# Copyright 2016 Cloudbase Solutions Srl # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. from oslo_policy import policy from nova.policies import base POLICY_ROOT = 'os_compute_api:os-volumes-attachments:%s' volumes_attachments_policies = [ policy.DocumentedRuleDefault( name=POLICY_ROOT % 'index', check_str=base.PROJECT_READER, description="List volume attachments for an instance", operations=[ {'method': 'GET', 'path': '/servers/{server_id}/os-volume_attachments' } ], scope_types=['project']), policy.DocumentedRuleDefault( name=POLICY_ROOT % 'create', check_str=base.PROJECT_MEMBER, description="Attach a volume to an instance", operations=[ { 'method': 'POST', 'path': '/servers/{server_id}/os-volume_attachments' } ], scope_types=['project']), policy.DocumentedRuleDefault( name=POLICY_ROOT % 'show', check_str=base.PROJECT_READER, description="Show details of a volume attachment", operations=[ { 'method': 'GET', 'path': '/servers/{server_id}/os-volume_attachments/{volume_id}' } ], scope_types=['project']), policy.DocumentedRuleDefault( name=POLICY_ROOT % 'update', check_str=base.PROJECT_MEMBER, description="""Update a volume attachment. New 'update' policy about 'swap + update' request (which is possible only >2.85) only is checked. We expect to be always superset of this policy permission. """, operations=[ { 'method': 'PUT', 'path': '/servers/{server_id}/os-volume_attachments/{volume_id}' } ], scope_types=['project']), policy.DocumentedRuleDefault( name=POLICY_ROOT % 'swap', # TODO(gmann): This is internal API policy and supposed to be called # only by cinder. Add 'service' role in this policy so that cinder # can call it with user having 'service' role (not having server's # project_id). That is for phase-2 of RBAC goal and until then, # we keep it open for all admin in any project. We cannot default it to # PROJECT_ADMIN which has the project_id in check_str and will fail # if cinder call it with other project_id. check_str=base.ADMIN, description="Update a volume attachment with a different volumeId", operations=[ { 'method': 'PUT', 'path': '/servers/{server_id}/os-volume_attachments/{volume_id}' } ], scope_types=['project']), policy.DocumentedRuleDefault( name=POLICY_ROOT % 'delete', check_str=base.PROJECT_MEMBER, description="Detach a volume from an instance", operations=[ { 'method': 'DELETE', 'path': '/servers/{server_id}/os-volume_attachments/{volume_id}' } ], scope_types=['project']), ] def list_rules(): return volumes_attachments_policies