keystone/keystone/common/policies/user.py

114 lines
5.5 KiB
Python

# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from oslo_policy import policy
from keystone.common.policies import base
user_policies = [
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'get_user',
check_str=base.RULE_ADMIN_OR_OWNER,
# FIXME(lbragstad): First, a system administrator should be able to get
# a user reference for anyone in the system. Second, a project
# administrator should be able to get references for users within the
# project their token is scoped to or their domain. Third, a user
# should be able to get a reference for themselves. This is going to
# require keystone to be smarter about enforcing policy checks in code,
# specifically for the last two cases. Once that is fixed, we can
# uncomment the following line.
# scope_types=['system', 'project'],
description='Show user details.',
operations=[{'path': '/v3/users/{user_id}',
'method': 'GET'},
{'path': '/v3/users/{user_id}',
'method': 'HEAD'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'list_users',
check_str=base.RULE_ADMIN_REQUIRED,
# FIXME(lbragstad): Since listing users has traditionally always been a
# system-level API call, let's maintain that pattern here. A system
# administrator should be able to list all users in the deployment,
# which is what's supported today. Project and domain administrators
# should also be able to list users, but they should only see users
# within their project or domain. Otherwise it would be possible for
# project and domain administrators to see users unrelated to their
# project or domain, which would be a security issue. Once we have that
# support in place, we should update scope_types to include 'project'.
scope_types=['system'],
description='List users.',
operations=[{'path': '/v3/users',
'method': 'GET'},
{'path': '/v3/users',
'method': 'HEAD'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'list_projects_for_user',
check_str='',
# NOTE(lbragstad): We explicitly omit scope_types from this policy
# because it's meant to be called with an unscoped token, which doesn't
# apply to scope_types or its purpose. So long as the user is in the
# system and has a valid token, they should be able to generate a list
# of projects they have access to.
description=('List all projects a user has access to via role '
'assignments.'),
operations=[{'path': ' /v3/auth/projects',
'method': 'GET'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'list_domains_for_user',
check_str='',
# NOTE(lbragstad): We explicitly omit scope_types from this policy
# because it's meant to be called with an unscoped token, which doesn't
# apply to scope_types or its purpose. So long as the user is in the
# system and has a valid token, they should be able to generate a list
# of domains they have access to.
description=('List all domains a user has access to via role '
'assignments.'),
operations=[{'path': '/v3/auth/domains',
'method': 'GET'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'create_user',
check_str=base.RULE_ADMIN_REQUIRED,
# FIXME(lbragstad): This can be considered either a system-level policy
# or a project-level policy. System administrator should have the
# ability to create users in any domain. Domain (or project)
# administrators should have the ability to create users in the domain
# they administer. The second case is going to require a policy check
# in code. Until that happens, we will leave this as a system-level
# policy.
scope_types=['system'],
description='Create a user.',
operations=[{'path': '/v3/users',
'method': 'POST'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'update_user',
check_str=base.RULE_ADMIN_REQUIRED,
# FIXME(lbragstad): See the above comment about adding support for
# project scope_types in the future.
scope_types=['system'],
description='Update a user, including administrative password resets.',
operations=[{'path': '/v3/users/{user_id}',
'method': 'PATCH'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'delete_user',
check_str=base.RULE_ADMIN_REQUIRED,
# FIXME(lbragstad): See the above comment about adding support for
# project scope_types in the future.
scope_types=['system'],
description='Delete a user.',
operations=[{'path': '/v3/users/{user_id}',
'method': 'DELETE'}])
]
def list_rules():
return user_policies