-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/58493/#review172460
-----------------------------------------------------------


Fix it, then Ship it!




Ship It!


ambari-logsearch/ambari-logsearch-portal/src/main/java/org/apache/ambari/logsearch/web/security/LogsearchExternalServerAuthenticationProvider.java
Line 126 (original), 126 (patched)
<https://reviews.apache.org/r/58493/#comment245583>

    As this is the only change that remained, and this is a bug fix not related 
to AMBARI.ADMINISTRATOR privileges please modify the description of the review 
request and the bug.


- Miklos Gergely


On April 20, 2017, 5:37 a.m., Keta Patel wrote:
> 
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/58493/
> -----------------------------------------------------------
> 
> (Updated April 20, 2017, 5:37 a.m.)
> 
> 
> Review request for Ambari, Di Li, Miklos Gergely, and Oliver Szabo.
> 
> 
> Bugs: AMBARI-20768
>     https://issues.apache.org/jira/browse/AMBARI-20768
> 
> 
> Repository: ambari
> 
> 
> Description
> -------
> 
> A local Ambari user with no cluster roles assigned to it can successfully log 
> into the Logsearch UI.
> 
> Logsearch service exercises restriction on who can access its UI using a 
> property "logsearch.roles.allowed". This property is a comma-separated list 
> of roles to be allowed access to Logsearch UI. This defect deals with the 
> following 2 issues:
> 1. If Logsearch service requires that only certain roles be allowed to access 
> its UI, then a local Ambari user with no roles must not be allowed to access 
> the UI.
> 2. If some user with privilege to edit the config properties, updates 
> "logsearch.roles.allowed" by removing the "AMBARI.ADMINISTRATOR" role from 
> its list, then the Ambari Admins will not be able to access the Logsearch UI. 
> This violates the Ambari Administrator privilege which must be able to access 
> all frames of Ambari UI as well as perform all UI operations.
> 
> 
> DESIRED BEHAVIOR:
> =================
> 1. A local user with no role assigned to it, must not be able to access 
> Logsearch UI.
> 2. Ambari Administrators must be always be allowed to access the Logsearch 
> UI. No user is allowed to revoke this access right of Ambari Administrator 
> for the Logsearch UI.
> 
> 
> Diffs
> -----
> 
>   
> ambari-logsearch/ambari-logsearch-portal/src/main/java/org/apache/ambari/logsearch/web/security/LogsearchExternalServerAuthenticationProvider.java
>  e23f0a2 
> 
> 
> Diff: https://reviews.apache.org/r/58493/diff/2/
> 
> 
> Testing
> -------
> 
> The patch *AMBARI-20768.patch* contains the fix for this issue. The fix 
> involves correction in 2 places in the 
> LogsearchExternalServerAuthenticationProvider class.
> 1. In order to prevent a local user with no cluster roles assigned to it from 
> logging into Logsearch UI, we return *false*.
> 2. We implicitly check whether the user is an Ambari Administrator or not, 
> thus removing the requirement of having "AMBARI.ADMINISTRATOR" role in the 
> "logsearch.roles.allowed" property on the UI. Now, even if some user removes 
> the "AMBARI.ADMINISTRATOR" property from the UI, it will not affect the 
> Ambari admin's accessibility to the Logsearch UI. Ambari Admins will always 
> be allowed to login.
> 
> The results of the logsearch tests after applying the patch are shown in the 
> screenshot "all_tests_successful.png" on the Jira.
> 
> 
> Thanks,
> 
> Keta Patel
> 
>

Reply via email to