Octavia Policies

Octavia Policies

The default policy is to not allow access unless the auth_strategy is ‘noauth’.

Users must be a member of one of the following roles to have access to the load-balancer API:

role:load-balancer_observer
User has access to load-balancer read-only APIs.
role:load-balancer_global_observer
User has access to load-balancer read-only APIs including resources owned by others.
role:load-balancer_member
User has access to load-balancer read and write APIs.
role:load-balancer_quota_admin
User is considered an admin for quota APIs only.
role:load-balancer_admin
User is considered an admin for all load-balnacer APIs including resources owned by others.
role:admin
User is admin to all APIs.

Note

‘is_admin:True’ is a policy rule that takes into account the auth_strategy == noauth configuration setting. It is equivalent to ‘rule:context_is_admin or {auth_strategy == noauth}’ if that would be valid syntax.

An alternate policy file has been provided in octavia/etc/policy called admin_or_owner-policy.json that removes the load-balancer RBAC role requirement. Please see the README.rst in that directory for more information.

Sample File Generation

To generate a sample policy.yaml file from the Octavia defaults, run the oslo policy generation script:

oslopolicy-sample-generator
--config-file etc/policy/octavia-policy-generator.conf
--output-file policy.yaml.sample

Merged File Generation

This will output a policy file which includes all registered policy defaults and all policies configured with a policy file. This file shows the effective policy in use by the project:

oslopolicy-policy-generator
--config-file etc/policy/octavia-policy-generator.conf

This tool uses the output_file path from the config-file.

List Redundant Configurations

This will output a list of matches for policy rules that are defined in a configuration file where the rule does not differ from a registered default rule. These are rules that can be removed from the policy file with no change in effective policy:

oslopolicy-list-redundant
--config-file etc/policy/octavia-policy-generator.conf

Default Octavia Policies

{
    "context_is_admin": "role:admin or role:load-balancer_admin",
    "load-balancer:owner": "project_id:%(project_id)s",
    "load-balancer:admin": "is_admin:True or role:admin or role:load-balancer_admin",
    "load-balancer:observer_and_owner": "role:load-balancer_observer and rule:load-balancer:owner",
    "load-balancer:global_observer": "role:load-balancer_global_observer",
    "load-balancer:member_and_owner": "role:load-balancer_member and rule:load-balancer:owner",
    "load-balancer:read": "rule:load-balancer:observer_and_owner or rule:load-balancer:global_observer or rule:load-balancer:member_and_owner or rule:load-balancer:admin",
    "load-balancer:read-global": "rule:load-balancer:global_observer or rule:load-balancer:admin",
    "load-balancer:write": "rule:load-balancer:member_and_owner or rule:load-balancer:admin",
    "load-balancer:read-quota": "rule:load-balancer:observer_and_owner or rule:load-balancer:global_observer or rule:load-balancer:member_and_owner or role:load-balancer_quota_admin or rule:load-balancer:admin",
    "load-balancer:read-quota-global": "rule:load-balancer:global_observer or role:load-balancer_quota_admin or rule:load-balancer:admin",
    "load-balancer:write-quota": "role:load-balancer_quota_admin or rule:load-balancer:admin",
    "os_load-balancer_api:healthmonitor:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:healthmonitor:get_all-global": "rule:load-balancer:read-global",
    "os_load-balancer_api:healthmonitor:post": "rule:load-balancer:write",
    "os_load-balancer_api:healthmonitor:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:healthmonitor:put": "rule:load-balancer:write",
    "os_load-balancer_api:healthmonitor:delete": "rule:load-balancer:write",
    "os_load-balancer_api:l7policy:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:l7policy:get_all-global": "rule:load-balancer:read-global",
    "os_load-balancer_api:l7policy:post": "rule:load-balancer:write",
    "os_load-balancer_api:l7policy:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:l7policy:put": "rule:load-balancer:write",
    "os_load-balancer_api:l7policy:delete": "rule:load-balancer:write",
    "os_load-balancer_api:l7rule:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:l7rule:post": "rule:load-balancer:write",
    "os_load-balancer_api:l7rule:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:l7rule:put": "rule:load-balancer:write",
    "os_load-balancer_api:l7rule:delete": "rule:load-balancer:write",
    "os_load-balancer_api:listener:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:listener:get_all-global": "rule:load-balancer:read-global",
    "os_load-balancer_api:listener:post": "rule:load-balancer:write",
    "os_load-balancer_api:listener:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:listener:put": "rule:load-balancer:write",
    "os_load-balancer_api:listener:delete": "rule:load-balancer:write",
    "os_load-balancer_api:listener:get_stats": "rule:load-balancer:read",
    "os_load-balancer_api:loadbalancer:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:loadbalancer:get_all-global": "rule:load-balancer:read-global",
    "os_load-balancer_api:loadbalancer:post": "rule:load-balancer:write",
    "os_load-balancer_api:loadbalancer:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:loadbalancer:put": "rule:load-balancer:write",
    "os_load-balancer_api:loadbalancer:delete": "rule:load-balancer:write",
    "os_load-balancer_api:loadbalancer:get_stats": "rule:load-balancer:read",
    "os_load-balancer_api:loadbalancer:get_status": "rule:load-balancer:read",
    "os_load-balancer_api:loadbalancer:put_failover": "rule:load-balancer:admin",
    "os_load-balancer_api:member:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:member:post": "rule:load-balancer:write",
    "os_load-balancer_api:member:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:member:put": "rule:load-balancer:write",
    "os_load-balancer_api:member:delete": "rule:load-balancer:write",
    "os_load-balancer_api:pool:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:pool:get_all-global": "rule:load-balancer:read-global",
    "os_load-balancer_api:pool:post": "rule:load-balancer:write",
    "os_load-balancer_api:pool:get_one": "rule:load-balancer:read",
    "os_load-balancer_api:pool:put": "rule:load-balancer:write",
    "os_load-balancer_api:pool:delete": "rule:load-balancer:write",
    "os_load-balancer_api:provider:get_all": "rule:load-balancer:read",
    "os_load-balancer_api:quota:get_all": "rule:load-balancer:read-quota",
    "os_load-balancer_api:quota:get_all-global": "rule:load-balancer:read-quota-global",
    "os_load-balancer_api:quota:get_one": "rule:load-balancer:read-quota",
    "os_load-balancer_api:quota:put": "rule:load-balancer:write-quota",
    "os_load-balancer_api:quota:delete": "rule:load-balancer:write-quota",
    "os_load-balancer_api:quota:get_defaults": "rule:load-balancer:read-quota",
    "os_load-balancer_api:amphora:get_all": "rule:load-balancer:admin",
    "os_load-balancer_api:amphora:get_one": "rule:load-balancer:admin",
    "os_load-balancer_api:amphora:put_failover": "rule:load-balancer:admin"
}
Creative Commons Attribution 3.0 License

Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.