-
Notifications
You must be signed in to change notification settings - Fork 344
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TO: Only display Server ILO/XMPP Passwords Based on New Permission #7697
Conversation
Codecov Report
@@ Coverage Diff @@
## master #7697 +/- ##
============================================
+ Coverage 26.95% 29.79% +2.83%
Complexity 98 98
============================================
Files 686 801 +115
Lines 80539 85760 +5221
Branches 90 952 +862
============================================
+ Hits 21707 25549 +3842
- Misses 56760 58071 +1311
- Partials 2072 2140 +68
Flags with carried forward coverage won't be shown. Click here to find out more.
... and 115 files with indirect coverage changes 📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
@shamrickus can you also create the SECURE-SERVER:READ permission via a database migration? |
@shamrickus is there a reason this can't be "fixed" in api v3 and v4? i know we don't like to change behavior of a published api but fixing a bug seems like it would be fair game. |
API v3 doesn't have the new role based permissions and this fixes it in v4. |
oh ok. your PR description only mentioned v5 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code looks good, and tested functionality
…pache#7697) * Remove priv checks for secure server fields * Handle api version 4 also * Forgot a file + changelog --------- Co-authored-by: Steve Hamrick <shamrick@apache.org>
Currently, the
servers
endpoints will display thexmppPasswd
/iloPassword
based only on privlevel. In api v5/v4 this has been changed to check for a new permissionSECURE-SERVER:READ
instead (if enabled).Which Traffic Control components are affected by this PR?
What is the best way to verify this PR?
Confirm the TO Tests work. For version api version 3/4 and
role_based_permissions
is off confirm that Ops/Admin PrivLevel is required to view the two password fields. For Version 4, confirm that withrole_based_permissions
set, that only users that are admin or have theSECURE-SERVER:READ
permission can view the password fields. For version 5, it should only check for the permission.If this is a bugfix, which Traffic Control versions contained the bug?
PR submission checklist