keystone.access_rules_config.backends.json.
AccessRulesConfig
[source]¶Bases: keystone.access_rules_config.backends.base.AccessRulesConfigDriverBase
This backend reads the access rules from a JSON file on disk.
The format of the file is a mapping from service type to rules for that service type. For example:
{
"identity": [
{
"path": "/v3/users",
"method": "GET"
},
{
"path": "/v3/users",
"method": "POST"
},
{
"path": "/v3/users/*",
"method": "GET"
},
{
"path": "/v3/users/*",
"method": "PATCH"
},
{
"path": "/v3/users/*",
"method": "DELETE"
}
...
],
"image": [
{
"path": "/v2/images",
"method": "GET"
},
...
],
...
}
This will be transmuted in memory to a hash map that looks like this:
{
"identity": {
"GET": [
{
"path": "/v3/users"
},
{
"path": "/v3/users/*"
}
...
],
"POST": [ ... ]
},
...
}
The path may include a wildcard like ‘*’ or ‘**’ or a named wildcard like {server_id}. An application credential access rule validation request for a path like “/v3/users/uuid” will match with a configured access rule like “/v3/users/” or “/v3/users/{user_id}”, and a request for a path like “/v3/users/uuid/application_credentials/uuid” will match with a configured access rule like “/v3/users/*”.
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.