: CVE-2018-8088
> CVE's in jboss-fuse/teiid
> -------------------------
>
> Key: TEIID-5823
> URL: https://issues.jboss.org/browse/TEIID-5823
> Project: Teiid
> Issue Type: Quality Risk
> Components: Build/Kits
> Affects Versions: 13.x, 12.3.1
> Reporter: Van Halbert
> Assignee: Van Halbert
> Priority: Blocker
>
> *Branch/Tag*: 12.3.1.fuse-750011-redhat-00001
> * *Severity*: {color:#f9423a}High{color}
> 1. apache commons collections
> * Vulnerability ID: CVE-2015-6420
> 2. org.apache.lucene:lucene-queryparser - Remote Code Execution (RCE)
> * Vulnerability ID: CVE-2017-12629
> 3. org.slf4j:slf4j-ext - Access Restriction Bypass
> * Vulnerability ID: CVE-2018-8088
> These changes will be committed to the teiid/teiid product branch 7.5-12.3.x and to master.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
6 years, 6 months
[JBoss JIRA] (TEIID-5823) CVE's in jboss-fuse/teiid
by Van Halbert (Jira)
[ https://issues.jboss.org/browse/TEIID-5823?page=com.atlassian.jira.plugin... ]
Van Halbert moved ENTESB-11967 to TEIID-5823:
---------------------------------------------
Project: Teiid (was: Red Hat Fuse)
Key: TEIID-5823 (was: ENTESB-11967)
Issue Type: Quality Risk (was: Bug)
Workflow: classic default workflow (was: ENTESB Triaged Work)
Component/s: Build/Kits
(was: Data Integration)
Affects Version/s: 13.x
12.3.1
(was: fuse-7.5-ER1)
> CVE's in jboss-fuse/teiid
> -------------------------
>
> Key: TEIID-5823
> URL: https://issues.jboss.org/browse/TEIID-5823
> Project: Teiid
> Issue Type: Quality Risk
> Components: Build/Kits
> Affects Versions: 13.x, 12.3.1
> Reporter: Van Halbert
> Assignee: Van Halbert
> Priority: Blocker
>
> *Branch/Tag*: 12.3.1.fuse-750011-redhat-00001
> * *Severity*: {color:#f9423a}High{color}
> 1. apache commons collections
> * Vulnerability ID: CVE-2015-6420
> 2. org.apache.lucene:lucene-queryparser - Remote Code Execution (RCE)
> * Vulnerability ID: CVE-2017-12629
> 3. org.slf4j:slf4j-ext - Access Restriction Bypass
> * Vulnerability ID: CVE-2018-8088
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
6 years, 6 months