heat/heat/tests/policy
Steven Hardy d414b46c59 Add check_is_admin to common.policy.Enforcer
Currently we have no concept of admin-ness inside Heat, so it's
not possible for deployers to specify a hierarchy within a project
such that some users have more privileged access than others.

The first step is to provide a means to specify in the policy a
rule which describes who is admin, then we can correctly set
is_admin in the context based on that rule.

blueprint: request-scoping-policy

Change-Id: Idd1fb5f4e52bda87c70830d66e0c931bfe879347
2013-11-27 22:30:59 +00:00
..
check_admin.json Add check_is_admin to common.policy.Enforcer 2013-11-27 22:30:59 +00:00
deny_stack_user.json heat api : Add policy.json authorization to cloudwatch API 2013-02-07 10:22:14 +00:00
notallowed.json Add initial code to support policy.json implementation 2013-02-05 19:38:49 +00:00