Policy Control on Per Resource Type

Registered by Travis Tripp

Summary
=======
Provide the policy control on searches based on each resource type.

Motivation
========
Most services provide the ability to list their resources based on Keystone policy files. We need to provide this ability on a per resource type basis.

Description
=========

Testing
======
Brief instruction for reviewers to exercise the changes, including expected results where non-obvious.

Outside Dependencies
==================
See also "A common policy scenario across all projects" : https://review.openstack.org/#/c/245629/

Requirements Update Required
========================

Blueprint information

Status:
Complete
Approver:
None
Priority:
Essential
Drafter:
Travis Tripp
Direction:
Approved
Assignee:
Steve McLellan
Definition:
Review
Series goal:
Accepted for mitaka
Implementation:
Implemented
Milestone target:
milestone icon mitaka-rc1
Started by
Steve McLellan
Completed by
Travis Tripp

Related branches

Sprints

Whiteboard

After some discussion, it's decided that for mitaka we'll support allowing queries to resource types based on policy; expanding this to translate from policy -> rbac filtering will be for the next cycle.

Currently we have catalog_search, catalog_plugins, catalog_facets as allowed policy options. We'll expand this to allow control over plugins by resource type. The original discussion had us with query_os_glance_image but on reflection it makes more sense to begin with the resource name and add actions afterwards if required:

"query": "",
"facets": "",
"plugins": "",

"os_glance_image_allow": "",
"os_glance_image_query": ""

precedence order for a search query is "query" > "os_glance_image_query" > "os_glance_image_allow". The absence of any policy for a given plugin defaults to allowing access

Gerrit topic: https://review.openstack.org/#q,topic:bp/per-resource-type-policy-control,n,z

Addressed by: https://review.openstack.org/282514
    Spec for per-resource policy control

Addressed by: https://review.openstack.org/283243
    Per resource policy control

(?)

Work Items

This blueprint contains Public information 
Everyone can see this information.

Subscribers

No subscribers.