Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Trino failed to enable ldap to match ranger group #24190

Open
A-little-bit-of-data opened this issue Nov 20, 2024 · 0 comments
Open

Trino failed to enable ldap to match ranger group #24190

A-little-bit-of-data opened this issue Nov 20, 2024 · 0 comments

Comments

@A-little-bit-of-data
Copy link

Currently, trino version 430, openldap uses bitnami 2.6.8, and ranger is 2.4.0. Currently, ranger synchronizes the corresponding relationship between ldap users and groups, as shown in the following figure

Image

The current trino ldap configuration is:

password-authenticator.name=ldap
ldap.url=ldap://localhost:389
ldap.bind-dn=cn=admin,dc=test,dc=com
ldap.bind-password=xxxxxx
ldap.user-base-dn=dc=test,dc=com
ldap.group-auth-pattern=(&(objectClass=posixGroup)(memberUid=${USER}))

Since my ldap does not have the memberOf attribute, I use ldap.group-auth-pattern=(&(objectClass=posixGroup)(memberUid=${USER})) like this, but there are problems at present.

  1. When using the evmli user to log in, the password of the evm group must be used to verify the authentication.

  2. Use the evmli user and use the password of the evm group to authenticate the authentication. When executing sql, the log is as follows. The group cannot be used to verify the authority during the authority verification, resulting in query failure.

http-worker-346 io.trino.security.AccessControl Invocation of checkCanSetUser(principal=Optional[evmli], userName='evmli') succeeded in 28.35us 
 
http-worker-346 io.trino.security.AccessControl Invocation of filterQueriesOwnedBy(identity=Ident ity{user='evmli', principal=evmli}, queryOwners=[]) succeeded in 4.60us

The authorization relationship in ranger is shown in the figure
Image

Is there a configuration problem somewhere, or is it that the relationship between the user and group of trino cannot be synchronized with the relationship between the user and group in ldap? Why does --user=evmli require the password of the evm group to be authenticated when --password is enabled when ldap.group-auth-pattern is enabled?
Is there any other configuration required to authorize the group in ranger, so that when using the user in the group to log in and query trino, the users in this group have the same permissions as the group?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant