Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix data anonymizer failures by updating legacy parser. #82

Closed
wants to merge 3 commits into from

Conversation

Yury-Fridlyand
Copy link

@Yury-Fridlyand Yury-Fridlyand commented Jun 28, 2022

Signed-off-by: Yury Fridlyand [email protected]

Description

  1. Don't print query if error occurred:
    } catch (Exception e) {
    LOG.warn("Caught an exception when anonymizing sensitive data");
    resultQuery = "";
    }
    return resultQuery;
  2. Don't validate tokens' type in [], fixes processing functions with multiple fields:
    /*
    if (lexer.token() != Token.IDENTIFIER && lexer.token() != Token.INDEX
    && lexer.token() != Token.LITERAL_CHARS && lexer.token() != Token.LITERAL_ALIAS) {
    throw new ParserException("All items between Brackets should be identifiers , got:"
    + lexer.token());
    }
    */
  3. Don't process MATCH ... AGAINST clause, because it is overlayed by MATCH function. Fixes failure on MATCH function:
    }/* else if ("MATCH".equalsIgnoreCase(ident)) {
    lexer.nextToken();
    MySqlMatchAgainstExpr matchAgainstExpr = new MySqlMatchAgainstExpr();
    if (lexer.token() == Token.RPAREN) {
    lexer.nextToken();
    } else {
    exprList(matchAgainstExpr.getColumns(), matchAgainstExpr);
    accept(Token.RPAREN);
    }
    acceptIdentifier("AGAINST");
    accept(Token.LPAREN);
    SQLExpr against = primary();
    matchAgainstExpr.setAgainst(against);
    if (lexer.token() == Token.IN) {
    lexer.nextToken();
    if (identifierEquals("NATURAL")) {
    lexer.nextToken();
    acceptIdentifier("LANGUAGE");
    acceptIdentifier("MODE");
    if (lexer.token() == Token.WITH) {
    lexer.nextToken();
    acceptIdentifier("QUERY");
    acceptIdentifier("EXPANSION");
    matchAgainstExpr.setSearchModifier(
    MySqlMatchAgainstExpr.SearchModifier.IN_NATURAL_LANGUAGE_MODE_WITH_QUERY_EXPANSION);
    } else {
    matchAgainstExpr.setSearchModifier(
    MySqlMatchAgainstExpr.SearchModifier.IN_NATURAL_LANGUAGE_MODE);
    }
    } else if (identifierEquals("BOOLEAN")) {
    lexer.nextToken();
    acceptIdentifier("MODE");
    matchAgainstExpr.setSearchModifier(MySqlMatchAgainstExpr.SearchModifier.IN_BOOLEAN_MODE);
    } else {
    throw new ParserException("Syntax error: " + lexer.token());
    }
    } else if (lexer.token() == Token.WITH) {
    throw new ParserException("Syntax error: " + lexer.token());
    }
    accept(Token.RPAREN);
    expr = matchAgainstExpr;
    return primaryRest(expr);
    }*/ else if ("CONVERT".equalsIgnoreCase(ident)) {

Issues Resolved

[WARN ][o.o.s.l.u.QueryDataAnonymizer] [...] Caught an exception when anonymizing sensitive data

TODO

  • Discuss
  • Confirm that we can remove support of MATCH ... AGAINST (Is it even supported BTW?)
  • Test it - WIP

Check List

  • New functionality includes testing.
    • All tests pass, including unit test, integration test and doctest
  • New functionality has been documented.
    • New functionality has javadoc added
    • New functionality has user manual doc added
  • Commits are signed per the DCO using --signoff

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

@Yury-Fridlyand
Copy link
Author

  1. Don't process MATCH ... AGAINST clause...

This fix damages support of this clause, but it was working ever. I failed to run it on OpenSearch 1.1 with plugin pre-match support (commit 012cc03).
According to the article MATCH ... AGAINST provides full-text search for MySQL. Meanwhile, OpenSearch provides a set of full text search (relevance based search) functions which are much more flexible, see opensearch-project#182.
I don't think that we need to keep support for MATCH ... AGAINST especially in the legacy parser.

@codecov
Copy link

codecov bot commented Jun 28, 2022

Codecov Report

❗ No coverage uploaded for pull request base (integ-fix-anonymizer@9e2a9ff). Click here to learn what that means.
The diff coverage is n/a.

@@                   Coverage Diff                   @@
##             integ-fix-anonymizer      #82   +/-   ##
=======================================================
  Coverage                        ?   97.72%           
  Complexity                      ?     2816           
=======================================================
  Files                           ?      271           
  Lines                           ?     6934           
  Branches                        ?      439           
=======================================================
  Hits                            ?     6776           
  Misses                          ?      157           
  Partials                        ?        1           
Flag Coverage Δ
sql-engine 97.72% <0.00%> (?)

Flags with carried forward coverage won't be shown. Click here to find out more.


Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 9e2a9ff...ebe978b. Read the comment docs.

@MaxKsyunz
Copy link

We need an anonymizer that works with the new engine. At some point the legacy engine goes will go away.

Until that happens, I think it's best if QueryDataAnonymizer.anonymizeData works similarly to how queries are processed -- try new engine first, if it fails -- try legacy engine, if it fails -- error out.

This way we we gain an anonymizer for the new SQL engine, avoid changing the legacy parser, and avoid regressions in anonymizer when legacy engine is removed.

Anonymizer for the new SQL engine would have a lot in common with PPL anonymizer. Probably will make sense to have a common subclass.

What do you think?

@Yury-Fridlyand
Copy link
Author

Yury-Fridlyand commented Jun 29, 2022

We need an anonymizer that works with the new engine. At some point the legacy engine goes will go away.

Until that happens, I think it's best if QueryDataAnonymizer.anonymizeData works similarly to how queries are processed -- try new engine first, if it fails -- try legacy engine, if it fails -- error out.

This way we we gain an anonymizer for the new SQL engine, avoid changing the legacy parser, and avoid regressions in anonymizer when legacy engine is removed.

Anonymizer for the new SQL engine would have a lot in common with PPL anonymizer. Probably will make sense to have a common base class.

What do you think?

Great idea, thanks. I will try it out.

@@ -39,7 +39,7 @@ public static String anonymizeData(String query) {
.replaceAll("[\\n][\\t]+", " ");
} catch (Exception e) {
LOG.warn("Caught an exception when anonymizing sensitive data");
resultQuery = query;
resultQuery = "";

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The problem with returning an empty string is that it's not solving the root of the problem. The anonymizer is repressing ALL exceptions from the anonymizer, and returning a valid state.
We should, instead, be returning a failure state in the response or throwing some exception. The function that's calling the anonymizer is completely unaware that an error occurred.

@Yury-Fridlyand Yury-Fridlyand deleted the dev-fix-anonymizer branch September 12, 2022 23:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants