diff options
author | Sean Pryor <spryor@redhat.com> | 2017-06-05 15:35:25 -0400 |
---|---|---|
committer | Sean Pryor <spryor@redhat.com> | 2017-06-05 15:35:25 -0400 |
commit | ab91ff350034a186fe7f1400c2ffece96efaeacf (patch) | |
tree | bb078096a7fd7f78b76028e2d037034a0e88780d /etc/glance | |
parent | 8da390dc08f48fbfaf3d35c0576d65b5085a0b8c (diff) | |
download | openstack-access-policy-ab91ff350034a186fe7f1400c2ffece96efaeacf.tar.gz openstack-access-policy-ab91ff350034a186fe7f1400c2ffece96efaeacf.tar.xz openstack-access-policy-ab91ff350034a186fe7f1400c2ffece96efaeacf.zip |
Created branch 'original' with unmodified policies
Change-Id: Ia0b0ae2786caabf70b16020bfdfe26c4b02fa0ea
Diffstat (limited to 'etc/glance')
-rw-r--r-- | etc/glance/policy.json | 53 |
1 files changed, 26 insertions, 27 deletions
diff --git a/etc/glance/policy.json b/etc/glance/policy.json index 7913cf1..0a058c1 100644 --- a/etc/glance/policy.json +++ b/etc/glance/policy.json @@ -1,62 +1,61 @@ { - "deny_readonly": "not role:readonly", - "context_is_admin": "role:admin and rule:deny_readonly", + "context_is_admin": "role:admin", "default": "role:admin", - "add_image": "rule:deny_readonly", - "delete_image": "rule:deny_readonly", + "add_image": "", + "delete_image": "", "get_image": "", "get_images": "", - "modify_image": "rule:deny_readonly", + "modify_image": "", "publicize_image": "role:admin", - "copy_from": "rule:deny_readonly", + "copy_from": "", - "download_image": "rule:deny_readonly", - "upload_image": "rule:deny_readonly", + "download_image": "", + "upload_image": "", - "delete_image_location": "rule:deny_readonly", + "delete_image_location": "", "get_image_location": "", - "set_image_location": "rule:deny_readonly", + "set_image_location": "", - "add_member": "rule:deny_readonly", - "delete_member": "rule:deny_readonly", + "add_member": "", + "delete_member": "", "get_member": "", "get_members": "", - "modify_member": "rule:deny_readonly", + "modify_member": "", "manage_image_cache": "role:admin", "get_task": "role:admin", "get_tasks": "role:admin", - "add_task": "role:admin and rule:deny_readonly", - "modify_task": "role:admin and rule:deny_readonly", + "add_task": "role:admin", + "modify_task": "role:admin", - "deactivate": "rule:deny_readonly", - "reactivate": "rule:deny_readonly", + "deactivate": "", + "reactivate": "", "get_metadef_namespace": "", "get_metadef_namespaces":"", - "modify_metadef_namespace":"rule:deny_readonly", - "add_metadef_namespace":"rule:deny_readonly", + "modify_metadef_namespace":"", + "add_metadef_namespace":"", "get_metadef_object":"", "get_metadef_objects":"", - "modify_metadef_object":"rule:deny_readonly", - "add_metadef_object":"rule:deny_readonly", + "modify_metadef_object":"", + "add_metadef_object":"", "list_metadef_resource_types":"", "get_metadef_resource_type":"", - "add_metadef_resource_type_association":"rule:deny_readonly", + "add_metadef_resource_type_association":"", "get_metadef_property":"", "get_metadef_properties":"", - "modify_metadef_property":"rule:deny_readonly", - "add_metadef_property":"rule:deny_readonly", + "modify_metadef_property":"", + "add_metadef_property":"", "get_metadef_tag":"", "get_metadef_tags":"", - "modify_metadef_tag":"rule:deny_readonly", - "add_metadef_tag":"rule:deny_readonly", - "add_metadef_tags":"rule:deny_readonly" + "modify_metadef_tag":"", + "add_metadef_tag":"", + "add_metadef_tags":"" } |