mirror of
https://github.com/netbox-community/netbox.git
synced 2026-01-11 21:10:29 +01:00
Allow exclude object permission in 2.9 #3942
Closed
opened 2025-12-29 18:32:11 +01:00 by adam
·
11 comments
No Branch/Tag Specified
main
update-changelog-comments-docs
feature-removal-issue-type
20911-dropdown
20239-plugin-menu-classes-mutable-state
21097-graphql-id-lookups
feature
fix_module_substitution
20923-dcim-templates
20044-elevation-stuck-lightmode
feature-ip-prefix-link
v4.5-beta1-release
20068-import-moduletype-attrs
20766-fix-german-translation-code-literals
20378-del-script
7604-filter-modifiers-v3
circuit-swap
12318-case-insensitive-uniqueness
20637-improve-device-q-filter
20660-script-load
19724-graphql
20614-update-ruff
14884-script
02496-max-page
19720-macaddress-interface-generic-relation
19408-circuit-terminations-export-templates
20203-openapi-check
fix-19669-api-image-download
7604-filter-modifiers
19275-fixes-interface-bulk-edit
fix-17794-get_field_value_return_list
11507-show-aggregate-and-rir-on-api
9583-add_column_specific_search_field_to_tables
v4.5.0
v4.4.10
v4.4.9
v4.5.0-beta1
v4.4.8
v4.4.7
v4.4.6
v4.4.5
v4.4.4
v4.4.3
v4.4.2
v4.4.1
v4.4.0
v4.3.7
v4.4.0-beta1
v4.3.6
v4.3.5
v4.3.4
v4.3.3
v4.3.2
v4.3.1
v4.3.0
v4.2.9
v4.3.0-beta2
v4.2.8
v4.3.0-beta1
v4.2.7
v4.2.6
v4.2.5
v4.2.4
v4.2.3
v4.2.2
v4.2.1
v4.2.0
v4.1.11
v4.1.10
v4.1.9
v4.1.8
v4.2-beta1
v4.1.7
v4.1.6
v4.1.5
v4.1.4
v4.1.3
v4.1.2
v4.1.1
v4.1.0
v4.0.11
v4.0.10
v4.0.9
v4.1-beta1
v4.0.8
v4.0.7
v4.0.6
v4.0.5
v4.0.3
v4.0.2
v4.0.1
v4.0.0
v3.7.8
v3.7.7
v4.0-beta2
v3.7.6
v3.7.5
v4.0-beta1
v3.7.4
v3.7.3
v3.7.2
v3.7.1
v3.7.0
v3.6.9
v3.6.8
v3.6.7
v3.7-beta1
v3.6.6
v3.6.5
v3.6.4
v3.6.3
v3.6.2
v3.6.1
v3.6.0
v3.5.9
v3.6-beta2
v3.5.8
v3.6-beta1
v3.5.7
v3.5.6
v3.5.5
v3.5.4
v3.5.3
v3.5.2
v3.5.1
v3.5.0
v3.4.10
v3.4.9
v3.5-beta2
v3.4.8
v3.5-beta1
v3.4.7
v3.4.6
v3.4.5
v3.4.4
v3.4.3
v3.4.2
v3.4.1
v3.4.0
v3.3.10
v3.3.9
v3.4-beta1
v3.3.8
v3.3.7
v3.3.6
v3.3.5
v3.3.4
v3.3.3
v3.3.2
v3.3.1
v3.3.0
v3.2.9
v3.2.8
v3.3-beta2
v3.2.7
v3.3-beta1
v3.2.6
v3.2.5
v3.2.4
v3.2.3
v3.2.2
v3.2.1
v3.2.0
v3.1.11
v3.1.10
v3.2-beta2
v3.1.9
v3.2-beta1
v3.1.8
v3.1.7
v3.1.6
v3.1.5
v3.1.4
v3.1.3
v3.1.2
v3.1.1
v3.1.0
v3.0.12
v3.0.11
v3.0.10
v3.1-beta1
v3.0.9
v3.0.8
v3.0.7
v3.0.6
v3.0.5
v3.0.4
v3.0.3
v3.0.2
v3.0.1
v3.0.0
v2.11.12
v3.0-beta2
v2.11.11
v2.11.10
v3.0-beta1
v2.11.9
v2.11.8
v2.11.7
v2.11.6
v2.11.5
v2.11.4
v2.11.3
v2.11.2
v2.11.1
v2.11.0
v2.10.10
v2.10.9
v2.11-beta1
v2.10.8
v2.10.7
v2.10.6
v2.10.5
v2.10.4
v2.10.3
v2.10.2
v2.10.1
v2.10.0
v2.9.11
v2.10-beta2
v2.9.10
v2.10-beta1
v2.9.9
v2.9.8
v2.9.7
v2.9.6
v2.9.5
v2.9.4
v2.9.3
v2.9.2
v2.9.1
v2.9.0
v2.9-beta2
v2.8.9
v2.9-beta1
v2.8.8
v2.8.7
v2.8.6
v2.8.5
v2.8.4
v2.8.3
v2.8.2
v2.8.1
v2.8.0
v2.7.12
v2.7.11
v2.7.10
v2.7.9
v2.7.8
v2.7.7
v2.7.6
v2.7.5
v2.7.4
v2.7.3
v2.7.2
v2.7.1
v2.7.0
v2.6.12
v2.6.11
v2.6.10
v2.6.9
v2.7-beta1
Solcon-2020-01-06
v2.6.8
v2.6.7
v2.6.6
v2.6.5
v2.6.4
v2.6.3
v2.6.2
v2.6.1
v2.6.0
v2.5.13
v2.5.12
v2.6-beta1
v2.5.11
v2.5.10
v2.5.9
v2.5.8
v2.5.7
v2.5.6
v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5.0
v2.4.9
v2.5-beta2
v2.4.8
v2.5-beta1
v2.4.7
v2.4.6
v2.4.5
v2.4.4
v2.4.3
v2.4.2
v2.4.1
v2.4.0
v2.3.7
v2.4-beta1
v2.3.6
v2.3.5
v2.3.4
v2.3.3
v2.3.2
v2.3.1
v2.3.0
v2.2.10
v2.3-beta2
v2.2.9
v2.3-beta1
v2.2.8
v2.2.7
v2.2.6
v2.2.5
v2.2.4
v2.2.3
v2.2.2
v2.2.1
v2.2.0
v2.1.6
v2.2-beta2
v2.1.5
v2.2-beta1
v2.1.4
v2.1.3
v2.1.2
v2.1.1
v2.1.0
v2.0.10
v2.1-beta1
v2.0.9
v2.0.8
v2.0.7
v2.0.6
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v2.0-beta3
v1.9.6
v1.9.5
v2.0-beta2
v1.9.4-r1
v1.9.3
v2.0-beta1
v1.9.2
v1.9.1
v1.9.0-r1
v1.8.4
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.7.3
v1.7.2-r1
v1.7.1
v1.7.0
v1.6.3
v1.6.2-r1
v1.6.1-r1
1.6.1
v1.6.0
v1.5.2
v1.5.1
v1.5.0
v1.4.2
v1.4.1
v1.4.0
v1.3.2
v1.3.1
v1.3.0
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.7-r1
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3-r1
v1.0.3
1.0.0
Labels
Clear labels
beta
breaking change
complexity: high
complexity: low
complexity: medium
needs milestone
netbox
pending closure
plugin candidate
pull-request
severity: high
severity: low
severity: medium
status: accepted
status: backlog
status: blocked
status: duplicate
status: needs owner
status: needs triage
status: revisions needed
status: under review
topic: GraphQL
topic: Internationalization
topic: OpenAPI
topic: UI/UX
topic: cabling
topic: event rules
topic: htmx navigation
topic: industrialization
topic: migrations
topic: plugins
topic: scripts
topic: templating
topic: testing
type: bug
type: deprecation
type: documentation
type: feature
type: housekeeping
type: translation
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/netbox#3942
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @a31amit on GitHub (Aug 4, 2020).
Environment
Proposed Functionality
To Allow exclude() method on object permission along with filter()
Use Case
This change would allow us to protect information related to pre-released hardware where group belongs to tenant A can see everything else however very specific users for tenants would also able to see pre-released hardware information added to netbox specially Device Inventory tab.
At present with object permission, users can filter information but cannot use exclude()
Example -
Assume you have 20-40 items in inventory tab such as cpu/ ram/ disk / gpu and so on. if we wanted to exclude only 1 or 2 inventory items, we have to create filters for all to display so remaining items not included in filter() don't show up.
That means users will end up creating filter for each inventory item. but if Django query exclude() support with netbox, than we can just add what to exclude but remaining would show up.
We record some Pre-Released hardware information netbox inventory tab. this is a very important feature where we can allow users to see most of the inventory items but very specific people can query or see pre-released hw info
Database Changes
Not sure
External Dependencies
Should be none as Object Permission is core feature of netbox
@lampwins commented on GitHub (Aug 4, 2020):
@jeremystretch will need to comment on the viability of this. My opinion would be to not do this as it basically equates to access controls based on a blacklist, which can be very dangerous if not properly understood. I would want to push this in the direction of using a
pre-releasetag on inventory items which would require us to support tags there as a separate issue.@lampwins commented on GitHub (Aug 4, 2020):
Clarification, we do actually support tags on inventory items, just not on the creation form, which is really a bug.
@lampwins commented on GitHub (Aug 4, 2020):
And is already fixed in 2.9. I'm new here :)
@a31amit commented on GitHub (Aug 4, 2020):
I am still not sure if without exclude or control based on a blacklist such cases even possible. but I believe blacklist or exclude would be having same impact as filter. when you do blacklist, you know exactly what you blacklisted, with filters it's even more concerned because there would be a lot of permission with filter OR statement which can easily be missed out.
@jeremystretch commented on GitHub (Aug 5, 2020):
You know exactly what you've blacklisted, but not what you've neglected to blacklist. This is @lampwins' point: It's much easier to audit what access has been specifically allowed, as opposed to ensuring everything that shouldn't be allowed has been blocked. A blacklist-based approach fails in an non-secure fashion, as opposed to a whitelist which denies access by default.
That said, I can see a use case for the inversion. It could be as simple as implementing an "invert" checkbox on the ObjectPermission model which, when applied, calls
exclude()with the prescribed constraints rather thaninclude(). We'd just need to make it very clear to the user that the length of rope he or she is being issued is more than enough to hang oneself.@jeremystretch commented on GitHub (Aug 7, 2020):
I've looked into this a bit further, but I'm a little stuck at how we'd efficiently convey the negation of constraints when caching assigned permissions on the user instance. The current approach results in a dictionary similar to the following:
In this example, the user can view VLANs and sites with some constraints, and can view all regions.
I like this arrangement because we can check for the existence of a specific permission as a dictionary key to quickly determine whether the user has that permission on at least some objects (if the user did not, the key would not exist). This is handy for things like disabling navigation menu items.
To support negation for permission constraints, we'll need to come up with an elegant way to convey the inversion when caching permissions, ideally while maintaining the current dictionary-based approach.
@stale[bot] commented on GitHub (Oct 7, 2020):
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. NetBox is governed by a small group of core maintainers which means not all opened issues may receive direct feedback. Please see our contributing guide.
@a31amit commented on GitHub (Oct 7, 2020):
@jeremystretch - Can we Please exclude this from auto-remove stale bot. I still believe this feature would be very useful and wish to get implemented in core. lately noticing that auto stale-bot seems closing many outstanding issues.
@jeremystretch commented on GitHub (Oct 7, 2020):
@a31amit sorry, but it doesn't look like there's been any further interest in it from the community, and the development effort it would demand honestly isn't going to be worthwhile.
Yes; that's its purpose. Issues which don't receive continued interest and for which no one volunteers to implement get closed so that development can remain focused.
@stale[bot] commented on GitHub (Oct 23, 2020):
This issue has been automatically closed due to lack of activity. In an effort to reduce noise, please do not comment any further. Note that the core maintainers may elect to reopen this issue at a later date if deemed necessary.
@hballiance commented on GitHub (Dec 4, 2020):
+1
This would be useful for us. For example I want to restrict access for a group of users. Allow them access to all devices that contain "aaa" in name however exclude ones that also contain "bbb" in name. The following should happen...