glance/etc
Eoghan Glynn cc938e25f3 Use RBAC policy to determine if context is admin.
Fixes bug 1152716

If the context roles do not match the configured admin_role,
fall back to determining if admin via the "context_is_admin"
RBAC policy rule (for consistency with the approach used by
the other projects).

Note this requires that the "context_is_admin" rule *must*
be set in the policy.json if the out-of-the-box default rule
is used (as this default is so open, the net effect of omitting
the "context_is_admin" rule is for every request to acquire
admin status).

Change-Id: Ide2cf604b48f24bd759ce2d65091ff546cd9d22e
2013-05-02 16:40:24 +01:00
..
glance-api-paste.ini Compress response's content according to client's accepted encoding 2013-04-30 19:31:57 +02:00
glance-api.conf Document db_auto_create in default config files 2013-02-22 11:25:30 +00:00
glance-cache.conf Update glance config files with log defaults 2013-01-21 16:58:33 +00:00
glance-registry-paste.ini Use auth_token middleware from python-keystoneclient. 2012-11-28 10:30:50 +08:00
glance-registry.conf Document db_auto_create in default config files 2013-02-22 11:25:30 +00:00
glance-scrubber.conf Merge "Encrypt scrubber marker files" 2013-02-12 05:22:08 +00:00
logging.cnf.sample First round of logging functionality: 2011-02-01 13:18:40 -05:00
policy.json Use RBAC policy to determine if context is admin. 2013-05-02 16:40:24 +01:00
schema-image.json Removed controversial common image property 'os_libosinfo_shortid' 2013-02-26 20:55:58 +00:00