[Engine-devel] Managing permissions on network
Itamar Heim
iheim at redhat.com
Mon Nov 19 22:11:49 UTC 2012
On 11/20/2012 12:01 AM, Livnat Peer wrote:
> On 19/11/12 23:24, Itamar Heim wrote:
>> On 11/19/2012 11:22 PM, Livnat Peer wrote:
>>> On 16/11/12 12:06, Itamar Heim wrote:
>>>> On 11/16/2012 10:22 AM, Moti Asayag wrote:
>>>>> On 11/16/2012 09:34 AM, Itamar Heim wrote:
>>>>>> On 11/15/2012 07:01 PM, Moti Asayag wrote:
>>>>>>> To recap so far:
>>>>>>>
>>>>>>> 1. User may see only the networks he has a permission on.
>>>>>>> 2. User API: Only permitted networks are shown to the user. A user
>>>>>>> will
>>>>>>> be capable to view the network element attached to its vnic, only
>>>>>>> if he
>>>>>>> has permission on that network, else it will see its id (same as
>>>>>>> storage
>>>>>>> domain id appears under disk element which attached to a vm).
>>>>>>
>>>>>> I think a user should be able to see network for networks
>>>>>> associated to
>>>>>> their VMs, regardless of permissions to the attach the network to
>>>>>> other
>>>>>> vms.
>>>>>> it doesn't mean they need to see all details (like statistics,
>>>>>> which are
>>>>>> not part of the user level api)
>>>>>> I'm pretty sure storage, cluster and dc follow the same concept in
>>>>>> user
>>>>>> level api.
>>>>>>
>>>>>
>>>>> Could you elaborate the importance from user perspective for the
>>>>> network
>>>>> implementation details? why the user should be concerned with MTU, Vlan
>>>>> and other network properties? Wouldn't the cloud-provider prefer to
>>>>> encapsulate this information from the end-user ?
>>>>
>>>> i do agree not all fields are relevant to user, and iirc, we have a
>>>> mechanism to filter out such fields.
>>>> is the MTU of the logical network a secret? user will get it from the
>>>> vnic anyway, right?
>>>> logical network name is also something user may need to know (what is
>>>> user going to see in the power user portal when standing on a VM which
>>>> has a vnic with a network they don't have a permission for? the uuid
>>>> instead of the network name?
>>>> tomorrow will let user create virtual networks. you need to decide which
>>>> fields they can and cannot set (vlan they cannot set. not sure if we
>>>> should or shouldn't hide it. i'm guessing both use cases will have merit
>>>> actually).
>>>>
>>>>
>>>
>>> With the above approach, what will the user see if he go to the network
>>> main collection (/api/networks) in the user API?
>>>
>>> Today you don't get any network info in the user API (I think - need to
>>> make sure), with the approach Moti suggested you see all the networks
>>> you have permissions on, but with the approach you suggested it seems
>>> like the user will be able to see all networks, for those he has
>>> permissions on he'll get all the details and for those he has no
>>> permissions he'll get limited amount of info like (name, description,
>>> MTU, usage). Do we want the user to be aware of all the networks defined
>>> in our DC?
>>
>> user always gets same level of details on entities they see today.
>> according to the approach i'm suggesting, user will see all networks
>> they can see either via direct permissions, or because they are used by
>> entities they have permissions to.
>>
>
> I guess the question is how do we define indirect permissions for networks.
> * Obviously if a user has a permission on a VM or a template then he has
> indirect permission on the networks attached to these entities.
>
> what about cluster and DC -
> * If a user has a userVMManager role on the cluster/DC - he should be
> able to see all networks attached to a VM/tempalte in the cluster/DC? or
> all networks attached to the cluster/ in the DC?
UserVmManager role on the cluster or DC implies permissions to all
vms/templates in them...
>
>
>
>
>>>
>>> Livnat
>>>
>>>>>
>>>>>>> 3. On upgrade: 'everyone' will get 'VmNetworkUser' role on all of the
>>>>>>> networks on the system.
>>>>>>> 4. On the dialog of creating new network there will be an option to
>>>>>>> grant 'everyone' permissions of the created network with
>>>>>>> 'VmNetworkUser'
>>>>>>> role (same as on 'make template' dialog).
>>>>>>> 5. Since there is no granularity of permission of network for the
>>>>>>> scope
>>>>>>> of a specific VM, If a user is 'VmNetworkUser' on a network, he may
>>>>>>> attach it to any VM he has a permission on (permission to edit the
>>>>>>> VM).
>>>>>>> 6. 'Create a VM from Template' and 'Create a VM from
>>>>>>> Snapshot/Clone VM'
>>>>>>> requires permissions on the vnics' networks. This will save the
>>>>>>> need to
>>>>>>> grant an automatic permissions for the vnics' networks. An
>>>>>>> alternative
>>>>>>> would be the opposite: Leave the current required permissions as
>>>>>>> is and
>>>>>>> grant permissions to the users for the networks of the created VM.
>>>>>>>
>>>>>>> Once we'll reach into a conclusion, I'll update the wiki accordingly.
>>>>>>>
>>>>>>> Thanks,
>>>>>>> Moti
>>>>>>>
>>>>>>> On 11/06/2012 03:56 PM, Livnat Peer wrote:
>>>>>>>> Hi All,
>>>>>>>>
>>>>>>>> This is a proposal for handling network permissions in oVirt.
>>>>>>>>
>>>>>>>> In this proposal we took the more permissive approach as we find it
>>>>>>>> simple and a good starting point, we also think a more restrict
>>>>>>>> approach
>>>>>>>> makes the configuration of a network cumbersome for ovirt
>>>>>>>> administrators.
>>>>>>>>
>>>>>>>> Inputs are welcomed as always...
>>>>>>>>
>>>>>>>> Here is an overview of the approach, for more detailed description
>>>>>>>> please read the wiki page:
>>>>>>>> http://wiki.ovirt.org/wiki/Feature/NetworkPermissions
>>>>>>>>
>>>>>>>> ---------------------------------------------------------------------------
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> Admin
>>>>>>>> ======
>>>>>>>>
>>>>>>>> -> For creating a network in a data center you need to be a
>>>>>>>> Superuser or
>>>>>>>> a DCAdmin or a networkAdmin on the DC.
>>>>>>>>
>>>>>>>> -> After creating the network you can manipulate the network if you
>>>>>>>> are
>>>>>>>> a DCAdmin or a networkAdmin on the relevant network (or the whole
>>>>>>>> DC).
>>>>>>>>
>>>>>>>> -> For attaching the network to cluster you need to be a
>>>>>>>> networkAdmin on
>>>>>>>> the network (no requirement to have permission on the cluster)
>>>>>>>>
>>>>>>>> -> Cluster administrator can not attach/detach a network from the
>>>>>>>> cluster, the motivation for this is that as long as the network
>>>>>>>> is not
>>>>>>>> attached to the cluster it is not part of the cluster resources
>>>>>>>> thus can
>>>>>>>> not be managed by the cluster administrator.
>>>>>>>> In addition once a network is attached to a cluster the cluster
>>>>>>>> administrator can change the network from required to
>>>>>>>> non-required for
>>>>>>>> controlling the impact of the network within the cluster.
>>>>>>>>
>>>>>>>> -> For setting a network on the host you need to be host
>>>>>>>> administrator
>>>>>>>> on the host and you don't need to be network administrator.
>>>>>>>> This implies that if you are a host administrator you can
>>>>>>>> add/remove all
>>>>>>>> the cluster networks from your host without the need for network
>>>>>>>> related
>>>>>>>> permissions (this is the permissive approach).
>>>>>>>>
>>>>>>>> User
>>>>>>>> ====
>>>>>>>>
>>>>>>>> -> For attaching a network to a Vnic in the VM you need to have the
>>>>>>>> role
>>>>>>>> of VmNetworkUser on the network and vmAdmin on the VM.
>>>>>>>>
>>>>>>>> -> In user portal - the list of shown network for a user will
>>>>>>>> include
>>>>>>>> only the list of networks the user is allowed to attach to its vnics
>>>>>>>> (instead of all cluster's networks).
>>>>>>>>
>>>>>>>> Port-mirroring
>>>>>>>> ===============
>>>>>>>>
>>>>>>>> -> For configuring in the VM port mirroring you need to have the
>>>>>>>> role
>>>>>>>> of VmAdvancedNetworkUser on the network and vmAdmin on the VM.
>>>>>>>> VmAdvancedNetworkUser includes the VmNetworkUser actions in
>>>>>>>> addition to
>>>>>>>> port mirroring.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> For all DB upgrade information and new roles/action groups please
>>>>>>>> review
>>>>>>>> the wiki.
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> Livnat & Moti
>>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>
>>>>
>>>
>>
>>
>
More information about the Devel
mailing list