Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enforcing scope with SRBAC breaks heat #395

Merged

Conversation

rabi
Copy link
Contributor

@rabi rabi commented Mar 22, 2024

Heat won't work when scope is enforced and it's being used by many of our NFV customers. Rather than making a single property to enable SRBAC, let's split them so that enforce_new_defaults can be set to true by default and customers can toggle enforce_scope if they're not using heat.

jira: https://issues.redhat.com/browse/OSPRH-5753

Heat won't work when scope is enforced and it's being used by many
of our NFV customers. Rather than making a single property to enable
SRBAC, let's split them so that `enforce_new_defaults` can be set to
true by default and customers can toggle `enforce_scope` if they're
not using heat.
@openshift-ci openshift-ci bot requested review from abays and stuggi March 22, 2024 06:40
@rabi rabi requested review from abays and dmendiza and removed request for abays March 22, 2024 07:05
@rabi
Copy link
Contributor Author

rabi commented Mar 22, 2024

I've mentioned it in the jira and doing it here too.. The other option is changing keystone default policies[1] to allow domain scope.

[1] https://github.com/openstack/keystone/blob/master/keystone/common/policies/role.py#L98

@vyzigold
Copy link

I'll note it here. I just tried to create a stack and it was failing with the following until I disabled SRBAC:

Resource CREATE failed: Forbidden: resources.scaledown_policy: You are not authorized to perform the requested action: identity:list_roles.

My hopes are this PR will fix the issue.

@rabi
Copy link
Contributor Author

rabi commented Mar 26, 2024

My hopes are this PR will fix the issue.

Toggling enforce_scope will fix the issue as explained in the commit message. You can test with the customServiceConfig as below for keystone.

keystone:
  apiOverride:
    route: {}
  enabled: true
  template:
    adminProject: admin
    adminUser: admin
    containerImage: ""
    customServiceConfig: |
      [oslo_policy]
      enforce_scope=false

@abays
Copy link
Contributor

abays commented Mar 26, 2024

This looks good to me. @dmendiza What do you think?

Copy link
Contributor

@abays abays left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We at least need this now to unblock other things. If there are objections, we can discuss in a follow-up.

/lgtm

Copy link
Contributor

openshift-ci bot commented Mar 26, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: abays, rabi

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-bot openshift-merge-bot bot merged commit d8230c2 into openstack-k8s-operators:main Mar 26, 2024
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants