Bug 1411702 - User access filtering using tags for clouds networks and floating ip| isnt' working as expected.
Summary: User access filtering using tags for clouds networks and floating ip| isnt' w...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat CloudForms Management Engine
Classification: Red Hat
Component: Appliance
Version: 5.7.0
Hardware: x86_64
OS: Linux
high
high
Target Milestone: GA
: 5.8.0
Assignee: Libor Pichler
QA Contact: Ruslana Babyuk
URL:
Whiteboard:
Depends On:
Blocks: 1427520
TreeView+ depends on / blocked
 
Reported: 2017-01-10 11:02 UTC by Prasad Mukhedkar
Modified: 2017-06-12 16:13 UTC (History)
7 users (show)

Fixed In Version: 5.8.0.0
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 1427520 (view as bug list)
Environment:
Last Closed: 2017-06-12 16:13:42 UTC
Category: ---
Cloudforms Team: CFME Core
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Prasad Mukhedkar 2017-01-10 11:02:49 UTC
Description of problem:

Networks and floating_ips are accessible to all the user irrespective 
what filtering is set. 


Version-Release number of selected component (if applicable):
cfme 5.7

How reproducible:
always

Steps to Reproduce:
- Create a group and set "Assigned Filters (read only)"
  to a visibility tag. 

- Attach that visibility tag to some networks and floting_ip

- create a user in the group and login using that user.


Actual results:
Under Networks, User can see all the network. (visibility filter is simply)

Expected results:
Should only show the networks for which the user has visibility



Additional info:

Comment 2 Prasad Mukhedkar 2017-01-10 11:07:46 UTC
video recording of the buggy behavior has been attached to the bugzilla

Comment 4 jritenou 2017-02-04 00:42:41 UTC
I can also confirm this behavior just as Prasad stated:

1. Assign tag to cloud network/vpc/subnet.
2. Try to access resources with group with different tag filter.
3. Group can see all network resources regardless of tag.

It appears to just be resources under the network provider - I have confirmed it with both Azure & AWS cloud network resources.  

I'll see if I can get a video of it recorded over the weekend.

Comment 8 Ruslana Babyuk 2017-05-03 10:50:12 UTC
Verified in 5.8.0.13


Note You need to log in before you can comment on or make changes to this bug.