-
Notifications
You must be signed in to change notification settings - Fork 1.3k
api,server: allow project role-based api access #9090
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Fixes apache#9071 Signed-off-by: Abhishek Kumar <[email protected]>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## 4.19 #9090 +/- ##
============================================
- Coverage 14.96% 14.96% -0.01%
+ Complexity 10995 10991 -4
============================================
Files 5373 5374 +1
Lines 469005 469045 +40
Branches 58953 60633 +1680
============================================
- Hits 70198 70191 -7
- Misses 391036 391086 +50
+ Partials 7771 7768 -3
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
@blueorangutan package |
|
@shwstppr a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
@rajujith @andrijapanicsb I've created this PR to allow API access for accounts within the project irrespective of their account role. |
|
Packaging result [SF]: ✔️ el7 ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 9658 |
DaanHoogland
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
clgtm, nice unit-test but I think manual testing is needed anyway.
|
@blueorangutan test alma9 kvm-alma9 keepEnv |
|
@DaanHoogland a [SL] Trillian-Jenkins test job (alma9 mgmt + kvm-alma9) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-10252)
|
|
This would need some discussions so moving to draft for now. To support the use-case of elevating account privileges we may need to:
cc @rajujith @andrijapanicsb @Pearl1594 @rohityadavcloud @DaanHoogland |
Based on the discussions, closing this and the behaviour will be documented |
Description
Fixes #9071
Allows API access when the API is called with a project and ProjectRoleBasedApiAccessChecker allows it.
Types of changes
Feature/Enhancement Scale or Bug Severity
Feature/Enhancement Scale
Bug Severity
Screenshots (if appropriate):
How Has This Been Tested?
How did you try to break this feature and the system with this change?
With cmk,