From: "Shannon Sterz" <s.sterz@proxmox.com>
To: "Shannon Sterz" <s.sterz@proxmox.com>, <pdm-devel@lists.proxmox.com>
Subject: [pdm-devel] Superseded: Re: [PATCH datacenter-manager/proxmox/yew-comp v2 00/11] ACL edit api and ui components
Date: Thu, 28 Aug 2025 13:00:09 +0200 [thread overview]
Message-ID: <DCE0BL2L5TPU.1QFOXBE77ZLN4@proxmox.com> (raw)
In-Reply-To: <20250411134435.269524-1-s.sterz@proxmox.com>
Superseded-by: https://lore.proxmox.com/pdm-devel/20250828105912.294887-1-s.sterz@proxmox.com/T/#t
On Fri Apr 11, 2025 at 3:44 PM CEST, Shannon Sterz wrote:
> this series aims to make more parts of our access control list
> implementation re-usable between products. in a first step most of the
> relevant api endpoints and api types are moved to
> `proxmox-access-control`. this is done by adding a new `api` feature
> that includes the necessary api endpoints. the `AccessControlConfig`
> trait is also expanded to make the api endpoints more adaptable to
> different products. by providing default implementations for the newly
> added trait functions existing users don't need to change anything. it
> also tries to make the code here easier to understand as the checks
> could be hard to grasp previously.
>
> next the series adds components to proxmox-yew-comp to provide a panel
> for inspecting the current acl and adding or removing entries. this is
> done by using the existing `RoleSelector` and `AuthidSelector`
> components. the later is also slightly adapted to make it possible to
> change the api endpoint that roles are fetched from as well as the
> default role. the `AclView` component allows users of the crate to add
> more options for adding ACL entries. meaning they can configure distinct
> components for adding user, token or group permissions. this is done in
> a generic fashion so that extending this menu does not require changing
> the component again.
>
> finally proxmox-datacenter-manager is adapted to use the new api
> endpoints in `proxmox-access-control` and a permissions panel is
> implemented. note that this would benefit from some clean-up once
> permission path and such are cleaned up.
>
> proxmox:
>
> Shannon Sterz (6):
> access-control: add more types to prepare for api feature
> access-control: add acl api feature
> access-control: add comments to roles function of AccessControlConfig
> access-control: add generic roles endpoint to `api` feature
> access-control: api: refactor validation checks to re-use existing
> code
> access-control: api: refactor extract_acl_node_data to be
> non-recursive
>
> proxmox-access-control/Cargo.toml | 8 +
> proxmox-access-control/src/acl.rs | 12 +-
> proxmox-access-control/src/api.rs | 349 ++++++++++++++++++
> .../src/cached_user_info.rs | 4 +-
> proxmox-access-control/src/init.rs | 35 +-
> proxmox-access-control/src/lib.rs | 3 +
> proxmox-access-control/src/types.rs | 87 ++++-
> 7 files changed, 486 insertions(+), 12 deletions(-)
> create mode 100644 proxmox-access-control/src/api.rs
>
>
> proxmox-yew-comp:
>
> Shannon Sterz (3):
> api-types/role_selector: depend on common `RoleInfo` type
> acl: add a view and semi-generic `EditWindow` for acl entries
> role_selector/acl_edit: make api endpoint and default role
> configurable
>
> src/acl/acl_edit.rs | 112 +++++++++++++++++
> src/acl/acl_view.rs | 270 ++++++++++++++++++++++++++++++++++++++++
> src/acl/mod.rs | 5 +
> src/common_api_types.rs | 8 --
> src/lib.rs | 3 +
> src/role_selector.rs | 22 +++-
> 6 files changed, 407 insertions(+), 13 deletions(-)
> create mode 100644 src/acl/acl_edit.rs
> create mode 100644 src/acl/acl_view.rs
> create mode 100644 src/acl/mod.rs
>
>
> proxmox-datacenter-manager:
>
> Shannon Sterz (2):
> server: use proxmox-access-control api implementations
> ui: configuration: add panel for viewing and editing acl entries
>
> server/Cargo.toml | 2 +-
> server/src/acl.rs | 102 ++++-
> server/src/api/access/acl.rs | 357 ------------------
> server/src/api/access/mod.rs | 4 +-
> ui/src/configuration/mod.rs | 23 +-
> .../configuration/permission_path_selector.rs | 86 +++++
> 6 files changed, 208 insertions(+), 366 deletions(-)
> delete mode 100644 server/src/api/access/acl.rs
> create mode 100644 ui/src/configuration/permission_path_selector.rs
>
>
> Summary over all repositories:
> 19 files changed, 1101 insertions(+), 391 deletions(-)
>
> --
> Generated by git-murpp 0.8.0
_______________________________________________
pdm-devel mailing list
pdm-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pdm-devel
prev parent reply other threads:[~2025-08-28 11:00 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-04-11 13:44 [pdm-devel] " Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH proxmox v2 1/6] access-control: add more types to prepare for api feature Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH proxmox v2 2/6] access-control: add acl " Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH proxmox v2 3/6] access-control: add comments to roles function of AccessControlConfig Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH proxmox v2 4/6] access-control: add generic roles endpoint to `api` feature Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH proxmox v2 5/6] access-control: api: refactor validation checks to re-use existing code Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH proxmox v2 6/6] access-control: api: refactor extract_acl_node_data to be non-recursive Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH yew-comp v2 1/3] api-types/role_selector: depend on common `RoleInfo` type Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH yew-comp v2 2/3] acl: add a view and semi-generic `EditWindow` for acl entries Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH yew-comp v2 3/3] role_selector/acl_edit: make api endpoint and default role configurable Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH datacenter-manager v2 1/2] server: use proxmox-access-control api implementations Shannon Sterz
2025-04-11 13:44 ` [pdm-devel] [PATCH datacenter-manager v2 2/2] ui: configuration: add panel for viewing and editing acl entries Shannon Sterz
2025-04-17 15:46 ` [pdm-devel] [PATCH datacenter-manager/proxmox/yew-comp v2 00/11] ACL edit api and ui components Thomas Lamprecht
2025-04-22 8:12 ` Shannon Sterz
2025-08-28 11:00 ` Shannon Sterz [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=DCE0BL2L5TPU.1QFOXBE77ZLN4@proxmox.com \
--to=s.sterz@proxmox.com \
--cc=pdm-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox