Bug 1320726

Summary: RFE Rename heat_stack_user role
Product: Red Hat OpenStack Reporter: Andreas Karis <akaris>
Component: openstack-heatAssignee: Zane Bitter <zbitter>
Status: CLOSED WONTFIX QA Contact: Amit Ugol <augol>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 7.0 (Kilo)CC: mburns, rhel-osp-director-maint, sbaker, shardy, srevivo
Target Milestone: ---Keywords: FutureFeature, ZStream
Target Release: 8.0 (Liberty)   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-07-14 13:13:02 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Andreas Karis 2016-03-23 20:38:56 UTC
Description of problem:
Putting myself into the shoes of a customer who just deployed OSP. I'm assigning my user to different roles. I see the heat_stack_user role. I think: hey, my user needs to use heat, so I'm assigning him to the heat_stack_user role! And exactly the contrary happens. 
===>in policy.json,  the deny_stack_user is an allow rule for everyone but heat_stack_user 
 
Version-Release number of selected component (if applicable):
7

How reproducible:
all of the time

Steps to Reproduce:
1. 
2.
3.

Actual results:
heat_stack_user role is denied access to create heat stacks with a "not authorized"

Expected results:
the name is misleading. neither users nor support would see right away that this is a configuration mistake. you have to really knowwhat's happening, in order to understand what heat_stack_user role does exactly the opposite of what it sounds that it does. A name for a role however should help grasp the meaning of this role

Additional info:

http://hardysteven.blogspot.ca/2014/04/heat-auth-model-updates-part-2-stack.html

{
    "context_is_admin":  "role:admin",
    "deny_stack_user": "not role:heat_stack_user",
    "deny_everybody": "!",

    "cloudformation:ListStacks": "rule:deny_stack_user",
    "cloudformation:CreateStack": "rule:deny_stack_user",
(...)
}

Comment 3 Amit Ugol 2016-03-24 06:57:36 UTC
I dread thinking what would happen if the name is changed or anything else regarding this role.
This is more a Keystone feature request: Lock certain roles to certain users.