policy.yaml¶
Use the policy.yaml
file to define additional access controls that will be
applied to Aodh:
#
#"context_is_admin": "role:admin"
#
#"segregation": "rule:context_is_admin"
#
#"admin_or_owner": "rule:context_is_admin or project_id:%(project_id)s"
#
#"default": "rule:context_is_admin or project_id:%(project_id)s"
# Get an alarm.
# GET /v2/alarms/{alarm_id}
#"telemetry:get_alarm": "rule:context_is_admin or project_id:%(project_id)s"
# Get all alarms, based on the query provided.
# GET /v2/alarms
#"telemetry:get_alarms": "rule:context_is_admin or project_id:%(project_id)s"
# Get all alarms, based on the query provided.
# POST /v2/query/alarms
#"telemetry:query_alarm": "rule:context_is_admin or project_id:%(project_id)s"
# Create a new alarm.
# POST /v2/alarms
#"telemetry:create_alarm": ""
# Modify this alarm.
# PUT /v2/alarms/{alarm_id}
#"telemetry:change_alarm": "rule:context_is_admin or project_id:%(project_id)s"
# Delete this alarm.
# DELETE /v2/alarms/{alarm_id}
#"telemetry:delete_alarm": "rule:context_is_admin or project_id:%(project_id)s"
# Get the state of this alarm.
# GET /v2/alarms/{alarm_id}/state
#"telemetry:get_alarm_state": "rule:context_is_admin or project_id:%(project_id)s"
# Set the state of this alarm.
# PUT /v2/alarms/{alarm_id}/state
#"telemetry:change_alarm_state": "rule:context_is_admin or project_id:%(project_id)s"
# Assembles the alarm history requested.
# GET /v2/alarms/{alarm_id}/history
#"telemetry:alarm_history": "rule:context_is_admin or project_id:%(project_id)s"
# Define query for retrieving AlarmChange data.
# POST /v2/query/alarms/history
#"telemetry:query_alarm_history": "rule:context_is_admin or project_id:%(project_id)s"