Implement policy in code - backup (5)

This commit migrate all backup policies into code [1].

Like oslo.config, with oslo.policy, we can define all of
default rules in code base and only change some rules
via policy file. Another thing that we should use yaml
format instead of json format.

[1] https://governance.openstack.org/tc/goals/queens/policy-in-code.html
Co-authored-By: Dai Dang-Van <daidv@vn.fujitsu.com>

Change-Id: I3ec5d3282c28289cef7e7ab595ee1bebda03ca32
This commit is contained in:
Hieu LE 2017-10-16 10:28:32 +07:00
parent 5222c58007
commit b4ba0018d9
3 changed files with 71 additions and 5 deletions

View File

@ -1,9 +1,4 @@
{
"backups:get_all": "",
"backups:create": "",
"backups:get": "",
"backups:delete": "",
"clients:get_all": "",
"clients:create": "",
"clients:get": "",

View File

@ -18,6 +18,7 @@
import itertools
from freezer_api.common.policies import action
from freezer_api.common.policies import backup
from freezer_api.common.policies import base
from freezer_api.common.policies import job
from freezer_api.common.policies import session
@ -26,6 +27,7 @@ from freezer_api.common.policies import session
def list_rules():
return itertools.chain(
action.list_rules(),
backup.list_rules(),
base.list_rules(),
job.list_rules(),
session.list_rules()

View File

@ -0,0 +1,69 @@
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from oslo_policy import policy
from freezer_api.common.policies import base
BACKUPS = 'backups:%s'
rules = [
policy.DocumentedRuleDefault(
name=BACKUPS % 'create',
check_str=base.UNPROTECTED,
description='Creates backup entry.',
operations=[
{
'path': '/v1/backups',
'method': 'POST'
}
]
),
policy.DocumentedRuleDefault(
name=BACKUPS % 'delete',
check_str=base.UNPROTECTED,
description='Delete backup.',
operations=[
{
'path': '/v1/backups/{backup_id}',
'method': 'DELETE'
}
]
),
policy.DocumentedRuleDefault(
name=BACKUPS % 'get',
check_str=base.UNPROTECTED,
description='Show backups.',
operations=[
{
'path': '/v1/backups/{backup_id}',
'method': 'GET'
}
]
),
policy.DocumentedRuleDefault(
name=BACKUPS % 'get_all',
check_str=base.UNPROTECTED,
description='Lists backups.',
operations=[
{
'path': '/v1/backups',
'method': 'GET'
}
]
)
]
def list_rules():
return rules