
This updates the default policy file and sample policy file based on the latest policy rules in heat code. Change-Id: I1d9fca846a56ae4893d76053ee1f0b9b6434dbd8
845 lines
30 KiB
YAML
845 lines
30 KiB
YAML
# Decides what is required for the 'is_admin:True' check to succeed.
|
|
#"context_is_admin": "(role:admin and is_admin_project:True) OR (role:admin and system_scope:all)"
|
|
|
|
# Default rule for project admin.
|
|
#"project_admin": "role:admin"
|
|
|
|
# Default rule for deny stack user.
|
|
#"deny_stack_user": "not role:heat_stack_user"
|
|
|
|
# Default rule for deny everybody.
|
|
#"deny_everybody": "!"
|
|
|
|
# Default rule for allow everybody.
|
|
#"allow_everybody": ""
|
|
|
|
# Performs non-lifecycle operations on the stack (Snapshot, Resume,
|
|
# Cancel update, or check stack resources). This is the default for
|
|
# all actions but can be overridden by more specific policies for
|
|
# individual actions.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:action": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:action":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "actions:action":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Create stack snapshot
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:snapshot": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:snapshot":"rule:deny_stack_user" has been deprecated since
|
|
# W in favor of "actions:snapshot":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Suspend a stack.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:suspend": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:suspend":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "actions:suspend":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Resume a suspended stack.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:resume": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:resume":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "actions:resume":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Check stack resources.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:check": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:check":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "actions:check":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Cancel stack operation and roll back.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:cancel_update": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:cancel_update":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "actions:cancel_update":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Cancel stack operation without rolling back.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/actions
|
|
# Intended scope(s): project
|
|
#"actions:cancel_without_rollback": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "actions:cancel_without_rollback":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "actions:cancel_without_rollback":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The actions API now supports system scope and default roles.
|
|
|
|
# Show build information.
|
|
# GET /v1/{tenant_id}/build_info
|
|
# Intended scope(s): project
|
|
#"build_info:build_info": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "build_info:build_info":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "build_info:build_info":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The build API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:ListStacks": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:ListStacks":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:ListStacks":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:CreateStack": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:CreateStack":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:CreateStack":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:DescribeStacks": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:DescribeStacks":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:DescribeStacks":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:DeleteStack": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:DeleteStack":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:DeleteStack":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:UpdateStack": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:UpdateStack":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:UpdateStack":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:CancelUpdateStack": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:CancelUpdateStack":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:CancelUpdateStack":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:DescribeStackEvents": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:DescribeStackEvents":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:DescribeStackEvents":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:ValidateTemplate": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:ValidateTemplate":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:ValidateTemplate":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:GetTemplate": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:GetTemplate":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:GetTemplate":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:EstimateTemplateCost": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:EstimateTemplateCost":"rule:deny_stack_user" has
|
|
# been deprecated since W in favor of
|
|
# "cloudformation:EstimateTemplateCost":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:DescribeStackResource": "(role:reader and project_id:%(project_id)s) or (role:heat_stack_user and project_id:%(project_id)s)"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:DescribeStackResource":"rule:allow_everybody" has
|
|
# been deprecated since W in favor of
|
|
# "cloudformation:DescribeStackResource":"(role:reader and
|
|
# project_id:%(project_id)s) or (role:heat_stack_user and
|
|
# project_id:%(project_id)s)".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:DescribeStackResources": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:DescribeStackResources":"rule:deny_stack_user" has
|
|
# been deprecated since W in favor of
|
|
# "cloudformation:DescribeStackResources":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"cloudformation:ListStackResources": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "cloudformation:ListStackResources":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "cloudformation:ListStackResources":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The cloud formation API now supports system scope and default roles.
|
|
|
|
# List events.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/events
|
|
# Intended scope(s): project
|
|
#"events:index": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "events:index":"rule:deny_stack_user" has been deprecated since W in
|
|
# favor of "events:index":"role:reader and project_id:%(project_id)s".
|
|
# The events API now supports system scope and default roles.
|
|
|
|
# Show event.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/resources/{resource_name}/events/{event_id}
|
|
# Intended scope(s): project
|
|
#"events:show": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "events:show":"rule:deny_stack_user" has been deprecated since W in
|
|
# favor of "events:show":"role:reader and project_id:%(project_id)s".
|
|
# The events API now supports system scope and default roles.
|
|
|
|
# List resources.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/resources
|
|
# Intended scope(s): project
|
|
#"resource:index": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "resource:index":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "resource:index":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The resources API now supports system scope and default roles.
|
|
|
|
# Show resource metadata.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/resources/{resource_name}/metadata
|
|
# Intended scope(s): project
|
|
#"resource:metadata": "(role:reader and project_id:%(project_id)s) or (role:heat_stack_user and project_id:%(project_id)s)"
|
|
|
|
# DEPRECATED
|
|
# "resource:metadata":"rule:allow_everybody" has been deprecated since
|
|
# W in favor of "resource:metadata":"(role:reader and
|
|
# project_id:%(project_id)s) or (role:heat_stack_user and
|
|
# project_id:%(project_id)s)".
|
|
# The resources API now supports system scope and default roles.
|
|
|
|
# Signal resource.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/resources/{resource_name}/signal
|
|
# Intended scope(s): project
|
|
#"resource:signal": "(role:reader and project_id:%(project_id)s) or (role:heat_stack_user and project_id:%(project_id)s)"
|
|
|
|
# DEPRECATED
|
|
# "resource:signal":"rule:allow_everybody" has been deprecated since W
|
|
# in favor of "resource:signal":"(role:reader and
|
|
# project_id:%(project_id)s) or (role:heat_stack_user and
|
|
# project_id:%(project_id)s)".
|
|
# The resources API now supports system scope and default roles.
|
|
|
|
# Mark resource as unhealthy.
|
|
# PATCH /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/resources/{resource_name_or_physical_id}
|
|
# Intended scope(s): project
|
|
#"resource:mark_unhealthy": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "resource:mark_unhealthy":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "resource:mark_unhealthy":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The resources API now supports system scope and default roles.
|
|
|
|
# Show resource.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/resources/{resource_name}
|
|
# Intended scope(s): project
|
|
#"resource:show": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "resource:show":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "resource:show":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The resources API now supports system scope and default roles.
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Nova::Flavor": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Cinder::EncryptedVolumeType": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Cinder::VolumeType": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Cinder::Quota": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::Quota": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Nova::Quota": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Octavia::Quota": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Manila::ShareType": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::ProviderNet": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::QoSPolicy": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::QoSBandwidthLimitRule": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::QoSDscpMarkingRule": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::QoSMinimumBandwidthRule": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::QoSMinimumPacketRateRule": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Neutron::Segment": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Nova::HostAggregate": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Cinder::QoSSpecs": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Cinder::QoSAssociation": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Keystone::*": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Blazar::Host": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Octavia::Flavor": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"resource_types:OS::Octavia::FlavorProfile": "rule:project_admin"
|
|
|
|
# Intended scope(s): project
|
|
#"service:index": "role:admin and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "service:index":"rule:context_is_admin" has been deprecated since W
|
|
# in favor of "service:index":"role:admin and
|
|
# project_id:%(project_id)s".
|
|
# The service API now supports system scope and default roles.
|
|
|
|
# List configs globally.
|
|
# GET /v1/{tenant_id}/software_configs
|
|
#"software_configs:global_index": "rule:deny_everybody"
|
|
|
|
# List configs.
|
|
# GET /v1/{tenant_id}/software_configs
|
|
# Intended scope(s): project
|
|
#"software_configs:index": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_configs:index":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "software_configs:index":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The software configuration API now support system scope and default
|
|
# roles.
|
|
|
|
# Create config.
|
|
# POST /v1/{tenant_id}/software_configs
|
|
# Intended scope(s): project
|
|
#"software_configs:create": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_configs:create":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "software_configs:create":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The software configuration API now support system scope and default
|
|
# roles.
|
|
|
|
# Show config details.
|
|
# GET /v1/{tenant_id}/software_configs/{config_id}
|
|
# Intended scope(s): project
|
|
#"software_configs:show": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_configs:show":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "software_configs:show":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The software configuration API now support system scope and default
|
|
# roles.
|
|
|
|
# Delete config.
|
|
# DELETE /v1/{tenant_id}/software_configs/{config_id}
|
|
# Intended scope(s): project
|
|
#"software_configs:delete": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_configs:delete":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "software_configs:delete":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The software configuration API now support system scope and default
|
|
# roles.
|
|
|
|
# List deployments.
|
|
# GET /v1/{tenant_id}/software_deployments
|
|
# Intended scope(s): project
|
|
#"software_deployments:index": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_deployments:index":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "software_deployments:index":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The software deployment API now supports system scope and default
|
|
# roles.
|
|
|
|
# Create deployment.
|
|
# POST /v1/{tenant_id}/software_deployments
|
|
# Intended scope(s): project
|
|
#"software_deployments:create": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_deployments:create":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "software_deployments:create":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The software deployment API now supports system scope and default
|
|
# roles.
|
|
|
|
# Show deployment details.
|
|
# GET /v1/{tenant_id}/software_deployments/{deployment_id}
|
|
# Intended scope(s): project
|
|
#"software_deployments:show": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_deployments:show":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "software_deployments:show":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The software deployment API now supports system scope and default
|
|
# roles.
|
|
|
|
# Update deployment.
|
|
# PUT /v1/{tenant_id}/software_deployments/{deployment_id}
|
|
# Intended scope(s): project
|
|
#"software_deployments:update": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_deployments:update":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "software_deployments:update":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The software deployment API now supports system scope and default
|
|
# roles.
|
|
|
|
# Delete deployment.
|
|
# DELETE /v1/{tenant_id}/software_deployments/{deployment_id}
|
|
# Intended scope(s): project
|
|
#"software_deployments:delete": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "software_deployments:delete":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "software_deployments:delete":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The software deployment API now supports system scope and default
|
|
# roles.
|
|
|
|
# Show server configuration metadata.
|
|
# GET /v1/{tenant_id}/software_deployments/metadata/{server_id}
|
|
# Intended scope(s): project
|
|
#"software_deployments:metadata": "(role:reader and project_id:%(project_id)s) or (role:heat_stack_user and project_id:%(project_id)s)"
|
|
|
|
# Abandon stack.
|
|
# DELETE /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/abandon
|
|
# Intended scope(s): project
|
|
#"stacks:abandon": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:abandon":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:abandon":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Create stack.
|
|
# POST /v1/{tenant_id}/stacks
|
|
# Intended scope(s): project
|
|
#"stacks:create": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:create":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:create":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Delete stack.
|
|
# DELETE /v1/{tenant_id}/stacks/{stack_name}/{stack_id}
|
|
# Intended scope(s): project
|
|
#"stacks:delete": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:delete":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:delete":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List stacks in detail.
|
|
# GET /v1/{tenant_id}/stacks
|
|
# Intended scope(s): project
|
|
#"stacks:detail": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:detail":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:detail":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Export stack.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/export
|
|
# Intended scope(s): project
|
|
#"stacks:export": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:export":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:export":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Generate stack template.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/template
|
|
# Intended scope(s): project
|
|
#"stacks:generate_template": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:generate_template":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "stacks:generate_template":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List stacks globally.
|
|
# GET /v1/{tenant_id}/stacks
|
|
#"stacks:global_index": "rule:deny_everybody"
|
|
|
|
# List stacks.
|
|
# GET /v1/{tenant_id}/stacks
|
|
# Intended scope(s): project
|
|
#"stacks:index": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:index":"rule:deny_stack_user" has been deprecated since W in
|
|
# favor of "stacks:index":"role:reader and project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List resource types.
|
|
# GET /v1/{tenant_id}/resource_types
|
|
# Intended scope(s): project
|
|
#"stacks:list_resource_types": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:list_resource_types":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "stacks:list_resource_types":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List template versions.
|
|
# GET /v1/{tenant_id}/template_versions
|
|
# Intended scope(s): project
|
|
#"stacks:list_template_versions": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:list_template_versions":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "stacks:list_template_versions":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List template functions.
|
|
# GET /v1/{tenant_id}/template_versions/{template_version}/functions
|
|
# Intended scope(s): project
|
|
#"stacks:list_template_functions": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:list_template_functions":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "stacks:list_template_functions":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Find stack.
|
|
# GET /v1/{tenant_id}/stacks/{stack_identity}
|
|
# Intended scope(s): project
|
|
#"stacks:lookup": "(role:reader and project_id:%(project_id)s) or (role:heat_stack_user and project_id:%(project_id)s)"
|
|
|
|
# DEPRECATED
|
|
# "stacks:lookup":"rule:allow_everybody" has been deprecated since W
|
|
# in favor of "stacks:lookup":"(role:reader and
|
|
# project_id:%(project_id)s) or (role:heat_stack_user and
|
|
# project_id:%(project_id)s)".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Preview stack.
|
|
# POST /v1/{tenant_id}/stacks/preview
|
|
# Intended scope(s): project
|
|
#"stacks:preview": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:preview":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:preview":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Show resource type schema.
|
|
# GET /v1/{tenant_id}/resource_types/{type_name}
|
|
# Intended scope(s): project
|
|
#"stacks:resource_schema": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:resource_schema":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:resource_schema":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Show stack.
|
|
# GET /v1/{tenant_id}/stacks/{stack_identity}
|
|
# Intended scope(s): project
|
|
#"stacks:show": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:show":"rule:deny_stack_user" has been deprecated since W in
|
|
# favor of "stacks:show":"role:reader and project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Get stack template.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/template
|
|
# Intended scope(s): project
|
|
#"stacks:template": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:template":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:template":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Get stack environment.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/environment
|
|
# Intended scope(s): project
|
|
#"stacks:environment": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:environment":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:environment":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Get stack files.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/files
|
|
# Intended scope(s): project
|
|
#"stacks:files": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:files":"rule:deny_stack_user" has been deprecated since W in
|
|
# favor of "stacks:files":"role:reader and project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Update stack.
|
|
# PUT /v1/{tenant_id}/stacks/{stack_name}/{stack_id}
|
|
# Intended scope(s): project
|
|
#"stacks:update": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:update":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:update":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Update stack (PATCH).
|
|
# PATCH /v1/{tenant_id}/stacks/{stack_name}/{stack_id}
|
|
# Intended scope(s): project
|
|
#"stacks:update_patch": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:update_patch":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:update_patch":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Update stack (PATCH) with no changes.
|
|
# PATCH /v1/{tenant_id}/stacks/{stack_name}/{stack_id}
|
|
# Intended scope(s): project
|
|
#"stacks:update_no_change": "rule:stacks:update_patch"
|
|
|
|
# Preview update stack.
|
|
# PUT /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/preview
|
|
# Intended scope(s): project
|
|
#"stacks:preview_update": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:preview_update":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:preview_update":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Preview update stack (PATCH).
|
|
# PATCH /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/preview
|
|
# Intended scope(s): project
|
|
#"stacks:preview_update_patch": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:preview_update_patch":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "stacks:preview_update_patch":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Validate template.
|
|
# POST /v1/{tenant_id}/validate
|
|
# Intended scope(s): project
|
|
#"stacks:validate_template": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:validate_template":"rule:deny_stack_user" has been
|
|
# deprecated since W in favor of
|
|
# "stacks:validate_template":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Snapshot Stack.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/snapshots
|
|
# Intended scope(s): project
|
|
#"stacks:snapshot": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:snapshot":"rule:deny_stack_user" has been deprecated since W
|
|
# in favor of "stacks:snapshot":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Show snapshot.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/snapshots/{snapshot_id}
|
|
# Intended scope(s): project
|
|
#"stacks:show_snapshot": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:show_snapshot":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:show_snapshot":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Delete snapshot.
|
|
# DELETE /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/snapshots/{snapshot_id}
|
|
# Intended scope(s): project
|
|
#"stacks:delete_snapshot": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:delete_snapshot":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:delete_snapshot":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List snapshots.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/snapshots
|
|
# Intended scope(s): project
|
|
#"stacks:list_snapshots": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:list_snapshots":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:list_snapshots":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Restore snapshot.
|
|
# POST /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/snapshots/{snapshot_id}/restore
|
|
# Intended scope(s): project
|
|
#"stacks:restore_snapshot": "role:member and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:restore_snapshot":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:restore_snapshot":"role:member and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# List outputs.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/outputs
|
|
# Intended scope(s): project
|
|
#"stacks:list_outputs": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:list_outputs":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:list_outputs":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|
|
# Show outputs.
|
|
# GET /v1/{tenant_id}/stacks/{stack_name}/{stack_id}/outputs/{output_key}
|
|
# Intended scope(s): project
|
|
#"stacks:show_output": "role:reader and project_id:%(project_id)s"
|
|
|
|
# DEPRECATED
|
|
# "stacks:show_output":"rule:deny_stack_user" has been deprecated
|
|
# since W in favor of "stacks:show_output":"role:reader and
|
|
# project_id:%(project_id)s".
|
|
# The stack API now supports system scope and default roles.
|
|
|