Uploaded image for project: 'Red Hat Advanced Cluster Management'
  1. Red Hat Advanced Cluster Management
  2. ACM-6866

Add authorization to the compliance event API endpoints

XMLWordPrintable

    • 3
    • False
    • None
    • False
    • ACM-2047 - ACM Store Compliance History
    • GRC Sprint 2023-23, GRC Sprint 2024-01, GRC Sprint 2024-02, GRC Sprint 2024-05
    • No

      Value Statement

      As a policy user, I need to ensure that the compliance history can only be written by authorized service accounts and viewed by users with appropriate ACM access.

      Definition of Done for Engineering Story Owner (Checklist)

      • The read API endpoint is restricted based on a user's "get" access to corresponding ManagedCluster objects. This result will filter the requests returned in the SQL queries.
      • The write API endpoint must require the service account to have "patch" access to the "status" subresource of a policy in the corresponding managed cluster namespace.

      See the design for more information.

      Development Complete

      • The code is complete.
      • Functionality is working.
      • Any required downstream Docker file changes are made.

      Tests Automated

      • [ ] Unit/function tests have been automated and incorporated into the
        build.
      • [ ] 100% automated unit/function test coverage for new or changed APIs.

      Secure Design

      • [ ] Security has been assessed and incorporated into your threat model.

      Multidisciplinary Teams Readiness

      Support Readiness

      • [ ] The must-gather script has been updated.

              yikim@redhat.com Yi Rae Kim
              mprahl Matthew Prahl
              Derek Ho Derek Ho
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: