Merge "docs: Add separate man page for each CLI tool"
This commit is contained in:
commit
de85774686
19
doc/source/cli/common/default-opts.rst
Normal file
19
doc/source/cli/common/default-opts.rst
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
.. option:: -h, --help
|
||||||
|
|
||||||
|
Show help message and exit.
|
||||||
|
|
||||||
|
.. option:: --config-dir DIR
|
||||||
|
|
||||||
|
Path to a config directory to pull ``*.conf`` files from. This file set is
|
||||||
|
sorted, so as to provide a predictable parse order if individual options
|
||||||
|
are overridden. The set is parsed after the file(s) specified via previous
|
||||||
|
``--config-file``, arguments hence overridden options in the directory
|
||||||
|
take precedence.
|
||||||
|
|
||||||
|
This option must be set from the command-line.
|
||||||
|
|
||||||
|
.. option:: --config-file PATH
|
||||||
|
|
||||||
|
Path to a config file to use. Multiple config files can be specified, with
|
||||||
|
values in later files taking precedence. Defaults to None. This option must
|
||||||
|
be set from the command-line.
|
4
doc/source/cli/common/enforcer-opts.rst
Normal file
4
doc/source/cli/common/enforcer-opts.rst
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
.. option:: --namespace NAMESPACE
|
||||||
|
|
||||||
|
Option namespace under "oslo.policy.enforcer" in which to look for a
|
||||||
|
``policy.Enforcer``.
|
3
doc/source/cli/common/generator-opts.rst
Normal file
3
doc/source/cli/common/generator-opts.rst
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
.. option:: --output-file OUTPUT_FILE
|
||||||
|
|
||||||
|
Path of the file to write to. Defaults to stdout.
|
8
doc/source/cli/common/rule-opts.rst
Normal file
8
doc/source/cli/common/rule-opts.rst
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
.. option:: --format FORMAT
|
||||||
|
|
||||||
|
Desired format for the output. Allowed values: ``json``, ``yaml``
|
||||||
|
|
||||||
|
.. option:: --namespace NAMESPACE
|
||||||
|
|
||||||
|
Option namespace(s) under "oslo.policy.policies" in which to query for
|
||||||
|
options.
|
@ -5,189 +5,11 @@ Command Line Interface
|
|||||||
This document describes the various command line tools exposed by
|
This document describes the various command line tools exposed by
|
||||||
``oslo.policy`` to manage policies and policy files.
|
``oslo.policy`` to manage policies and policy files.
|
||||||
|
|
||||||
oslopolicy-checker
|
.. toctree::
|
||||||
==================
|
:maxdepth: 1
|
||||||
|
|
||||||
Run the command line ``oslopolicy-checker`` to check policy against the
|
oslopolicy-checker
|
||||||
OpenStack Identity API access information.
|
oslopolicy-validator
|
||||||
|
oslopolicy-list-redundant
|
||||||
Command-line arguments:
|
oslopolicy-policy-generator
|
||||||
|
oslopolicy-sample-generator
|
||||||
* ``--policy POLICY`` path to policy file.
|
|
||||||
* ``--access ACCESS`` path to access token file.
|
|
||||||
* ``--rule RULE`` (optional) rule to test. If omitted, tests all rules.
|
|
||||||
* ``--is_admin IS_ADMIN`` (optional) set is_admin=True on the credentials.
|
|
||||||
|
|
||||||
Sample access tokens are provided in the ``sample_data`` directory.
|
|
||||||
|
|
||||||
Examples
|
|
||||||
--------
|
|
||||||
|
|
||||||
Test all of Nova's policy with an admin token
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
tox -e venv -- oslopolicy-checker \
|
|
||||||
--policy /opt/stack/nova/etc/nova/policy.json
|
|
||||||
--access sample_data/auth_v3_token_admin.json
|
|
||||||
|
|
||||||
Test the ``compute_extension:flavorextraspecs:index`` rule in Nova's policy
|
|
||||||
with the admin member token and ``is_admin`` set to ``True``
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
tox -e venv -- oslopolicy-checker \
|
|
||||||
--policy /opt/stack/nova/etc/nova/policy.json \
|
|
||||||
--access sample_data/auth_v3_token_admin.json \
|
|
||||||
--is_admin=true --rule compute_extension:flavorextraspecs:index
|
|
||||||
|
|
||||||
Test the ``compute_extension:flavorextraspecs:index`` rule in Nova's policy
|
|
||||||
with the plain member token
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
tox -e venv -- oslopolicy-checker \
|
|
||||||
--policy /opt/stack/nova/etc/nova/policy.json \
|
|
||||||
--access sample_data/auth_v3_token_member.json \
|
|
||||||
--rule compute_extension:flavorextraspecs:index
|
|
||||||
|
|
||||||
oslopolicy-policy-generator
|
|
||||||
===========================
|
|
||||||
|
|
||||||
The ``oslopolicy-policy-generator`` command can be used to generate a policy
|
|
||||||
file that shows the effective policy in use. This is generated by merging the
|
|
||||||
registered defaults and policies loaded from a configuration file.
|
|
||||||
|
|
||||||
Examples
|
|
||||||
--------
|
|
||||||
|
|
||||||
The generate the effective policy file for a namespace called ``keystone``:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-policy-generator --namespace keystone
|
|
||||||
|
|
||||||
To generate the effective policy file in JSON:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-policy-generator --namespace keystone --format json
|
|
||||||
|
|
||||||
To generate the effective policy file and output directly to a file:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-policy-generator \
|
|
||||||
--namespace keystone \
|
|
||||||
--format yaml \
|
|
||||||
--output-file keystone-policy.yaml
|
|
||||||
|
|
||||||
To show the additional options and arguments supported by
|
|
||||||
``oslopolicy-policy-generator``:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-policy-generator --help
|
|
||||||
|
|
||||||
oslopolicy-sample-generator
|
|
||||||
===========================
|
|
||||||
|
|
||||||
The ``oslopolicy-sample-generator`` command can be used to generate a sample
|
|
||||||
policy file based on the default policies in a given namespace. This tool
|
|
||||||
requires a namespace to query for policies and supports output in JSON or YAML.
|
|
||||||
|
|
||||||
Examples
|
|
||||||
--------
|
|
||||||
|
|
||||||
To generate sample policies for a namespace called ``keystone``:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-sample-generator --namespace keystone
|
|
||||||
|
|
||||||
To generate sample policies in JSON use:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-sample-generator --namespace keystone --format json
|
|
||||||
|
|
||||||
To generate a sample policy file and output directly to a file:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-sample-generator --namespace keystone \
|
|
||||||
--format yaml \
|
|
||||||
--output-file keystone-policy.yaml
|
|
||||||
|
|
||||||
Use the following to generate help text for additional options and arguments
|
|
||||||
supported by ``oslopolicy-sample-generator``:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-sample-generator --help
|
|
||||||
|
|
||||||
oslopolicy-list-redundant
|
|
||||||
=========================
|
|
||||||
|
|
||||||
The ``oslopolicy-list-redundant`` tool is useful for detecting policies that
|
|
||||||
are specified in policy files that are the same as the defaults provided by the
|
|
||||||
service. Operators can use this tool to find policies that they can remove from
|
|
||||||
their policy files, making maintenance easier.
|
|
||||||
|
|
||||||
This tool assumes a policy file containing overrides exists and is specified
|
|
||||||
through configuration.
|
|
||||||
|
|
||||||
Examples
|
|
||||||
--------
|
|
||||||
|
|
||||||
To list redundant default policies:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-list-redundant --namespace keystone --config-dir /etc/keystone
|
|
||||||
|
|
||||||
For more information regarding the options supported by this tool:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-list-redundant --help
|
|
||||||
|
|
||||||
oslopolicy_validator
|
|
||||||
====================
|
|
||||||
|
|
||||||
The ``oslopolicy-validator`` tool can be used to perform basic sanity checks
|
|
||||||
against a policy file. It will detect the following problems:
|
|
||||||
|
|
||||||
* A missing policy file
|
|
||||||
* Rules which have invalid syntax
|
|
||||||
* Rules which reference non-existent other rules
|
|
||||||
* Rules which form a cyclical reference with another rule
|
|
||||||
* Rules which do not exist in the specified namespace
|
|
||||||
|
|
||||||
This tool does very little validation of the content of the rules. Other tools,
|
|
||||||
such as ``oslopolicy-checker``, should be used to check that rules do what is
|
|
||||||
intended.
|
|
||||||
|
|
||||||
``oslopolicy-validator`` exits with a ``0`` return code on success and ``1`` on
|
|
||||||
failure.
|
|
||||||
|
|
||||||
.. note:: At this time the policy validator can only handle single policy
|
|
||||||
files, not policy dirs.
|
|
||||||
|
|
||||||
Examples
|
|
||||||
--------
|
|
||||||
|
|
||||||
Validate the policy file used for Keystone:
|
|
||||||
|
|
||||||
.. code-block:: bash
|
|
||||||
|
|
||||||
oslopolicy-validator --config-file /etc/keystone/keystone.conf --namespace keystone
|
|
||||||
|
|
||||||
Sample output from a failed validation::
|
|
||||||
|
|
||||||
$ oslopolicy-validator --config-file keystone.conf --namespace keystone
|
|
||||||
WARNING:oslo_policy.policy:Policies ['foo', 'bar'] are part of a cyclical reference.
|
|
||||||
Invalid rules found
|
|
||||||
Failed to parse rule: (role:admin and system_scope:all) or (role:foo and oken.domain.id:%(target.user.domain_id)s))
|
|
||||||
Unknown rule found in policy file: foo
|
|
||||||
Unknown rule found in policy file: bar
|
|
||||||
|
94
doc/source/cli/oslopolicy-checker.rst
Normal file
94
doc/source/cli/oslopolicy-checker.rst
Normal file
@ -0,0 +1,94 @@
|
|||||||
|
==================
|
||||||
|
oslopolicy-checker
|
||||||
|
==================
|
||||||
|
|
||||||
|
.. program:: oslopolicy-checker
|
||||||
|
|
||||||
|
Synopsis
|
||||||
|
--------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
oslopolicy-checker [-h] [--access ACCESS] [--config-dir DIR]
|
||||||
|
[--config-file PATH]
|
||||||
|
[--enforcer_config ENFORCER_CONFIG] [--is_admin]
|
||||||
|
[--nois_admin] [--policy POLICY] [--rule RULE]
|
||||||
|
[--target TARGET]
|
||||||
|
|
||||||
|
Description
|
||||||
|
-----------
|
||||||
|
|
||||||
|
The ``oslopolicy-policy-generator`` command can be used to check policy against
|
||||||
|
the OpenStack Identity API access information.
|
||||||
|
|
||||||
|
Options
|
||||||
|
-------
|
||||||
|
|
||||||
|
.. include:: common/default-opts.rst
|
||||||
|
|
||||||
|
.. option:: --access ACCESS
|
||||||
|
|
||||||
|
Path to a file containing OpenStack Identity API access info in JSON
|
||||||
|
format.
|
||||||
|
|
||||||
|
.. option:: --enforcer_config ENFORCER_CONFIG
|
||||||
|
|
||||||
|
Configuration file for the oslopolicy-checker enforcer
|
||||||
|
|
||||||
|
.. option:: --is_admin
|
||||||
|
|
||||||
|
Set ``is_admin=True`` on the credentials used for the evaluation.
|
||||||
|
|
||||||
|
.. option:: --nois_admin
|
||||||
|
|
||||||
|
The inverse of ``--is_admin``
|
||||||
|
|
||||||
|
.. option:: --policy POLICY
|
||||||
|
|
||||||
|
Path to a policy file.
|
||||||
|
|
||||||
|
.. option:: --rule RULE
|
||||||
|
|
||||||
|
Rule to test.
|
||||||
|
|
||||||
|
.. option:: --target TARGET
|
||||||
|
|
||||||
|
Path to a file containing custom target info in JSON format. This will be
|
||||||
|
used to evaluate the policy with.
|
||||||
|
|
||||||
|
Examples
|
||||||
|
--------
|
||||||
|
|
||||||
|
Test all of Nova's policy with an admin token:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-checker \
|
||||||
|
--policy /opt/stack/nova/etc/nova/policy.json
|
||||||
|
--access sample_data/auth_v3_token_admin.json
|
||||||
|
|
||||||
|
Test the ``compute_extension:flavorextraspecs:index`` rule in Nova's policy
|
||||||
|
with the admin member token and ``is_admin`` set to ``True``:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-checker \
|
||||||
|
--policy /opt/stack/nova/etc/nova/policy.json \
|
||||||
|
--access sample_data/auth_v3_token_admin.json \
|
||||||
|
--is_admin=true --rule compute_extension:flavorextraspecs:index
|
||||||
|
|
||||||
|
Test the ``compute_extension:flavorextraspecs:index`` rule in Nova's policy
|
||||||
|
with the plain member token:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-checker \
|
||||||
|
--policy /opt/stack/nova/etc/nova/policy.json \
|
||||||
|
--access sample_data/auth_v3_token_member.json \
|
||||||
|
--rule compute_extension:flavorextraspecs:index
|
||||||
|
|
||||||
|
See Also
|
||||||
|
--------
|
||||||
|
|
||||||
|
:program:`oslopolicy-sample-generator`, :program:`oslopolicy-policy-generator`,
|
||||||
|
:program:`oslopolicy-list-redundant`, :program:`oslopolicy-validator`
|
52
doc/source/cli/oslopolicy-list-redundant.rst
Normal file
52
doc/source/cli/oslopolicy-list-redundant.rst
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
=========================
|
||||||
|
oslopolicy-list-redundant
|
||||||
|
=========================
|
||||||
|
|
||||||
|
.. program:: oslopolicy-list-redundant
|
||||||
|
|
||||||
|
Synopsis
|
||||||
|
--------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
oslopolicy-list-redundant [-h] [--config-dir DIR] [--config-file PATH]
|
||||||
|
[--namespace NAMESPACE]
|
||||||
|
|
||||||
|
Description
|
||||||
|
-----------
|
||||||
|
|
||||||
|
The ``oslopolicy-list-redundant`` tool is useful for detecting policies that
|
||||||
|
are specified in policy files that are the same as the defaults provided by the
|
||||||
|
service. Operators can use this tool to find policies that they can remove from
|
||||||
|
their policy files, making maintenance easier.
|
||||||
|
|
||||||
|
This tool assumes a policy file containing overrides exists and is specified
|
||||||
|
through configuration.
|
||||||
|
|
||||||
|
Options
|
||||||
|
-------
|
||||||
|
|
||||||
|
.. include:: common/default-opts.rst
|
||||||
|
|
||||||
|
.. include:: common/enforcer-opts.rst
|
||||||
|
|
||||||
|
Examples
|
||||||
|
--------
|
||||||
|
|
||||||
|
To list redundant default policies:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-list-redundant --namespace keystone --config-dir /etc/keystone
|
||||||
|
|
||||||
|
For more information regarding the options supported by this tool:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-list-redundant --help
|
||||||
|
|
||||||
|
See Also
|
||||||
|
--------
|
||||||
|
|
||||||
|
:program:`oslopolicy-sample-generator`, :program:`oslopolicy-policy-generator`,
|
||||||
|
:program:`oslopolicy-checker`
|
67
doc/source/cli/oslopolicy-policy-generator.rst
Normal file
67
doc/source/cli/oslopolicy-policy-generator.rst
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
===========================
|
||||||
|
oslopolicy-policy-generator
|
||||||
|
===========================
|
||||||
|
|
||||||
|
.. program:: oslopolicy-policy-generator
|
||||||
|
|
||||||
|
Synopsis
|
||||||
|
--------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
oslopolicy-policy-generator [-h] [--config-dir DIR] [--config-file PATH]
|
||||||
|
[--namespace NAMESPACE]
|
||||||
|
[--output-file OUTPUT_FILE]
|
||||||
|
|
||||||
|
Description
|
||||||
|
-----------
|
||||||
|
|
||||||
|
The ``oslopolicy-policy-generator`` command can be used to generate a policy
|
||||||
|
file that shows the effective policy in use. This is generated by merging the
|
||||||
|
registered defaults and policies loaded from a configuration file.
|
||||||
|
|
||||||
|
Options
|
||||||
|
-------
|
||||||
|
|
||||||
|
.. include:: common/default-opts.rst
|
||||||
|
|
||||||
|
.. include:: common/enforcer-opts.rst
|
||||||
|
|
||||||
|
.. include:: common/generator-opts.rst
|
||||||
|
|
||||||
|
Examples
|
||||||
|
--------
|
||||||
|
|
||||||
|
The generate the effective policy file for a namespace called ``keystone``:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-policy-generator --namespace keystone
|
||||||
|
|
||||||
|
To generate the effective policy file in JSON:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-policy-generator --namespace keystone --format json
|
||||||
|
|
||||||
|
To generate the effective policy file and output directly to a file:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-policy-generator \
|
||||||
|
--namespace keystone \
|
||||||
|
--format yaml \
|
||||||
|
--output-file keystone-policy.yaml
|
||||||
|
|
||||||
|
To show the additional options and arguments supported by
|
||||||
|
``oslopolicy-policy-generator``:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-policy-generator --help
|
||||||
|
|
||||||
|
See Also
|
||||||
|
--------
|
||||||
|
|
||||||
|
:program:`oslopolicy-sample-generator`, :program:`oslopolicy-list-redundant`,
|
||||||
|
:program:`oslopolicy-checker`
|
68
doc/source/cli/oslopolicy-sample-generator.rst
Normal file
68
doc/source/cli/oslopolicy-sample-generator.rst
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
===========================
|
||||||
|
oslopolicy-sample-generator
|
||||||
|
===========================
|
||||||
|
|
||||||
|
.. program:: oslopolicy-sample-generator
|
||||||
|
|
||||||
|
Synopsis
|
||||||
|
--------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
oslopolicy-sample-generator [-h] [--config-dir DIR]
|
||||||
|
[--config-file PATH] [--format FORMAT]
|
||||||
|
[--namespace NAMESPACE]
|
||||||
|
[--output-file OUTPUT_FILE]
|
||||||
|
|
||||||
|
|
||||||
|
Description
|
||||||
|
-----------
|
||||||
|
|
||||||
|
The ``oslopolicy-sample-generator`` command can be used to generate a sample
|
||||||
|
policy file based on the default policies in a given namespace. This tool
|
||||||
|
requires a namespace to query for policies and supports output in JSON or YAML.
|
||||||
|
|
||||||
|
Options
|
||||||
|
-------
|
||||||
|
|
||||||
|
.. include:: common/default-opts.rst
|
||||||
|
|
||||||
|
.. include:: common/rule-opts.rst
|
||||||
|
|
||||||
|
.. include:: common/generator-opts.rst
|
||||||
|
|
||||||
|
Examples
|
||||||
|
--------
|
||||||
|
|
||||||
|
To generate sample policies for a namespace called ``keystone``:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-sample-generator --namespace keystone
|
||||||
|
|
||||||
|
To generate sample policies in JSON use:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-sample-generator --namespace keystone --format json
|
||||||
|
|
||||||
|
To generate a sample policy file and output directly to a file:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-sample-generator --namespace keystone \
|
||||||
|
--format yaml \
|
||||||
|
--output-file keystone-policy.yaml
|
||||||
|
|
||||||
|
Use the following to generate help text for additional options and arguments
|
||||||
|
supported by ``oslopolicy-sample-generator``:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-sample-generator --help
|
||||||
|
|
||||||
|
See Also
|
||||||
|
--------
|
||||||
|
|
||||||
|
:program:`oslopolicy-policy-generator`, :program:`oslopolicy-list-redundant`,
|
||||||
|
:program:`oslopolicy-checker`
|
58
doc/source/cli/oslopolicy-validator.rst
Normal file
58
doc/source/cli/oslopolicy-validator.rst
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
====================
|
||||||
|
oslopolicy-validator
|
||||||
|
====================
|
||||||
|
|
||||||
|
.. program:: oslopolicy-policy-validator
|
||||||
|
|
||||||
|
Synopsis
|
||||||
|
--------
|
||||||
|
|
||||||
|
::
|
||||||
|
|
||||||
|
oslopolicy-policy-validator
|
||||||
|
|
||||||
|
Description
|
||||||
|
-----------
|
||||||
|
|
||||||
|
The ``oslopolicy-validator`` tool can be used to perform basic sanity checks
|
||||||
|
against a policy file. It will detect the following problems:
|
||||||
|
|
||||||
|
* A missing policy file
|
||||||
|
* Rules which have invalid syntax
|
||||||
|
* Rules which reference non-existent other rules
|
||||||
|
* Rules which form a cyclical reference with another rule
|
||||||
|
* Rules which do not exist in the specified namespace
|
||||||
|
|
||||||
|
This tool does very little validation of the content of the rules. Other tools,
|
||||||
|
such as ``oslopolicy-checker``, should be used to check that rules do what is
|
||||||
|
intended.
|
||||||
|
|
||||||
|
Options
|
||||||
|
-------
|
||||||
|
|
||||||
|
.. include:: common/default-opts.rst
|
||||||
|
|
||||||
|
.. include:: common/enforcer-opts.rst
|
||||||
|
|
||||||
|
Examples
|
||||||
|
--------
|
||||||
|
|
||||||
|
Validate the policy file used for Keystone:
|
||||||
|
|
||||||
|
.. code-block:: bash
|
||||||
|
|
||||||
|
oslopolicy-validator --config-file /etc/keystone/keystone.conf --namespace keystone
|
||||||
|
|
||||||
|
Sample output from a failed validation::
|
||||||
|
|
||||||
|
$ oslopolicy-validator --config-file keystone.conf --namespace keystone
|
||||||
|
WARNING:oslo_policy.policy:Policies ['foo', 'bar'] are part of a cyclical reference.
|
||||||
|
Invalid rules found
|
||||||
|
Failed to parse rule: (role:admin and system_scope:all) or (role:foo and oken.domain.id:%(target.user.domain_id)s))
|
||||||
|
Unknown rule found in policy file: foo
|
||||||
|
Unknown rule found in policy file: bar
|
||||||
|
|
||||||
|
See Also
|
||||||
|
--------
|
||||||
|
|
||||||
|
:program:`oslopolicy-checker`
|
@ -40,7 +40,7 @@ source_suffix = '.rst'
|
|||||||
master_doc = 'index'
|
master_doc = 'index'
|
||||||
|
|
||||||
# General information about the project.
|
# General information about the project.
|
||||||
copyright = u'2014, OpenStack Foundation'
|
copyright = '2014-2020, OpenStack Foundation'
|
||||||
source_tree = 'https://opendev.org/openstack/oslo.policy/src/branch/master'
|
source_tree = 'https://opendev.org/openstack/oslo.policy/src/branch/master'
|
||||||
|
|
||||||
# If true, '()' will be appended to :func: etc. cross-reference text.
|
# If true, '()' will be appended to :func: etc. cross-reference text.
|
||||||
@ -62,6 +62,37 @@ modindex_common_prefix = ['oslo_policy.']
|
|||||||
# Sphinx are currently 'default' and 'sphinxdoc'.
|
# Sphinx are currently 'default' and 'sphinxdoc'.
|
||||||
html_theme = 'openstackdocs'
|
html_theme = 'openstackdocs'
|
||||||
|
|
||||||
|
# -- Options for man page output ---------------------------------------------
|
||||||
|
|
||||||
|
# Grouping the document tree for man pages.
|
||||||
|
# List of tuples 'sourcefile', 'target', u'title', u'Authors name', 'manual'
|
||||||
|
|
||||||
|
_man_pages = [
|
||||||
|
(
|
||||||
|
'oslopolicy-checker',
|
||||||
|
'Check policy against the OpenStack Identity API access information.',
|
||||||
|
),
|
||||||
|
(
|
||||||
|
'oslopolicy-list-redundant',
|
||||||
|
'Detect policies that are specified in policy files that are the same '
|
||||||
|
'as the defaults provided by the service',
|
||||||
|
),
|
||||||
|
(
|
||||||
|
'oslopolicy-policy-generator',
|
||||||
|
'Generate a policy file that shows the effective policy in use',
|
||||||
|
),
|
||||||
|
(
|
||||||
|
'oslopolicy-sample-generator',
|
||||||
|
'Generate a sample policy file based on the default policies in a '
|
||||||
|
'given namespace',
|
||||||
|
),
|
||||||
|
]
|
||||||
|
|
||||||
|
man_pages = [
|
||||||
|
(f'cli/{name}', name, description, 'OpenStack Community', 1)
|
||||||
|
for name, description in _man_pages
|
||||||
|
]
|
||||||
|
|
||||||
# -- sphinx.ext.extlinks configuration ---------------------------------------
|
# -- sphinx.ext.extlinks configuration ---------------------------------------
|
||||||
|
|
||||||
extlinks = {
|
extlinks = {
|
||||||
|
Loading…
Reference in New Issue
Block a user