api,server: allow project role-based api access#9090
api,server: allow project role-based api access#9090shwstppr wants to merge 3 commits intoapache:4.19from
Conversation
Fixes apache#9071 Signed-off-by: Abhishek Kumar <abhishek.mrt22@gmail.com>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## 4.19 #9090 +/- ##
============================================
- Coverage 14.96% 14.96% -0.01%
+ Complexity 10995 10991 -4
============================================
Files 5373 5374 +1
Lines 469005 469045 +40
Branches 58953 60633 +1680
============================================
- Hits 70198 70191 -7
- Misses 391036 391086 +50
+ Partials 7771 7768 -3
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
@blueorangutan package |
|
@shwstppr a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
@rajujith @andrijapanicsb I've created this PR to allow API access for accounts within the project irrespective of their account role. |
|
Packaging result [SF]: ✔️ el7 ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 9658 |
DaanHoogland
left a comment
There was a problem hiding this comment.
clgtm, nice unit-test but I think manual testing is needed anyway.
|
@blueorangutan test alma9 kvm-alma9 keepEnv |
|
@DaanHoogland a [SL] Trillian-Jenkins test job (alma9 mgmt + kvm-alma9) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-10252)
|
|
This would need some discussions so moving to draft for now. To support the use-case of elevating account privileges we may need to:
cc @rajujith @andrijapanicsb @Pearl1594 @rohityadavcloud @DaanHoogland |
Based on the discussions, closing this and the behaviour will be documented |
Description
Fixes #9071
Allows API access when the API is called with a project and ProjectRoleBasedApiAccessChecker allows it.
Types of changes
Feature/Enhancement Scale or Bug Severity
Feature/Enhancement Scale
Bug Severity
Screenshots (if appropriate):
How Has This Been Tested?
How did you try to break this feature and the system with this change?
With cmk,