_validate_network_tenant_ownership must be less strict
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
Fix Released
|
Medium
|
Avishay Balderman |
Bug Description
Neutron, currently does a strict validation code in https:/
so that for non-shared network the subnets and ports must belong to the same tenant as the network. In the case of a “service VM” created by an admin user, this function should return thus allowing admin users to create ports and networks in a tenant network.
Original code: https:/
Proposed Fix:
def _validate_
# TODO(salvatore-
# in the policy engine
if self._resource not in ('port', 'subnet') or request.
return
network = self._plugin.
# do not perform the check on shared networks
if network.
return
if network_owner != resource_
msg = _("Tenant %(tenant_id)s not allowed to "
raise webob.exc.
})
Changed in neutron: | |
status: | Incomplete → Confirmed |
Changed in neutron: | |
assignee: | nobody → Avishay Balderman (avishayb) |
Changed in neutron: | |
importance: | Undecided → Medium |
Changed in neutron: | |
milestone: | none → havana-rc1 |
tags: | added: neutron-core |
Changed in neutron: | |
status: | Fix Committed → Fix Released |
Changed in neutron: | |
milestone: | havana-rc1 → 2013.2 |
This bug is a "show stopper" for Radware LBaaS driver