Skip to content

Security

Adam Hornáček edited this page Jun 14, 2021 · 7 revisions

Security model

The web application has to have writable access to the data as it employs RESTful APIs that need to be able modify the data such as configuration, index data etc. It does not have to have writable access to the source data, though.

Securing a deployment

For security conscious setup, it is desirable to enable HTTPS handling in the application server. However, the indexer needs to be able to send RESTful API requests to the web application during indexing. These requests need to pass either through localhost or have the appropriate authentication Bearer tokens set in the HTTP headers (see https://github.com/oracle/opengrok/wiki/Webapp-configuration#configuration-tunables). This means that the application server has to be setup to allow plain HTTP communication on certain port (say 8080) and expose the port to localhost.

Also see https://github.com/oracle/opengrok/wiki/Authorization

Reporting vulnerabilities

If you find what you think is a security problem, report it via email to one of the core contributors.