Introduce scope_types in os-console-auth-tokens

oslo.policy introduced the scope_type feature which can
control the access level at system-level and project-level.
 - https://docs.openstack.org/oslo.policy/latest/user/usage.html#setting-scope
 - http://specs.openstack.org/openstack/keystone-specs/specs/keystone/queens/system-scope.html

Appropriate scope_type for nova case:
- https://specs.openstack.org/openstack/nova-specs/specs/ussuri/approved/policy-defaults-refresh.html#scope

This commit introduce scope_type for os-console-auth-tokens API policies
as 'system'.

Also adds the test case with scope_type enabled and verify we
pass and fail the policy check with expected context.

Partial implement blueprint policy-defaults-refresh

Change-Id: If6d9c3ad422b6e64b145c0695d441ba06045cce3
This commit is contained in:
Ghanshyam Mann
2020-02-08 20:28:05 -06:00
parent b055b5094e
commit 8e2d0333d9
2 changed files with 20 additions and 5 deletions
+6 -5
View File
@@ -23,16 +23,17 @@ BASE_POLICY_NAME = 'os_compute_api:os-console-auth-tokens'
console_auth_tokens_policies = [
policy.DocumentedRuleDefault(
BASE_POLICY_NAME,
base.RULE_ADMIN_API,
"Show console connection information for a given console "
name=BASE_POLICY_NAME,
check_str=base.RULE_ADMIN_API,
description="Show console connection information for a given console "
"authentication token",
[
operations=[
{
'method': 'GET',
'path': '/os-console-auth-tokens/{console_token}'
}
])
],
scope_types=['system'])
]
@@ -67,3 +67,17 @@ class ConsoleAuthTokensScopeTypePolicyTest(ConsoleAuthTokensPolicyTest):
def setUp(self):
super(ConsoleAuthTokensScopeTypePolicyTest, self).setUp()
self.flags(enforce_scope=True, group="oslo_policy")
# Check that system admin is able to get console connection
# information.
self.admin_authorized_contexts = [
self.system_admin_context]
# Check that non-system-admin is not able to get console connection
# information.
self.admin_unauthorized_contexts = [
self.legacy_admin_context, self.system_member_context,
self.system_reader_context, self.system_foo_context,
self.project_admin_context, self.project_member_context,
self.other_project_member_context,
self.project_foo_context, self.project_reader_context
]