----------------------------------------------------------- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/73846/#review224521 -----------------------------------------------------------
Ship it! Ship It! - Madhan Neethiraj On June 22, 2022, 3:54 a.m., Kirby Zhou wrote: > > ----------------------------------------------------------- > This is an automatically generated e-mail. To reply, visit: > https://reviews.apache.org/r/73846/ > ----------------------------------------------------------- > > (Updated June 22, 2022, 3:54 a.m.) > > > Review request for ranger, Dhaval Shah, Dineshkumar Yadav, Gautam Borad, > Jayendra Parab, Kishor Gollapalliwar, Abhay Kulkarni, Mateen Mansoori, Mehul > Parikh, Pradeep Agrawal, VaradreawiZTV VaradreawiZTV, Vishal Suvagia, and > Velmurugan Periasamy. > > > Bugs: RANGER-3623 > https://issues.apache.org/jira/browse/RANGER-3623 > > > Repository: ranger > > > Description > ------- > > Currently, we have an option ranger.admin.allow.unauthenticated.access to > allow unauthenticated clients to perform a series of API operations. This > option allows the client to perform both dangerous grant/revoke permission > operation and relatively safe download operation. > > In many cases, allowing anonymous downloading of policy/tag/role is not a > serious risk problem. On the contrary, the complicated kerberos and SSL > settings make it difficult for ranger plugin embedded in third-party services > to complete the task of refreshing policy, which may be a bigger problem. In > particular, refresh failure often has no obvious features for administrators > to discover. > > Therefore, I suggest that ranger increase the ability to allow client to > download policy/tag/roles anonymously. > There are two ways to achieve it. > > 1. Just limit the ability of "ranger.admin.allow.unauthenticated.access=true" > which needs to modify > "security-admin/src/main/resources/conf.dist/security-applicationContext.xml" > to remove dangerous operations from ' > security="none"'. > > 2. Add a candidate value "downloadonly" to > "ranger.admin.allow.unauthenticated.access" > Which needs modify ServiceRest.Java and BizUtil.java to implement the > enhanced checking logic. > > I have a patch for method2. > > > Diffs > ----- > > security-admin/src/main/java/org/apache/ranger/biz/RangerBizUtil.java > 252198ae8d2d14e25421fd8e9e778bd4c833d85a > security-admin/src/main/java/org/apache/ranger/rest/RoleREST.java > e007676430057a7e632e2dc9813232ec7c8eb5a8 > security-admin/src/main/java/org/apache/ranger/rest/ServiceREST.java > 58013415cd9bd3ea017442becfcc65d4c3b3c1c4 > security-admin/src/main/java/org/apache/ranger/rest/TagREST.java > 01df04e3ff9eb4edc7d5b80d405bdcf201335205 > security-admin/src/main/java/org/apache/ranger/rest/XUserREST.java > efb74ce1c088c83926a05b20b2b7946fa14d5f73 > security-admin/src/main/resources/conf.dist/ranger-admin-default-site.xml > 58f434da5014e19511d04bb04462ac752394c858 > > > Diff: https://reviews.apache.org/r/73846/diff/3/ > > > Testing > ------- > > mvn clean build package > fresh install and upgrade. > > > File Attachments > ---------------- > > 0001-RANGER-3623-Add-ability-to-enable-anonymous-download.patch > > https://reviews.apache.org/media/uploaded/files/2022/06/22/a305e34e-6b5e-4c2d-94af-23354c934960__0001-RANGER-3623-Add-ability-to-enable-anonymous-download.patch > > > Thanks, > > Kirby Zhou > >
