FTR this is not as trivial as granting access to fixed pool names for each auth key; pool names are generated from the name of each charm, which can be changed at deployment time (think cinder-ceph, cinder-ceph-fast, cinder-ceph-slow).
The charms also need to deal with upgrading from the current open access to the proposed restricted access (so this change impacts cinder-ceph, cinder, glance, ceph-radosgw and nova-compute as well).
When you also consider that features such as ephemeral disk on ceph and COW cloning between cinder and glance thinks get quite complex fast.
FTR this is not as trivial as granting access to fixed pool names for each auth key; pool names are generated from the name of each charm, which can be changed at deployment time (think cinder-ceph, cinder-ceph-fast, cinder-ceph-slow).
The charms also need to deal with upgrading from the current open access to the proposed restricted access (so this change impacts cinder-ceph, cinder, glance, ceph-radosgw and nova-compute as well).
When you also consider that features such as ephemeral disk on ceph and COW cloning between cinder and glance thinks get quite complex fast.