public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: "Fabian Grünbichler" <f.gruenbichler@proxmox.com>
To: Proxmox VE development discussion <pve-devel@lists.proxmox.com>
Subject: Re: [pve-devel] [PATCH-SERIE pve-access-control/pve-manager/qemu-server] check permissions on local bridge
Date: Tue, 06 Jun 2023 09:43:25 +0200	[thread overview]
Message-ID: <1686036509.uv78m51dug.astroid@yuna.none> (raw)
In-Reply-To: <48d2176fec4cb32dec1889cb2e6efeda1fec4c64.camel@groupe-cyllene.com>

On June 6, 2023 8:54 am, DERUMIER, Alexandre wrote:
> Le mardi 06 juin 2023 à 05:32 +0000, DERUMIER, Alexandre a écrit :
>> > to have at least the local bridge ACL path (for the zone, or for
>> > the
>> > zone and the bridges?) in the regular ACL selectors in 7.x as well,
>> > if
>> > we pull in something in pve-manager, than IMHO it should be that,
>> > not
>> > the full-flegded new panels.
>> I'll look to rewrok the selector, vnets are not yet displayed. (only
>> sdn zones, and localnetwork zone is also not displayed )
> 
> Looking at that,
> currently the pathselector is filled from cluster ressources.
> 
> I really don't known if we want to add all vnets to the cluster
> ressources api. (as we don't really want to expose them in the tree
> anyway,  like a disk from a datastore is not exposed. User could have a
> lot bridges, and the ressource json can be already big)
> 
> User could still add manually the bridge in the path if needed.
> 
> User could still use the new panel for easy add more granular
> permissions on bridge/vlan.

I think for PVE 7, we mainly want to provide an easy way to stay
compatible to the old behaviour, that would basically mean:

pveum acl modify /sdn/zones/localnetwork --groups XXX --users YYY --tokens ZZZ --roles PVESDNUser

rinse repeat for any SDN zones if you have any.

for the GUI, the least invasive change would be to just add a hardcoded
ACL selector entry for /sdn/zones/localnetwork (the rest can be done
manually via the GUI or pveum).

note that existing guests continue to work fine, it's just
- creating new ones (from scratch, backup or via clone)
- modifying any virtual nics on any guests

that require the permissions.

PVEAdmins and existing PVESDNAdmins would already have the required
permissions anyway (Administrator as well). so this would mostly affect
PVEVMAdmins and custom roles.




  reply	other threads:[~2023-06-06  7:44 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-04 23:37 Alexandre Derumier
2023-06-04 23:37 ` [pve-devel] [PATCH pve-access-control 1/2] access control: add /sdn/vnets/<vnet>/<vlan> path Alexandre Derumier
2023-06-04 23:37 ` [pve-devel] [PATCH v2 pve-manager 1/3] add vnet permissions panel Alexandre Derumier
2023-06-04 23:37 ` [pve-devel] [PATCH v2 qemu-server 1/1] api2: add check_bridge_access for create/update vm Alexandre Derumier
2023-06-05  7:38   ` Thomas Lamprecht
2023-06-06  4:20     ` DERUMIER, Alexandre
2023-06-05 10:12   ` Fabian Grünbichler
2023-06-04 23:37 ` [pve-devel] [PATCH v2 pve-manager 2/3] add permissions management for "localnetwork" zone Alexandre Derumier
2023-06-04 23:37 ` [pve-devel] [PATCH pve-access-control 2/2] rpcenvironnment: add check_sdn_bridge Alexandre Derumier
2023-06-05 10:12   ` Fabian Grünbichler
2023-06-06 12:15     ` DERUMIER, Alexandre
2023-06-06 12:37       ` Fabian Grünbichler
2023-06-04 23:37 ` [pve-devel] [PATCH v2 pve-manager 3/3] api2: network: check permissions for local bridges Alexandre Derumier
2023-06-05 10:13 ` [pve-devel] [PATCH-SERIE pve-access-control/pve-manager/qemu-server] check permissions on local bridge Fabian Grünbichler
2023-06-06  5:32   ` DERUMIER, Alexandre
2023-06-06  6:54     ` DERUMIER, Alexandre
2023-06-06  7:43       ` Fabian Grünbichler [this message]
2023-06-06  7:31     ` Fabian Grünbichler

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1686036509.uv78m51dug.astroid@yuna.none \
    --to=f.gruenbichler@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal