-
-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
action_view not included by default on action_execute #23
Comments
Can you please provide some more context and details? I tried to reproduce this issue, but I wasn't able to. I started by adding a new test case where we only grant "action_execute" to a specific action and then verify action_view is also granted on that action and it works fine (and in fact, we already had a test case which verifies that, but I added another one just in case to make sure existing one wasn't broken in some way). So I assume it's related to some edge case where perhaps action_execute is granted to a pack and not action directly or similar? |
I tried to reproduce it using both scenarios:
And both of the scenarios seem to work correctly - extremenetworks@43b6110. |
Per discussion with @armab on Slack, it looks like people are mixing up two different permission types - So those are two different permission and resource types. I believe we don't claim anywhere that granting We only claim that for Having said that, does it make sense for Perhaps, but we need to think about it some more since it has potential to change things. Let's take the following scenario for example:
I think it's reasonable to do that, but if user resource permission isolation functionality is not enabled (it's disabled by default), user A will also be able to see executions for action_5 triggered by the other users by default. Is this a problem? It depends on the use case and user setup. In any case, we need to document that well. /cc @VineeshJain |
I think the customer had similar example from https://docs.stackstorm.com/rbac.html#defining-roles-and-permission-grants
Doc example/comment says that Despite that, customer was able to run the action, but wasn’t able to re-run it as the rbac gave him |
Correct.
That's because of how CLI command is implemented - CLI first retrieves the original execution before performing the re-run operation. To re-run an execution, it's not strictly necessary to retrieve the original execution first (which requires That's simply an implementation detail of CLI command. If you use the API directly, |
This issue is triaged on st2 v3.1. The action_view permission is not implicitly granted to user with action_execution permission.
The text was updated successfully, but these errors were encountered: