Document keystone role element in container ACL
The use of a keystone role name in container ACLs is supported
and tested. This patch adds documentation.
[1] fb3d01a974/swift/common/middleware/keystoneauth.py (L491-L497)
[2] test.unit.common.middleware.test_keystoneauth.TestAuthorize.test_authorize_succeeds_for_user_role_in_roles
Change-Id: I77df27393a10f1d8c5a43161fdd4eb08be632566
Closes-Bug: #1705300
This commit is contained in:
parent
bf09a06708
commit
a959d24bf5
@ -131,6 +131,12 @@ Element Description
|
||||
does not require a token. In addition,
|
||||
``.r:*`` does not grant access to the
|
||||
container listing.
|
||||
``<role_name>`` A user with the specified role *name* on the
|
||||
project within which the container is stored is
|
||||
granted access. A user token scoped to the
|
||||
project must be included in the request. Access
|
||||
to the container is also granted when used in
|
||||
``X-Container-Read``.
|
||||
============================== ================================================
|
||||
|
||||
.. note::
|
||||
@ -211,6 +217,18 @@ project must be included in the request::
|
||||
--write-acl "77b8f82565f14814bece56e50c4c240f:*"
|
||||
|
||||
|
||||
Example: Sharing a Container with Users having a specified Role
|
||||
---------------------------------------------------------------
|
||||
|
||||
The following allows any user that has been assigned the
|
||||
``my_read_access_role`` on the project within which the ``www`` container is
|
||||
stored to download objects or to list the contents of the ``www`` container. A
|
||||
user token scoped to the project must be included in the download or list
|
||||
request::
|
||||
|
||||
swift post www --read-acl "my_read_access_role"
|
||||
|
||||
|
||||
Example: Allowing a Referrer Domain to Download Objects
|
||||
-------------------------------------------------------
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user