Workflow Logic the Assignment service.
keystone.assignment.controllers.
GrantAssignmentV3
[source]¶Bases: keystone.common.controller.V3Controller
The V3 Grant Assignment APIs.
check_grant
(request, *args, **kwargs)[source]¶Check if a role has been granted on either a domain or project.
check_system_grant_for_group
(request, *args, **kwargs)[source]¶Check if a group has a specific role on the system.
Parameters: |
|
---|
check_system_grant_for_user
(request, *args, **kwargs)[source]¶Check if a user has a specific role on the system.
Parameters: |
|
---|
collection_name
= 'roles'¶create_grant
(request, *args, **kwargs)[source]¶Grant a role to a user or group on either a domain or project.
create_system_grant_for_group
(request, *args, **kwargs)[source]¶Grant a role to a group on the system.
Parameters: |
|
---|
create_system_grant_for_user
(request, *args, **kwargs)[source]¶Grant a role to a user on the system.
Parameters: |
|
---|
list_grants
(request, *args, **kwargs)[source]¶List roles granted to user/group on either a domain or project.
list_system_grants_for_group
(request, *args, **kwargs)[source]¶List all system grants for a specific group.
Parameters: |
|
---|---|
Returns: | a list of grants the group has on the system |
list_system_grants_for_user
(request, *args, **kwargs)[source]¶List all system grants for a specific user.
Parameters: |
|
---|---|
Returns: | a list of grants the user has on the system |
member_name
= 'role'¶revoke_grant
(request, *args, **kwargs)[source]¶Revoke a role from user/group on either a domain or project.
keystone.assignment.controllers.
ImpliedRolesV3
[source]¶Bases: keystone.common.controller.V3Controller
The V3 ImpliedRoles CRD APIs. There is no Update.
keystone.assignment.controllers.
ProjectAssignmentV3
[source]¶Bases: keystone.common.controller.V3Controller
The V3 Project APIs that are processing assignments.
collection_name
= 'projects'¶member_name
= 'project'¶keystone.assignment.controllers.
RoleAssignmentV3
[source]¶Bases: keystone.common.controller.V3Controller
The V3 Role Assignment APIs, really just list_role_assignment().
collection_name
= 'role_assignments'¶list_role_assignments_wrapper
(request)[source]¶Main entry point from router for list role assignments.
Since we want different policy file rules to be applicable based on whether there the include_subtree query parameter is part of the API call, this method checks for this and then calls the appropriate protected entry point.
member_name
= 'role_assignment'¶keystone.assignment.controllers.
RoleV3
[source]¶Bases: keystone.common.controller.V3Controller
The V3 Role CRUD APIs.
To ease complexity (and hence risk) in writing the policy rules for the role APIs, we create separate policy actions for roles that are domain specific, as opposed to those that are global. In order to achieve this each of the role API methods has a wrapper method that checks to see if the role is global or domain specific.
NOTE (henry-nash): If this separate global vs scoped policy action pattern becomes repeated for other entities, we should consider encapsulating this into a specialized router class.
build_driver_hints
(request, supported_filters)[source]¶Build list hints based on the context query string.
Parameters: |
|
---|
collection_name
= 'roles'¶member_name
= 'role'¶Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.