Reviewed:  https://review.openstack.org/374463
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=e88097f4c0245439d15df490f4b097f2e9def9c9
Submitter: Jenkins
Branch:    master

commit e88097f4c0245439d15df490f4b097f2e9def9c9
Author: Sean Perry <[email protected]>
Date:   Wed Sep 21 16:59:47 2016 -0700

    Add domain check in domain-specific role implication
    
    Forbids implication between domain-specific roles from different domains
    
    Change-Id: I9d3b9747df04b425f8c708bb3436569f2baf47c8
    Co-Authored-By: Steve Martinelli <[email protected]>
    Co-Authored-By: Mikhail Nikolaenko <[email protected]>
    Closes-Bug: #1590583


** Changed in: keystone
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1590583

Title:
  domain-specific role in one domain should not be able to imply a
  domain-specific role from another domain

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  By design, domain-specific roles are visible within their owning
  domains only. In other words, domain-specific role in domain "foo"
  should not be able to imply a domain-specific role from domain "bar".

  To reproduce:

  1. create a domain-specific role "foo_domain_role" in domain "foo".
  2. create a domain-specific role "bar_domain_role" in domain "bar".
  3. PUT /v3/roles/<foo_domain_role_id>/implies/<bar_domain_role_id>
  4. list implies for "foo_domain_role" and you'll see "bar_domain_role" on the 
list

  vagrant@vagrant-ubuntu-trusty-64:~$ curl -s -H 'X-Auth-Token: 
748aa5d5c13c4df2b8d6fb2075ca4c39' 
http://10.0.2.15:5000/v3/roles/306b6d6f97084df983a6f2fa30cf1163/implies | 
python -mjson.tool
  {
      "role_inference": {
          "implies": [
              {
                  "id": "3171089626224021afc0299a0c9b916e",
                  "links": {
                      "self": 
"http://10.0.2.15/identity/v3/roles/3171089626224021afc0299a0c9b916e";
                  },
                  "name": "bar_domain_role"
              }
          ],
          "prior_role": {
              "id": "306b6d6f97084df983a6f2fa30cf1163",
              "links": {
                  "self": 
"http://10.0.2.15/identity/v3/roles/306b6d6f97084df983a6f2fa30cf1163";
              },
              "name": "foo_domain_role"
          }
      }
  }
  vagrant@vagrant-ubuntu-trusty-64:~$ curl -s -H 'X-Auth-Token: 
748aa5d5c13c4df2b8d6fb2075ca4c39' 
http://10.0.2.15:5000/v3/roles/306b6d6f97084df983a6f2fa30cf1163 | python 
-mjson.tool
  {
      "role": {
          "domain_id": "0ba1cc88be31429d98866d101d1ed0ba",
          "id": "306b6d6f97084df983a6f2fa30cf1163",
          "links": {
              "self": 
"http://10.0.2.15/identity/v3/roles/306b6d6f97084df983a6f2fa30cf1163";
          },
          "name": "foo_domain_role"
      }
  }

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1590583/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to