summaryrefslogtreecommitdiffstats
path: root/etc/zaqar/policy.json
blob: 259625eade844d9198e381ea77be50cf25131159 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
{
    "deny_readonly": "not role:readonly",
    "context_is_admin": "role:admin and rule:deny_readonly",
    "admin_or_owner": "is_admin:True or project_id:%(project_id)s",
    "default": "rule:admin_or_owner",

    "queues:get_all": "",
    "queues:create": "rule:deny_readonly",
    "queues:get": "",
    "queues:delete": "rule:deny_readonly",
    "queues:update": "rule:deny_readonly",
    "queues:stats": "",

    "messages:get_all": "",
    "messages:create": "rule:deny_readonly",
    "messages:get": "",
    "messages:delete": "rule:deny_readonly",
    "messages:delete_all": "rule:deny_readonly",

    "claims:get_all": "",
    "claims:create": "rule:deny_readonly",
    "claims:get": "",
    "claims:delete": "rule:deny_readonly",
    "claims:update": "rule:deny_readonly",

    "subscription:get_all": "",
    "subscription:create": "rule:deny_readonly",
    "subscription:get": "",
    "subscription:delete": "rule:deny_readonly",
    "subscription:update": "rule:deny_readonly",
    "subscription:confirm": "rule:deny_readonly",

    "pools:get_all": "rule:context_is_admin",
    "pools:create": "rule:context_is_admin",
    "pools:get": "rule:context_is_admin",
    "pools:delete": "rule:context_is_admin",
    "pools:update": "rule:context_is_admin",

    "flavors:get_all": "",
    "flavors:create": "rule:context_is_admin",
    "flavors:get": "",
    "flavors:delete": "rule:context_is_admin",
    "flavors:update": "rule:context_is_admin",

    "ping:get": "",
    "health:get": "rule:context_is_admin"
}