Hi Dolph

Thanks for idea. Is this approach used somewhere for similar use-case I described? If so please point it out. Thanks

Filip

On 07/10/2015 04:57 PM, Dolph Mathews wrote:
How about using domain-based role assignments in keystone and requiring domain-level authorization in policy, and then only returning data about the collection of tenants that belong to the authorized domain? That way you don't have an API that violates multi-tenant isolation, consumable only by cloud operators.

On Wed, Jul 8, 2015 at 6:27 AM, Filip Blaha <[email protected] <mailto:[email protected]>> wrote:

    Hi all,

    I started implement bp [1]. Problem is that congress needs data
    about environments from all tenants but murano API lists only
    environments of user's current tenant. We decided to ipmplement it
    similarly like listing servers in nova where is query parameter
    all_tenants=true for that (user must be admin) I have 2 questions
    about that:

    1) Are there any security concerns about this approach?
    2) Has someone better idea how to implement this?

    [1]
    https://blueprints.launchpad.net/murano/+spec/murano-api-all-tenants-search

    Regards
    Filip



    __________________________________________________________________________
    OpenStack Development Mailing List (not for usage questions)
    Unsubscribe:
    [email protected]?subject:unsubscribe
    <http://[email protected]?subject:unsubscribe>
    http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev




__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: [email protected]?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: [email protected]?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to