more verbose default policy denials

Related: https://pagure.io/koji/issue/3397
This commit is contained in:
Tomas Kopecek 2022-06-09 13:05:35 +02:00
parent 1a71b4e8d9
commit 03f3d92a00

View file

@ -557,23 +557,23 @@ def load_plugins(opts):
_default_policies = { _default_policies = {
'build_from_srpm': ''' 'build_from_srpm': '''
has_perm admin :: allow has_perm admin :: allow
all :: deny all :: deny Only admin can do this via default policy
''', ''',
'build_from_repo_id': ''' 'build_from_repo_id': '''
has_perm admin :: allow has_perm admin :: allow
all :: deny all :: deny Only admin can do this via default policy
''', ''',
'build_from_scm': ''' 'build_from_scm': '''
has_perm admin :: allow has_perm admin :: allow
# match scm_type CVS CVS+SSH && match scm_host scm.example.com && match scm_repository /cvs/example :: allow # match scm_type CVS CVS+SSH && match scm_host scm.example.com && match scm_repository /cvs/example :: allow
# match scm_type GIT GIT+SSH && match scm_host git.example.org && match scm_repository /example :: allow # match scm_type GIT GIT+SSH && match scm_host git.example.org && match scm_repository /example :: allow
# match scm_type SVN SVN+SSH && match scm_host svn.example.org && match scm_repository /users/* :: allow # match scm_type SVN SVN+SSH && match scm_host svn.example.org && match scm_repository /users/* :: allow
all :: deny all :: deny Only admin can do this via default policy
''', # noqa: E501 ''', # noqa: E501
'package_list': ''' 'package_list': '''
has_perm admin :: allow has_perm admin :: allow
has_perm tag :: allow has_perm tag :: allow
all :: deny all :: deny Only admin/tag can do this via default policy
''', ''',
'channel': ''' 'channel': '''
has req_channel :: req has req_channel :: req
@ -582,7 +582,7 @@ _default_policies = {
''', ''',
'vm': ''' 'vm': '''
has_perm admin win-admin :: allow has_perm admin win-admin :: allow
all :: deny all :: deny Only admin/win-admin can do this via default policy
''', ''',
'cg_import': ''' 'cg_import': '''
all :: allow all :: allow