-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AdhocRequest permissions are aliased to CheckConfig permissions #3458
Comments
It sounds straightforward. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been mentioned on Sensu Community. There might be relevant details there: https://discourse.sensu.io/t/could-not-impliment-check-execute-only-privileges/2450/2 |
It would be useful to have an |
I'm guessing that |
For us this issue is related to sensu/sensu-docs#2968 , because without OIDC we cannot have 2FA login and therefore cannot trust users to |
Signed-off-by: Mattias Jiderhamn <[email protected]>
So, I feel really silly for not thinking about this sooner, but I actually think the system already supports doing this... because to adhoc execute a check, you need permission to create an AdhocRequest. This means that we don't need any special new RBAC verb or anything, users just need create permissions on AdhocRequest. @jspaleta is going to confirm, and if I'm right, this will become a docs issue. |
@echlebek, Here's the test I did, using fresh sensu-go-workshop environment, using sensuctl as workshop's 'sensu' user using
|
Also note... using the test procedure above. So either this is a bug in the api endpoint not returning an errror when it should, or its a bug in the web-ui. Need to retest the api endpoint directly with curl with an api key. I'll get to that Monday if noone else beats me to it. |
This issue has become a bug, that we don't support the correct RBAC setup for AdhocRequest. We simply need to do so. |
Goal create Role with a rules that give narrow access to execute a specifc unpublished check.
Currently with existing RBAC I have to grant 'create' verb permissions to the full check resource.
What's needed is to extend the resource-name logic to work with the 'create' verb so that the POST to a specific check execute endpoint can be covered via role rule
The text was updated successfully, but these errors were encountered: