Merge "List SG rules which belongs to tenant's SG"
This commit is contained in:
commit
e04e1d80e4
@ -20,8 +20,22 @@ SG_RESOURCE_PATH = '/security-groups/{id}'
|
|||||||
RULE_COLLECTION_PATH = '/security-group-rules'
|
RULE_COLLECTION_PATH = '/security-group-rules'
|
||||||
RULE_RESOURCE_PATH = '/security-group-rules/{id}'
|
RULE_RESOURCE_PATH = '/security-group-rules/{id}'
|
||||||
|
|
||||||
|
RULE_ADMIN_OR_SG_OWNER = 'rule:admin_or_sg_owner'
|
||||||
|
RULE_ADMIN_OWNER_OR_SG_OWNER = 'rule:admin_owner_or_sg_owner'
|
||||||
|
|
||||||
|
|
||||||
rules = [
|
rules = [
|
||||||
|
policy.RuleDefault(
|
||||||
|
'admin_or_sg_owner',
|
||||||
|
base.policy_or('rule:context_is_admin',
|
||||||
|
'tenant_id:%(security_group:tenant_id)s'),
|
||||||
|
description='Rule for admin or security group owner access'),
|
||||||
|
policy.RuleDefault(
|
||||||
|
'admin_owner_or_sg_owner',
|
||||||
|
base.policy_or('rule:owner',
|
||||||
|
RULE_ADMIN_OR_SG_OWNER),
|
||||||
|
description=('Rule for resource owner, '
|
||||||
|
'admin or security group owner access')),
|
||||||
# TODO(amotoki): admin_or_owner is the right rule?
|
# TODO(amotoki): admin_or_owner is the right rule?
|
||||||
# Does an empty string make more sense for create_security_group?
|
# Does an empty string make more sense for create_security_group?
|
||||||
policy.DocumentedRuleDefault(
|
policy.DocumentedRuleDefault(
|
||||||
@ -88,7 +102,7 @@ rules = [
|
|||||||
),
|
),
|
||||||
policy.DocumentedRuleDefault(
|
policy.DocumentedRuleDefault(
|
||||||
'get_security_group_rule',
|
'get_security_group_rule',
|
||||||
base.RULE_ADMIN_OR_OWNER,
|
RULE_ADMIN_OWNER_OR_SG_OWNER,
|
||||||
'Get a security group rule',
|
'Get a security group rule',
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
|
@ -709,8 +709,13 @@ class SecurityGroupDbMixin(ext_sg.SecurityGroupPluginBase,
|
|||||||
pager = base_obj.Pager(
|
pager = base_obj.Pager(
|
||||||
sorts=sorts, marker=marker, limit=limit, page_reverse=page_reverse)
|
sorts=sorts, marker=marker, limit=limit, page_reverse=page_reverse)
|
||||||
|
|
||||||
|
# NOTE(slaweq): use admin context here to be able to get all rules
|
||||||
|
# which fits filters' criteria. Later in policy engine rules will be
|
||||||
|
# filtered and only those which are allowed according to policy will
|
||||||
|
# be returned
|
||||||
rule_objs = sg_obj.SecurityGroupRule.get_objects(
|
rule_objs = sg_obj.SecurityGroupRule.get_objects(
|
||||||
context, _pager=pager, validate_filters=False, **filters
|
context_lib.get_admin_context(), _pager=pager,
|
||||||
|
validate_filters=False, **filters
|
||||||
)
|
)
|
||||||
return [
|
return [
|
||||||
self._make_security_group_rule_dict(obj.db_obj, fields)
|
self._make_security_group_rule_dict(obj.db_obj, fields)
|
||||||
@ -725,7 +730,12 @@ class SecurityGroupDbMixin(ext_sg.SecurityGroupPluginBase,
|
|||||||
|
|
||||||
@db_api.retry_if_session_inactive()
|
@db_api.retry_if_session_inactive()
|
||||||
def get_security_group_rule(self, context, id, fields=None):
|
def get_security_group_rule(self, context, id, fields=None):
|
||||||
security_group_rule = self._get_security_group_rule(context, id)
|
# NOTE(slaweq): use admin context here to be able to get all rules
|
||||||
|
# which fits filters' criteria. Later in policy engine rules will be
|
||||||
|
# filtered and only those which are allowed according to policy will
|
||||||
|
# be returned
|
||||||
|
security_group_rule = self._get_security_group_rule(
|
||||||
|
context_lib.get_admin_context(), id)
|
||||||
return self._make_security_group_rule_dict(
|
return self._make_security_group_rule_dict(
|
||||||
security_group_rule.db_obj, fields)
|
security_group_rule.db_obj, fields)
|
||||||
|
|
||||||
|
@ -45,7 +45,10 @@ ADVSVC_CTX_POLICY = 'context_is_advsvc'
|
|||||||
|
|
||||||
# Identify the attribute used by a resource to reference another resource
|
# Identify the attribute used by a resource to reference another resource
|
||||||
_RESOURCE_FOREIGN_KEYS = {
|
_RESOURCE_FOREIGN_KEYS = {
|
||||||
net_apidef.COLLECTION_NAME: 'network_id'
|
net_apidef.COLLECTION_NAME: 'network_id',
|
||||||
|
# TODO(slaweq): use SECURITYGROUPS constant from api def when
|
||||||
|
# securitygroups api def will be moved to neutron-lib
|
||||||
|
'security_groups': 'security_group_id'
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
fixes:
|
||||||
|
- |
|
||||||
|
Owners of security groups now see all security group rules which belong to
|
||||||
|
the security group, even if the rule was created by the admin user.
|
||||||
|
Fixes bug `1824248 <https://bugs.launchpad.net/neutron/+bug/1824248>`_.
|
Loading…
Reference in New Issue
Block a user