aboutsummaryrefslogtreecommitdiffstats
path: root/releasenotes/notes/deployed-server-environment-output-d838c782f76823b7.yaml
blob: 14a5a279ad367be16e472b5ccd6099c2ff74e722 (plain)
1
2
3
4
5
6
---
features:
  - Add a new output, DeployedServerEnvironment, that can be used as
    the contents of an environment file. This environment file can then be used
    as input into a services only stack when using split-stack. The parameter
    simplifies the manual steps needed to deploy split-stack.
b; font-weight: bold } /* Name.Function.Magic */ .highlight .vc { color: #336699 } /* Name.Variable.Class */ .highlight .vg { color: #dd7700 } /* Name.Variable.Global */ .highlight .vi { color: #3333bb } /* Name.Variable.Instance */ .highlight .vm { color: #336699 } /* Name.Variable.Magic */ .highlight .il { color: #0000DD; font-weight: bold } /* Literal.Number.Integer.Long */ }
{
  "rbac_rule":[
    ["root_role" , "read", "authz.subjects"],
    ["root_role" , "read", "authz.objects"],
    ["root_role" , "read", "authz.actions"],
    ["root_role" , "read", "authz.subject_categories"],
    ["root_role" , "read", "authz.object_categories"],
    ["root_role" , "read", "authz.action_categories"],
    ["root_role" , "read", "authz.subject_scopes"],
    ["root_role" , "read", "authz.object_scopes"],
    ["root_role" , "read", "authz.action_scopes"],
    ["root_role" , "read", "authz.subject_assignments"],
    ["root_role" , "read", "authz.object_assignments"],
    ["root_role" , "read", "authz.action_assignments"],
    ["root_role" , "read", "authz.aggregation_algorithm"],
    ["root_role" , "read", "authz.sub_meta_rules"],    
    ["root_role" , "read", "authz.rules"],
    ["root_role" , "write", "authz.subjects"],
    ["root_role" , "write", "authz.objects"],
    ["root_role" , "write", "authz.actions"],
    ["root_role" , "write", "authz.subject_categories"],
    ["root_role" , "write", "authz.object_categories"],
    ["root_role" , "write", "authz.action_categories"],
    ["root_role" , "write", "authz.subject_scopes"],
    ["root_role" , "write", "authz.object_scopes"],
    ["root_role" , "write", "authz.action_scopes"],
    ["root_role" , "write", "authz.subject_assignments"],
    ["root_role" , "write", "authz.object_assignments"],
    ["root_role" , "write", "authz.action_assignments"],
    ["root_role" , "write", "authz.aggregation_algorithm"],
    ["root_role" , "write", "authz.sub_meta_rules"],    
    ["root_role" , "write", "authz.rules"], 
    ["root_role" , "read", "admin.subjects"],
    ["root_role" , "read", "admin.objects"],
    ["root_role" , "read", "admin.actions"],
    ["root_role" , "read", "admin.subject_categories"],
    ["root_role" , "read", "admin.object_categories"],
    ["root_role" , "read", "admin.action_categories"],
    ["root_role" , "read", "admin.subject_scopes"],
    ["root_role" , "read", "admin.object_scopes"],
    ["root_role" , "read", "admin.action_scopes"],
    ["root_role" , "read", "admin.subject_assignments"],
    ["root_role" , "read", "admin.object_assignments"],
    ["root_role" , "read", "admin.action_assignments"],
    ["root_role" , "read", "admin.aggregation_algorithm"],
    ["root_role" , "read", "admin.sub_meta_rules"],    
    ["root_role" , "read", "admin.rules"],
    ["root_role" , "write", "admin.subjects"],
    ["root_role" , "write", "admin.objects"],
    ["root_role" , "write", "admin.actions"],
    ["root_role" , "write", "admin.subject_categories"],
    ["root_role" , "write", "admin.object_categories"],
    ["root_role" , "write", "admin.action_categories"],
    ["root_role" , "write", "admin.subject_scopes"],
    ["root_role" , "write", "admin.object_scopes"],
    ["root_role" , "write", "admin.action_scopes"],
    ["root_role" , "write", "admin.subject_assignments"],
    ["root_role" , "write", "admin.object_assignments"],
    ["root_role" , "write", "admin.action_assignments"],
    ["root_role" , "write", "admin.aggregation_algorithm"],
    ["root_role" , "write", "admin.sub_meta_rules"],    
    ["root_role" , "write", "admin.rules"],
    ["dev_role" , "read", "authz.subjects"],
    ["dev_role" , "read", "authz.objects"],
    ["dev_role" , "read", "authz.actions"],
    ["dev_role" , "read", "authz.subject_categories"],
    ["dev_role" , "read", "authz.object_categories"],
    ["dev_role" , "read", "authz.action_categories"],
    ["dev_role" , "read", "authz.subject_scopes"],
    ["dev_role" , "read", "authz.object_scopes"],
    ["dev_role" , "read", "authz.action_scopes"],
    ["dev_role" , "read", "authz.subject_assignments"],
    ["dev_role" , "read", "authz.object_assignments"],
    ["dev_role" , "read", "authz.action_assignments"],
    ["dev_role" , "read", "authz.aggregation_algorithm"],
    ["dev_role" , "read", "authz.sub_meta_rules"],
    ["dev_role" , "read", "authz.rules"],
    ["dev_role" , "read", "admin.subjects"],
    ["dev_role" , "read", "admin.objects"],
    ["dev_role" , "read", "admin.actions"],
    ["dev_role" , "read", "admin.subject_categories"],
    ["dev_role" , "read", "admin.object_categories"],
    ["dev_role" , "read", "admin.action_categories"],
    ["dev_role" , "read", "admin.subject_scopes"],
    ["dev_role" , "read", "admin.object_scopes"],
    ["dev_role" , "read", "admin.action_scopes"],
    ["dev_role" , "read", "admin.subject_assignments"],
    ["dev_role" , "read", "admin.object_assignments"],
    ["dev_role" , "read", "admin.action_assignments"],
    ["dev_role" , "read", "admin.aggregation_algorithm"],
    ["dev_role" , "read", "admin.sub_meta_rules"],
    ["dev_role" , "read", "admin.rules"]
  ]
}