Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Visibility makes apiView permission obsolete #2492

Open
BastianGem opened this issue Mar 21, 2023 · 0 comments
Open

Visibility makes apiView permission obsolete #2492

BastianGem opened this issue Mar 21, 2023 · 0 comments

Comments

@BastianGem
Copy link
Contributor

Apiman Version

3.0

Apiman Manager Distro

Tomcat

Apiman Gateway Distro

Vert.x

Java Version

openjdk 11.0.17 2022-10-18
OpenJDK Runtime Environment Temurin-11.0.17+8 (build 11.0.17+8)
OpenJDK 64-Bit Server VM Temurin-11.0.17+8 (build 11.0.17+8, mixed mode, sharing)

Operating System

Ubuntu 22.04.1 LTS

Are you running Apiman in a container, or on an orchestration platform?

Kubernetes

Describe the bug

With the introduction of the visibility feature in the API Management, we made the permission apiView in an organization obsolete.

Since the default visibility is 'ORG_MEMBERS', every member of the organization sees every API even if the user does not have the explicit permission to view the APIs.

Expected behaviour

Possible solution:
The default visibility should respect the explicit permission system.
A organization member should only see the APIs if he has explicit permission to do so (apiView) or the visibility is set less restrictive than ORG_MEMBERS

Actual behaviour

A member of an organization sees every API even if the user does not have the explicit permission to view the APIs.

How to Reproduce

  1. Create Org
  2. create API (visibility ORG_MEMBER)
  3. Invite a new member without apiView permission

Relevant log output

No response

Anything else?

No response

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant