diff options
author | Vincent Cojot <vcojot@redhat.com> | 2017-04-19 01:46:12 +0530 |
---|---|---|
committer | Vincent Cojot <vcojot@redhat.com> | 2017-04-19 01:46:12 +0530 |
commit | 17adfb65b6c823b3c1d7faa751e4799d35bd734c (patch) | |
tree | adcf809269795661fcfabb91f1cffcd872af66ca /README.md | |
parent | 63eb72dd41fd1fe89f75111b1b9359eed46d941b (diff) | |
download | openstack-access-policy-17adfb65b6c823b3c1d7faa751e4799d35bd734c.tar.gz openstack-access-policy-17adfb65b6c823b3c1d7faa751e4799d35bd734c.tar.xz openstack-access-policy-17adfb65b6c823b3c1d7faa751e4799d35bd734c.zip |
Update README.md
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -18,14 +18,14 @@ Here is how it works: On the undercloud, as the 'stack' user perform the following steps: -1) source stackrc -2) git clone https://gitlab.cee.redhat.com/vcojot/OSP-Readonly-Policies/tree/master -3) ./policydir/files/push_readonly_policies_to_overcloud.sh + 1) source stackrc + 2) git clone https://gitlab.cee.redhat.com/vcojot/OSP-Readonly-Policies/tree/master + 3) ./policydir/files/push_readonly_policies_to_overcloud.sh (this will auto-detect the controllers and push the appropriate policies) To restrict a user, then simply do add the 'readonly' role to the user, do a: -openstack role add --project <tenant_name> --user <user_name> readonly + openstack role add --project <tenant_name> --user <user_name> readonly To lift the restrictions and re-enable modifications to the overcloud, do a: -'''openstack role remove --project <tenant_name> --user <user_name> readonly''' + openstack role remove --project <tenant_name> --user <user_name> readonly |