[Openstack-security] [Bug 1187104] Re: Implement policy check for object ownership

Andrew Laski andrew.laski at rackspace.com
Fri Jun 14 18:14:30 UTC 2013


You are correct that there is no 'owns' check, but the policy engine
does support checking against arbitrary fields in a 'target'.  In a
lot(most?) of those checks that occur in the compute/api.py layer, vs
the wsgi layer, the target is an instance dict so something like
user_id:%(user_id)s would work.  Now, that's not universally true so
there may be specific checks that could use a more robust target to
check against, and I would suggest opening bugs for specific checks in
that case.  So I marked this as invalid because I think it's a bit
general and is somewhat supported.  But please open reports for specific
policy checks that are too limiting.

If you're interested in expanding the policy engine capabilities to
support an owns resource that would fall under a blueprint rather than a
bug report.

-- 
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1187104

Title:
  Implement policy check for object ownership

Status in OpenStack Compute (Nova):
  Invalid

Bug description:
  As far as I can tell, there is no policy check for resource ownership.

  The current policy checks support: all, none, role-membership, and tenant-membership. This means that the most minimal policy for an action, e.g. "compute:delete" is "role:Name and tenant_id:%(tenant_id)s".
  This role would allows any member of a project to delete any instance, which is a problem!

  We need something like:
  "owns:%(resource_id)" which checks the "user_id" field associated with the resource?

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1187104/+subscriptions




More information about the Openstack-security mailing list