-
-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFC] "action_execute" should also grant "execution_view" on all the corresponding executions #25
base: master
Are you sure you want to change the base?
Conversation
directly on the action or on the pack implicity grants "action_execute" to the corresponding action or all actions inside a particular pack.
action or pack also grants "execution_view" on all the executions for that particular action / actions which are parent of that particular pack.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm good with this change 👍
However changing st2 CLI to make appropriate execution re-run API request (with no additional execution view API request) would be more appropriate IMO and less disturbing per https://github.com/extremenetworks/st2-enterprise-rbac-backend/issues/23#issuecomment-521213478.
@armab Was this merged in somewhere or no? |
I think deleting the branch closed this PR automatically. Let me restore it. With that, not sure if I feel lucky enough to merge this PR after 1yr of stale. |
I merged in master. |
Closes #23
This pull request updates RBAC resolvers code and updates it so now
action_execute
permission either on the action directly or on a pack, implicitly grantsexecution_view
permission for all the executions which belong to that particular action (or to all the actions which belong to a particular pack).This was implemented, because of the discussion in #23.
It's worth noting that this is not a bug fix.
This is a new functionality / change of behavior which has security implications (see my comment here https://github.com/extremenetworks/st2-enterprise-rbac-backend/issues/23#issuecomment-521204374).
I think that change is reasonable since we already have some other implicit grants in other places, but it could surprise users so it's important all the implications are documented.
With this change, if user A has
action_execute
permission on Action 1, that user will also be able to view all the executions for that action, even the ones which are triggered by other users ifrbac.permission_isolation
is not enabled (it's disabled by default).I personally think that's a reasonable behavior (since it's already the case for
execution_re_run
andexecution_stop
), but we should probably also enablerbac.permission_isolation
by default at some point in the future.What do others think?
TODO