X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;ds=sidebyside;f=PLC%2FAccessors%2FAccessors_standard.py;h=8ee3e910a851c874fe9d953e947758c19e203612;hb=8b7ba869c3582b2db70f79ee920de57c1cfacf95;hp=5e54437eab5f2d26df64e7c3dec297edbf21c163;hpb=2f01db56f89dc123c984424d51ecd81dc4017b2e;p=plcapi.git diff --git a/PLC/Accessors/Accessors_standard.py b/PLC/Accessors/Accessors_standard.py index 5e54437..8ee3e91 100644 --- a/PLC/Accessors/Accessors_standard.py +++ b/PLC/Accessors/Accessors_standard.py @@ -44,21 +44,21 @@ define_accessors(current_module, Slice, "Initscript","initscript", # needs 'admin' so the Set method is accessible define_accessors(current_module, [Slice,Node], "Arch", "arch", "node/slice/config", "node arch or slivers arch", - set_roles=["admin","pi","user","tech","node"], expose_in_api=True) + set_roles=all_roles, expose_in_api=True) define_accessors(current_module, [Slice,Node], "Pldistro", "pldistro", "node/slice/config/sfa", "PlanetLab distribution to use for node or slivers", - set_roles=["admin","pi","user","tech","node"], expose_in_api=True) + set_roles=all_roles, expose_in_api=True) # fc of course historically was for fedora core define_accessors(current_module, [Slice,Node], "Fcdistro", "fcdistro", "node/slice/config", "Linux distribution to use for node or slivers", - set_roles=["admin","pi","user","tech","node"], expose_in_api=True) + set_roles=all_roles, expose_in_api=True) # the virtualization model to use - this is only used by the bootmanager for # picking the right options e.g. prior to reinstalling # see PLC_FLAVOUR_VIRT_MAP to see how the default gets computed define_accessors(current_module, Node, "Virt", "virt", "node/operation", 'typically "vs" or "lxc"', - set_roles=["admin"], expose_in_api=True) + set_roles=all_roles, expose_in_api=True) # node deployment (alpha, beta, ...) define_accessors(current_module, Node, "Deployment", "deployment", "node/operation", 'typically "alpha", "beta", or "production"', @@ -68,12 +68,8 @@ define_accessors(current_module, Node, "Extensions", "extensions", "node/config", "space-separated list of extensions to install", set_roles=["admin"],expose_in_api=True) # access HRN - this is the ideal definition of roles, even if AddNodeTag cannot handle this -define_accessors(current_module, Node, "Hrn","hrn", - "node/person/sfa", "SFA human readable name", - set_roles=all_roles, expose_in_api=True) -# same for persons -define_accessors(current_module, Person, "Hrn","hrn", - "node/person/sfa", "SFA human readable name", +define_accessors(current_module, [Node,Person,Slice,Site] , "Hrn", "hrn", + "node/person/slice/site/sfa", "SFA human readable name", set_roles=all_roles, expose_in_api=True) # test nodes perform their installation from an uncompressed bootstrapfs @@ -112,3 +108,14 @@ define_accessors(current_module, Interface, "Alias", "alias", define_accessors(current_module, Interface, "Backdoor", "backdoor", "interface/hidden", "For testing new settings", set_roles=admin_roles) + +# we need to identify objects created through SFA interfaces +define_accessors(current_module, [Person,Slice,Site] , "SfaCreated", "sfa_created", + "person/slice/site/sfa", "Tag objects created through SFA interfaces", + set_roles=all_roles, expose_in_api=True) + +# set any value to this tag to prevent a site from showing up +# in the person registration form +define_accessors(current_module, Site, "DisabledRegistration", "disabled_registration", + "site", "Sites that have a non-void value are excluded from the drop-down list on the registration form", + set_roles=admin_roles, expose_in_api=True)