mirror of https://github.com/apache/cloudstack.git
Removed the AccessType.UseNetwork - replaced all referrences by AccessType.UseEntry
This commit is contained in:
parent
84a528fad6
commit
36c0a4e2c3
|
|
@ -32,7 +32,6 @@ public interface SecurityChecker extends Adapter {
|
|||
|
||||
public enum AccessType {
|
||||
ModifyProject,
|
||||
UseNetwork,
|
||||
OperateEntry,
|
||||
UseEntry
|
||||
}
|
||||
|
|
|
|||
|
|
@ -105,7 +105,7 @@ public class DeployVMCmd extends BaseAsyncCreateCustomIdCmd {
|
|||
private Long domainId;
|
||||
|
||||
//Network information
|
||||
@ACL(accessType = AccessType.UseNetwork)
|
||||
@ACL(accessType = AccessType.UseEntry)
|
||||
@Parameter(name = ApiConstants.NETWORK_IDS, type = CommandType.LIST, collectionType = CommandType.UUID, entityType = NetworkResponse.class, description = "list of network ids used by virtual machine. Can't be specified with ipToNetworkList parameter")
|
||||
private List<Long> networkIds;
|
||||
|
||||
|
|
|
|||
|
|
@ -134,7 +134,7 @@ public class DomainChecker extends AdapterBase implements SecurityChecker {
|
|||
}
|
||||
|
||||
return true;
|
||||
} else if (entity instanceof Network && accessType != null && accessType == AccessType.UseNetwork) {
|
||||
} else if (entity instanceof Network && accessType != null && accessType == AccessType.UseEntry) {
|
||||
_networkMgr.checkNetworkPermissions(caller, (Network)entity);
|
||||
} else if (entity instanceof AffinityGroup) {
|
||||
return false;
|
||||
|
|
|
|||
|
|
@ -1164,7 +1164,8 @@ public class IpAddressManagerImpl extends ManagerBase implements IpAddressManage
|
|||
if (zone.getNetworkType() == NetworkType.Advanced) {
|
||||
if (network.getGuestType() == Network.GuestType.Shared) {
|
||||
if (isSharedNetworkOfferingWithServices(network.getNetworkOfferingId())) {
|
||||
_accountMgr.checkAccess(CallContext.current().getCallingAccount(), AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(CallContext.current().getCallingAccount(), AccessType.UseEntry, false,
|
||||
network);
|
||||
} else {
|
||||
throw new InvalidParameterValueException("IP can be associated with guest network of 'shared' type only if "
|
||||
+ "network services Source Nat, Static Nat, Port Forwarding, Load balancing, firewall are enabled in the network");
|
||||
|
|
@ -1186,7 +1187,7 @@ public class IpAddressManagerImpl extends ManagerBase implements IpAddressManage
|
|||
|
||||
Network network = _networksDao.findById(networkId);
|
||||
if (network != null) {
|
||||
_accountMgr.checkAccess(owner, AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(owner, AccessType.UseEntry, false, network);
|
||||
} else {
|
||||
s_logger.debug("Unable to find ip address by id: " + ipId);
|
||||
return null;
|
||||
|
|
@ -1318,7 +1319,8 @@ public class IpAddressManagerImpl extends ManagerBase implements IpAddressManage
|
|||
if (zone.getNetworkType() == NetworkType.Advanced) {
|
||||
if (network.getGuestType() == Network.GuestType.Shared) {
|
||||
assert (isSharedNetworkOfferingWithServices(network.getNetworkOfferingId()));
|
||||
_accountMgr.checkAccess(CallContext.current().getCallingAccount(), AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(CallContext.current().getCallingAccount(), AccessType.UseEntry, false,
|
||||
network);
|
||||
}
|
||||
} else {
|
||||
_accountMgr.checkAccess(caller, null, true, ipToAssoc);
|
||||
|
|
|
|||
|
|
@ -535,7 +535,7 @@ public class NetworkServiceImpl extends ManagerBase implements NetworkService {
|
|||
// if shared network in the advanced zone, then check the caller against the network for 'AccessType.UseNetwork'
|
||||
if (zone.getNetworkType() == NetworkType.Advanced) {
|
||||
if (isSharedNetworkOfferingWithServices(network.getNetworkOfferingId())) {
|
||||
_accountMgr.checkAccess(caller, AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(caller, AccessType.UseEntry, false, network);
|
||||
if (s_logger.isDebugEnabled()) {
|
||||
s_logger.debug("Associate IP address called by the user " + callerUserId + " account " + ipOwner.getId());
|
||||
}
|
||||
|
|
@ -578,7 +578,7 @@ public class NetworkServiceImpl extends ManagerBase implements NetworkService {
|
|||
// if shared network in the advanced zone, then check the caller against the network for 'AccessType.UseNetwork'
|
||||
if (zone.getNetworkType() == NetworkType.Advanced) {
|
||||
if (isSharedNetworkOfferingWithServices(network.getNetworkOfferingId())) {
|
||||
_accountMgr.checkAccess(caller, AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(caller, AccessType.UseEntry, false, network);
|
||||
if (s_logger.isDebugEnabled()) {
|
||||
s_logger.debug("Associate IP address called by the user " + callerUserId + " account " + ipOwner.getId());
|
||||
}
|
||||
|
|
|
|||
|
|
@ -91,6 +91,7 @@ import com.cloud.exception.PermissionDeniedException;
|
|||
import com.cloud.exception.ResourceUnavailableException;
|
||||
import com.cloud.network.IpAddress;
|
||||
import com.cloud.network.IpAddressManager;
|
||||
import com.cloud.network.Network;
|
||||
import com.cloud.network.VpnUserVO;
|
||||
import com.cloud.network.as.AutoScaleManager;
|
||||
import com.cloud.network.dao.AccountGuestVlanMapDao;
|
||||
|
|
@ -490,7 +491,7 @@ public class AccountManagerImpl extends ManagerBase implements AccountManager, M
|
|||
domainId = account != null ? account.getDomainId() : -1;
|
||||
}
|
||||
if (entity.getAccountId() != -1 && domainId != -1 && !(entity instanceof VirtualMachineTemplate) &&
|
||||
!(accessType != null && accessType == AccessType.UseNetwork) && !(entity instanceof AffinityGroup)) {
|
||||
!(entity instanceof Network && accessType != null && accessType == AccessType.UseEntry) && !(entity instanceof AffinityGroup)) {
|
||||
List<ControlledEntity> toBeChecked = domains.get(entity.getDomainId());
|
||||
// for templates, we don't have to do cross domains check
|
||||
if (toBeChecked == null) {
|
||||
|
|
|
|||
|
|
@ -987,7 +987,7 @@ public class UserVmManagerImpl extends ManagerBase implements UserVmManager, Vir
|
|||
}
|
||||
|
||||
// Perform account permission check on network
|
||||
_accountMgr.checkAccess(caller, AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(caller, AccessType.UseEntry, false, network);
|
||||
|
||||
//ensure network belongs in zone
|
||||
if (network.getDataCenterId() != vmInstance.getDataCenterId()) {
|
||||
|
|
@ -1061,7 +1061,7 @@ public class UserVmManagerImpl extends ManagerBase implements UserVmManager, Vir
|
|||
}
|
||||
|
||||
// Perform account permission check on network
|
||||
_accountMgr.checkAccess(caller, AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(caller, AccessType.UseEntry, false, network);
|
||||
|
||||
boolean nicremoved = false;
|
||||
|
||||
|
|
@ -2336,7 +2336,7 @@ public class UserVmManagerImpl extends ManagerBase implements UserVmManager, Vir
|
|||
|
||||
// Perform account permission check
|
||||
if (network.getAclType() == ACLType.Account) {
|
||||
_accountMgr.checkAccess(caller, AccessType.UseNetwork, false, network);
|
||||
_accountMgr.checkAccess(caller, AccessType.UseEntry, false, network);
|
||||
}
|
||||
networkList.add(network);
|
||||
}
|
||||
|
|
|
|||
|
|
@ -114,7 +114,7 @@ public class ApplicationLoadBalancerManagerImpl extends ManagerBase implements A
|
|||
}
|
||||
|
||||
Account caller = CallContext.current().getCallingAccount();
|
||||
_accountMgr.checkAccess(caller, AccessType.UseNetwork, false, guestNtwk);
|
||||
_accountMgr.checkAccess(caller, AccessType.UseEntry, false, guestNtwk);
|
||||
|
||||
Network sourceIpNtwk = _networkModel.getNetwork(sourceIpNetworkId);
|
||||
if (sourceIpNtwk == null) {
|
||||
|
|
|
|||
Loading…
Reference in New Issue