RBAC -access_as_external lack of flexibility

Bug #1581929 reported by Alex Stafeyev
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Expired
Undecided
Unassigned

Bug Description

If we have an external network, with default rbac policy, and even 1 tenant is using this network, we can not delete the default rbac policy in order to decide to which tenants this network will be exposed.
In this situation the network will be exposed to all tenants unless the admin first disconnects ( clears the network ports from all tenants - Router gw/Vms usage, etc ) the using tenant and then makes the needed changes.

In a situation with many tenants this will be non user friendly.

MITAKA.

Revision history for this message
Kevin Benton (kevinbenton) wrote :

You should be able to grant access to the specific tenant that is using the network and then remove the wildcard policy.

Changed in neutron:
status: New → Incomplete
Alex Stafeyev (astafeye)
description: updated
Revision history for this message
Alex Stafeyev (astafeye) wrote :

My goal is to remove the wildcard rbac policy when one of the tenants is already using this network.
So how t ogrant access to specific tenant provides me solution to this issue.
It would be great if you could show examples :)

tnx

Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for neutron because there has been no activity for 60 days.]

Changed in neutron:
status: Incomplete → Expired
Revision history for this message
Kevin Benton (kevinbenton) wrote :

Sorry to comment a year later, but in case someone else stumbles across this, please refer to the networking guide section on rbac policies to see how to share with a specific tenant: https://docs.openstack.org/mitaka/networking-guide/config-rbac.html

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.