summaryrefslogtreecommitdiffstats
path: root/etc/glance
diff options
context:
space:
mode:
authorSean Pryor <spryor@redhat.com>2017-06-05 15:35:25 -0400
committerSean Pryor <spryor@redhat.com>2017-06-05 15:35:25 -0400
commitab91ff350034a186fe7f1400c2ffece96efaeacf (patch)
treebb078096a7fd7f78b76028e2d037034a0e88780d /etc/glance
parent8da390dc08f48fbfaf3d35c0576d65b5085a0b8c (diff)
downloadopenstack-access-policy-ab91ff350034a186fe7f1400c2ffece96efaeacf.tar.gz
openstack-access-policy-ab91ff350034a186fe7f1400c2ffece96efaeacf.tar.xz
openstack-access-policy-ab91ff350034a186fe7f1400c2ffece96efaeacf.zip
Created branch 'original' with unmodified policies
Change-Id: Ia0b0ae2786caabf70b16020bfdfe26c4b02fa0ea
Diffstat (limited to 'etc/glance')
-rw-r--r--etc/glance/policy.json53
1 files changed, 26 insertions, 27 deletions
diff --git a/etc/glance/policy.json b/etc/glance/policy.json
index 7913cf1..0a058c1 100644
--- a/etc/glance/policy.json
+++ b/etc/glance/policy.json
@@ -1,62 +1,61 @@
{
- "deny_readonly": "not role:readonly",
- "context_is_admin": "role:admin and rule:deny_readonly",
+ "context_is_admin": "role:admin",
"default": "role:admin",
- "add_image": "rule:deny_readonly",
- "delete_image": "rule:deny_readonly",
+ "add_image": "",
+ "delete_image": "",
"get_image": "",
"get_images": "",
- "modify_image": "rule:deny_readonly",
+ "modify_image": "",
"publicize_image": "role:admin",
- "copy_from": "rule:deny_readonly",
+ "copy_from": "",
- "download_image": "rule:deny_readonly",
- "upload_image": "rule:deny_readonly",
+ "download_image": "",
+ "upload_image": "",
- "delete_image_location": "rule:deny_readonly",
+ "delete_image_location": "",
"get_image_location": "",
- "set_image_location": "rule:deny_readonly",
+ "set_image_location": "",
- "add_member": "rule:deny_readonly",
- "delete_member": "rule:deny_readonly",
+ "add_member": "",
+ "delete_member": "",
"get_member": "",
"get_members": "",
- "modify_member": "rule:deny_readonly",
+ "modify_member": "",
"manage_image_cache": "role:admin",
"get_task": "role:admin",
"get_tasks": "role:admin",
- "add_task": "role:admin and rule:deny_readonly",
- "modify_task": "role:admin and rule:deny_readonly",
+ "add_task": "role:admin",
+ "modify_task": "role:admin",
- "deactivate": "rule:deny_readonly",
- "reactivate": "rule:deny_readonly",
+ "deactivate": "",
+ "reactivate": "",
"get_metadef_namespace": "",
"get_metadef_namespaces":"",
- "modify_metadef_namespace":"rule:deny_readonly",
- "add_metadef_namespace":"rule:deny_readonly",
+ "modify_metadef_namespace":"",
+ "add_metadef_namespace":"",
"get_metadef_object":"",
"get_metadef_objects":"",
- "modify_metadef_object":"rule:deny_readonly",
- "add_metadef_object":"rule:deny_readonly",
+ "modify_metadef_object":"",
+ "add_metadef_object":"",
"list_metadef_resource_types":"",
"get_metadef_resource_type":"",
- "add_metadef_resource_type_association":"rule:deny_readonly",
+ "add_metadef_resource_type_association":"",
"get_metadef_property":"",
"get_metadef_properties":"",
- "modify_metadef_property":"rule:deny_readonly",
- "add_metadef_property":"rule:deny_readonly",
+ "modify_metadef_property":"",
+ "add_metadef_property":"",
"get_metadef_tag":"",
"get_metadef_tags":"",
- "modify_metadef_tag":"rule:deny_readonly",
- "add_metadef_tag":"rule:deny_readonly",
- "add_metadef_tags":"rule:deny_readonly"
+ "modify_metadef_tag":"",
+ "add_metadef_tag":"",
+ "add_metadef_tags":""
}