5343 Commits

Author SHA1 Message Date
Zuul
1515701df0 Merge "[NetApp] Fix security service configuration for LDAP servers" 2021-03-11 12:48:58 +00:00
Zuul
a9c6ed03eb Merge "Clean up some policy code" 2021-03-11 02:53:26 +00:00
Douglas Viroel
8943e57ee6 [NetApp] Fix security service configuration for LDAP servers
This patch fixes some issues with LDAP client configuration on
ONTAP SVMs. With ldap security service, users should be able to
configure a LDAP client that can be used for authentication and
name mapping. The name service switch order remains: ldap,files.
Issues fixed:
- The driver now identifies when user provide a Active Directory
  domain or a Linux/Unix LDAP server IP and sets the correct schema.
- LDAP configuration parameter `servers` was replaced by `ldap-servers`
  in ONTAP 9.2, and now accepts host names too.
- Fix DNS configuration for LDAP security service
- User can now specify base search DN for LDAP queries, which can be
  mandatory for Unix/Linux servers, using the security service `ou`
  parameter.

Closes-Bug: #1916534
Change-Id: Ieaa53abbe50e7b708e508c132dfc4bb36b71a4f5
Signed-off-by: Douglas Viroel <viroel@gmail.com>
2021-03-10 16:00:46 -03:00
Zuul
fbb8e6b510 Merge "Implement secure RBAC for share group type specs" 2021-03-10 02:12:05 +00:00
Zuul
e979cb529c Merge "Implement secure RBAC for share instances" 2021-03-10 01:03:45 +00:00
Zuul
b0bba79b52 Merge "Implement secure RBAC for share instance export location" 2021-03-10 00:58:15 +00:00
Zuul
f4837fe95a Merge "Implement secure RBAC for share networks" 2021-03-10 00:58:10 +00:00
Zuul
ca9b6d2333 Merge "Implement secure RBAC for share network subnets" 2021-03-10 00:58:06 +00:00
Zuul
c39995df6f Merge "Implement secure RBAC for share replica locations" 2021-03-10 00:49:55 +00:00
Zuul
44008289ef Merge "Implement secure RBAC for share groups" 2021-03-09 19:04:08 +00:00
Zuul
374d754f2c Merge "Implement secure RBAC for share group types" 2021-03-09 17:44:10 +00:00
Zuul
8523d323e7 Merge "Adding Zadara Manila driver" 2021-03-09 17:44:03 +00:00
Zuul
217438084b Merge "Implement secure RBAC for group snapshots" 2021-03-09 17:17:20 +00:00
Lance Bragstad
81cbc2395b Implement secure RBAC for share group type specs
This commit updates the policies for share group type specs to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: Ie1b72459ae060693badb6fe864454836a4ff1300
2021-03-09 03:36:11 +00:00
Lance Bragstad
3ecad318bd Implement secure RBAC for share network subnets
This commit updates the policies for share network subnets to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: I2c90a40a7950be0463c3bc1bcf0b2d41cb6aeaa7
2021-03-09 00:53:00 +00:00
Lance Bragstad
19d182c429 Implement secure RBAC for share networks
This commit updates the policies for share networks to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: Ie5e87c73e97d4a464ec91db8fba1c5d3e9abfff5
2021-03-09 00:52:33 +00:00
Lance Bragstad
a7eb825721 Implement secure RBAC for share group types
This commit updates the policies for
share group types to understand scope
checking and account for a read-only role.
This is part of a broader series of
changes across OpenStack to provide a
consistent RBAC experience and improve
security.

Also fix the HTTP method in the policy
doc for this API.

Change-Id: I8b95e1e70f74052e5bd4af1ba29842420bafd0b2
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-03-08 16:18:55 -08:00
Lance Bragstad
18d96c1426 Implement secure RBAC for share groups
This commit updates the policies for share groups
to understand scope checking and account for a
read-only role. This is part of a broader series
of changes across OpenStack to provide a
consistent RBAC experience and improve security.

Change-Id: I71d63179131c5dbe75a2de7339fa4df70243e83f
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-03-08 15:50:22 -08:00
Zuul
aa298c9a8c Merge "Implement secure RBAC for services" 2021-03-08 23:27:40 +00:00
Zuul
c52c2be123 Merge "RBAC tightening for share access rule" 2021-03-08 23:10:38 +00:00
Zuul
15581e1457 Merge "Implement secure RBAC for share access rules" 2021-03-08 22:32:45 +00:00
Zuul
06a9cb1c41 Merge "Implement secure RBAC for share locations" 2021-03-08 19:58:30 +00:00
Zuul
d01566a574 Merge "Implement secure RBAC for access rule metadata" 2021-03-08 19:58:26 +00:00
Zuul
187e6bcc43 Merge "Implement secure RBAC for security services" 2021-03-08 19:21:24 +00:00
Lance Bragstad
264636575a Implement secure RBAC for share instances
This commit updates the policies for share instances to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: I1978fd95f5a9f798dd2d5a2ca011952515319746
2021-03-08 16:12:27 +00:00
Lance Bragstad
f6bf1e43e5 Implement secure RBAC for group snapshots
This commit updates the policies for group snapshots to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: Id02cb45ecca32378a0a8b65589f21c64893d2c8e
2021-03-08 15:11:16 +00:00
Lance Bragstad
f7fbe9837e Implement secure RBAC for share replica locations
This commit updates the policies for share replica locations to understand
scope checking and account for a read-only role. This is part of a broader
series of changes across OpenStack to provide a consistent RBAC experience and
improve security.

Change-Id: I2964f82844df47006e79c90d32f43174203f2aa6
2021-03-08 14:35:42 +00:00
Lance Bragstad
b1dacdabf8 Implement secure RBAC for share instance export location
This commit updates the policies for share instance export locations to
understand scope checking and account for a read-only role. This is part of a
broader series of changes across OpenStack to provide a consistent RBAC
experience and improve security.

Change-Id: I0cf9beed3c60fd790045580afa0c993c21e71d49
2021-03-08 14:28:09 +00:00
Zuul
16232ce01a Merge "[doc] remove project_id from api endpoints" 2021-03-08 14:15:18 +00:00
haixin
3bedb15bbb Fixed some syntax errors
Change-Id: I298cf625c869394ca3582b9224a737d722567dec
2021-03-08 09:20:07 +08:00
Ratnakaram Rajesh
4705a7d520 Adding Zadara Manila driver
Implements: blueprint zadara-manila-driver

Change-Id: Iae0eaf8b37d5eecc352af6546fd0cfa4cadab497
2021-03-06 10:02:09 +02:00
haixin
74415f6d4a Adds support min/max share size limited by share_type
Allows set min/max share size that can be created in
extra_specs for each share_type.the share size will
be checked at API level as part of share create,
extend, shrink, migration_start. when manage share,
check it after get true size of share at manager layer.
new extra_specs keys are supported for set min/max
size of share.
'provisioning:max_share_size'
'provisioning:min_share_size'

Implements: blueprint share-size-limited-by-share-type
Change-Id: I5ce0fabf59bfca5ebaf0be5ffe9986e2b0480295
2021-03-06 14:30:58 +08:00
Zuul
067d44aab6 Merge "Implement secure RBAC for storage pool statistics" 2021-03-03 07:17:29 +00:00
Lance Bragstad
472277c03a Implement secure RBAC for share locations
This commit updates the policies for share locations to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: Iaebbadea3ed153f19e7abb13d7d28ae3b6bb1fd9
2021-03-03 05:46:10 +00:00
Lance Bragstad
f59505538b Implement secure RBAC for access rule metadata
This commit updates the policies for share
access rule  metadata to understand scope
checking and account for a read-only role.
This is part of a broader series of
changes across OpenStack to provide a
consistent RBAC experience and improve
security.

Change-Id: Ie9fafd00f1a1888979fbce2a66af53613f8052c7
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-03-02 17:51:20 -08:00
Lance Bragstad
72de265c1d Implement secure RBAC for share access rules
This commit updates the policies for share access rules to understand scope
checking and account for a read-only role. This is part of a broader series of
changes across OpenStack to provide a consistent RBAC experience and improve
security.

Change-Id: I12026c7874620abb076df979f0492f6d1b8563fd
2021-03-03 01:45:14 +00:00
Lance Bragstad
8d0b6acfcd Implement secure RBAC for services
This commit updates the policies for services to
understand scope checking and account for a
read-only role. This is part of a broader series
of changes across OpenStack to provide a
consistent RBAC experience and improve security.

Change-Id: I340f63874af5783099ed6b353be61a2909829343
2021-03-02 17:43:10 -08:00
Lance Bragstad
d7dd466a6d Implement secure RBAC for security services
This commit updates the policies for security services
to understand scope checking and account for a read-only
role. This is part of a broader series of changes across
OpenStack to provide a consistent RBAC experience and
improve security.

Change-Id: I399a61691dad3a80c289c9f3f99f3c48be07846f
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-03-02 17:39:40 -08:00
Zuul
5aa61a2830 Merge "Implement secure RBAC for quotas" 2021-03-02 20:47:11 +00:00
Zuul
f36da9395a Merge "Implement secure RBAC for quota classes" 2021-03-02 20:47:06 +00:00
Zuul
49225664ca Merge "Implement secure RBAC for messages" 2021-03-02 20:17:58 +00:00
Goutham Pacha Ravi
fc0f669dec RBAC tightening for share access rule
Non privileged users of unrelated projects
must not be able to retrieve details of an
access rule. We can add a further check to
/share-access-rules APIs to validate that
the caller has access to the share that these
rules pertain to.

Change-Id: I0009a3d682ee5d9a946821c3f82dfd90faa886aa
Closes-Bug: #1917417
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-03-01 23:05:56 -08:00
Zuul
8d9fb9250d Merge "Remove deprecated public share policies" 2021-03-02 01:42:30 +00:00
Zuul
d116218778 Merge "Implement secure RBAC for storage availability zones" 2021-03-02 00:54:45 +00:00
Zuul
4b7b0155dc Merge "[NetApp] Fix deepcopy of sqlalchemy objects inside the driver" 2021-03-01 16:54:45 +00:00
Goutham Pacha Ravi
8553962997 Clean up some policy code
oslo policy handles the mapping of
credentials from a context object to values
that oslo policy cares about. This mapping
includes some deprecations and compatibility
handling code that we must take advantage of [1].
So, stop mapping context to policy values
on our end, and rely on oslo.policy handling
this for us.

enforce and authorize methods in policy.py
do the same thing, but with a subtle
difference. The "enforce" method doesn't
raise errors when unregistered policies are
invoked - this shouldn't ever be the case
for any policies written/maintained within
manila - however, we support API extensions
and don't dictate what must be done there. So
add docstrings to clarify that we shouldn't
invoke enforce, ever.

Also handle InvalidPolicyScope exceptions
and raise the oslo.policy library version
since some test enhancements have been
committed in the latest version.

[1] d3185debdb/oslo_policy/policy.py (L1077-L1096)

Change-Id: I069bf7143d6ff66b3dcdc34c9b52d48f5808481b
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-02-25 23:41:57 -08:00
Goutham Pacha Ravi
00133f93ae Drop "system_scope" from context constructor
Manila's RequestContext base class was
recently refactored to allow arbitrary
keyword arguments to be passed on to the
base Context class in oslo_context. This
was done so that we don't have to maintain
every new addition to Context within manila
code since that layer may change as the
middleware components (keystonemiddleware, for
example) evolve outside of manila.

During this refactor, "system_scope" was
inadvertently added as a separate keyword
argument, and it wasn't being passed to the
base class, causing system scoped users to
not be represented correctly in the API.
We can drop this parameter and allow it to
flow transparently through "kwargs".

Change-Id: I88b664c631eddced4ee1fcdf34cf05222cb73662
Signed-off-by: Goutham Pacha Ravi <gouthampravi@gmail.com>
2021-02-25 11:02:07 -08:00
Zuul
9619ca3242 Merge "Doc: Add profiler support documentation" 2021-02-25 17:34:30 +00:00
Zuul
ba6a2800d0 Merge "Integrate OSprofiler and Manila" 2021-02-25 17:16:55 +00:00
kpdev
3b0358a1bc Doc: Add profiler support documentation
The profiler integration with the shared file system service(Manila)
allows to trace commands issued using both manila-client and
openstack-client.

Note that osprofiler should be run from admin user name & tenant.

Closes-Bug: #1915116
Change-Id: Ic16bc3cb03b851003c189450b398f8dd5dde8160
2021-02-25 05:18:21 +01:00