Skip to content

Conversation

@dineshkumar-yadav
Copy link
Contributor

…can query those admin/keyadmin users.

What changes were proposed in this pull request?

This change will prevent users with the USER role from fetching details of roles other than USER.

How was this patch tested?

-- build with mvn clean install
-- tested below REST API working as expected

  1. curl --insecure -k -v -u 'user:pass' -H 'Accept: application/json, text/plain, /' '{hostname}:{port}/service/xusers/users?pageSize=10000&userRole=ROLE_SYS_ADMIN'
  2. curl --insecure -k -u 'user:pass' -H 'Accept: application/json, text/plain, /' '{hostname}:{port}/service/xusers/users?pageSize=10000&userRole=ROLE_KEY_ADMIN'
  3. curl --insecure -k -v -u 'user:pass' -H 'Accept: application/json, text/plain, /' '{hostname}:{port}/service/xusers/users?pageSize=10000&userRoleList=ROLE_KEY_ADMIN&userRoleList=ROLE_SYS_ADMIN'

@dineshkumar-yadav dineshkumar-yadav self-assigned this Oct 1, 2025
@dineshkumar-yadav dineshkumar-yadav deleted the sandbox/dineshkumar-yadav/RANGER-5342 branch October 7, 2025 09:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant