Bug 1469578 - [Docs][RFE][Director] Permit modifying policy.json files for openstack services based on config needs
[Docs][RFE][Director] Permit modifying policy.json files for openstack servic...
Product: Red Hat OpenStack
Classification: Red Hat
Component: documentation (Show other bugs)
12.0 (Pike)
Unspecified Unspecified
medium Severity medium
: ---
: ---
Assigned To: Dan Macpherson
Charelle Collett
Depends On: 1304025
  Show dependency treegraph
Reported: 2017-07-11 10:08 EDT by Dan Macpherson
Modified: 2017-12-18 23:20 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2017-12-18 23:20:38 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Dan Macpherson 2017-07-11 10:08:38 EDT
Customer use case is as a hosting provider requires control access and permission within the stack in a granular fashion. The way that this is done (presently) is through the use of each component's policy.json file. 
The ability to automate this via puppet or heat template at time of deploy would be a nice feature to have as it would assist in consolidating the post deployment actions that are being done and allow for a structured approach in crafting specialized permissions.
Due to the nature of hosting, this customer would like to have the ability to dictate during the initial data dump into director to add the configuration changes to each components policy.json file. This would allow for the services to be hardened at the time of deployment rather than either being scripted out later or a manual process post deploy.

Requires documentation in Advanced Overcloud Guide on how to set per-service policy. Also the Overclud Parameters guide needs to be refreshd to include these new parameters.
Comment 1 Lucy Bopf 2017-08-03 02:13:36 EDT
Updating DFG to match the engineering RFE on which this was based.
Comment 4 Dan Macpherson 2017-11-22 20:42:30 EST
Alex, would you be able to take a look at the content items in comment #2 and let me know if I've missed anything?
Comment 5 Charelle Collett 2017-11-29 08:21:00 EST
Hi Dan,

They both look good to me from a peer review.
Comment 6 Gurenko Alex 2017-11-30 04:59:12 EST
Looks good to me
Comment 7 Dan Macpherson 2017-11-30 05:12:22 EST
Awesome. Thanks, Alex.

Switching to pper review.
Comment 8 Charelle Collett 2017-11-30 07:12:14 EST
Looks good to me Dan.

Note You need to log in before you can comment on or make changes to this bug.