[openstack-dev] [keystone/swift] role-based access cotrol in swift

Nassim Babaci nassim.babaci at cloudwatt.com
Mon Jul 21 13:18:36 UTC 2014


Hi, 

My answer is may be a little bite late but here's a swift middleware we have just published: https://github.com/cloudwatt/swiftpolicy 
it allows managing swift authorization using a policy.json file. 
It is based on the keystoneauth middleware, and uses oslo.policy file format.

Feel free to comment and/or to ask if any questions.

--
Nassim

----- Mail original -----
De: "John Dickinson" <me at not.mn>
À: "OpenStack Development Mailing List (not for usage questions)" <openstack-dev at lists.openstack.org>
Envoyé: Vendredi 11 Juillet 2014 05:33:13
Objet: Re: [openstack-dev] [keystone/swift] role-based access cotrol in	swift

There are a couple of places to look to see the current dev effort in Swift around ACLs.

In no particular order:

* Supporting a service token in Swift https://review.openstack.org/#/c/105228/
* Adding policy engine support to Swift https://review.openstack.org/#/c/89568/
* Fixing ACLs to work with Keystone v3+ https://review.openstack.org/#/c/86430/

Some of the above may be in line with what you're looking for.

--John

On Jul 10, 2014, at 8:17 PM, Osanai, Hisashi <osanai.hisashi at jp.fujitsu.com> wrote:

> 
> Hi, 
> 
> I looked for info about role-based access control in swift because 
> I would like to prohibit PUT operations to containers like create 
> containers and set ACLs.
> 
> Other services like Nova, Cinder have "policy.json" file but Swift doesn't.
> And I found out the following info.
> - Swift ACL's migration
> - Centralized policy management
> 
> Do you have detail info for above?
> 
> http://dolphm.com/openstack-juno-design-summit-outcomes-for-keystone/
> ---
> Migrate Swift ACL's from a highly flexible Tenant ID/Name basis, which worked reasonably well against Identity API v2, to strictly be based on v3 Project IDs. The driving requirement here is that Project Names are no longer globally unique in v3, as they're only unique within a top-level domain.
> ---
> Centralized policy management
> Keystone currently provides an unused /v3/policies API that can be used to centralize policy blob management across OpenStack.
> 
> 
> Best Regards,
> Hisashi Osanai
> 
> 
> _______________________________________________
> OpenStack-dev mailing list
> OpenStack-dev at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


_______________________________________________
OpenStack-dev mailing list
OpenStack-dev at lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev



More information about the OpenStack-dev mailing list