----------------------------------------------------------- This is an automatically generated e-mail. To reply, visit: https://reviews.apache.org/r/58493/#review172460 -----------------------------------------------------------
Fix it, then Ship it! Ship It! ambari-logsearch/ambari-logsearch-portal/src/main/java/org/apache/ambari/logsearch/web/security/LogsearchExternalServerAuthenticationProvider.java Line 126 (original), 126 (patched) <https://reviews.apache.org/r/58493/#comment245583> As this is the only change that remained, and this is a bug fix not related to AMBARI.ADMINISTRATOR privileges please modify the description of the review request and the bug. - Miklos Gergely On April 20, 2017, 5:37 a.m., Keta Patel wrote: > > ----------------------------------------------------------- > This is an automatically generated e-mail. To reply, visit: > https://reviews.apache.org/r/58493/ > ----------------------------------------------------------- > > (Updated April 20, 2017, 5:37 a.m.) > > > Review request for Ambari, Di Li, Miklos Gergely, and Oliver Szabo. > > > Bugs: AMBARI-20768 > https://issues.apache.org/jira/browse/AMBARI-20768 > > > Repository: ambari > > > Description > ------- > > A local Ambari user with no cluster roles assigned to it can successfully log > into the Logsearch UI. > > Logsearch service exercises restriction on who can access its UI using a > property "logsearch.roles.allowed". This property is a comma-separated list > of roles to be allowed access to Logsearch UI. This defect deals with the > following 2 issues: > 1. If Logsearch service requires that only certain roles be allowed to access > its UI, then a local Ambari user with no roles must not be allowed to access > the UI. > 2. If some user with privilege to edit the config properties, updates > "logsearch.roles.allowed" by removing the "AMBARI.ADMINISTRATOR" role from > its list, then the Ambari Admins will not be able to access the Logsearch UI. > This violates the Ambari Administrator privilege which must be able to access > all frames of Ambari UI as well as perform all UI operations. > > > DESIRED BEHAVIOR: > ================= > 1. A local user with no role assigned to it, must not be able to access > Logsearch UI. > 2. Ambari Administrators must be always be allowed to access the Logsearch > UI. No user is allowed to revoke this access right of Ambari Administrator > for the Logsearch UI. > > > Diffs > ----- > > > ambari-logsearch/ambari-logsearch-portal/src/main/java/org/apache/ambari/logsearch/web/security/LogsearchExternalServerAuthenticationProvider.java > e23f0a2 > > > Diff: https://reviews.apache.org/r/58493/diff/2/ > > > Testing > ------- > > The patch *AMBARI-20768.patch* contains the fix for this issue. The fix > involves correction in 2 places in the > LogsearchExternalServerAuthenticationProvider class. > 1. In order to prevent a local user with no cluster roles assigned to it from > logging into Logsearch UI, we return *false*. > 2. We implicitly check whether the user is an Ambari Administrator or not, > thus removing the requirement of having "AMBARI.ADMINISTRATOR" role in the > "logsearch.roles.allowed" property on the UI. Now, even if some user removes > the "AMBARI.ADMINISTRATOR" property from the UI, it will not affect the > Ambari admin's accessibility to the Logsearch UI. Ambari Admins will always > be allowed to login. > > The results of the logsearch tests after applying the patch are shown in the > screenshot "all_tests_successful.png" on the Jira. > > > Thanks, > > Keta Patel > >
