Back to bug 1888788

Who When What Removed Added
RHEL Program Management 2020-10-15 18:41:31 UTC Target Release 17.0 ---
Harry Rybacki 2020-10-20 15:06:39 UTC Summary [RFE] Configure read only role in policy.json for neutron [RFE] Configure read only role in policy.json for manilla
Goutham Pacha Ravi 2020-10-20 19:17:57 UTC Summary [RFE] Configure read only role in policy.json for manilla [RFE] Configure read only role in policy.json for manila
Harry Rybacki 2020-10-22 20:23:37 UTC Blocks 1890785
Harry Rybacki 2020-11-03 19:13:48 UTC Summary [RFE] Configure read only role in policy.json for manila [RFE] Implement Secure RBAC within manila
Giulio Fidente 2020-11-20 11:08:50 UTC CC gfidente
John Visser 2020-12-09 13:41:49 UTC CC jvisser
Gregory Charot 2021-01-14 14:16:33 UTC Keywords Triaged
CC gcharot
Gregory Charot 2021-01-14 14:16:49 UTC Target Milestone --- Upstream M1
Red Hat Bugzilla 2021-02-02 14:01:33 UTC CC rmascena
Ignacio 2021-02-25 13:36:33 UTC QA Contact vhariria lkuchlan
CC igarciam
Goutham Pacha Ravi 2021-04-07 15:05:10 UTC Status NEW POST
RHEL Program Management 2021-04-07 15:05:46 UTC CC vhariria
Target Release --- 17.0
Giulio Fidente 2021-05-03 11:46:36 UTC Blocks 1956283
Gregory Charot 2021-05-25 12:34:35 UTC Target Milestone Upstream M1 Alpha
Red Hat Bugzilla 2021-05-30 14:49:34 UTC CC chrisw
Jeff Fearn 🐞 2021-06-03 12:22:25 UTC CC chrisw
Assaf Muller 2021-06-15 17:24:52 UTC CC amuller
Jakub Libosvar 2021-06-16 13:55:29 UTC Depends On 1904499
Andy Stillman 2021-06-18 19:28:39 UTC Docs Contact mmurray rhos-docs
Red Hat Bugzilla 2021-06-22 00:25:07 UTC CC dbecker
Red Hat Bugzilla 2021-07-01 14:18:21 UTC CC elewis
Harry Rybacki 2021-08-06 17:55:55 UTC Summary [RFE] Implement Secure RBAC within manila [RFE] Implement Secure RBAC Project Scoped Personas within manila
Chuck Copello 2021-09-02 13:17:40 UTC CC spower
CC ccopello
nlevinki 2021-10-28 11:12:05 UTC CC nlevinki
Goutham Pacha Ravi 2021-11-17 01:54:34 UTC Link ID OpenStack gerrit 763450 OpenStack gerrit 775725 OpenStack gerrit 763441 OpenStack gerrit 763469 OpenStack gerrit 763442 OpenStack gerrit 763453 OpenStack gerrit 763452 OpenStack gerrit 763466 OpenStack gerrit 763464 OpenStack gerrit 763461 OpenStack gerrit 763459 OpenStack gerrit 763463 OpenStack gerrit 763462 OpenStack gerrit 763457 OpenStack gerrit 763465 OpenStack gerrit 763445 OpenStack gerrit 763448 OpenStack gerrit 763456 OpenStack gerrit 783192 OpenStack gerrit 763446 OpenStack gerrit 763451 OpenStack gerrit 781928 OpenStack gerrit 763387 OpenStack gerrit 779862 OpenStack gerrit 763449 OpenStack gerrit 763460 OpenStack gerrit 763386 OpenStack gerrit 763443 OpenStack gerrit 763458 OpenStack gerrit 777725 OpenStack gerrit 782904 OpenStack gerrit 763467 OpenStack gerrit 763454 OpenStack gerrit 763455 OpenStack gerrit 763444 OpenStack gerrit 763447 OpenStack gerrit 777652 OpenStack gerrit 763468 OpenStack gerrit 782622
Red Hat One Jira (issues.redhat.com) 2021-11-17 01:56:35 UTC Link ID Red Hat Issue Tracker OSP-390
Goutham Pacha Ravi 2021-11-17 02:11:25 UTC Link ID OpenStack gerrit 773709
Mikey Ariel 2022-02-04 12:17:19 UTC CC mariel
Victoria Martinez de la Cruz 2022-02-28 21:39:43 UTC CC vimartin
Fixed In Version openstack-manila-12.1.1-0.20220204174037.e1e9670
Victoria Martinez de la Cruz 2022-03-02 12:43:18 UTC Status POST MODIFIED
Jon Schlueter 2022-04-25 19:36:24 UTC Status MODIFIED ON_QA
RHEL Program Management 2022-08-26 12:21:05 UTC Keywords TechPreview
Target Release 17.0 17.1
Gregory Charot 2022-08-26 12:21:26 UTC Keywords TechPreview
Jon Schlueter 2022-08-29 11:58:29 UTC Status ON_QA MODIFIED
Jon Schlueter 2022-08-29 11:59:44 UTC CC jschluet
Gregory Charot 2022-09-02 13:41:17 UTC Target Milestone Alpha beta
Priority high urgent
Dave Wilde 2022-09-08 16:49:25 UTC Blocks 2125342
Red Hat Bugzilla 2022-11-24 08:37:15 UTC Docs Contact rhos-docs ndeevy
ndeevy 2022-11-24 13:21:52 UTC Docs Contact ndeevy erpeters
Florin Boboc 2022-11-28 15:43:31 UTC CC fboboc
errata-xmlrpc 2022-11-29 14:53:34 UTC Status MODIFIED ON_QA
Harry Rybacki 2023-05-09 18:13:06 UTC CC hrybacki
lkuchlan 2023-05-10 08:22:33 UTC Keywords AutomationBlocker
Red Hat Bugzilla 2023-05-24 06:54:34 UTC CC jvisser
lkuchlan 2023-05-30 10:35:43 UTC Status ON_QA VERIFIED
Ian Frangs 2023-08-03 15:46:23 UTC Flags needinfo?(gouthamr)
CC gouthamr
Goutham Pacha Ravi 2023-08-04 00:49:46 UTC Doc Text Feature: A project scoped "reader" role is supported by the Shared File Systems (manila) API. This role can be added in isolation to an OpenStack project user. A user with this role can send "GET" requests to the service. Users with this role will be prevented from making any other kind of request to the service.

Reason: A "reader" role is useful to create audit users for humans and automation. This role can be safely used to perform read-only interactions with OpenStack APIs.
Flags needinfo?(gouthamr)
Goutham Pacha Ravi 2023-08-04 00:52:20 UTC Doc Text Feature: A project scoped "reader" role is supported by the Shared File Systems (manila) API. This role can be added in isolation to an OpenStack project user. A user with this role can send "GET" requests to the service. Users with this role will be prevented from making any other kind of request to the service.

Reason: A "reader" role is useful to create audit users for humans and automation. This role can be safely used to perform read-only interactions with OpenStack APIs.
Feature: A project scoped "reader" role is supported by the Shared File Systems (manila) API. This role can be added in isolation to an OpenStack project user. A user with this role can send "GET" requests to the service. Users with this role will be prevented from making any other kind of request to the service. You can enable this feature by using the "environments/enable-secure-rbac.yaml" environment file included in Director.

Reason: A "reader" role is useful to create audit users for humans and automation. This role can be safely used to perform read-only interactions with OpenStack APIs.
Jenny-Anne Lynch 2023-08-04 12:27:58 UTC Flags needinfo?(gouthamr)
Doc Text Feature: A project scoped "reader" role is supported by the Shared File Systems (manila) API. This role can be added in isolation to an OpenStack project user. A user with this role can send "GET" requests to the service. Users with this role will be prevented from making any other kind of request to the service. You can enable this feature by using the "environments/enable-secure-rbac.yaml" environment file included in Director.

Reason: A "reader" role is useful to create audit users for humans and automation. This role can be safely used to perform read-only interactions with OpenStack APIs.
With this update, the Shared File Systems service (manila) API supports a project-scoped 'reader' role independently of an OpenStack project user role. Users with the 'reader' role can send GET requests to the service, but they cannot make any other kind of request. You can enable this feature by using the `environments/enable-secure-rbac.yaml` environment file included with director. You can use the 'reader' role to create audit users for humans and automation and to perform read-only interactions safely with OpenStack APIs.
CC jelynch
Goutham Pacha Ravi 2023-08-04 22:54:41 UTC Flags needinfo?(gouthamr)
Jenny-Anne Lynch 2023-08-09 10:11:09 UTC Doc Text With this update, the Shared File Systems service (manila) API supports a project-scoped 'reader' role independently of an OpenStack project user role. Users with the 'reader' role can send GET requests to the service, but they cannot make any other kind of request. You can enable this feature by using the `environments/enable-secure-rbac.yaml` environment file included with director. You can use the 'reader' role to create audit users for humans and automation and to perform read-only interactions safely with OpenStack APIs. With this update, the Shared File Systems service (manila) API supports a project-scoped 'reader' role. Users with the 'reader' role can send GET requests to the service, but they cannot make any other kind of request. You can enable this feature by using the `environments/enable-secure-rbac.yaml` environment file included with director. You can use the 'reader' role to create audit users for humans and automation and to perform read-only interactions safely with OpenStack APIs.
errata-xmlrpc 2023-08-16 00:01:34 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2023-08-16 01:09:25 UTC Resolution --- ERRATA
Status RELEASE_PENDING CLOSED
Last Closed 2023-08-16 01:09:25 UTC
errata-xmlrpc 2023-08-16 01:10:32 UTC Link ID Red Hat Product Errata RHEA-2023:4577

Back to bug 1888788