Merge ~gboutry/ubuntu/+source/horizon:stable/2024.1 into ~ubuntu-openstack-dev/ubuntu/+source/horizon:stable/2024.1
- Git
- lp:~gboutry/ubuntu/+source/horizon
- stable/2024.1
- Merge into stable/2024.1
Proposed by
Guillaume Boutry
Status: | Needs review | ||||||||
---|---|---|---|---|---|---|---|---|---|
Proposed branch: | ~gboutry/ubuntu/+source/horizon:stable/2024.1 | ||||||||
Merge into: | ~ubuntu-openstack-dev/ubuntu/+source/horizon:stable/2024.1 | ||||||||
Diff against target: |
42017 lines (+3386/-2073) 74 files modified
AUTHORS (+3/-0) ChangeLog (+22/-0) PKG-INFO (+117/-58) debian/changelog (+7/-2) debian/patches/series (+0/-1) dev/null (+0/-508) doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po (+21/-3) doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po (+16/-3) doc/source/locale/en_GB/LC_MESSAGES/doc-install.po (+13/-3) horizon.egg-info/PKG-INFO (+117/-58) horizon.egg-info/SOURCES.txt (+1/-7) horizon.egg-info/entry_points.txt (+0/-1) horizon.egg-info/pbr.json (+1/-1) horizon.egg-info/requires.txt (+33/-33) openstack_auth/policy.py (+5/-2) openstack_dashboard/api/keystone.py (+1/-1) openstack_dashboard/api/neutron.py (+2/-1) openstack_dashboard/api/placement.py (+51/-25) openstack_dashboard/conf/default_policies/cinder.yaml (+483/-206) openstack_dashboard/conf/default_policies/glance.yaml (+228/-70) openstack_dashboard/conf/default_policies/keystone.yaml (+463/-314) openstack_dashboard/conf/default_policies/neutron.yaml (+820/-458) openstack_dashboard/conf/default_policies/nova.yaml (+700/-150) openstack_dashboard/dashboards/admin/backups/tables.py (+3/-1) openstack_dashboard/dashboards/admin/backups/templates/backups/_detail_overview.html (+2/-0) openstack_dashboard/dashboards/identity/projects/tabs.py (+9/-4) openstack_dashboard/dashboards/identity/projects/tests.py (+17/-10) openstack_dashboard/dashboards/project/backups/tables.py (+3/-0) openstack_dashboard/dashboards/project/backups/templates/backups/_detail_overview.html (+2/-0) openstack_dashboard/dashboards/project/floating_ips/tables.py (+1/-3) openstack_dashboard/dashboards/project/networks/ports/extensions/allowed_address_pairs/tables.py (+2/-2) openstack_dashboard/dashboards/project/networks/ports/tests.py (+2/-2) openstack_dashboard/dashboards/project/volumes/forms.py (+5/-2) openstack_dashboard/locale/as/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/bn_IN/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/brx/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/cs/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/de/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/en_AU/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/en_GB/LC_MESSAGES/django.po (+72/-5) openstack_dashboard/locale/en_GB/LC_MESSAGES/djangojs.po (+35/-2) openstack_dashboard/locale/eo/LC_MESSAGES/django.po (+72/-5) openstack_dashboard/locale/es/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/fr/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/gu/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/hi/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/id/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/it/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ja/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ka_GE/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/kn/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ko_KR/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/kok/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ks/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/mai/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/mni/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/mr/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ne/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/pa_IN/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/pl_PL/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/pt_BR/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ru/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ta/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/tr_TR/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/ur/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/zh_Hans/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/locale/zh_Hant/LC_MESSAGES/django.po (+1/-4) openstack_dashboard/management/commands/dump_default_policies.py (+2/-2) openstack_dashboard/static/app/core/metadata/metadata.service.js (+1/-1) openstack_dashboard/static/app/core/openstack-service-api/common-test.mock.js (+8/-1) openstack_dashboard/static/app/core/openstack-service-api/swift.service.js (+1/-0) openstack_dashboard/static/app/core/openstack-service-api/swift.service.spec.js (+6/-2) releasenotes/notes/change-metadef-for-cinder-volume-type-f65dd215d2a3ce75.yaml (+6/-0) tox.ini (+2/-2) |
||||||||
Related bugs: |
|
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Ubuntu Sponsors | Pending | ||
Ubuntu OpenStack uploaders | Pending | ||
Review via email:
|
Commit message
Description of the change
To post a comment you must log in.
Unmerged commits
- 41f5b5f... by Guillaume Boutry
-
d/chanlog: mentionned dropped patches
Signed-off-by: Guillaume Boutry <email address hidden>
-
ubuntu-build:0 (build) ubuntu-autopkgtest:0 (build) cloud-archive-build:0 (build) cloud-archive-autopkgtest:0 (build) 1 → 4 of 4 results First • Previous • Next • Last - 85bf4cf... by Guillaume Boutry
-
d/p/lp2054799.
patch: drop integrated patch Signed-off-by: Guillaume Boutry <email address hidden>
- 927ef9d... by Guillaume Boutry
-
New upstream release for OpenStack Caracal. (LP: #2110279)
- dfb1a73... by Guillaume Boutry
-
Merging upstream release 24.0.1
- 9eb8dee... by Guillaume Boutry
-
New upstream version 24.0.1
- 9eb5160... by James Page
-
New upstream version 25.0.0
- 06a798e... by James Page
-
New upstream version 25.0.0+
git2024080809. d171cee3
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | diff --git a/AUTHORS b/AUTHORS |
2 | index 22f3602..4f99bfd 100644 |
3 | --- a/AUTHORS |
4 | +++ b/AUTHORS |
5 | @@ -735,6 +735,7 @@ Tim Schnell <tim.schnell@rackspace.com> |
6 | Timur Sufiev <tsufiev@gmail.com> |
7 | Timur Sufiev <tsufiev@mirantis.com> |
8 | Tin Lam <tin@irrational.io> |
9 | +Tobias Urdin <tobias.urdin@binero.com> |
10 | Tobias Urdin <tobias.urdin@binero.se> |
11 | Todd Willey <todd@ansolabs.com> |
12 | Tom Fifield <fifieldt@unimelb.edu.au> |
13 | @@ -979,6 +980,7 @@ utsav dusad <utsavdusad@gmail.com> |
14 | utsavdusad <utsavdusad@gmail.com> |
15 | veena <mveenasl@gmail.com> |
16 | venkatamahesh <venkatamaheshkotha@gmail.com> |
17 | +viktorkrivak <viktor.krivak@ultimum.io> |
18 | vinay_m <vinay.harsha@tcs.com> |
19 | vmarkov <vmarkov@mirantis.com> |
20 | wangbo <wangbo_bupt@163.com> |
21 | @@ -996,6 +998,7 @@ yan.haifeng <haifeng.yan@hp.com> |
22 | yanghuichan <yanghc@fiberhome.com> |
23 | yangyapeng <yang.yapeng@99cloud.net> |
24 | yaraat <Yaraat@gmail.com> |
25 | +yatinkarel <ykarel@redhat.com> |
26 | yfzhao <dsware@126.com> |
27 | yong sheng gong <gong.yongsheng@99cloud.net> |
28 | yuanke wei <weiyuanke123@gmail.com> |
29 | diff --git a/ChangeLog b/ChangeLog |
30 | index 62bd2ca..61ad329 100644 |
31 | --- a/ChangeLog |
32 | +++ b/ChangeLog |
33 | @@ -1,6 +1,28 @@ |
34 | CHANGES |
35 | ======= |
36 | |
37 | +24.0.1 |
38 | +------ |
39 | + |
40 | +* Fix typo in metadef for Cinder Volume Type |
41 | +* Force scope when listing domains |
42 | +* Move deprecated since/reason to deprecated\_rule object |
43 | +* Fix generation of inventory capacities |
44 | +* Imported Translations from Zanata |
45 | +* Delete container show duplicate toast notifications |
46 | +* Fix Placement statistics display |
47 | +* Sort image source choices by name for volume |
48 | +* Fix floating IP associated to unbound port |
49 | +* Fix allowed address pair row unique ID |
50 | +* Show Created At column for backups table |
51 | +* Show availability zone for volume backups |
52 | +* Imported Translations from Zanata |
53 | +* Respect SSL settings in placement API |
54 | +* Fix Users/Groups tab list when a domain context is set |
55 | +* Imported Translations from Zanata |
56 | +* Update TOX\_CONSTRAINTS\_FILE for stable/2024.1 |
57 | +* Update .gitreview for stable/2024.1 |
58 | + |
59 | 24.0.0 |
60 | ------ |
61 | |
62 | diff --git a/PKG-INFO b/PKG-INFO |
63 | index b7dca79..ca6115f 100644 |
64 | --- a/PKG-INFO |
65 | +++ b/PKG-INFO |
66 | @@ -1,66 +1,10 @@ |
67 | -Metadata-Version: 1.2 |
68 | +Metadata-Version: 2.1 |
69 | Name: horizon |
70 | -Version: 24.0.0 |
71 | +Version: 24.0.1 |
72 | Summary: OpenStack Dashboard |
73 | Home-page: https://docs.openstack.org/horizon/latest/ |
74 | Author: OpenStack |
75 | Author-email: openstack-discuss@lists.openstack.org |
76 | -License: UNKNOWN |
77 | -Description: ============================= |
78 | - Horizon (OpenStack Dashboard) |
79 | - ============================= |
80 | - |
81 | - Horizon is a Django-based project aimed at providing a complete OpenStack |
82 | - Dashboard along with an extensible framework for building new dashboards |
83 | - from reusable components. The ``openstack_dashboard`` module is a reference |
84 | - implementation of a Django site that uses the ``horizon`` app to provide |
85 | - web-based interactions with the various OpenStack projects. |
86 | - |
87 | - * Project documentation: https://docs.openstack.org/horizon/latest/ |
88 | - * Release management: https://launchpad.net/horizon |
89 | - * Blueprints and feature specifications: https://blueprints.launchpad.net/horizon |
90 | - * Issue tracking: https://bugs.launchpad.net/horizon |
91 | - * Release notes: https://docs.openstack.org/releasenotes/horizon/ |
92 | - |
93 | - .. image:: https://governance.openstack.org/tc/badges/horizon.svg |
94 | - :target: https://governance.openstack.org/tc/reference/tags/ |
95 | - |
96 | - Using Horizon |
97 | - ============= |
98 | - |
99 | - See ``doc/source/install/index.rst`` about how to install Horizon |
100 | - in your OpenStack setup. It describes the example steps and |
101 | - has pointers for more detailed settings and configurations. |
102 | - |
103 | - It is also available at |
104 | - `Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_. |
105 | - |
106 | - Getting Started for Developers |
107 | - ============================== |
108 | - |
109 | - ``doc/source/quickstart.rst`` or |
110 | - `Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_ |
111 | - describes how to setup Horizon development environment and start development. |
112 | - |
113 | - Building Contributor Documentation |
114 | - ================================== |
115 | - |
116 | - This documentation is written by contributors, for contributors. |
117 | - |
118 | - The source is maintained in the ``doc/source`` directory using |
119 | - `reStructuredText`_ and built by `Sphinx`_ |
120 | - |
121 | - .. _reStructuredText: http://docutils.sourceforge.net/rst.html |
122 | - .. _Sphinx: http://sphinx-doc.org/ |
123 | - |
124 | - To build the docs, use:: |
125 | - |
126 | - $ tox -e docs |
127 | - |
128 | - Results are in the ``doc/build/html`` directory |
129 | - |
130 | - |
131 | -Platform: UNKNOWN |
132 | Classifier: Development Status :: 5 - Production/Stable |
133 | Classifier: Environment :: OpenStack |
134 | Classifier: Framework :: Django |
135 | @@ -77,3 +21,118 @@ Classifier: Programming Language :: Python :: 3.8 |
136 | Classifier: Programming Language :: Python :: 3.9 |
137 | Classifier: Topic :: Internet :: WWW/HTTP |
138 | Requires-Python: >=3.8 |
139 | +License-File: LICENSE |
140 | +Requires-Dist: pbr>=5.5.0 |
141 | +Requires-Dist: Babel>=2.6.0 |
142 | +Requires-Dist: debtcollector>=1.2.0 |
143 | +Requires-Dist: Django<4.3,>=4.2 |
144 | +Requires-Dist: django-compressor>=2.4.1 |
145 | +Requires-Dist: django-debreach>=1.4.2 |
146 | +Requires-Dist: django-pyscss>=2.0.3 |
147 | +Requires-Dist: futurist>=1.2.0 |
148 | +Requires-Dist: iso8601>=0.1.11 |
149 | +Requires-Dist: keystoneauth1>=4.3.1 |
150 | +Requires-Dist: netaddr>=0.7.18 |
151 | +Requires-Dist: oslo.concurrency>=4.5.0 |
152 | +Requires-Dist: oslo.config>=8.8.0 |
153 | +Requires-Dist: oslo.i18n>=5.1.0 |
154 | +Requires-Dist: oslo.policy>=3.11.0 |
155 | +Requires-Dist: oslo.serialization>=4.3.0 |
156 | +Requires-Dist: oslo.upgradecheck>=1.5.0 |
157 | +Requires-Dist: oslo.utils>=4.12.0 |
158 | +Requires-Dist: osprofiler>=3.4.2 |
159 | +Requires-Dist: pymongo!=3.1,>=3.0.2 |
160 | +Requires-Dist: pyScss>=1.4.0 |
161 | +Requires-Dist: python-cinderclient>=8.0.0 |
162 | +Requires-Dist: python-glanceclient>=2.8.0 |
163 | +Requires-Dist: python-keystoneclient>=3.22.0 |
164 | +Requires-Dist: python-neutronclient>=8.1.0 |
165 | +Requires-Dist: python-novaclient>=9.1.0 |
166 | +Requires-Dist: python-swiftclient>=3.2.0 |
167 | +Requires-Dist: pytz>=2013.6 |
168 | +Requires-Dist: PyYAML>=6.0 |
169 | +Requires-Dist: requests>=2.25.1 |
170 | +Requires-Dist: semantic-version>=2.3.1 |
171 | +Requires-Dist: XStatic>=1.0.3 |
172 | +Requires-Dist: XStatic-Angular>=1.8.2.2 |
173 | +Requires-Dist: XStatic-Angular-Bootstrap>=2.2.0.0 |
174 | +Requires-Dist: XStatic-Angular-FileUpload>=12.0.4.0 |
175 | +Requires-Dist: XStatic-Angular-Gettext>=2.3.8.0 |
176 | +Requires-Dist: XStatic-Angular-lrdragndrop>=1.0.2.2 |
177 | +Requires-Dist: XStatic-Angular-Schema-Form>=0.8.13.0 |
178 | +Requires-Dist: XStatic-Bootstrap-Datepicker>=1.3.1.0 |
179 | +Requires-Dist: XStatic-Bootstrap-SCSS>=3.3.7.1 |
180 | +Requires-Dist: XStatic-bootswatch>=3.3.7.0 |
181 | +Requires-Dist: XStatic-D3>=3.5.17.0 |
182 | +Requires-Dist: XStatic-Hogan>=2.0.0.2 |
183 | +Requires-Dist: XStatic-Font-Awesome>=4.7.0.0 |
184 | +Requires-Dist: XStatic-Jasmine>=2.4.1.1 |
185 | +Requires-Dist: XStatic-jQuery>=3.5.1.1 |
186 | +Requires-Dist: XStatic-JQuery-Migrate>=3 |
187 | +Requires-Dist: XStatic-JQuery.quicksearch>=2.0.3.1 |
188 | +Requires-Dist: XStatic-JQuery.TableSorter>=2.14.5.1 |
189 | +Requires-Dist: XStatic-jquery-ui>=1.12.1.1 |
190 | +Requires-Dist: XStatic-JSEncrypt>=2.3.1.1 |
191 | +Requires-Dist: XStatic-mdi>=1.6.50.2 |
192 | +Requires-Dist: XStatic-objectpath>=1.2.1.0 |
193 | +Requires-Dist: XStatic-Rickshaw>=1.5.0.0 |
194 | +Requires-Dist: XStatic-roboto-fontface>=0.5.0.0 |
195 | +Requires-Dist: XStatic-smart-table>=1.4.13.2 |
196 | +Requires-Dist: XStatic-Spin>=1.2.5.2 |
197 | +Requires-Dist: XStatic-term.js>=0.0.7.0 |
198 | +Requires-Dist: XStatic-tv4>=1.2.7.0 |
199 | +Requires-Dist: enmerkar>=0.7.1 |
200 | + |
201 | +============================= |
202 | +Horizon (OpenStack Dashboard) |
203 | +============================= |
204 | + |
205 | +Horizon is a Django-based project aimed at providing a complete OpenStack |
206 | +Dashboard along with an extensible framework for building new dashboards |
207 | +from reusable components. The ``openstack_dashboard`` module is a reference |
208 | +implementation of a Django site that uses the ``horizon`` app to provide |
209 | +web-based interactions with the various OpenStack projects. |
210 | + |
211 | +* Project documentation: https://docs.openstack.org/horizon/latest/ |
212 | +* Release management: https://launchpad.net/horizon |
213 | +* Blueprints and feature specifications: https://blueprints.launchpad.net/horizon |
214 | +* Issue tracking: https://bugs.launchpad.net/horizon |
215 | +* Release notes: https://docs.openstack.org/releasenotes/horizon/ |
216 | + |
217 | +.. image:: https://governance.openstack.org/tc/badges/horizon.svg |
218 | + :target: https://governance.openstack.org/tc/reference/tags/ |
219 | + |
220 | +Using Horizon |
221 | +============= |
222 | + |
223 | +See ``doc/source/install/index.rst`` about how to install Horizon |
224 | +in your OpenStack setup. It describes the example steps and |
225 | +has pointers for more detailed settings and configurations. |
226 | + |
227 | +It is also available at |
228 | +`Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_. |
229 | + |
230 | +Getting Started for Developers |
231 | +============================== |
232 | + |
233 | +``doc/source/quickstart.rst`` or |
234 | +`Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_ |
235 | +describes how to setup Horizon development environment and start development. |
236 | + |
237 | +Building Contributor Documentation |
238 | +================================== |
239 | + |
240 | +This documentation is written by contributors, for contributors. |
241 | + |
242 | +The source is maintained in the ``doc/source`` directory using |
243 | +`reStructuredText`_ and built by `Sphinx`_ |
244 | + |
245 | +.. _reStructuredText: http://docutils.sourceforge.net/rst.html |
246 | +.. _Sphinx: http://sphinx-doc.org/ |
247 | + |
248 | +To build the docs, use:: |
249 | + |
250 | + $ tox -e docs |
251 | + |
252 | +Results are in the ``doc/build/html`` directory |
253 | + |
254 | diff --git a/debian/changelog b/debian/changelog |
255 | index bf2383e..d575ad6 100644 |
256 | --- a/debian/changelog |
257 | +++ b/debian/changelog |
258 | @@ -1,9 +1,14 @@ |
259 | -horizon (4:24.0.0-0ubuntu1.4) UNRELEASED; urgency=medium |
260 | +horizon (4:24.0.1-0ubuntu0.24.04.1) noble; urgency=medium |
261 | |
262 | + [ James Page ] |
263 | * d/gbp.conf, .launchpad.yaml: Sync from cloud-archive-tools for |
264 | caracal. |
265 | |
266 | - -- James Page <james.page@ubuntu.com> Mon, 22 Jul 2024 09:38:02 +0100 |
267 | + [ Guillaume Boutry ] |
268 | + * New upstream release for OpenStack Caracal. (LP: #2110279) |
269 | + * d/p/lp2054799.patch: drop integrated patch |
270 | + |
271 | + -- Guillaume Boutry <guillaume.boutry@canonical.com> Mon, 16 Jun 2025 12:38:28 +0200 |
272 | |
273 | horizon (4:24.0.0-0ubuntu1.3) noble; urgency=medium |
274 | |
275 | diff --git a/debian/patches/lp2054799.patch b/debian/patches/lp2054799.patch |
276 | deleted file mode 100644 |
277 | index 9317d26..0000000 |
278 | --- a/debian/patches/lp2054799.patch |
279 | +++ /dev/null |
280 | @@ -1,161 +0,0 @@ |
281 | -Bug-Ubuntu: https://bugs.launchpad.net/bugs/2054799 |
282 | -Origin: upstream, https://opendev.org/openstack/horizon/commit/ed768ab5071307ee15f95636ea548050cb894f9e |
283 | - |
284 | -From ed768ab5071307ee15f95636ea548050cb894f9e Mon Sep 17 00:00:00 2001 |
285 | -From: Zhang Hua <joshua.zhang@canonical.com> |
286 | -Date: Tue, 27 Feb 2024 15:26:28 +0800 |
287 | -Subject: [PATCH] Fix Users/Groups tab list when a domain context is set |
288 | - |
289 | -The list of users assigned to a project becomes invisible when a domain context |
290 | -is set in Horizon. If a domain context is set, the user list call should |
291 | -provide a list of users within the specified domain context, rather than users |
292 | -within the user's own domain. |
293 | - |
294 | -Groups tab of project also has the same problem. |
295 | - |
296 | -Change-Id: Ia778317acc41fe589765e6cd04c7fe8cad2360ab |
297 | -Closes-Bug: #2054799 |
298 | ---- |
299 | - .../dashboards/identity/projects/tabs.py | 13 ++++++--- |
300 | - .../dashboards/identity/projects/tests.py | 27 ++++++++++++------- |
301 | - 2 files changed, 26 insertions(+), 14 deletions(-) |
302 | - |
303 | -diff --git a/openstack_dashboard/dashboards/identity/projects/tabs.py b/openstack_dashboard/dashboards/identity/projects/tabs.py |
304 | -index 5899efd760..80ace64fb6 100644 |
305 | ---- a/openstack_dashboard/dashboards/identity/projects/tabs.py |
306 | -+++ b/openstack_dashboard/dashboards/identity/projects/tabs.py |
307 | -@@ -23,6 +23,7 @@ from openstack_dashboard.dashboards.identity.projects.groups \ |
308 | - import tables as groups_tables |
309 | - from openstack_dashboard.dashboards.identity.projects.users \ |
310 | - import tables as users_tables |
311 | -+from openstack_dashboard.utils import identity |
312 | - |
313 | - |
314 | - class OverviewTab(tabs.Tab): |
315 | -@@ -93,7 +94,8 @@ class UsersTab(tabs.TableTab): |
316 | - # For keystone.user_list project_id is not passed as argument because |
317 | - # it is ignored when using admin credentials |
318 | - # Get all users (to be able to find user name) |
319 | -- users = api.keystone.user_list(self.request) |
320 | -+ domain_id = identity.get_domain_id_for_operation(self.request) |
321 | -+ users = api.keystone.user_list(self.request, domain=domain_id) |
322 | - users = {user.id: user for user in users} |
323 | - |
324 | - # Get project_users_roles ({user_id: [role_id_1, role_id_2]}) |
325 | -@@ -128,7 +130,8 @@ class UsersTab(tabs.TableTab): |
326 | - # For keystone.group_list project_id is not passed as argument because |
327 | - # it is ignored when using admin credentials |
328 | - # Get all groups (to be able to find group name) |
329 | -- groups = api.keystone.group_list(self.request) |
330 | -+ domain_id = identity.get_domain_id_for_operation(self.request) |
331 | -+ groups = api.keystone.group_list(self.request, domain=domain_id) |
332 | - group_names = {group.id: group.name for group in groups} |
333 | - |
334 | - # Get a dictionary {group_id: [role_id_1, role_id_2]} |
335 | -@@ -138,7 +141,8 @@ class UsersTab(tabs.TableTab): |
336 | - |
337 | - for group_id in project_groups_roles: |
338 | - group_users = api.keystone.user_list(self.request, |
339 | -- group=group_id) |
340 | -+ group=group_id, |
341 | -+ domain=domain_id) |
342 | - group_roles_names = [ |
343 | - role.name for role in roles |
344 | - if role.id in project_groups_roles[group_id]] |
345 | -@@ -202,6 +206,7 @@ class GroupsTab(tabs.TableTab): |
346 | - project = self.tab_group.kwargs['project'] |
347 | - |
348 | - try: |
349 | -+ domain_id = identity.get_domain_id_for_operation(self.request) |
350 | - # Get project_groups_roles: {group_id: [role_id_1, role_id_2]} |
351 | - project_groups_roles = api.keystone.get_project_groups_roles( |
352 | - self.request, |
353 | -@@ -210,7 +215,7 @@ class GroupsTab(tabs.TableTab): |
354 | - roles = api.keystone.role_list(self.request) |
355 | - # For keystone.group_list, we do not give the project_id because it |
356 | - # is ignored when called with admin creds. |
357 | -- groups = api.keystone.group_list(self.request) |
358 | -+ groups = api.keystone.group_list(self.request, domain=domain_id) |
359 | - groups = {group.id: group for group in groups} |
360 | - except Exception: |
361 | - exceptions.handle(self.request, |
362 | -diff --git a/openstack_dashboard/dashboards/identity/projects/tests.py b/openstack_dashboard/dashboards/identity/projects/tests.py |
363 | -index 635f981238..9fae5fd426 100644 |
364 | ---- a/openstack_dashboard/dashboards/identity/projects/tests.py |
365 | -+++ b/openstack_dashboard/dashboards/identity/projects/tests.py |
366 | -@@ -31,6 +31,7 @@ from openstack_dashboard.dashboards.identity.projects import workflows |
367 | - from openstack_dashboard.test import helpers as test |
368 | - from openstack_dashboard import usage |
369 | - from openstack_dashboard.usage import quotas |
370 | -+from openstack_dashboard.utils import identity |
371 | - |
372 | - |
373 | - INDEX_URL = reverse('horizon:identity:projects:index') |
374 | -@@ -1339,7 +1340,8 @@ class DetailProjectViewTests(test.BaseAdminViewTests): |
375 | - 'get_project_groups_roles', |
376 | - 'role_list', |
377 | - 'group_list'), |
378 | -- quotas: ('enabled_quotas',)}) |
379 | -+ quotas: ('enabled_quotas',), |
380 | -+ identity: ('get_domain_id_for_operation',)}) |
381 | - def test_detail_view_users_tab(self): |
382 | - project = self.tenants.first() |
383 | - domain = self.domains.first() |
384 | -@@ -1357,8 +1359,9 @@ class DetailProjectViewTests(test.BaseAdminViewTests): |
385 | - self.mock_domain_get.return_value = domain |
386 | - self.mock_enabled_quotas.return_value = ('instances',) |
387 | - self.mock_role_list.return_value = self.roles.list() |
388 | -+ self.mock_get_domain_id_for_operation.return_value = domain.id |
389 | - |
390 | -- def _user_list_side_effect(request, group=None): |
391 | -+ def _user_list_side_effect(request, group=None, domain=None): |
392 | - if group: |
393 | - return self._get_users_in_group(group) |
394 | - return users |
395 | -@@ -1408,13 +1411,14 @@ class DetailProjectViewTests(test.BaseAdminViewTests): |
396 | - domain.id) |
397 | - self.mock_enabled_quotas.assert_called_once_with(test.IsHttpRequest()) |
398 | - self.mock_role_list.assert_called_once_with(test.IsHttpRequest()) |
399 | -- self.mock_group_list.assert_called_once_with(test.IsHttpRequest()) |
400 | -+ self.mock_group_list.assert_called_once_with(test.IsHttpRequest(), |
401 | -+ domain="1") |
402 | - self.mock_get_project_users_roles.assert_called_once_with( |
403 | - test.IsHttpRequest(), project=project.id) |
404 | - self.mock_get_project_groups_roles.assert_called_once_with( |
405 | - test.IsHttpRequest(), project=project.id) |
406 | -- calls = [mock.call(test.IsHttpRequest()), |
407 | -- mock.call(test.IsHttpRequest(), group="1"), ] |
408 | -+ calls = [mock.call(test.IsHttpRequest(), domain="1"), |
409 | -+ mock.call(test.IsHttpRequest(), group="1", domain="1"), ] |
410 | - |
411 | - self.mock_user_list.assert_has_calls(calls) |
412 | - |
413 | -@@ -1506,11 +1510,13 @@ class DetailProjectViewTests(test.BaseAdminViewTests): |
414 | - |
415 | - self.mock_tenant_get.assert_called_once_with(test.IsHttpRequest(), |
416 | - self.tenant.id) |
417 | -- self.mock_domain_get.assert_called_once_with(test.IsHttpRequest(), |
418 | -- domain.id) |
419 | -+ calls = [mock.call(test.IsHttpRequest(), "1"), |
420 | -+ mock.call(test.IsHttpRequest(), None), ] |
421 | -+ self.mock_domain_get.assert_has_calls(calls) |
422 | - self.mock_enabled_quotas.assert_called_once_with(test.IsHttpRequest()) |
423 | - self.mock_role_list.assert_called_once_with(test.IsHttpRequest()) |
424 | -- self.mock_group_list.assert_called_once_with(test.IsHttpRequest()) |
425 | -+ self.mock_group_list.assert_called_once_with(test.IsHttpRequest(), |
426 | -+ domain=None) |
427 | - self.mock_get_project_groups_roles.assert_called_once_with( |
428 | - test.IsHttpRequest(), project=project.id) |
429 | - |
430 | -@@ -1546,8 +1552,9 @@ class DetailProjectViewTests(test.BaseAdminViewTests): |
431 | - |
432 | - self.mock_tenant_get.assert_called_once_with(test.IsHttpRequest(), |
433 | - self.tenant.id) |
434 | -- self.mock_domain_get.assert_called_once_with(test.IsHttpRequest(), |
435 | -- domain.id) |
436 | -+ calls = [mock.call(test.IsHttpRequest(), "1"), |
437 | -+ mock.call(test.IsHttpRequest(), None), ] |
438 | -+ self.mock_domain_get.assert_has_calls(calls) |
439 | - self.mock_enabled_quotas.assert_called_once_with(test.IsHttpRequest()) |
440 | - self.mock_get_project_groups_roles.assert_called_once_with( |
441 | - test.IsHttpRequest(), project=project.id) |
442 | diff --git a/debian/patches/series b/debian/patches/series |
443 | index b087504..e99cd52 100644 |
444 | --- a/debian/patches/series |
445 | +++ b/debian/patches/series |
446 | @@ -3,4 +3,3 @@ fix-dashboard-manage.patch |
447 | embedded-xstatic.patch |
448 | ubuntu_settings.patch |
449 | lp1728031.patch |
450 | -lp2054799.patch |
451 | diff --git a/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po b/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po |
452 | index 8d852aa..b414960 100644 |
453 | --- a/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po |
454 | +++ b/doc/source/locale/en_GB/LC_MESSAGES/doc-configuration.po |
455 | @@ -4,15 +4,16 @@ |
456 | # Andi Chandler <andi@gowling.com>, 2021. #zanata |
457 | # Andi Chandler <andi@gowling.com>, 2022. #zanata |
458 | # Andi Chandler <andi@gowling.com>, 2023. #zanata |
459 | +# Andi Chandler <andi@gowling.com>, 2024. #zanata |
460 | msgid "" |
461 | msgstr "" |
462 | -"Project-Id-Version: horizon 23.4.0.dev3\n" |
463 | +"Project-Id-Version: horizon 24.0.1.dev2\n" |
464 | "Report-Msgid-Bugs-To: \n" |
465 | -"POT-Creation-Date: 2023-09-25 17:31+0000\n" |
466 | +"POT-Creation-Date: 2024-03-23 17:30+0000\n" |
467 | "MIME-Version: 1.0\n" |
468 | "Content-Type: text/plain; charset=UTF-8\n" |
469 | "Content-Transfer-Encoding: 8bit\n" |
470 | -"PO-Revision-Date: 2023-09-09 10:45+0000\n" |
471 | +"PO-Revision-Date: 2024-04-18 12:43+0000\n" |
472 | "Last-Translator: Andi Chandler <andi@gowling.com>\n" |
473 | "Language-Team: English (United Kingdom)\n" |
474 | "Language: en_GB\n" |
475 | @@ -966,6 +967,17 @@ msgid "DROPDOWN_MAX_ITEMS" |
476 | msgstr "DROPDOWN_MAX_ITEMS" |
477 | |
478 | msgid "" |
479 | +"Decides whether the DHCP Agents column should be shown on the Admin Networks " |
480 | +"panel. Retrieving data for that column takes time, and it may be advisable " |
481 | +"to disable it on large deployments with a large number on networks to speed " |
482 | +"up displaying of that view." |
483 | +msgstr "" |
484 | +"Decides whether the DHCP Agents column should be shown on the Admin Networks " |
485 | +"panel. Retrieving data for that column takes time, and it may be advisable " |
486 | +"to disable it on large deployments with a large number on networks to speed " |
487 | +"up displaying of that view." |
488 | + |
489 | +msgid "" |
490 | "Default DNS servers you would like to use when a subnet is created. This is " |
491 | "only a default. Users can still choose a different list of dns servers." |
492 | msgstr "" |
493 | @@ -989,6 +1001,9 @@ msgstr "" |
494 | "as much as possible, and support for this is given preference over more " |
495 | "exotic methods such as monkey patching and overrides files." |
496 | |
497 | +msgid "Default ``True``" |
498 | +msgstr "Default ``True``" |
499 | + |
500 | msgid "Default ``['*']``" |
501 | msgstr "Default ``['*']``" |
502 | |
503 | @@ -4734,6 +4749,9 @@ msgstr "physical_networks" |
504 | msgid "segmentation_id_range" |
505 | msgstr "segmentation_id_range" |
506 | |
507 | +msgid "show_agents_column" |
508 | +msgstr "show_agents_column" |
509 | + |
510 | msgid "supported_provider_types" |
511 | msgstr "supported_provider_types" |
512 | |
513 | diff --git a/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po b/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po |
514 | index f9980d7..e352181 100644 |
515 | --- a/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po |
516 | +++ b/doc/source/locale/en_GB/LC_MESSAGES/doc-contributor.po |
517 | @@ -4,15 +4,16 @@ |
518 | # Andi Chandler <andi@gowling.com>, 2021. #zanata |
519 | # Andi Chandler <andi@gowling.com>, 2022. #zanata |
520 | # Andi Chandler <andi@gowling.com>, 2023. #zanata |
521 | +# Andi Chandler <andi@gowling.com>, 2024. #zanata |
522 | msgid "" |
523 | msgstr "" |
524 | -"Project-Id-Version: horizon 23.4.1.dev25\n" |
525 | +"Project-Id-Version: horizon 24.0.1.dev2\n" |
526 | "Report-Msgid-Bugs-To: \n" |
527 | -"POT-Creation-Date: 2024-02-07 17:51+0000\n" |
528 | +"POT-Creation-Date: 2024-03-23 17:30+0000\n" |
529 | "MIME-Version: 1.0\n" |
530 | "Content-Type: text/plain; charset=UTF-8\n" |
531 | "Content-Transfer-Encoding: 8bit\n" |
532 | -"PO-Revision-Date: 2023-09-09 10:45+0000\n" |
533 | +"PO-Revision-Date: 2024-04-18 12:49+0000\n" |
534 | "Last-Translator: Andi Chandler <andi@gowling.com>\n" |
535 | "Language-Team: English (United Kingdom)\n" |
536 | "Language: en_GB\n" |
537 | @@ -7305,6 +7306,9 @@ msgstr "" |
538 | "Runs pep8, which is a tool that checks Python code style. You can read more " |
539 | "about pep8 at https://www.python.org/dev/peps/pep-0008/" |
540 | |
541 | +msgid "Runs the Python unit tests against Django 4.2." |
542 | +msgstr "Runs the Python unit tests against Django 4.2." |
543 | + |
544 | msgid "" |
545 | "Runs the Python unit tests against the current default version of Django " |
546 | "with Python 3.7 environment. Check ``requirements.txt`` in horizon " |
547 | @@ -7314,6 +7318,9 @@ msgstr "" |
548 | "with Python 3.7 environment. Check ``requirements.txt`` in Horizon " |
549 | "repository to know which version of Django is actually used." |
550 | |
551 | +msgid "Runs the Python unit tests with a Python 3.11 environment." |
552 | +msgstr "Runs the Python unit tests with a Python 3.11 environment." |
553 | + |
554 | msgid "SCSS files" |
555 | msgstr "SCSS files" |
556 | |
557 | @@ -12394,6 +12401,12 @@ msgstr "panel.py" |
558 | msgid "pep8" |
559 | msgstr "pep8" |
560 | |
561 | +msgid "py3-dj42" |
562 | +msgstr "py3-dj42" |
563 | + |
564 | +msgid "py311" |
565 | +msgstr "py311" |
566 | + |
567 | msgid "py37" |
568 | msgstr "py37" |
569 | |
570 | diff --git a/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po b/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po |
571 | index ec0acea..83012ff 100644 |
572 | --- a/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po |
573 | +++ b/doc/source/locale/en_GB/LC_MESSAGES/doc-install.po |
574 | @@ -2,15 +2,16 @@ |
575 | # Andi Chandler <andi@gowling.com>, 2019. #zanata |
576 | # Andi Chandler <andi@gowling.com>, 2020. #zanata |
577 | # Andi Chandler <andi@gowling.com>, 2022. #zanata |
578 | +# Andi Chandler <andi@gowling.com>, 2024. #zanata |
579 | msgid "" |
580 | msgstr "" |
581 | -"Project-Id-Version: horizon 23.4.1.dev25\n" |
582 | +"Project-Id-Version: horizon 24.0.1.dev2\n" |
583 | "Report-Msgid-Bugs-To: \n" |
584 | -"POT-Creation-Date: 2024-02-07 17:51+0000\n" |
585 | +"POT-Creation-Date: 2024-03-23 17:30+0000\n" |
586 | "MIME-Version: 1.0\n" |
587 | "Content-Type: text/plain; charset=UTF-8\n" |
588 | "Content-Transfer-Encoding: 8bit\n" |
589 | -"PO-Revision-Date: 2022-05-25 09:09+0000\n" |
590 | +"PO-Revision-Date: 2024-04-18 12:43+0000\n" |
591 | "Last-Translator: Andi Chandler <andi@gowling.com>\n" |
592 | "Language-Team: English (United Kingdom)\n" |
593 | "Language: en_GB\n" |
594 | @@ -364,6 +365,9 @@ msgstr "" |
595 | msgid "Deployment" |
596 | msgstr "Deployment" |
597 | |
598 | +msgid "Django 4.2" |
599 | +msgstr "Django 4.2" |
600 | + |
601 | msgid "Django support policy is documented at :ref:`django_support`." |
602 | msgstr "Django support policy is documented at :ref:`django_support`." |
603 | |
604 | @@ -582,6 +586,9 @@ msgstr "" |
605 | "certificate connection problems, point the server IP address to a domain " |
606 | "name, and give users access." |
607 | |
608 | +msgid "Python 3.8 or 3.11" |
609 | +msgstr "Python 3.8 or 3.11" |
610 | + |
611 | msgid "Python memcached module installed" |
612 | msgstr "Python memcached module installed" |
613 | |
614 | @@ -647,6 +654,9 @@ msgstr "Static Assets" |
615 | msgid "System Requirements" |
616 | msgstr "System Requirements" |
617 | |
618 | +msgid "The Caracal release of horizon has the following dependencies." |
619 | +msgstr "The Caracal release of Horizon has the following dependencies." |
620 | + |
621 | msgid "" |
622 | "The ``systemctl restart`` command starts each service if not currently " |
623 | "running." |
624 | diff --git a/horizon.egg-info/PKG-INFO b/horizon.egg-info/PKG-INFO |
625 | index b7dca79..ca6115f 100644 |
626 | --- a/horizon.egg-info/PKG-INFO |
627 | +++ b/horizon.egg-info/PKG-INFO |
628 | @@ -1,66 +1,10 @@ |
629 | -Metadata-Version: 1.2 |
630 | +Metadata-Version: 2.1 |
631 | Name: horizon |
632 | -Version: 24.0.0 |
633 | +Version: 24.0.1 |
634 | Summary: OpenStack Dashboard |
635 | Home-page: https://docs.openstack.org/horizon/latest/ |
636 | Author: OpenStack |
637 | Author-email: openstack-discuss@lists.openstack.org |
638 | -License: UNKNOWN |
639 | -Description: ============================= |
640 | - Horizon (OpenStack Dashboard) |
641 | - ============================= |
642 | - |
643 | - Horizon is a Django-based project aimed at providing a complete OpenStack |
644 | - Dashboard along with an extensible framework for building new dashboards |
645 | - from reusable components. The ``openstack_dashboard`` module is a reference |
646 | - implementation of a Django site that uses the ``horizon`` app to provide |
647 | - web-based interactions with the various OpenStack projects. |
648 | - |
649 | - * Project documentation: https://docs.openstack.org/horizon/latest/ |
650 | - * Release management: https://launchpad.net/horizon |
651 | - * Blueprints and feature specifications: https://blueprints.launchpad.net/horizon |
652 | - * Issue tracking: https://bugs.launchpad.net/horizon |
653 | - * Release notes: https://docs.openstack.org/releasenotes/horizon/ |
654 | - |
655 | - .. image:: https://governance.openstack.org/tc/badges/horizon.svg |
656 | - :target: https://governance.openstack.org/tc/reference/tags/ |
657 | - |
658 | - Using Horizon |
659 | - ============= |
660 | - |
661 | - See ``doc/source/install/index.rst`` about how to install Horizon |
662 | - in your OpenStack setup. It describes the example steps and |
663 | - has pointers for more detailed settings and configurations. |
664 | - |
665 | - It is also available at |
666 | - `Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_. |
667 | - |
668 | - Getting Started for Developers |
669 | - ============================== |
670 | - |
671 | - ``doc/source/quickstart.rst`` or |
672 | - `Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_ |
673 | - describes how to setup Horizon development environment and start development. |
674 | - |
675 | - Building Contributor Documentation |
676 | - ================================== |
677 | - |
678 | - This documentation is written by contributors, for contributors. |
679 | - |
680 | - The source is maintained in the ``doc/source`` directory using |
681 | - `reStructuredText`_ and built by `Sphinx`_ |
682 | - |
683 | - .. _reStructuredText: http://docutils.sourceforge.net/rst.html |
684 | - .. _Sphinx: http://sphinx-doc.org/ |
685 | - |
686 | - To build the docs, use:: |
687 | - |
688 | - $ tox -e docs |
689 | - |
690 | - Results are in the ``doc/build/html`` directory |
691 | - |
692 | - |
693 | -Platform: UNKNOWN |
694 | Classifier: Development Status :: 5 - Production/Stable |
695 | Classifier: Environment :: OpenStack |
696 | Classifier: Framework :: Django |
697 | @@ -77,3 +21,118 @@ Classifier: Programming Language :: Python :: 3.8 |
698 | Classifier: Programming Language :: Python :: 3.9 |
699 | Classifier: Topic :: Internet :: WWW/HTTP |
700 | Requires-Python: >=3.8 |
701 | +License-File: LICENSE |
702 | +Requires-Dist: pbr>=5.5.0 |
703 | +Requires-Dist: Babel>=2.6.0 |
704 | +Requires-Dist: debtcollector>=1.2.0 |
705 | +Requires-Dist: Django<4.3,>=4.2 |
706 | +Requires-Dist: django-compressor>=2.4.1 |
707 | +Requires-Dist: django-debreach>=1.4.2 |
708 | +Requires-Dist: django-pyscss>=2.0.3 |
709 | +Requires-Dist: futurist>=1.2.0 |
710 | +Requires-Dist: iso8601>=0.1.11 |
711 | +Requires-Dist: keystoneauth1>=4.3.1 |
712 | +Requires-Dist: netaddr>=0.7.18 |
713 | +Requires-Dist: oslo.concurrency>=4.5.0 |
714 | +Requires-Dist: oslo.config>=8.8.0 |
715 | +Requires-Dist: oslo.i18n>=5.1.0 |
716 | +Requires-Dist: oslo.policy>=3.11.0 |
717 | +Requires-Dist: oslo.serialization>=4.3.0 |
718 | +Requires-Dist: oslo.upgradecheck>=1.5.0 |
719 | +Requires-Dist: oslo.utils>=4.12.0 |
720 | +Requires-Dist: osprofiler>=3.4.2 |
721 | +Requires-Dist: pymongo!=3.1,>=3.0.2 |
722 | +Requires-Dist: pyScss>=1.4.0 |
723 | +Requires-Dist: python-cinderclient>=8.0.0 |
724 | +Requires-Dist: python-glanceclient>=2.8.0 |
725 | +Requires-Dist: python-keystoneclient>=3.22.0 |
726 | +Requires-Dist: python-neutronclient>=8.1.0 |
727 | +Requires-Dist: python-novaclient>=9.1.0 |
728 | +Requires-Dist: python-swiftclient>=3.2.0 |
729 | +Requires-Dist: pytz>=2013.6 |
730 | +Requires-Dist: PyYAML>=6.0 |
731 | +Requires-Dist: requests>=2.25.1 |
732 | +Requires-Dist: semantic-version>=2.3.1 |
733 | +Requires-Dist: XStatic>=1.0.3 |
734 | +Requires-Dist: XStatic-Angular>=1.8.2.2 |
735 | +Requires-Dist: XStatic-Angular-Bootstrap>=2.2.0.0 |
736 | +Requires-Dist: XStatic-Angular-FileUpload>=12.0.4.0 |
737 | +Requires-Dist: XStatic-Angular-Gettext>=2.3.8.0 |
738 | +Requires-Dist: XStatic-Angular-lrdragndrop>=1.0.2.2 |
739 | +Requires-Dist: XStatic-Angular-Schema-Form>=0.8.13.0 |
740 | +Requires-Dist: XStatic-Bootstrap-Datepicker>=1.3.1.0 |
741 | +Requires-Dist: XStatic-Bootstrap-SCSS>=3.3.7.1 |
742 | +Requires-Dist: XStatic-bootswatch>=3.3.7.0 |
743 | +Requires-Dist: XStatic-D3>=3.5.17.0 |
744 | +Requires-Dist: XStatic-Hogan>=2.0.0.2 |
745 | +Requires-Dist: XStatic-Font-Awesome>=4.7.0.0 |
746 | +Requires-Dist: XStatic-Jasmine>=2.4.1.1 |
747 | +Requires-Dist: XStatic-jQuery>=3.5.1.1 |
748 | +Requires-Dist: XStatic-JQuery-Migrate>=3 |
749 | +Requires-Dist: XStatic-JQuery.quicksearch>=2.0.3.1 |
750 | +Requires-Dist: XStatic-JQuery.TableSorter>=2.14.5.1 |
751 | +Requires-Dist: XStatic-jquery-ui>=1.12.1.1 |
752 | +Requires-Dist: XStatic-JSEncrypt>=2.3.1.1 |
753 | +Requires-Dist: XStatic-mdi>=1.6.50.2 |
754 | +Requires-Dist: XStatic-objectpath>=1.2.1.0 |
755 | +Requires-Dist: XStatic-Rickshaw>=1.5.0.0 |
756 | +Requires-Dist: XStatic-roboto-fontface>=0.5.0.0 |
757 | +Requires-Dist: XStatic-smart-table>=1.4.13.2 |
758 | +Requires-Dist: XStatic-Spin>=1.2.5.2 |
759 | +Requires-Dist: XStatic-term.js>=0.0.7.0 |
760 | +Requires-Dist: XStatic-tv4>=1.2.7.0 |
761 | +Requires-Dist: enmerkar>=0.7.1 |
762 | + |
763 | +============================= |
764 | +Horizon (OpenStack Dashboard) |
765 | +============================= |
766 | + |
767 | +Horizon is a Django-based project aimed at providing a complete OpenStack |
768 | +Dashboard along with an extensible framework for building new dashboards |
769 | +from reusable components. The ``openstack_dashboard`` module is a reference |
770 | +implementation of a Django site that uses the ``horizon`` app to provide |
771 | +web-based interactions with the various OpenStack projects. |
772 | + |
773 | +* Project documentation: https://docs.openstack.org/horizon/latest/ |
774 | +* Release management: https://launchpad.net/horizon |
775 | +* Blueprints and feature specifications: https://blueprints.launchpad.net/horizon |
776 | +* Issue tracking: https://bugs.launchpad.net/horizon |
777 | +* Release notes: https://docs.openstack.org/releasenotes/horizon/ |
778 | + |
779 | +.. image:: https://governance.openstack.org/tc/badges/horizon.svg |
780 | + :target: https://governance.openstack.org/tc/reference/tags/ |
781 | + |
782 | +Using Horizon |
783 | +============= |
784 | + |
785 | +See ``doc/source/install/index.rst`` about how to install Horizon |
786 | +in your OpenStack setup. It describes the example steps and |
787 | +has pointers for more detailed settings and configurations. |
788 | + |
789 | +It is also available at |
790 | +`Installation Guide <https://docs.openstack.org/horizon/latest/install/>`_. |
791 | + |
792 | +Getting Started for Developers |
793 | +============================== |
794 | + |
795 | +``doc/source/quickstart.rst`` or |
796 | +`Quickstart Guide <https://docs.openstack.org/horizon/latest/contributor/quickstart.html>`_ |
797 | +describes how to setup Horizon development environment and start development. |
798 | + |
799 | +Building Contributor Documentation |
800 | +================================== |
801 | + |
802 | +This documentation is written by contributors, for contributors. |
803 | + |
804 | +The source is maintained in the ``doc/source`` directory using |
805 | +`reStructuredText`_ and built by `Sphinx`_ |
806 | + |
807 | +.. _reStructuredText: http://docutils.sourceforge.net/rst.html |
808 | +.. _Sphinx: http://sphinx-doc.org/ |
809 | + |
810 | +To build the docs, use:: |
811 | + |
812 | + $ tox -e docs |
813 | + |
814 | +Results are in the ``doc/build/html`` directory |
815 | + |
816 | diff --git a/horizon.egg-info/SOURCES.txt b/horizon.egg-info/SOURCES.txt |
817 | index c853f9d..e2a8f9f 100644 |
818 | --- a/horizon.egg-info/SOURCES.txt |
819 | +++ b/horizon.egg-info/SOURCES.txt |
820 | @@ -2954,6 +2954,7 @@ releasenotes/notes/bug_1963652_fix_policy_for_resume-a719efb23054c708.yaml |
821 | releasenotes/notes/change-default-image-visibility-560c3b6ab2830cdc.yaml |
822 | releasenotes/notes/change-keystone-default-role-3f95b6af11aed63b.yaml |
823 | releasenotes/notes/change-keystone-url-default-value-6a56397acf4f7328.yaml |
824 | +releasenotes/notes/change-metadef-for-cinder-volume-type-f65dd215d2a3ce75.yaml |
825 | releasenotes/notes/cinder-api-v3-by-default-d6e3c12760fdf655.yaml |
826 | releasenotes/notes/cinder-backup-cinder-messages-2127d04da3c82033.yaml |
827 | releasenotes/notes/cinder-user-facing-messages-92cfd25492616d6d.yaml |
828 | @@ -3144,13 +3145,6 @@ releasenotes/source/yoga.rst |
829 | releasenotes/source/zed.rst |
830 | releasenotes/source/_static/.placeholder |
831 | releasenotes/source/_templates/.placeholder |
832 | -releasenotes/source/locale/de/LC_MESSAGES/releasenotes.po |
833 | -releasenotes/source/locale/en_GB/LC_MESSAGES/releasenotes.po |
834 | -releasenotes/source/locale/id/LC_MESSAGES/releasenotes.po |
835 | -releasenotes/source/locale/ja/LC_MESSAGES/releasenotes.po |
836 | -releasenotes/source/locale/ko_KR/LC_MESSAGES/releasenotes.po |
837 | -releasenotes/source/locale/pt_BR/LC_MESSAGES/releasenotes.po |
838 | -releasenotes/source/locale/zh_CN/LC_MESSAGES/releasenotes.po |
839 | roles/ensure-django/defaults/main.yaml |
840 | roles/ensure-django/tasks/main.yaml |
841 | roles/fetch-video-output/README.rst |
842 | diff --git a/horizon.egg-info/entry_points.txt b/horizon.egg-info/entry_points.txt |
843 | index 15c19b3..1011e3a 100644 |
844 | --- a/horizon.egg-info/entry_points.txt |
845 | +++ b/horizon.egg-info/entry_points.txt |
846 | @@ -4,4 +4,3 @@ angular = horizon.utils.babel_extract_angular:extract_angular |
847 | [oslo.config.opts] |
848 | openstack_dashboard = openstack_dashboard.utils.config:list_options |
849 | openstack_dashboard_integration_tests = openstack_dashboard.test.integration_tests.config:list_opts |
850 | - |
851 | diff --git a/horizon.egg-info/pbr.json b/horizon.egg-info/pbr.json |
852 | index 006b632..8a54205 100644 |
853 | --- a/horizon.egg-info/pbr.json |
854 | +++ b/horizon.egg-info/pbr.json |
855 | @@ -1 +1 @@ |
856 | -{"git_version": "3d9855eeb", "is_release": true} |
857 | \ No newline at end of file |
858 | +{"git_version": "a9267a60d", "is_release": true} |
859 | \ No newline at end of file |
860 | diff --git a/horizon.egg-info/requires.txt b/horizon.egg-info/requires.txt |
861 | index ab85861..29ab7f5 100644 |
862 | --- a/horizon.egg-info/requires.txt |
863 | +++ b/horizon.egg-info/requires.txt |
864 | @@ -1,39 +1,10 @@ |
865 | +pbr>=5.5.0 |
866 | Babel>=2.6.0 |
867 | -Django<4.3,>=4.2 |
868 | -PyYAML>=6.0 |
869 | -XStatic-Angular-Bootstrap>=2.2.0.0 |
870 | -XStatic-Angular-FileUpload>=12.0.4.0 |
871 | -XStatic-Angular-Gettext>=2.3.8.0 |
872 | -XStatic-Angular-Schema-Form>=0.8.13.0 |
873 | -XStatic-Angular-lrdragndrop>=1.0.2.2 |
874 | -XStatic-Angular>=1.8.2.2 |
875 | -XStatic-Bootstrap-Datepicker>=1.3.1.0 |
876 | -XStatic-Bootstrap-SCSS>=3.3.7.1 |
877 | -XStatic-D3>=3.5.17.0 |
878 | -XStatic-Font-Awesome>=4.7.0.0 |
879 | -XStatic-Hogan>=2.0.0.2 |
880 | -XStatic-JQuery-Migrate>=3 |
881 | -XStatic-JQuery.TableSorter>=2.14.5.1 |
882 | -XStatic-JQuery.quicksearch>=2.0.3.1 |
883 | -XStatic-JSEncrypt>=2.3.1.1 |
884 | -XStatic-Jasmine>=2.4.1.1 |
885 | -XStatic-Rickshaw>=1.5.0.0 |
886 | -XStatic-Spin>=1.2.5.2 |
887 | -XStatic-bootswatch>=3.3.7.0 |
888 | -XStatic-jQuery>=3.5.1.1 |
889 | -XStatic-jquery-ui>=1.12.1.1 |
890 | -XStatic-mdi>=1.6.50.2 |
891 | -XStatic-objectpath>=1.2.1.0 |
892 | -XStatic-roboto-fontface>=0.5.0.0 |
893 | -XStatic-smart-table>=1.4.13.2 |
894 | -XStatic-term.js>=0.0.7.0 |
895 | -XStatic-tv4>=1.2.7.0 |
896 | -XStatic>=1.0.3 |
897 | debtcollector>=1.2.0 |
898 | +Django<4.3,>=4.2 |
899 | django-compressor>=2.4.1 |
900 | django-debreach>=1.4.2 |
901 | django-pyscss>=2.0.3 |
902 | -enmerkar>=0.7.1 |
903 | futurist>=1.2.0 |
904 | iso8601>=0.1.11 |
905 | keystoneauth1>=4.3.1 |
906 | @@ -46,9 +17,8 @@ oslo.serialization>=4.3.0 |
907 | oslo.upgradecheck>=1.5.0 |
908 | oslo.utils>=4.12.0 |
909 | osprofiler>=3.4.2 |
910 | -pbr>=5.5.0 |
911 | -pyScss>=1.4.0 |
912 | pymongo!=3.1,>=3.0.2 |
913 | +pyScss>=1.4.0 |
914 | python-cinderclient>=8.0.0 |
915 | python-glanceclient>=2.8.0 |
916 | python-keystoneclient>=3.22.0 |
917 | @@ -56,5 +26,35 @@ python-neutronclient>=8.1.0 |
918 | python-novaclient>=9.1.0 |
919 | python-swiftclient>=3.2.0 |
920 | pytz>=2013.6 |
921 | +PyYAML>=6.0 |
922 | requests>=2.25.1 |
923 | semantic-version>=2.3.1 |
924 | +XStatic>=1.0.3 |
925 | +XStatic-Angular>=1.8.2.2 |
926 | +XStatic-Angular-Bootstrap>=2.2.0.0 |
927 | +XStatic-Angular-FileUpload>=12.0.4.0 |
928 | +XStatic-Angular-Gettext>=2.3.8.0 |
929 | +XStatic-Angular-lrdragndrop>=1.0.2.2 |
930 | +XStatic-Angular-Schema-Form>=0.8.13.0 |
931 | +XStatic-Bootstrap-Datepicker>=1.3.1.0 |
932 | +XStatic-Bootstrap-SCSS>=3.3.7.1 |
933 | +XStatic-bootswatch>=3.3.7.0 |
934 | +XStatic-D3>=3.5.17.0 |
935 | +XStatic-Hogan>=2.0.0.2 |
936 | +XStatic-Font-Awesome>=4.7.0.0 |
937 | +XStatic-Jasmine>=2.4.1.1 |
938 | +XStatic-jQuery>=3.5.1.1 |
939 | +XStatic-JQuery-Migrate>=3 |
940 | +XStatic-JQuery.quicksearch>=2.0.3.1 |
941 | +XStatic-JQuery.TableSorter>=2.14.5.1 |
942 | +XStatic-jquery-ui>=1.12.1.1 |
943 | +XStatic-JSEncrypt>=2.3.1.1 |
944 | +XStatic-mdi>=1.6.50.2 |
945 | +XStatic-objectpath>=1.2.1.0 |
946 | +XStatic-Rickshaw>=1.5.0.0 |
947 | +XStatic-roboto-fontface>=0.5.0.0 |
948 | +XStatic-smart-table>=1.4.13.2 |
949 | +XStatic-Spin>=1.2.5.2 |
950 | +XStatic-term.js>=0.0.7.0 |
951 | +XStatic-tv4>=1.2.7.0 |
952 | +enmerkar>=0.7.1 |
953 | diff --git a/openstack_auth/policy.py b/openstack_auth/policy.py |
954 | index 2b43ef3..30b29e4 100644 |
955 | --- a/openstack_auth/policy.py |
956 | +++ b/openstack_auth/policy.py |
957 | @@ -59,8 +59,11 @@ def _get_policy_file_with_full_path(service): |
958 | def _convert_to_ruledefault(p): |
959 | deprecated = p.get('deprecated_rule') |
960 | if deprecated: |
961 | - deprecated_rule = policy.DeprecatedRule(deprecated['name'], |
962 | - deprecated['check_str']) |
963 | + deprecated_rule = policy.DeprecatedRule( |
964 | + deprecated['name'], |
965 | + deprecated['check_str'], |
966 | + deprecated_reason=deprecated.get('deprecated_reason'), |
967 | + deprecated_since=deprecated.get('deprecated_since')) |
968 | else: |
969 | deprecated_rule = None |
970 | |
971 | diff --git a/openstack_dashboard/api/keystone.py b/openstack_dashboard/api/keystone.py |
972 | index 976b61c..5bb86af 100644 |
973 | --- a/openstack_dashboard/api/keystone.py |
974 | +++ b/openstack_dashboard/api/keystone.py |
975 | @@ -221,7 +221,7 @@ def domain_delete(request, domain_id): |
976 | |
977 | @profiler.trace |
978 | def domain_list(request): |
979 | - manager = keystoneclient(request, admin=True).domains |
980 | + manager = keystoneclient(request, admin=True, force_scoped=True).domains |
981 | return manager.list() |
982 | |
983 | |
984 | diff --git a/openstack_dashboard/api/neutron.py b/openstack_dashboard/api/neutron.py |
985 | index 3df0e8a..2ad1ca5 100644 |
986 | --- a/openstack_dashboard/api/neutron.py |
987 | +++ b/openstack_dashboard/api/neutron.py |
988 | @@ -213,7 +213,8 @@ class PortAllowedAddressPair(NeutronAPIDictWrapper): |
989 | def __init__(self, addr_pair): |
990 | super().__init__(addr_pair) |
991 | # Horizon references id property for table operations |
992 | - self.id = addr_pair['ip_address'] |
993 | + mac_addr = addr_pair['mac_address'].replace(':', '-') |
994 | + self.id = addr_pair['ip_address'] + ":" + mac_addr |
995 | |
996 | |
997 | class Router(NeutronAPIDictWrapper): |
998 | diff --git a/openstack_dashboard/api/placement.py b/openstack_dashboard/api/placement.py |
999 | index 60c07d4..f2cf5ae 100644 |
1000 | --- a/openstack_dashboard/api/placement.py |
1001 | +++ b/openstack_dashboard/api/placement.py |
1002 | @@ -10,6 +10,7 @@ |
1003 | # License for the specific language governing permissions and limitations |
1004 | # under the License. |
1005 | |
1006 | +from django.conf import settings |
1007 | from keystoneauth1 import adapter |
1008 | from keystoneauth1 import identity |
1009 | from keystoneauth1 import session |
1010 | @@ -41,7 +42,15 @@ def make_adapter(request): |
1011 | project_name=request.user.project_name, |
1012 | project_domain_name=request.user.domain_id, |
1013 | ) |
1014 | - return Adapter(session.Session(auth=auth), api_version="placement 1.6") |
1015 | + verify = True |
1016 | + if settings.OPENSTACK_SSL_NO_VERIFY: |
1017 | + verify = False |
1018 | + elif settings.OPENSTACK_SSL_CACERT: |
1019 | + verify = settings.OPENSTACK_SSL_CACERT |
1020 | + return Adapter( |
1021 | + session.Session(auth=auth, verify=verify), |
1022 | + api_version="placement 1.6", |
1023 | + ) |
1024 | |
1025 | |
1026 | def _get_json(request, path): |
1027 | @@ -91,38 +100,55 @@ def get_providers(request): |
1028 | usages = resource_provider_usages(request, p['uuid']) |
1029 | vcpus = inventories.get('VCPU') |
1030 | pcpus = inventories.get('PCPU') |
1031 | + memory = inventories.get('MEMORY_MB') |
1032 | + disk = inventories.get('DISK_GB') |
1033 | p['inventories'] = inventories |
1034 | p['usages'] = usages |
1035 | p['aggregates'] = resource_provider_aggregates(request, p['uuid']) |
1036 | p['traits'] = resource_provider_traits(request, p['uuid']) |
1037 | |
1038 | p['vcpus_used'] = usages.get('VCPU') |
1039 | - p['vcpus_reserved'] = vcpus['reserved'] if vcpus is not None else None |
1040 | + # Reserved: |
1041 | # The actual amount of the resource that the provider can accommodate |
1042 | - p['vcpus'] = vcpus['total'] if vcpus is not None else None |
1043 | + # Total: |
1044 | # Overall capacity |
1045 | - p['vcpus_ar'] = vcpus['allocation_ratio'] \ |
1046 | - if vcpus is not None else None |
1047 | - p['vcpus_capacity'] = int(vcpus['allocation_ratio'] * vcpus['total']) \ |
1048 | - if vcpus is not None else None |
1049 | + if vcpus is not None: |
1050 | + p.update(vcpus_reserved=vcpus['reserved'], |
1051 | + vcpus=vcpus['total'], |
1052 | + vcpus_ar=vcpus['allocation_ratio']) |
1053 | + p['vcpus_capacity'] = int(p['vcpus_ar'] * p['vcpus']) |
1054 | + else: |
1055 | + p.update(vcpus_reserved=None, vcpus=None, |
1056 | + vcpus_ar=None, vcpus_capacity=None) |
1057 | |
1058 | p['pcpus_used'] = usages.get('PCPU') |
1059 | - p['pcpus_reserved'] = pcpus['reserved'] if pcpus is not None else None |
1060 | - p['pcpus'] = pcpus['total'] if pcpus is not None else None |
1061 | - p['pcpus_ar'] = pcpus['allocation_ratio'] \ |
1062 | - if pcpus is not None else None |
1063 | - p['pcpus_capacity'] = int(pcpus['allocation_ratio'] * pcpus['total']) \ |
1064 | - if pcpus is not None else None |
1065 | - |
1066 | - p['memory_mb_used'] = usages['MEMORY_MB'] |
1067 | - p['memory_mb_reserved'] = inventories['MEMORY_MB']['reserved'] |
1068 | - p['memory_mb'] = inventories['MEMORY_MB']['total'] |
1069 | - p['memory_mb_ar'] = inventories['MEMORY_MB']['allocation_ratio'] |
1070 | - p['memory_mb_capacity'] = p['memory_mb_ar'] * p['memory_mb'] |
1071 | - |
1072 | - p['disk_gb_used'] = usages['DISK_GB'] |
1073 | - p['disk_gb_reserved'] = inventories['DISK_GB']['reserved'] |
1074 | - p['disk_gb'] = inventories['DISK_GB']['total'] |
1075 | - p['disk_gb_ar'] = inventories['DISK_GB']['allocation_ratio'] |
1076 | - p['disk_gb_capacity'] = p['disk_gb_ar'] * p['disk_gb'] |
1077 | + if pcpus is not None: |
1078 | + p.update(pcpus_reserved=pcpus['reserved'], |
1079 | + pcpus=pcpus['total'], |
1080 | + pcpus_ar=pcpus['allocation_ratio']) |
1081 | + p['pcpus_capacity'] = int(p['pcpus_ar'] * p['pcpus']) |
1082 | + else: |
1083 | + p.update(pcpus_reserved=None, pcpus=None, |
1084 | + pcpus_ar=None, pcpus_capacity=None) |
1085 | + |
1086 | + p['memory_mb_used'] = usages.get('MEMORY_MB') |
1087 | + if memory is not None: |
1088 | + p.update(memory_mb_reserved=memory['reserved'], |
1089 | + memory_mb=memory['total'], |
1090 | + memory_mb_ar=memory['allocation_ratio']) |
1091 | + p['memory_mb_capacity'] = p['memory_mb_ar'] * p['memory_mb'] |
1092 | + else: |
1093 | + p.update(memory_mb_reserved=None, memory_mb=None, |
1094 | + memory_mb_ar=None, memory_mb_capacity=None) |
1095 | + |
1096 | + p['disk_gb_used'] = usages.get('DISK_GB') |
1097 | + if disk is not None: |
1098 | + p.update(disk_gb_reserved=disk['reserved'], |
1099 | + disk_gb=disk['total'], |
1100 | + disk_gb_ar=disk['allocation_ratio']) |
1101 | + p['disk_gb_capacity'] = p['disk_gb_ar'] * p['disk_gb'] |
1102 | + else: |
1103 | + p.update(disk_gb_reserved=None, disk_gb=None, |
1104 | + disk_gb_ar=None, disk_gb_capacity=None) |
1105 | + |
1106 | return providers |
1107 | diff --git a/openstack_dashboard/conf/default_policies/cinder.yaml b/openstack_dashboard/conf/default_policies/cinder.yaml |
1108 | index 1badc61..31dda6e 100644 |
1109 | --- a/openstack_dashboard/conf/default_policies/cinder.yaml |
1110 | +++ b/openstack_dashboard/conf/default_policies/cinder.yaml |
1111 | @@ -32,11 +32,14 @@ |
1112 | operations: [] |
1113 | scope_types: null |
1114 | - check_str: rule:xena_system_admin_or_project_member |
1115 | - deprecated_reason: null |
1116 | deprecated_rule: |
1117 | check_str: '' |
1118 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1119 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1120 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1121 | + (Xena release) for details. |
1122 | + deprecated_since: X |
1123 | name: volume:attachment_create |
1124 | - deprecated_since: null |
1125 | description: Create attachment. |
1126 | name: volume:attachment_create |
1127 | operations: |
1128 | @@ -44,11 +47,14 @@ |
1129 | path: /attachments |
1130 | scope_types: null |
1131 | - check_str: rule:xena_system_admin_or_project_member |
1132 | - deprecated_reason: null |
1133 | deprecated_rule: |
1134 | check_str: rule:admin_or_owner |
1135 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1136 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1137 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1138 | + (Xena release) for details. |
1139 | + deprecated_since: X |
1140 | name: volume:attachment_update |
1141 | - deprecated_since: null |
1142 | description: Update attachment. |
1143 | name: volume:attachment_update |
1144 | operations: |
1145 | @@ -56,11 +62,14 @@ |
1146 | path: /attachments/{attachment_id} |
1147 | scope_types: null |
1148 | - check_str: rule:xena_system_admin_or_project_member |
1149 | - deprecated_reason: null |
1150 | deprecated_rule: |
1151 | check_str: rule:admin_or_owner |
1152 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1153 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1154 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1155 | + (Xena release) for details. |
1156 | + deprecated_since: X |
1157 | name: volume:attachment_delete |
1158 | - deprecated_since: null |
1159 | description: Delete attachment. |
1160 | name: volume:attachment_delete |
1161 | operations: |
1162 | @@ -68,11 +77,14 @@ |
1163 | path: /attachments/{attachment_id} |
1164 | scope_types: null |
1165 | - check_str: rule:xena_system_admin_or_project_member |
1166 | - deprecated_reason: null |
1167 | deprecated_rule: |
1168 | check_str: rule:admin_or_owner |
1169 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1170 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1171 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1172 | + (Xena release) for details. |
1173 | + deprecated_since: X |
1174 | name: volume:attachment_complete |
1175 | - deprecated_since: null |
1176 | description: Mark a volume attachment process as completed (in-use) |
1177 | name: volume:attachment_complete |
1178 | operations: |
1179 | @@ -80,11 +92,14 @@ |
1180 | path: /attachments/{attachment_id}/action (os-complete) |
1181 | scope_types: null |
1182 | - check_str: rule:xena_system_admin_or_project_member |
1183 | - deprecated_reason: null |
1184 | deprecated_rule: |
1185 | check_str: rule:admin_or_owner |
1186 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1187 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1188 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1189 | + (Xena release) for details. |
1190 | + deprecated_since: X |
1191 | name: volume:multiattach_bootable_volume |
1192 | - deprecated_since: null |
1193 | description: Allow multiattach of bootable volumes. |
1194 | name: volume:multiattach_bootable_volume |
1195 | operations: |
1196 | @@ -92,11 +107,14 @@ |
1197 | path: /attachments |
1198 | scope_types: null |
1199 | - check_str: rule:xena_system_admin_or_project_reader |
1200 | - deprecated_reason: null |
1201 | deprecated_rule: |
1202 | check_str: rule:admin_or_owner |
1203 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1204 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1205 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1206 | + (Xena release) for details. |
1207 | + deprecated_since: X |
1208 | name: message:get_all |
1209 | - deprecated_since: null |
1210 | description: List messages. |
1211 | name: message:get_all |
1212 | operations: |
1213 | @@ -104,11 +122,14 @@ |
1214 | path: /messages |
1215 | scope_types: null |
1216 | - check_str: rule:xena_system_admin_or_project_reader |
1217 | - deprecated_reason: null |
1218 | deprecated_rule: |
1219 | check_str: rule:admin_or_owner |
1220 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1221 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1222 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1223 | + (Xena release) for details. |
1224 | + deprecated_since: X |
1225 | name: message:get |
1226 | - deprecated_since: null |
1227 | description: Show message. |
1228 | name: message:get |
1229 | operations: |
1230 | @@ -116,11 +137,14 @@ |
1231 | path: /messages/{message_id} |
1232 | scope_types: null |
1233 | - check_str: rule:xena_system_admin_or_project_member |
1234 | - deprecated_reason: null |
1235 | deprecated_rule: |
1236 | check_str: rule:admin_or_owner |
1237 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1238 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1239 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1240 | + (Xena release) for details. |
1241 | + deprecated_since: X |
1242 | name: message:delete |
1243 | - deprecated_since: null |
1244 | description: Delete message. |
1245 | name: message:delete |
1246 | operations: |
1247 | @@ -158,11 +182,14 @@ |
1248 | path: /workers/cleanup |
1249 | scope_types: null |
1250 | - check_str: rule:xena_system_admin_or_project_reader |
1251 | - deprecated_reason: null |
1252 | deprecated_rule: |
1253 | check_str: rule:admin_or_owner |
1254 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1255 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1256 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1257 | + (Xena release) for details. |
1258 | + deprecated_since: X |
1259 | name: volume:get_snapshot_metadata |
1260 | - deprecated_since: null |
1261 | description: Show snapshot's metadata or one specified metadata with a given key. |
1262 | name: volume:get_snapshot_metadata |
1263 | operations: |
1264 | @@ -172,11 +199,14 @@ |
1265 | path: /snapshots/{snapshot_id}/metadata/{key} |
1266 | scope_types: null |
1267 | - check_str: rule:xena_system_admin_or_project_member |
1268 | - deprecated_reason: null |
1269 | deprecated_rule: |
1270 | check_str: rule:admin_or_owner |
1271 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1272 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1273 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1274 | + (Xena release) for details. |
1275 | + deprecated_since: X |
1276 | name: volume:update_snapshot_metadata |
1277 | - deprecated_since: null |
1278 | description: Update snapshot's metadata or one specified metadata with a given key. |
1279 | name: volume:update_snapshot_metadata |
1280 | operations: |
1281 | @@ -186,11 +216,14 @@ |
1282 | path: /snapshots/{snapshot_id}/metadata/{key} |
1283 | scope_types: null |
1284 | - check_str: rule:xena_system_admin_or_project_member |
1285 | - deprecated_reason: null |
1286 | deprecated_rule: |
1287 | check_str: rule:admin_or_owner |
1288 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1289 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1290 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1291 | + (Xena release) for details. |
1292 | + deprecated_since: X |
1293 | name: volume:delete_snapshot_metadata |
1294 | - deprecated_since: null |
1295 | description: Delete snapshot's specified metadata with a given key. |
1296 | name: volume:delete_snapshot_metadata |
1297 | operations: |
1298 | @@ -198,11 +231,14 @@ |
1299 | path: /snapshots/{snapshot_id}/metadata/{key} |
1300 | scope_types: null |
1301 | - check_str: rule:xena_system_admin_or_project_reader |
1302 | - deprecated_reason: null |
1303 | deprecated_rule: |
1304 | check_str: rule:admin_or_owner |
1305 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1306 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1307 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1308 | + (Xena release) for details. |
1309 | + deprecated_since: X |
1310 | name: volume:get_all_snapshots |
1311 | - deprecated_since: null |
1312 | description: List snapshots. |
1313 | name: volume:get_all_snapshots |
1314 | operations: |
1315 | @@ -212,11 +248,14 @@ |
1316 | path: /snapshots/detail |
1317 | scope_types: null |
1318 | - check_str: rule:xena_system_admin_or_project_reader |
1319 | - deprecated_reason: null |
1320 | deprecated_rule: |
1321 | check_str: rule:admin_or_owner |
1322 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1323 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1324 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1325 | + (Xena release) for details. |
1326 | + deprecated_since: X |
1327 | name: volume_extension:extended_snapshot_attributes |
1328 | - deprecated_since: null |
1329 | description: List or show snapshots with extended attributes. |
1330 | name: volume_extension:extended_snapshot_attributes |
1331 | operations: |
1332 | @@ -226,11 +265,14 @@ |
1333 | path: /snapshots/detail |
1334 | scope_types: null |
1335 | - check_str: rule:xena_system_admin_or_project_member |
1336 | - deprecated_reason: null |
1337 | deprecated_rule: |
1338 | check_str: rule:admin_or_owner |
1339 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1340 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1341 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1342 | + (Xena release) for details. |
1343 | + deprecated_since: X |
1344 | name: volume:create_snapshot |
1345 | - deprecated_since: null |
1346 | description: Create snapshot. |
1347 | name: volume:create_snapshot |
1348 | operations: |
1349 | @@ -238,11 +280,14 @@ |
1350 | path: /snapshots |
1351 | scope_types: null |
1352 | - check_str: rule:xena_system_admin_or_project_reader |
1353 | - deprecated_reason: null |
1354 | deprecated_rule: |
1355 | check_str: rule:admin_or_owner |
1356 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1357 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1358 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1359 | + (Xena release) for details. |
1360 | + deprecated_since: X |
1361 | name: volume:get_snapshot |
1362 | - deprecated_since: null |
1363 | description: Show snapshot. |
1364 | name: volume:get_snapshot |
1365 | operations: |
1366 | @@ -250,11 +295,14 @@ |
1367 | path: /snapshots/{snapshot_id} |
1368 | scope_types: null |
1369 | - check_str: rule:xena_system_admin_or_project_member |
1370 | - deprecated_reason: null |
1371 | deprecated_rule: |
1372 | check_str: rule:admin_or_owner |
1373 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1374 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1375 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1376 | + (Xena release) for details. |
1377 | + deprecated_since: X |
1378 | name: volume:update_snapshot |
1379 | - deprecated_since: null |
1380 | description: Update snapshot. |
1381 | name: volume:update_snapshot |
1382 | operations: |
1383 | @@ -262,11 +310,14 @@ |
1384 | path: /snapshots/{snapshot_id} |
1385 | scope_types: null |
1386 | - check_str: rule:xena_system_admin_or_project_member |
1387 | - deprecated_reason: null |
1388 | deprecated_rule: |
1389 | check_str: rule:admin_or_owner |
1390 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1391 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1392 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1393 | + (Xena release) for details. |
1394 | + deprecated_since: X |
1395 | name: volume:delete_snapshot |
1396 | - deprecated_since: null |
1397 | description: Delete snapshot. |
1398 | name: volume:delete_snapshot |
1399 | operations: |
1400 | @@ -281,11 +332,14 @@ |
1401 | path: /snapshots/{snapshot_id}/action (os-reset_status) |
1402 | scope_types: null |
1403 | - check_str: rule:xena_system_admin_or_project_member |
1404 | - deprecated_reason: null |
1405 | deprecated_rule: |
1406 | check_str: '' |
1407 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1408 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1409 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1410 | + (Xena release) for details. |
1411 | + deprecated_since: X |
1412 | name: snapshot_extension:snapshot_actions:update_snapshot_status |
1413 | - deprecated_since: null |
1414 | description: Update database fields of snapshot. |
1415 | name: snapshot_extension:snapshot_actions:update_snapshot_status |
1416 | operations: |
1417 | @@ -323,11 +377,14 @@ |
1418 | path: /snapshots/{snapshot_id}/action (os-unmanage) |
1419 | scope_types: null |
1420 | - check_str: rule:xena_system_admin_or_project_reader |
1421 | - deprecated_reason: null |
1422 | deprecated_rule: |
1423 | check_str: rule:admin_or_owner |
1424 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1425 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1426 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1427 | + (Xena release) for details. |
1428 | + deprecated_since: X |
1429 | name: backup:get_all |
1430 | - deprecated_since: null |
1431 | description: List backups. |
1432 | name: backup:get_all |
1433 | operations: |
1434 | @@ -346,11 +403,14 @@ |
1435 | path: /backups/detail |
1436 | scope_types: null |
1437 | - check_str: rule:xena_system_admin_or_project_member |
1438 | - deprecated_reason: null |
1439 | deprecated_rule: |
1440 | check_str: '' |
1441 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1442 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1443 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1444 | + (Xena release) for details. |
1445 | + deprecated_since: X |
1446 | name: backup:create |
1447 | - deprecated_since: null |
1448 | description: Create backup. |
1449 | name: backup:create |
1450 | operations: |
1451 | @@ -358,11 +418,14 @@ |
1452 | path: /backups |
1453 | scope_types: null |
1454 | - check_str: rule:xena_system_admin_or_project_reader |
1455 | - deprecated_reason: null |
1456 | deprecated_rule: |
1457 | check_str: rule:admin_or_owner |
1458 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1459 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1460 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1461 | + (Xena release) for details. |
1462 | + deprecated_since: X |
1463 | name: backup:get |
1464 | - deprecated_since: null |
1465 | description: Show backup. |
1466 | name: backup:get |
1467 | operations: |
1468 | @@ -370,11 +433,14 @@ |
1469 | path: /backups/{backup_id} |
1470 | scope_types: null |
1471 | - check_str: rule:xena_system_admin_or_project_member |
1472 | - deprecated_reason: null |
1473 | deprecated_rule: |
1474 | check_str: rule:admin_or_owner |
1475 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1476 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1477 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1478 | + (Xena release) for details. |
1479 | + deprecated_since: X |
1480 | name: backup:update |
1481 | - deprecated_since: null |
1482 | description: Update backup. |
1483 | name: backup:update |
1484 | operations: |
1485 | @@ -382,11 +448,14 @@ |
1486 | path: /backups/{backup_id} |
1487 | scope_types: null |
1488 | - check_str: rule:xena_system_admin_or_project_member |
1489 | - deprecated_reason: null |
1490 | deprecated_rule: |
1491 | check_str: rule:admin_or_owner |
1492 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1493 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1494 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1495 | + (Xena release) for details. |
1496 | + deprecated_since: X |
1497 | name: backup:delete |
1498 | - deprecated_since: null |
1499 | description: Delete backup. |
1500 | name: backup:delete |
1501 | operations: |
1502 | @@ -394,11 +463,14 @@ |
1503 | path: /backups/{backup_id} |
1504 | scope_types: null |
1505 | - check_str: rule:xena_system_admin_or_project_member |
1506 | - deprecated_reason: null |
1507 | deprecated_rule: |
1508 | check_str: rule:admin_or_owner |
1509 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1510 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1511 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1512 | + (Xena release) for details. |
1513 | + deprecated_since: X |
1514 | name: backup:restore |
1515 | - deprecated_since: null |
1516 | description: Restore backup. |
1517 | name: backup:restore |
1518 | operations: |
1519 | @@ -434,11 +506,14 @@ |
1520 | path: /backups/{backup_id}/action (os-force_delete) |
1521 | scope_types: null |
1522 | - check_str: rule:xena_system_admin_or_project_reader |
1523 | - deprecated_reason: null |
1524 | deprecated_rule: |
1525 | check_str: rule:admin_or_owner |
1526 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1527 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1528 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1529 | + (Xena release) for details. |
1530 | + deprecated_since: X |
1531 | name: group:get_all |
1532 | - deprecated_since: null |
1533 | description: List groups. |
1534 | name: group:get_all |
1535 | operations: |
1536 | @@ -448,11 +523,14 @@ |
1537 | path: /groups/detail |
1538 | scope_types: null |
1539 | - check_str: rule:xena_system_admin_or_project_member |
1540 | - deprecated_reason: null |
1541 | deprecated_rule: |
1542 | check_str: '' |
1543 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1544 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1545 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1546 | + (Xena release) for details. |
1547 | + deprecated_since: X |
1548 | name: group:create |
1549 | - deprecated_since: null |
1550 | description: Create group. |
1551 | name: group:create |
1552 | operations: |
1553 | @@ -460,11 +538,14 @@ |
1554 | path: /groups |
1555 | scope_types: null |
1556 | - check_str: rule:xena_system_admin_or_project_reader |
1557 | - deprecated_reason: null |
1558 | deprecated_rule: |
1559 | check_str: rule:admin_or_owner |
1560 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1561 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1562 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1563 | + (Xena release) for details. |
1564 | + deprecated_since: X |
1565 | name: group:get |
1566 | - deprecated_since: null |
1567 | description: Show group. |
1568 | name: group:get |
1569 | operations: |
1570 | @@ -472,11 +553,14 @@ |
1571 | path: /groups/{group_id} |
1572 | scope_types: null |
1573 | - check_str: rule:xena_system_admin_or_project_member |
1574 | - deprecated_reason: null |
1575 | deprecated_rule: |
1576 | check_str: rule:admin_or_owner |
1577 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1578 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1579 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1580 | + (Xena release) for details. |
1581 | + deprecated_since: X |
1582 | name: group:update |
1583 | - deprecated_since: null |
1584 | description: Update group. |
1585 | name: group:update |
1586 | operations: |
1587 | @@ -493,11 +577,12 @@ |
1588 | path: /groups/detail |
1589 | scope_types: null |
1590 | - check_str: rule:admin_api |
1591 | - deprecated_reason: null |
1592 | deprecated_rule: |
1593 | check_str: rule:admin_api |
1594 | + deprecated_reason: group:group_types_manage has been replaced by more granular |
1595 | + policies that separately govern POST, PUT, and DELETE operations. |
1596 | + deprecated_since: X |
1597 | name: group:group_types_manage |
1598 | - deprecated_since: null |
1599 | description: Create a group type. |
1600 | name: group:group_types:create |
1601 | operations: |
1602 | @@ -505,11 +590,12 @@ |
1603 | path: /group_types/ |
1604 | scope_types: null |
1605 | - check_str: rule:admin_api |
1606 | - deprecated_reason: null |
1607 | deprecated_rule: |
1608 | check_str: rule:admin_api |
1609 | + deprecated_reason: group:group_types_manage has been replaced by more granular |
1610 | + policies that separately govern POST, PUT, and DELETE operations. |
1611 | + deprecated_since: X |
1612 | name: group:group_types_manage |
1613 | - deprecated_since: null |
1614 | description: Update a group type. |
1615 | name: group:group_types:update |
1616 | operations: |
1617 | @@ -517,11 +603,12 @@ |
1618 | path: /group_types/{group_type_id} |
1619 | scope_types: null |
1620 | - check_str: rule:admin_api |
1621 | - deprecated_reason: null |
1622 | deprecated_rule: |
1623 | check_str: rule:admin_api |
1624 | + deprecated_reason: group:group_types_manage has been replaced by more granular |
1625 | + policies that separately govern POST, PUT, and DELETE operations. |
1626 | + deprecated_since: X |
1627 | name: group:group_types_manage |
1628 | - deprecated_since: null |
1629 | description: Delete a group type. |
1630 | name: group:group_types:delete |
1631 | operations: |
1632 | @@ -536,11 +623,12 @@ |
1633 | path: /group_types/{group_type_id} |
1634 | scope_types: null |
1635 | - check_str: rule:admin_api |
1636 | - deprecated_reason: null |
1637 | deprecated_rule: |
1638 | check_str: rule:admin_api |
1639 | + deprecated_reason: group:group_types_specs has been replaced by more granular |
1640 | + policies that separately govern GET, POST, PUT, and DELETE operations. |
1641 | + deprecated_since: X |
1642 | name: group:group_types_specs |
1643 | - deprecated_since: null |
1644 | description: Show a group type spec. |
1645 | name: group:group_types_specs:get |
1646 | operations: |
1647 | @@ -548,11 +636,12 @@ |
1648 | path: /group_types/{group_type_id}/group_specs/{g_spec_id} |
1649 | scope_types: null |
1650 | - check_str: rule:admin_api |
1651 | - deprecated_reason: null |
1652 | deprecated_rule: |
1653 | check_str: rule:admin_api |
1654 | + deprecated_reason: group:group_types_specs has been replaced by more granular |
1655 | + policies that separately govern GET, POST, PUT, and DELETE operations. |
1656 | + deprecated_since: X |
1657 | name: group:group_types_specs |
1658 | - deprecated_since: null |
1659 | description: List group type specs. |
1660 | name: group:group_types_specs:get_all |
1661 | operations: |
1662 | @@ -560,11 +649,12 @@ |
1663 | path: /group_types/{group_type_id}/group_specs |
1664 | scope_types: null |
1665 | - check_str: rule:admin_api |
1666 | - deprecated_reason: null |
1667 | deprecated_rule: |
1668 | check_str: rule:admin_api |
1669 | + deprecated_reason: group:group_types_specs has been replaced by more granular |
1670 | + policies that separately govern GET, POST, PUT, and DELETE operations. |
1671 | + deprecated_since: X |
1672 | name: group:group_types_specs |
1673 | - deprecated_since: null |
1674 | description: Create a group type spec. |
1675 | name: group:group_types_specs:create |
1676 | operations: |
1677 | @@ -572,11 +662,12 @@ |
1678 | path: /group_types/{group_type_id}/group_specs |
1679 | scope_types: null |
1680 | - check_str: rule:admin_api |
1681 | - deprecated_reason: null |
1682 | deprecated_rule: |
1683 | check_str: rule:admin_api |
1684 | + deprecated_reason: group:group_types_specs has been replaced by more granular |
1685 | + policies that separately govern GET, POST, PUT, and DELETE operations. |
1686 | + deprecated_since: X |
1687 | name: group:group_types_specs |
1688 | - deprecated_since: null |
1689 | description: Update a group type spec. |
1690 | name: group:group_types_specs:update |
1691 | operations: |
1692 | @@ -584,11 +675,12 @@ |
1693 | path: /group_types/{group_type_id}/group_specs/{g_spec_id} |
1694 | scope_types: null |
1695 | - check_str: rule:admin_api |
1696 | - deprecated_reason: null |
1697 | deprecated_rule: |
1698 | check_str: rule:admin_api |
1699 | + deprecated_reason: group:group_types_specs has been replaced by more granular |
1700 | + policies that separately govern GET, POST, PUT, and DELETE operations. |
1701 | + deprecated_since: X |
1702 | name: group:group_types_specs |
1703 | - deprecated_since: null |
1704 | description: Delete a group type spec. |
1705 | name: group:group_types_specs:delete |
1706 | operations: |
1707 | @@ -596,11 +688,14 @@ |
1708 | path: /group_types/{group_type_id}/group_specs/{g_spec_id} |
1709 | scope_types: null |
1710 | - check_str: rule:xena_system_admin_or_project_reader |
1711 | - deprecated_reason: null |
1712 | deprecated_rule: |
1713 | check_str: rule:admin_or_owner |
1714 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1715 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1716 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1717 | + (Xena release) for details. |
1718 | + deprecated_since: X |
1719 | name: group:get_all_group_snapshots |
1720 | - deprecated_since: null |
1721 | description: List group snapshots. |
1722 | name: group:get_all_group_snapshots |
1723 | operations: |
1724 | @@ -610,11 +705,14 @@ |
1725 | path: /group_snapshots/detail |
1726 | scope_types: null |
1727 | - check_str: rule:xena_system_admin_or_project_member |
1728 | - deprecated_reason: null |
1729 | deprecated_rule: |
1730 | check_str: '' |
1731 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1732 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1733 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1734 | + (Xena release) for details. |
1735 | + deprecated_since: X |
1736 | name: group:create_group_snapshot |
1737 | - deprecated_since: null |
1738 | description: Create group snapshot. |
1739 | name: group:create_group_snapshot |
1740 | operations: |
1741 | @@ -622,11 +720,14 @@ |
1742 | path: /group_snapshots |
1743 | scope_types: null |
1744 | - check_str: rule:xena_system_admin_or_project_reader |
1745 | - deprecated_reason: null |
1746 | deprecated_rule: |
1747 | check_str: rule:admin_or_owner |
1748 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1749 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1750 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1751 | + (Xena release) for details. |
1752 | + deprecated_since: X |
1753 | name: group:get_group_snapshot |
1754 | - deprecated_since: null |
1755 | description: Show group snapshot. |
1756 | name: group:get_group_snapshot |
1757 | operations: |
1758 | @@ -634,11 +735,14 @@ |
1759 | path: /group_snapshots/{group_snapshot_id} |
1760 | scope_types: null |
1761 | - check_str: rule:xena_system_admin_or_project_member |
1762 | - deprecated_reason: null |
1763 | deprecated_rule: |
1764 | check_str: rule:admin_or_owner |
1765 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1766 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1767 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1768 | + (Xena release) for details. |
1769 | + deprecated_since: X |
1770 | name: group:delete_group_snapshot |
1771 | - deprecated_since: null |
1772 | description: Delete group snapshot. |
1773 | name: group:delete_group_snapshot |
1774 | operations: |
1775 | @@ -646,11 +750,14 @@ |
1776 | path: /group_snapshots/{group_snapshot_id} |
1777 | scope_types: null |
1778 | - check_str: rule:xena_system_admin_or_project_member |
1779 | - deprecated_reason: null |
1780 | deprecated_rule: |
1781 | check_str: rule:admin_or_owner |
1782 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1783 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1784 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1785 | + (Xena release) for details. |
1786 | + deprecated_since: X |
1787 | name: group:update_group_snapshot |
1788 | - deprecated_since: null |
1789 | description: Update group snapshot. |
1790 | name: group:update_group_snapshot |
1791 | operations: |
1792 | @@ -674,11 +781,14 @@ |
1793 | path: /group_snapshots/{g_snapshot_id}/action (reset_status) |
1794 | scope_types: null |
1795 | - check_str: rule:xena_system_admin_or_project_member |
1796 | - deprecated_reason: null |
1797 | deprecated_rule: |
1798 | check_str: rule:admin_or_owner |
1799 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1800 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1801 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1802 | + (Xena release) for details. |
1803 | + deprecated_since: X |
1804 | name: group:delete |
1805 | - deprecated_since: null |
1806 | description: Delete group. |
1807 | name: group:delete |
1808 | operations: |
1809 | @@ -693,11 +803,14 @@ |
1810 | path: /groups/{group_id}/action (reset_status) |
1811 | scope_types: null |
1812 | - check_str: rule:xena_system_admin_or_project_member |
1813 | - deprecated_reason: null |
1814 | deprecated_rule: |
1815 | check_str: rule:admin_or_owner |
1816 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1817 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1818 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1819 | + (Xena release) for details. |
1820 | + deprecated_since: X |
1821 | name: group:enable_replication |
1822 | - deprecated_since: null |
1823 | description: Enable replication. |
1824 | name: group:enable_replication |
1825 | operations: |
1826 | @@ -705,11 +818,14 @@ |
1827 | path: /groups/{group_id}/action (enable_replication) |
1828 | scope_types: null |
1829 | - check_str: rule:xena_system_admin_or_project_member |
1830 | - deprecated_reason: null |
1831 | deprecated_rule: |
1832 | check_str: rule:admin_or_owner |
1833 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1834 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1835 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1836 | + (Xena release) for details. |
1837 | + deprecated_since: X |
1838 | name: group:disable_replication |
1839 | - deprecated_since: null |
1840 | description: Disable replication. |
1841 | name: group:disable_replication |
1842 | operations: |
1843 | @@ -717,11 +833,14 @@ |
1844 | path: /groups/{group_id}/action (disable_replication) |
1845 | scope_types: null |
1846 | - check_str: rule:xena_system_admin_or_project_member |
1847 | - deprecated_reason: null |
1848 | deprecated_rule: |
1849 | check_str: rule:admin_or_owner |
1850 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1851 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1852 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1853 | + (Xena release) for details. |
1854 | + deprecated_since: X |
1855 | name: group:failover_replication |
1856 | - deprecated_since: null |
1857 | description: Fail over replication. |
1858 | name: group:failover_replication |
1859 | operations: |
1860 | @@ -729,11 +848,14 @@ |
1861 | path: /groups/{group_id}/action (failover_replication) |
1862 | scope_types: null |
1863 | - check_str: rule:xena_system_admin_or_project_member |
1864 | - deprecated_reason: null |
1865 | deprecated_rule: |
1866 | check_str: rule:admin_or_owner |
1867 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1868 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1869 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1870 | + (Xena release) for details. |
1871 | + deprecated_since: X |
1872 | name: group:list_replication_targets |
1873 | - deprecated_since: null |
1874 | description: List failover replication. |
1875 | name: group:list_replication_targets |
1876 | operations: |
1877 | @@ -786,11 +908,12 @@ |
1878 | path: /qos-specs/{qos_id}/delete_keys |
1879 | scope_types: null |
1880 | - check_str: rule:admin_api |
1881 | - deprecated_reason: null |
1882 | deprecated_rule: |
1883 | check_str: rule:admin_api |
1884 | + deprecated_reason: volume_extension:quota_classes has been replaced by more granular |
1885 | + policies that separately govern GET and PUT operations. |
1886 | + deprecated_since: X |
1887 | name: volume_extension:quota_classes |
1888 | - deprecated_since: null |
1889 | description: Show project quota class. |
1890 | name: volume_extension:quota_classes:get |
1891 | operations: |
1892 | @@ -798,11 +921,12 @@ |
1893 | path: /os-quota-class-sets/{project_id} |
1894 | scope_types: null |
1895 | - check_str: rule:admin_api |
1896 | - deprecated_reason: null |
1897 | deprecated_rule: |
1898 | check_str: rule:admin_api |
1899 | + deprecated_reason: volume_extension:quota_classes has been replaced by more granular |
1900 | + policies that separately govern GET and PUT operations. |
1901 | + deprecated_since: X |
1902 | name: volume_extension:quota_classes |
1903 | - deprecated_since: null |
1904 | description: Update project quota class. |
1905 | name: volume_extension:quota_classes:update |
1906 | operations: |
1907 | @@ -810,11 +934,11 @@ |
1908 | path: /os-quota-class-sets/{project_id} |
1909 | scope_types: null |
1910 | - check_str: rule:xena_system_admin_or_project_reader |
1911 | - deprecated_reason: null |
1912 | deprecated_rule: |
1913 | check_str: rule:admin_or_owner |
1914 | + deprecated_reason: null |
1915 | + deprecated_since: null |
1916 | name: volume_extension:quotas:show |
1917 | - deprecated_since: null |
1918 | description: Show project quota (including usage and default). |
1919 | name: volume_extension:quotas:show |
1920 | operations: |
1921 | @@ -901,11 +1025,14 @@ |
1922 | path: /os-hosts/{host_id} |
1923 | scope_types: null |
1924 | - check_str: rule:xena_system_admin_or_project_reader |
1925 | - deprecated_reason: null |
1926 | deprecated_rule: |
1927 | check_str: rule:admin_or_owner |
1928 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1929 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1930 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1931 | + (Xena release) for details. |
1932 | + deprecated_since: X |
1933 | name: limits_extension:used_limits |
1934 | - deprecated_since: null |
1935 | description: Show limits with used limit attributes. |
1936 | name: limits_extension:used_limits |
1937 | operations: |
1938 | @@ -936,11 +1063,12 @@ |
1939 | path: /volumes/{volume_id}/action (os-unmanage) |
1940 | scope_types: null |
1941 | - check_str: rule:admin_api |
1942 | - deprecated_reason: null |
1943 | deprecated_rule: |
1944 | check_str: rule:admin_api |
1945 | + deprecated_reason: volume_extension:types_manage has been replaced by more granular |
1946 | + policies that separately govern POST, PUT, and DELETE operations. |
1947 | + deprecated_since: X |
1948 | name: volume_extension:types_manage |
1949 | - deprecated_since: null |
1950 | description: Create volume type. |
1951 | name: volume_extension:type_create |
1952 | operations: |
1953 | @@ -948,11 +1076,12 @@ |
1954 | path: /types |
1955 | scope_types: null |
1956 | - check_str: rule:admin_api |
1957 | - deprecated_reason: null |
1958 | deprecated_rule: |
1959 | check_str: rule:admin_api |
1960 | + deprecated_reason: volume_extension:types_manage has been replaced by more granular |
1961 | + policies that separately govern POST, PUT, and DELETE operations. |
1962 | + deprecated_since: X |
1963 | name: volume_extension:types_manage |
1964 | - deprecated_since: null |
1965 | description: Update volume type. |
1966 | name: volume_extension:type_update |
1967 | operations: |
1968 | @@ -960,11 +1089,12 @@ |
1969 | path: /types |
1970 | scope_types: null |
1971 | - check_str: rule:admin_api |
1972 | - deprecated_reason: null |
1973 | deprecated_rule: |
1974 | check_str: rule:admin_api |
1975 | + deprecated_reason: volume_extension:types_manage has been replaced by more granular |
1976 | + policies that separately govern POST, PUT, and DELETE operations. |
1977 | + deprecated_since: X |
1978 | name: volume_extension:types_manage |
1979 | - deprecated_since: null |
1980 | description: Delete volume type. |
1981 | name: volume_extension:type_delete |
1982 | operations: |
1983 | @@ -972,11 +1102,14 @@ |
1984 | path: /types |
1985 | scope_types: null |
1986 | - check_str: rule:xena_system_admin_or_project_reader |
1987 | - deprecated_reason: null |
1988 | deprecated_rule: |
1989 | check_str: '' |
1990 | + deprecated_reason: Default policies now support the three Keystone default roles, |
1991 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
1992 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
1993 | + (Xena release) for details. |
1994 | + deprecated_since: X |
1995 | name: volume_extension:type_get |
1996 | - deprecated_since: null |
1997 | description: Get one specific volume type. |
1998 | name: volume_extension:type_get |
1999 | operations: |
2000 | @@ -984,11 +1117,14 @@ |
2001 | path: /types/{type_id} |
2002 | scope_types: null |
2003 | - check_str: rule:xena_system_admin_or_project_reader |
2004 | - deprecated_reason: null |
2005 | deprecated_rule: |
2006 | check_str: '' |
2007 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2008 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2009 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2010 | + (Xena release) for details. |
2011 | + deprecated_since: X |
2012 | name: volume_extension:type_get_all |
2013 | - deprecated_since: null |
2014 | description: List volume types. |
2015 | name: volume_extension:type_get_all |
2016 | operations: |
2017 | @@ -996,11 +1132,14 @@ |
2018 | path: /types/ |
2019 | scope_types: null |
2020 | - check_str: rule:xena_system_admin_or_project_reader |
2021 | - deprecated_reason: null |
2022 | deprecated_rule: |
2023 | check_str: rule:admin_api |
2024 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2025 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2026 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2027 | + (Xena release) for details. |
2028 | + deprecated_since: X |
2029 | name: volume_extension:access_types_extra_specs |
2030 | - deprecated_since: null |
2031 | description: Include the volume type's extra_specs attribute in the volume type |
2032 | list or show requests. The ability to make these calls is governed by other policies. |
2033 | name: volume_extension:access_types_extra_specs |
2034 | @@ -1027,11 +1166,15 @@ |
2035 | operations: [] |
2036 | scope_types: null |
2037 | - check_str: rule:admin_api |
2038 | - deprecated_reason: null |
2039 | deprecated_rule: |
2040 | check_str: rule:volume_extension:volume_type_encryption |
2041 | + deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a |
2042 | + convenience policy that allowed you to set all volume encryption type policies |
2043 | + to the same value. We are deprecating this rule to prepare for a future release |
2044 | + in which the default values for policies that read, create/update, and delete |
2045 | + encryption types will be different from each other.' |
2046 | + deprecated_since: X |
2047 | name: volume_extension:volume_type_encryption:create |
2048 | - deprecated_since: null |
2049 | description: Create volume type encryption. |
2050 | name: volume_extension:volume_type_encryption:create |
2051 | operations: |
2052 | @@ -1039,11 +1182,15 @@ |
2053 | path: /types/{type_id}/encryption |
2054 | scope_types: null |
2055 | - check_str: rule:admin_api |
2056 | - deprecated_reason: null |
2057 | deprecated_rule: |
2058 | check_str: rule:volume_extension:volume_type_encryption |
2059 | + deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a |
2060 | + convenience policy that allowed you to set all volume encryption type policies |
2061 | + to the same value. We are deprecating this rule to prepare for a future release |
2062 | + in which the default values for policies that read, create/update, and delete |
2063 | + encryption types will be different from each other.' |
2064 | + deprecated_since: X |
2065 | name: volume_extension:volume_type_encryption:get |
2066 | - deprecated_since: null |
2067 | description: Show a volume type's encryption type, show an encryption specs item. |
2068 | name: volume_extension:volume_type_encryption:get |
2069 | operations: |
2070 | @@ -1053,11 +1200,15 @@ |
2071 | path: /types/{type_id}/encryption/{key} |
2072 | scope_types: null |
2073 | - check_str: rule:admin_api |
2074 | - deprecated_reason: null |
2075 | deprecated_rule: |
2076 | check_str: rule:volume_extension:volume_type_encryption |
2077 | + deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a |
2078 | + convenience policy that allowed you to set all volume encryption type policies |
2079 | + to the same value. We are deprecating this rule to prepare for a future release |
2080 | + in which the default values for policies that read, create/update, and delete |
2081 | + encryption types will be different from each other.' |
2082 | + deprecated_since: X |
2083 | name: volume_extension:volume_type_encryption:update |
2084 | - deprecated_since: null |
2085 | description: Update volume type encryption. |
2086 | name: volume_extension:volume_type_encryption:update |
2087 | operations: |
2088 | @@ -1065,11 +1216,15 @@ |
2089 | path: /types/{type_id}/encryption/{encryption_id} |
2090 | scope_types: null |
2091 | - check_str: rule:admin_api |
2092 | - deprecated_reason: null |
2093 | deprecated_rule: |
2094 | check_str: rule:volume_extension:volume_type_encryption |
2095 | + deprecated_reason: 'Reason: ''volume_extension:volume_type_encryption'' was a |
2096 | + convenience policy that allowed you to set all volume encryption type policies |
2097 | + to the same value. We are deprecating this rule to prepare for a future release |
2098 | + in which the default values for policies that read, create/update, and delete |
2099 | + encryption types will be different from each other.' |
2100 | + deprecated_since: X |
2101 | name: volume_extension:volume_type_encryption:delete |
2102 | - deprecated_since: null |
2103 | description: Delete volume type encryption. |
2104 | name: volume_extension:volume_type_encryption:delete |
2105 | operations: |
2106 | @@ -1077,11 +1232,14 @@ |
2107 | path: /types/{type_id}/encryption/{encryption_id} |
2108 | scope_types: null |
2109 | - check_str: rule:xena_system_admin_or_project_member |
2110 | - deprecated_reason: null |
2111 | deprecated_rule: |
2112 | check_str: rule:admin_or_owner |
2113 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2114 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2115 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2116 | + (Xena release) for details. |
2117 | + deprecated_since: X |
2118 | name: volume_extension:volume_type_access |
2119 | - deprecated_since: null |
2120 | description: Adds the boolean field 'os-volume-type-access:is_public' to the responses |
2121 | for these API calls. The ability to make these calls is governed by other policies. |
2122 | name: volume_extension:volume_type_access |
2123 | @@ -1108,11 +1266,13 @@ |
2124 | path: /types/{type_id}/action (removeProjectAccess) |
2125 | scope_types: null |
2126 | - check_str: rule:admin_api |
2127 | - deprecated_reason: null |
2128 | deprecated_rule: |
2129 | check_str: volume_extension:volume_type_access |
2130 | + deprecated_reason: 'Reason: ''volume_extension:volume_type_access:get_all_for_type'' |
2131 | + is a new policy that protects an API call formerly governed by ''volume_extension:volume_type_access'', |
2132 | + but which has been separated for finer-grained policy control.' |
2133 | + deprecated_since: X |
2134 | name: volume_extension:volume_type_access:get_all_for_type |
2135 | - deprecated_since: null |
2136 | description: List private volume type access detail, that is, list the projects |
2137 | that have access to this volume type. |
2138 | name: volume_extension:volume_type_access:get_all_for_type |
2139 | @@ -1121,11 +1281,14 @@ |
2140 | path: /types/{type_id}/os-volume-type-access |
2141 | scope_types: null |
2142 | - check_str: rule:xena_system_admin_or_project_member |
2143 | - deprecated_reason: null |
2144 | deprecated_rule: |
2145 | check_str: rule:admin_or_owner |
2146 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2147 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2148 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2149 | + (Xena release) for details. |
2150 | + deprecated_since: X |
2151 | name: volume:extend |
2152 | - deprecated_since: null |
2153 | description: Extend a volume. |
2154 | name: volume:extend |
2155 | operations: |
2156 | @@ -1133,11 +1296,14 @@ |
2157 | path: /volumes/{volume_id}/action (os-extend) |
2158 | scope_types: null |
2159 | - check_str: rule:xena_system_admin_or_project_member |
2160 | - deprecated_reason: null |
2161 | deprecated_rule: |
2162 | check_str: rule:admin_or_owner |
2163 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2164 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2165 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2166 | + (Xena release) for details. |
2167 | + deprecated_since: X |
2168 | name: volume:extend_attached_volume |
2169 | - deprecated_since: null |
2170 | description: Extend a attached volume. |
2171 | name: volume:extend_attached_volume |
2172 | operations: |
2173 | @@ -1152,11 +1318,14 @@ |
2174 | path: /volumes/{volume_id}/action (os-extend_volume_completion) |
2175 | scope_types: null |
2176 | - check_str: rule:xena_system_admin_or_project_member |
2177 | - deprecated_reason: null |
2178 | deprecated_rule: |
2179 | check_str: rule:admin_or_owner |
2180 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2181 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2182 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2183 | + (Xena release) for details. |
2184 | + deprecated_since: X |
2185 | name: volume:revert_to_snapshot |
2186 | - deprecated_since: null |
2187 | description: Revert a volume to a snapshot. |
2188 | name: volume:revert_to_snapshot |
2189 | operations: |
2190 | @@ -1171,11 +1340,14 @@ |
2191 | path: /volumes/{volume_id}/action (os-reset_status) |
2192 | scope_types: null |
2193 | - check_str: rule:xena_system_admin_or_project_member |
2194 | - deprecated_reason: null |
2195 | deprecated_rule: |
2196 | check_str: rule:admin_or_owner |
2197 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2198 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2199 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2200 | + (Xena release) for details. |
2201 | + deprecated_since: X |
2202 | name: volume:retype |
2203 | - deprecated_since: null |
2204 | description: Retype a volume. |
2205 | name: volume:retype |
2206 | operations: |
2207 | @@ -1183,11 +1355,14 @@ |
2208 | path: /volumes/{volume_id}/action (os-retype) |
2209 | scope_types: null |
2210 | - check_str: rule:xena_system_admin_or_project_member |
2211 | - deprecated_reason: null |
2212 | deprecated_rule: |
2213 | check_str: rule:admin_or_owner |
2214 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2215 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2216 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2217 | + (Xena release) for details. |
2218 | + deprecated_since: X |
2219 | name: volume:update_readonly_flag |
2220 | - deprecated_since: null |
2221 | description: Update a volume's readonly flag. |
2222 | name: volume:update_readonly_flag |
2223 | operations: |
2224 | @@ -1209,11 +1384,14 @@ |
2225 | path: /volumes/{volume_id}/action (os-volume_upload_image) |
2226 | scope_types: null |
2227 | - check_str: rule:xena_system_admin_or_project_member |
2228 | - deprecated_reason: null |
2229 | deprecated_rule: |
2230 | check_str: rule:admin_or_owner |
2231 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2232 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2233 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2234 | + (Xena release) for details. |
2235 | + deprecated_since: X |
2236 | name: volume_extension:volume_actions:upload_image |
2237 | - deprecated_since: null |
2238 | description: Upload a volume to image. |
2239 | name: volume_extension:volume_actions:upload_image |
2240 | operations: |
2241 | @@ -1242,11 +1420,14 @@ |
2242 | path: /volumes/{volume_id}/action (os-migrate_volume_completion) |
2243 | scope_types: null |
2244 | - check_str: rule:xena_system_admin_or_project_member |
2245 | - deprecated_reason: null |
2246 | deprecated_rule: |
2247 | check_str: rule:admin_or_owner |
2248 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2249 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2250 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2251 | + (Xena release) for details. |
2252 | + deprecated_since: X |
2253 | name: volume_extension:volume_actions:initialize_connection |
2254 | - deprecated_since: null |
2255 | description: Initialize volume attachment. |
2256 | name: volume_extension:volume_actions:initialize_connection |
2257 | operations: |
2258 | @@ -1254,11 +1435,14 @@ |
2259 | path: /volumes/{volume_id}/action (os-initialize_connection) |
2260 | scope_types: null |
2261 | - check_str: rule:xena_system_admin_or_project_member |
2262 | - deprecated_reason: null |
2263 | deprecated_rule: |
2264 | check_str: rule:admin_or_owner |
2265 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2266 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2267 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2268 | + (Xena release) for details. |
2269 | + deprecated_since: X |
2270 | name: volume_extension:volume_actions:terminate_connection |
2271 | - deprecated_since: null |
2272 | description: Terminate volume attachment. |
2273 | name: volume_extension:volume_actions:terminate_connection |
2274 | operations: |
2275 | @@ -1266,11 +1450,14 @@ |
2276 | path: /volumes/{volume_id}/action (os-terminate_connection) |
2277 | scope_types: null |
2278 | - check_str: rule:xena_system_admin_or_project_member |
2279 | - deprecated_reason: null |
2280 | deprecated_rule: |
2281 | check_str: rule:admin_or_owner |
2282 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2283 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2284 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2285 | + (Xena release) for details. |
2286 | + deprecated_since: X |
2287 | name: volume_extension:volume_actions:roll_detaching |
2288 | - deprecated_since: null |
2289 | description: Roll back volume status to 'in-use'. |
2290 | name: volume_extension:volume_actions:roll_detaching |
2291 | operations: |
2292 | @@ -1278,11 +1465,14 @@ |
2293 | path: /volumes/{volume_id}/action (os-roll_detaching) |
2294 | scope_types: null |
2295 | - check_str: rule:xena_system_admin_or_project_member |
2296 | - deprecated_reason: null |
2297 | deprecated_rule: |
2298 | check_str: rule:admin_or_owner |
2299 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2300 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2301 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2302 | + (Xena release) for details. |
2303 | + deprecated_since: X |
2304 | name: volume_extension:volume_actions:reserve |
2305 | - deprecated_since: null |
2306 | description: Mark volume as reserved. |
2307 | name: volume_extension:volume_actions:reserve |
2308 | operations: |
2309 | @@ -1290,11 +1480,14 @@ |
2310 | path: /volumes/{volume_id}/action (os-reserve) |
2311 | scope_types: null |
2312 | - check_str: rule:xena_system_admin_or_project_member |
2313 | - deprecated_reason: null |
2314 | deprecated_rule: |
2315 | check_str: rule:admin_or_owner |
2316 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2317 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2318 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2319 | + (Xena release) for details. |
2320 | + deprecated_since: X |
2321 | name: volume_extension:volume_actions:unreserve |
2322 | - deprecated_since: null |
2323 | description: Unmark volume as reserved. |
2324 | name: volume_extension:volume_actions:unreserve |
2325 | operations: |
2326 | @@ -1302,11 +1495,14 @@ |
2327 | path: /volumes/{volume_id}/action (os-unreserve) |
2328 | scope_types: null |
2329 | - check_str: rule:xena_system_admin_or_project_member |
2330 | - deprecated_reason: null |
2331 | deprecated_rule: |
2332 | check_str: rule:admin_or_owner |
2333 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2334 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2335 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2336 | + (Xena release) for details. |
2337 | + deprecated_since: X |
2338 | name: volume_extension:volume_actions:begin_detaching |
2339 | - deprecated_since: null |
2340 | description: Begin detach volumes. |
2341 | name: volume_extension:volume_actions:begin_detaching |
2342 | operations: |
2343 | @@ -1314,11 +1510,14 @@ |
2344 | path: /volumes/{volume_id}/action (os-begin_detaching) |
2345 | scope_types: null |
2346 | - check_str: rule:xena_system_admin_or_project_member |
2347 | - deprecated_reason: null |
2348 | deprecated_rule: |
2349 | check_str: rule:admin_or_owner |
2350 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2351 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2352 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2353 | + (Xena release) for details. |
2354 | + deprecated_since: X |
2355 | name: volume_extension:volume_actions:attach |
2356 | - deprecated_since: null |
2357 | description: Add attachment metadata. |
2358 | name: volume_extension:volume_actions:attach |
2359 | operations: |
2360 | @@ -1326,11 +1525,14 @@ |
2361 | path: /volumes/{volume_id}/action (os-attach) |
2362 | scope_types: null |
2363 | - check_str: rule:xena_system_admin_or_project_member |
2364 | - deprecated_reason: null |
2365 | deprecated_rule: |
2366 | check_str: rule:admin_or_owner |
2367 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2368 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2369 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2370 | + (Xena release) for details. |
2371 | + deprecated_since: X |
2372 | name: volume_extension:volume_actions:detach |
2373 | - deprecated_since: null |
2374 | description: Clear attachment metadata. |
2375 | name: volume_extension:volume_actions:detach |
2376 | operations: |
2377 | @@ -1352,11 +1554,14 @@ |
2378 | path: /volumes/{volume_id}/action (os-reimage) |
2379 | scope_types: null |
2380 | - check_str: rule:xena_system_admin_or_project_reader |
2381 | - deprecated_reason: null |
2382 | deprecated_rule: |
2383 | check_str: rule:admin_or_owner |
2384 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2385 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2386 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2387 | + (Xena release) for details. |
2388 | + deprecated_since: X |
2389 | name: volume:get_all_transfers |
2390 | - deprecated_since: null |
2391 | description: List volume transfer. |
2392 | name: volume:get_all_transfers |
2393 | operations: |
2394 | @@ -1370,11 +1575,14 @@ |
2395 | path: /volume-transfers/detail |
2396 | scope_types: null |
2397 | - check_str: rule:xena_system_admin_or_project_member |
2398 | - deprecated_reason: null |
2399 | deprecated_rule: |
2400 | check_str: rule:admin_or_owner |
2401 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2402 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2403 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2404 | + (Xena release) for details. |
2405 | + deprecated_since: X |
2406 | name: volume:create_transfer |
2407 | - deprecated_since: null |
2408 | description: Create a volume transfer. |
2409 | name: volume:create_transfer |
2410 | operations: |
2411 | @@ -1384,11 +1592,14 @@ |
2412 | path: /volume_transfers |
2413 | scope_types: null |
2414 | - check_str: rule:xena_system_admin_or_project_reader |
2415 | - deprecated_reason: null |
2416 | deprecated_rule: |
2417 | check_str: rule:admin_or_owner |
2418 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2419 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2420 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2421 | + (Xena release) for details. |
2422 | + deprecated_since: X |
2423 | name: volume:get_transfer |
2424 | - deprecated_since: null |
2425 | description: Show one specified volume transfer. |
2426 | name: volume:get_transfer |
2427 | operations: |
2428 | @@ -1398,11 +1609,14 @@ |
2429 | path: /volume-transfers/{transfer_id} |
2430 | scope_types: null |
2431 | - check_str: rule:xena_system_admin_or_project_member |
2432 | - deprecated_reason: null |
2433 | deprecated_rule: |
2434 | check_str: '' |
2435 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2436 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2437 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2438 | + (Xena release) for details. |
2439 | + deprecated_since: X |
2440 | name: volume:accept_transfer |
2441 | - deprecated_since: null |
2442 | description: Accept a volume transfer. |
2443 | name: volume:accept_transfer |
2444 | operations: |
2445 | @@ -1412,11 +1626,14 @@ |
2446 | path: /volume-transfers/{transfer_id}/accept |
2447 | scope_types: null |
2448 | - check_str: rule:xena_system_admin_or_project_member |
2449 | - deprecated_reason: null |
2450 | deprecated_rule: |
2451 | check_str: rule:admin_or_owner |
2452 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2453 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2454 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2455 | + (Xena release) for details. |
2456 | + deprecated_since: X |
2457 | name: volume:delete_transfer |
2458 | - deprecated_since: null |
2459 | description: Delete volume transfer. |
2460 | name: volume:delete_transfer |
2461 | operations: |
2462 | @@ -1426,11 +1643,14 @@ |
2463 | path: /volume-transfers/{transfer_id} |
2464 | scope_types: null |
2465 | - check_str: rule:xena_system_admin_or_project_reader |
2466 | - deprecated_reason: null |
2467 | deprecated_rule: |
2468 | check_str: rule:admin_or_owner |
2469 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2470 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2471 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2472 | + (Xena release) for details. |
2473 | + deprecated_since: X |
2474 | name: volume:get_volume_metadata |
2475 | - deprecated_since: null |
2476 | description: Show volume's metadata or one specified metadata with a given key. |
2477 | name: volume:get_volume_metadata |
2478 | operations: |
2479 | @@ -1442,11 +1662,14 @@ |
2480 | path: /volumes/{volume_id}/action (os-show_image_metadata) |
2481 | scope_types: null |
2482 | - check_str: rule:xena_system_admin_or_project_member |
2483 | - deprecated_reason: null |
2484 | deprecated_rule: |
2485 | check_str: rule:admin_or_owner |
2486 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2487 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2488 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2489 | + (Xena release) for details. |
2490 | + deprecated_since: X |
2491 | name: volume:create_volume_metadata |
2492 | - deprecated_since: null |
2493 | description: Create volume metadata. |
2494 | name: volume:create_volume_metadata |
2495 | operations: |
2496 | @@ -1454,11 +1677,14 @@ |
2497 | path: /volumes/{volume_id}/metadata |
2498 | scope_types: null |
2499 | - check_str: rule:xena_system_admin_or_project_member |
2500 | - deprecated_reason: null |
2501 | deprecated_rule: |
2502 | check_str: rule:admin_or_owner |
2503 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2504 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2505 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2506 | + (Xena release) for details. |
2507 | + deprecated_since: X |
2508 | name: volume:update_volume_metadata |
2509 | - deprecated_since: null |
2510 | description: Replace a volume's metadata dictionary or update a single metadatum |
2511 | with a given key. |
2512 | name: volume:update_volume_metadata |
2513 | @@ -1469,11 +1695,14 @@ |
2514 | path: /volumes/{volume_id}/metadata/{key} |
2515 | scope_types: null |
2516 | - check_str: rule:xena_system_admin_or_project_member |
2517 | - deprecated_reason: null |
2518 | deprecated_rule: |
2519 | check_str: rule:admin_or_owner |
2520 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2521 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2522 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2523 | + (Xena release) for details. |
2524 | + deprecated_since: X |
2525 | name: volume:delete_volume_metadata |
2526 | - deprecated_since: null |
2527 | description: Delete a volume's metadatum with the given key. |
2528 | name: volume:delete_volume_metadata |
2529 | operations: |
2530 | @@ -1481,11 +1710,12 @@ |
2531 | path: /volumes/{volume_id}/metadata/{key} |
2532 | scope_types: null |
2533 | - check_str: rule:xena_system_admin_or_project_reader |
2534 | - deprecated_reason: null |
2535 | deprecated_rule: |
2536 | check_str: rule:admin_or_owner |
2537 | + deprecated_reason: volume_extension:volume_image_metadata has been replaced by |
2538 | + more granular policies that separately govern show, set, and remove operations. |
2539 | + deprecated_since: X |
2540 | name: volume_extension:volume_image_metadata |
2541 | - deprecated_since: null |
2542 | description: Include a volume's image metadata in volume detail responses. The |
2543 | ability to make these calls is governed by other policies. |
2544 | name: volume_extension:volume_image_metadata:show |
2545 | @@ -1496,11 +1726,12 @@ |
2546 | path: /volumes/{volume_id} |
2547 | scope_types: null |
2548 | - check_str: rule:xena_system_admin_or_project_member |
2549 | - deprecated_reason: null |
2550 | deprecated_rule: |
2551 | check_str: rule:admin_or_owner |
2552 | + deprecated_reason: volume_extension:volume_image_metadata has been replaced by |
2553 | + more granular policies that separately govern show, set, and remove operations. |
2554 | + deprecated_since: X |
2555 | name: volume_extension:volume_image_metadata |
2556 | - deprecated_since: null |
2557 | description: Set image metadata for a volume |
2558 | name: volume_extension:volume_image_metadata:set |
2559 | operations: |
2560 | @@ -1508,11 +1739,12 @@ |
2561 | path: /volumes/{volume_id}/action (os-set_image_metadata) |
2562 | scope_types: null |
2563 | - check_str: rule:xena_system_admin_or_project_member |
2564 | - deprecated_reason: null |
2565 | deprecated_rule: |
2566 | check_str: rule:admin_or_owner |
2567 | + deprecated_reason: volume_extension:volume_image_metadata has been replaced by |
2568 | + more granular policies that separately govern show, set, and remove operations. |
2569 | + deprecated_since: X |
2570 | name: volume_extension:volume_image_metadata |
2571 | - deprecated_since: null |
2572 | description: Remove specific image metadata from a volume |
2573 | name: volume_extension:volume_image_metadata:remove |
2574 | operations: |
2575 | @@ -1530,11 +1762,14 @@ |
2576 | path: /volumes/{volume_id}/action (os-attach) |
2577 | scope_types: null |
2578 | - check_str: rule:xena_system_admin_or_project_reader |
2579 | - deprecated_reason: null |
2580 | deprecated_rule: |
2581 | check_str: '' |
2582 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2583 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2584 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2585 | + (Xena release) for details. |
2586 | + deprecated_since: X |
2587 | name: volume_extension:types_extra_specs:index |
2588 | - deprecated_since: null |
2589 | description: List type extra specs. |
2590 | name: volume_extension:types_extra_specs:index |
2591 | operations: |
2592 | @@ -1549,11 +1784,14 @@ |
2593 | path: /types/{type_id}/extra_specs |
2594 | scope_types: null |
2595 | - check_str: rule:xena_system_admin_or_project_reader |
2596 | - deprecated_reason: null |
2597 | deprecated_rule: |
2598 | check_str: '' |
2599 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2600 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2601 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2602 | + (Xena release) for details. |
2603 | + deprecated_since: X |
2604 | name: volume_extension:types_extra_specs:show |
2605 | - deprecated_since: null |
2606 | description: Show one specified type extra specs. |
2607 | name: volume_extension:types_extra_specs:show |
2608 | operations: |
2609 | @@ -1591,11 +1829,14 @@ |
2610 | path: /types/{type_id}/extra_specs/{extra_spec_key} |
2611 | scope_types: null |
2612 | - check_str: rule:xena_system_admin_or_project_member |
2613 | - deprecated_reason: null |
2614 | deprecated_rule: |
2615 | check_str: '' |
2616 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2617 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2618 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2619 | + (Xena release) for details. |
2620 | + deprecated_since: X |
2621 | name: volume:create |
2622 | - deprecated_since: null |
2623 | description: Create volume. |
2624 | name: volume:create |
2625 | operations: |
2626 | @@ -1603,11 +1844,14 @@ |
2627 | path: /volumes |
2628 | scope_types: null |
2629 | - check_str: rule:xena_system_admin_or_project_member |
2630 | - deprecated_reason: null |
2631 | deprecated_rule: |
2632 | check_str: '' |
2633 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2634 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2635 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2636 | + (Xena release) for details. |
2637 | + deprecated_since: X |
2638 | name: volume:create_from_image |
2639 | - deprecated_since: null |
2640 | description: Create volume from image. |
2641 | name: volume:create_from_image |
2642 | operations: |
2643 | @@ -1615,11 +1859,14 @@ |
2644 | path: /volumes |
2645 | scope_types: null |
2646 | - check_str: rule:xena_system_admin_or_project_reader |
2647 | - deprecated_reason: null |
2648 | deprecated_rule: |
2649 | check_str: rule:admin_or_owner |
2650 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2651 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2652 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2653 | + (Xena release) for details. |
2654 | + deprecated_since: X |
2655 | name: volume:get |
2656 | - deprecated_since: null |
2657 | description: Show volume. |
2658 | name: volume:get |
2659 | operations: |
2660 | @@ -1627,11 +1874,14 @@ |
2661 | path: /volumes/{volume_id} |
2662 | scope_types: null |
2663 | - check_str: rule:xena_system_admin_or_project_reader |
2664 | - deprecated_reason: null |
2665 | deprecated_rule: |
2666 | check_str: rule:admin_or_owner |
2667 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2668 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2669 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2670 | + (Xena release) for details. |
2671 | + deprecated_since: X |
2672 | name: volume:get_all |
2673 | - deprecated_since: null |
2674 | description: List volumes or get summary of volumes. |
2675 | name: volume:get_all |
2676 | operations: |
2677 | @@ -1643,11 +1893,14 @@ |
2678 | path: /volumes/summary |
2679 | scope_types: null |
2680 | - check_str: rule:xena_system_admin_or_project_member |
2681 | - deprecated_reason: null |
2682 | deprecated_rule: |
2683 | check_str: rule:admin_or_owner |
2684 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2685 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2686 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2687 | + (Xena release) for details. |
2688 | + deprecated_since: X |
2689 | name: volume:update |
2690 | - deprecated_since: null |
2691 | description: Update volume or update a volume's bootable status. |
2692 | name: volume:update |
2693 | operations: |
2694 | @@ -1657,11 +1910,14 @@ |
2695 | path: /volumes/{volume_id}/action (os-set_bootable) |
2696 | scope_types: null |
2697 | - check_str: rule:xena_system_admin_or_project_member |
2698 | - deprecated_reason: null |
2699 | deprecated_rule: |
2700 | check_str: rule:admin_or_owner |
2701 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2702 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2703 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2704 | + (Xena release) for details. |
2705 | + deprecated_since: X |
2706 | name: volume:delete |
2707 | - deprecated_since: null |
2708 | description: Delete volume. |
2709 | name: volume:delete |
2710 | operations: |
2711 | @@ -1685,11 +1941,14 @@ |
2712 | path: /volumes/detail |
2713 | scope_types: null |
2714 | - check_str: rule:xena_system_admin_or_project_reader |
2715 | - deprecated_reason: null |
2716 | deprecated_rule: |
2717 | check_str: rule:admin_or_owner |
2718 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2719 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2720 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2721 | + (Xena release) for details. |
2722 | + deprecated_since: X |
2723 | name: volume_extension:volume_tenant_attribute |
2724 | - deprecated_since: null |
2725 | description: List or show volume with tenant attribute. |
2726 | name: volume_extension:volume_tenant_attribute |
2727 | operations: |
2728 | @@ -1708,11 +1967,14 @@ |
2729 | path: /volumes/detail |
2730 | scope_types: null |
2731 | - check_str: rule:xena_system_admin_or_project_reader |
2732 | - deprecated_reason: null |
2733 | deprecated_rule: |
2734 | check_str: rule:admin_or_owner |
2735 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2736 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2737 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2738 | + (Xena release) for details. |
2739 | + deprecated_since: X |
2740 | name: volume_extension:volume_encryption_metadata |
2741 | - deprecated_since: null |
2742 | description: Show volume's encryption metadata. |
2743 | name: volume_extension:volume_encryption_metadata |
2744 | operations: |
2745 | @@ -1722,11 +1984,14 @@ |
2746 | path: /volumes/{volume_id}/encryption/{encryption_key} |
2747 | scope_types: null |
2748 | - check_str: rule:xena_system_admin_or_project_member |
2749 | - deprecated_reason: null |
2750 | deprecated_rule: |
2751 | check_str: rule:admin_or_owner |
2752 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2753 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2754 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2755 | + (Xena release) for details. |
2756 | + deprecated_since: X |
2757 | name: volume:multiattach |
2758 | - deprecated_since: null |
2759 | description: Create multiattach capable volume. |
2760 | name: volume:multiattach |
2761 | operations: |
2762 | @@ -1734,11 +1999,14 @@ |
2763 | path: /volumes |
2764 | scope_types: null |
2765 | - check_str: rule:admin_api |
2766 | - deprecated_reason: null |
2767 | deprecated_rule: |
2768 | check_str: rule:system_or_domain_or_project_admin |
2769 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2770 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2771 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2772 | + (Xena release) for details. |
2773 | + deprecated_since: X |
2774 | name: volume_extension:default_set_or_update |
2775 | - deprecated_since: null |
2776 | description: Set or update default volume type. |
2777 | name: volume_extension:default_set_or_update |
2778 | operations: |
2779 | @@ -1746,11 +2014,14 @@ |
2780 | path: /default-types |
2781 | scope_types: null |
2782 | - check_str: rule:admin_api |
2783 | - deprecated_reason: null |
2784 | deprecated_rule: |
2785 | check_str: rule:system_or_domain_or_project_admin |
2786 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2787 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2788 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2789 | + (Xena release) for details. |
2790 | + deprecated_since: X |
2791 | name: volume_extension:default_get |
2792 | - deprecated_since: null |
2793 | description: Get default types. |
2794 | name: volume_extension:default_get |
2795 | operations: |
2796 | @@ -1758,11 +2029,14 @@ |
2797 | path: /default-types/{project-id} |
2798 | scope_types: null |
2799 | - check_str: rule:admin_api |
2800 | - deprecated_reason: null |
2801 | deprecated_rule: |
2802 | check_str: role:admin and system_scope:all |
2803 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2804 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2805 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2806 | + (Xena release) for details. |
2807 | + deprecated_since: X |
2808 | name: volume_extension:default_get_all |
2809 | - deprecated_since: null |
2810 | description: 'Get all default types. WARNING: Changing this might open up too much |
2811 | information regarding cloud deployment.' |
2812 | name: volume_extension:default_get_all |
2813 | @@ -1771,11 +2045,14 @@ |
2814 | path: /default-types/ |
2815 | scope_types: null |
2816 | - check_str: rule:admin_api |
2817 | - deprecated_reason: null |
2818 | deprecated_rule: |
2819 | check_str: rule:system_or_domain_or_project_admin |
2820 | + deprecated_reason: Default policies now support the three Keystone default roles, |
2821 | + namely 'admin', 'member', and 'reader' to implement three Cinder "personas". See |
2822 | + "Policy Personas and Permissions" in the "Cinder Service Configuration" documentation |
2823 | + (Xena release) for details. |
2824 | + deprecated_since: X |
2825 | name: volume_extension:default_unset |
2826 | - deprecated_since: null |
2827 | description: Unset default type. |
2828 | name: volume_extension:default_unset |
2829 | operations: |
2830 | diff --git a/openstack_dashboard/conf/default_policies/glance.yaml b/openstack_dashboard/conf/default_policies/glance.yaml |
2831 | index c3fcd62..a5ab80e 100644 |
2832 | --- a/openstack_dashboard/conf/default_policies/glance.yaml |
2833 | +++ b/openstack_dashboard/conf/default_policies/glance.yaml |
2834 | @@ -1,9 +1,13 @@ |
2835 | - check_str: '' |
2836 | - deprecated_reason: null |
2837 | deprecated_rule: |
2838 | check_str: rule:context_is_admin |
2839 | + deprecated_reason: In order to allow operators to accept the default policies |
2840 | + from code by not defining them in the policy file, while still working with |
2841 | + old policy files that rely on the ``default`` rule for policies that are not |
2842 | + specified in the policy file, the ``default`` rule must now be explicitly set |
2843 | + to ``"role:admin"`` when that is the desired default for unspecified rules. |
2844 | + deprecated_since: Ussuri |
2845 | name: default |
2846 | - deprecated_since: null |
2847 | description: Defines the default rule used for policies that historically had an |
2848 | empty policy in the supplied policy.json file. |
2849 | name: default |
2850 | @@ -16,11 +20,15 @@ |
2851 | scope_types: null |
2852 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s and |
2853 | project_id:%(owner)s) |
2854 | - deprecated_reason: null |
2855 | deprecated_rule: |
2856 | check_str: rule:default |
2857 | + deprecated_reason: ' |
2858 | + |
2859 | + The image API now supports roles. |
2860 | + |
2861 | + ' |
2862 | + deprecated_since: W |
2863 | name: add_image |
2864 | - deprecated_since: null |
2865 | description: Create new image |
2866 | name: add_image |
2867 | operations: |
2868 | @@ -29,11 +37,15 @@ |
2869 | scope_types: |
2870 | - project |
2871 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
2872 | - deprecated_reason: null |
2873 | deprecated_rule: |
2874 | check_str: rule:default |
2875 | + deprecated_reason: ' |
2876 | + |
2877 | + The image API now supports roles. |
2878 | + |
2879 | + ' |
2880 | + deprecated_since: W |
2881 | name: delete_image |
2882 | - deprecated_since: null |
2883 | description: Deletes the image |
2884 | name: delete_image |
2885 | operations: |
2886 | @@ -44,11 +56,15 @@ |
2887 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
2888 | or project_id:%(member_id)s or 'community':%(visibility)s or 'public':%(visibility)s |
2889 | or 'shared':%(visibility)s)) |
2890 | - deprecated_reason: null |
2891 | deprecated_rule: |
2892 | check_str: rule:default |
2893 | + deprecated_reason: ' |
2894 | + |
2895 | + The image API now supports roles. |
2896 | + |
2897 | + ' |
2898 | + deprecated_since: W |
2899 | name: get_image |
2900 | - deprecated_since: null |
2901 | description: Get specified image |
2902 | name: get_image |
2903 | operations: |
2904 | @@ -57,11 +73,15 @@ |
2905 | scope_types: |
2906 | - project |
2907 | - check_str: rule:context_is_admin or (role:reader and project_id:%(project_id)s) |
2908 | - deprecated_reason: null |
2909 | deprecated_rule: |
2910 | check_str: rule:default |
2911 | + deprecated_reason: ' |
2912 | + |
2913 | + The image API now supports roles. |
2914 | + |
2915 | + ' |
2916 | + deprecated_since: W |
2917 | name: get_images |
2918 | - deprecated_since: null |
2919 | description: Get all available images |
2920 | name: get_images |
2921 | operations: |
2922 | @@ -70,11 +90,15 @@ |
2923 | scope_types: |
2924 | - project |
2925 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
2926 | - deprecated_reason: null |
2927 | deprecated_rule: |
2928 | check_str: rule:default |
2929 | + deprecated_reason: ' |
2930 | + |
2931 | + The image API now supports roles. |
2932 | + |
2933 | + ' |
2934 | + deprecated_since: W |
2935 | name: modify_image |
2936 | - deprecated_since: null |
2937 | description: Updates given image |
2938 | name: modify_image |
2939 | operations: |
2940 | @@ -91,11 +115,15 @@ |
2941 | scope_types: |
2942 | - project |
2943 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
2944 | - deprecated_reason: null |
2945 | deprecated_rule: |
2946 | check_str: rule:default |
2947 | + deprecated_reason: ' |
2948 | + |
2949 | + The image API now supports roles. |
2950 | + |
2951 | + ' |
2952 | + deprecated_since: W |
2953 | name: communitize_image |
2954 | - deprecated_since: null |
2955 | description: Communitize given image |
2956 | name: communitize_image |
2957 | operations: |
2958 | @@ -106,11 +134,15 @@ |
2959 | - check_str: rule:context_is_admin or (role:member and (project_id:%(project_id)s |
2960 | or project_id:%(member_id)s or 'community':%(visibility)s or 'public':%(visibility)s |
2961 | or 'shared':%(visibility)s)) |
2962 | - deprecated_reason: null |
2963 | deprecated_rule: |
2964 | check_str: rule:default |
2965 | + deprecated_reason: ' |
2966 | + |
2967 | + The image API now supports roles. |
2968 | + |
2969 | + ' |
2970 | + deprecated_since: W |
2971 | name: download_image |
2972 | - deprecated_since: null |
2973 | description: Downloads given image |
2974 | name: download_image |
2975 | operations: |
2976 | @@ -119,11 +151,15 @@ |
2977 | scope_types: |
2978 | - project |
2979 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
2980 | - deprecated_reason: null |
2981 | deprecated_rule: |
2982 | check_str: rule:default |
2983 | + deprecated_reason: ' |
2984 | + |
2985 | + The image API now supports roles. |
2986 | + |
2987 | + ' |
2988 | + deprecated_since: W |
2989 | name: upload_image |
2990 | - deprecated_since: null |
2991 | description: Uploads data to specified image |
2992 | name: upload_image |
2993 | operations: |
2994 | @@ -132,11 +168,15 @@ |
2995 | scope_types: |
2996 | - project |
2997 | - check_str: rule:context_is_admin |
2998 | - deprecated_reason: null |
2999 | deprecated_rule: |
3000 | check_str: rule:default |
3001 | + deprecated_reason: ' |
3002 | + |
3003 | + The image API now supports roles. |
3004 | + |
3005 | + ' |
3006 | + deprecated_since: W |
3007 | name: delete_image_location |
3008 | - deprecated_since: null |
3009 | description: Deletes the location of given image |
3010 | name: delete_image_location |
3011 | operations: |
3012 | @@ -145,11 +185,15 @@ |
3013 | scope_types: |
3014 | - project |
3015 | - check_str: rule:context_is_admin or (role:reader and project_id:%(project_id)s) |
3016 | - deprecated_reason: null |
3017 | deprecated_rule: |
3018 | check_str: rule:default |
3019 | + deprecated_reason: ' |
3020 | + |
3021 | + The image API now supports roles. |
3022 | + |
3023 | + ' |
3024 | + deprecated_since: W |
3025 | name: get_image_location |
3026 | - deprecated_since: null |
3027 | description: Reads the location of the image |
3028 | name: get_image_location |
3029 | operations: |
3030 | @@ -158,11 +202,15 @@ |
3031 | scope_types: |
3032 | - project |
3033 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
3034 | - deprecated_reason: null |
3035 | deprecated_rule: |
3036 | check_str: rule:default |
3037 | + deprecated_reason: ' |
3038 | + |
3039 | + The image API now supports roles. |
3040 | + |
3041 | + ' |
3042 | + deprecated_since: W |
3043 | name: set_image_location |
3044 | - deprecated_since: null |
3045 | description: Sets location URI to given image |
3046 | name: set_image_location |
3047 | operations: |
3048 | @@ -171,11 +219,15 @@ |
3049 | scope_types: |
3050 | - project |
3051 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
3052 | - deprecated_reason: null |
3053 | deprecated_rule: |
3054 | check_str: rule:default |
3055 | + deprecated_reason: ' |
3056 | + |
3057 | + The image API now supports roles. |
3058 | + |
3059 | + ' |
3060 | + deprecated_since: W |
3061 | name: add_member |
3062 | - deprecated_since: null |
3063 | description: Create image member |
3064 | name: add_member |
3065 | operations: |
3066 | @@ -184,11 +236,15 @@ |
3067 | scope_types: |
3068 | - project |
3069 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
3070 | - deprecated_reason: null |
3071 | deprecated_rule: |
3072 | check_str: rule:default |
3073 | + deprecated_reason: ' |
3074 | + |
3075 | + The image API now supports roles. |
3076 | + |
3077 | + ' |
3078 | + deprecated_since: W |
3079 | name: delete_member |
3080 | - deprecated_since: null |
3081 | description: Delete image member |
3082 | name: delete_member |
3083 | operations: |
3084 | @@ -198,11 +254,15 @@ |
3085 | - project |
3086 | - check_str: rule:context_is_admin or role:reader and (project_id:%(project_id)s or |
3087 | project_id:%(member_id)s) |
3088 | - deprecated_reason: null |
3089 | deprecated_rule: |
3090 | check_str: rule:default |
3091 | + deprecated_reason: ' |
3092 | + |
3093 | + The image API now supports roles. |
3094 | + |
3095 | + ' |
3096 | + deprecated_since: W |
3097 | name: get_member |
3098 | - deprecated_since: null |
3099 | description: Show image member details |
3100 | name: get_member |
3101 | operations: |
3102 | @@ -212,11 +272,15 @@ |
3103 | - project |
3104 | - check_str: rule:context_is_admin or role:reader and (project_id:%(project_id)s or |
3105 | project_id:%(member_id)s) |
3106 | - deprecated_reason: null |
3107 | deprecated_rule: |
3108 | check_str: rule:default |
3109 | + deprecated_reason: ' |
3110 | + |
3111 | + The image API now supports roles. |
3112 | + |
3113 | + ' |
3114 | + deprecated_since: W |
3115 | name: get_members |
3116 | - deprecated_since: null |
3117 | description: List image members |
3118 | name: get_members |
3119 | operations: |
3120 | @@ -225,11 +289,15 @@ |
3121 | scope_types: |
3122 | - project |
3123 | - check_str: rule:context_is_admin or (role:member and project_id:%(member_id)s) |
3124 | - deprecated_reason: null |
3125 | deprecated_rule: |
3126 | check_str: rule:default |
3127 | + deprecated_reason: ' |
3128 | + |
3129 | + The image API now supports roles. |
3130 | + |
3131 | + ' |
3132 | + deprecated_since: W |
3133 | name: modify_member |
3134 | - deprecated_since: null |
3135 | description: Update image member |
3136 | name: modify_member |
3137 | operations: |
3138 | @@ -244,11 +312,15 @@ |
3139 | scope_types: |
3140 | - project |
3141 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
3142 | - deprecated_reason: null |
3143 | deprecated_rule: |
3144 | check_str: rule:default |
3145 | + deprecated_reason: ' |
3146 | + |
3147 | + The image API now supports roles. |
3148 | + |
3149 | + ' |
3150 | + deprecated_since: W |
3151 | name: deactivate |
3152 | - deprecated_since: null |
3153 | description: Deactivate image |
3154 | name: deactivate |
3155 | operations: |
3156 | @@ -257,11 +329,15 @@ |
3157 | scope_types: |
3158 | - project |
3159 | - check_str: rule:context_is_admin or (role:member and project_id:%(project_id)s) |
3160 | - deprecated_reason: null |
3161 | deprecated_rule: |
3162 | check_str: rule:default |
3163 | + deprecated_reason: ' |
3164 | + |
3165 | + The image API now supports roles. |
3166 | + |
3167 | + ' |
3168 | + deprecated_since: W |
3169 | name: reactivate |
3170 | - deprecated_since: null |
3171 | description: Reactivate image |
3172 | name: reactivate |
3173 | operations: |
3174 | @@ -278,11 +354,21 @@ |
3175 | scope_types: |
3176 | - project |
3177 | - check_str: rule:default |
3178 | - deprecated_reason: null |
3179 | deprecated_rule: |
3180 | check_str: rule:default |
3181 | + deprecated_reason: ' |
3182 | + |
3183 | + From Xena we are enforcing policy checks in the API and policy layer where |
3184 | + |
3185 | + task policies were enforcing will be removed. Since task APIs are already |
3186 | + |
3187 | + deprecated and `tasks_api_access` is checked for each API at API layer, |
3188 | + |
3189 | + there will be no benefit of other having other task related policies. |
3190 | + |
3191 | + ' |
3192 | + deprecated_since: X |
3193 | name: get_task |
3194 | - deprecated_since: null |
3195 | description: 'Get an image task. |
3196 | |
3197 | |
3198 | @@ -306,11 +392,21 @@ |
3199 | scope_types: |
3200 | - project |
3201 | - check_str: rule:default |
3202 | - deprecated_reason: null |
3203 | deprecated_rule: |
3204 | check_str: rule:default |
3205 | + deprecated_reason: ' |
3206 | + |
3207 | + From Xena we are enforcing policy checks in the API and policy layer where |
3208 | + |
3209 | + task policies were enforcing will be removed. Since task APIs are already |
3210 | + |
3211 | + deprecated and `tasks_api_access` is checked for each API at API layer, |
3212 | + |
3213 | + there will be no benefit of other having other task related policies. |
3214 | + |
3215 | + ' |
3216 | + deprecated_since: X |
3217 | name: get_tasks |
3218 | - deprecated_since: null |
3219 | description: 'List tasks for all images. |
3220 | |
3221 | |
3222 | @@ -334,11 +430,21 @@ |
3223 | scope_types: |
3224 | - project |
3225 | - check_str: rule:default |
3226 | - deprecated_reason: null |
3227 | deprecated_rule: |
3228 | check_str: rule:default |
3229 | + deprecated_reason: ' |
3230 | + |
3231 | + From Xena we are enforcing policy checks in the API and policy layer where |
3232 | + |
3233 | + task policies were enforcing will be removed. Since task APIs are already |
3234 | + |
3235 | + deprecated and `tasks_api_access` is checked for each API at API layer, |
3236 | + |
3237 | + there will be no benefit of other having other task related policies. |
3238 | + |
3239 | + ' |
3240 | + deprecated_since: X |
3241 | name: add_task |
3242 | - deprecated_since: null |
3243 | description: 'List tasks for all images. |
3244 | |
3245 | |
3246 | @@ -412,11 +518,15 @@ |
3247 | scope_types: null |
3248 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3249 | or 'public':%(visibility)s)) |
3250 | - deprecated_reason: null |
3251 | deprecated_rule: |
3252 | check_str: rule:metadef_default |
3253 | + deprecated_reason: ' |
3254 | + |
3255 | + The metadata API now supports project scope and default roles. |
3256 | + |
3257 | + ' |
3258 | + deprecated_since: X |
3259 | name: get_metadef_namespace |
3260 | - deprecated_since: null |
3261 | description: Get a specific namespace. |
3262 | name: get_metadef_namespace |
3263 | operations: |
3264 | @@ -425,11 +535,15 @@ |
3265 | scope_types: |
3266 | - project |
3267 | - check_str: rule:context_is_admin or (role:reader and project_id:%(project_id)s) |
3268 | - deprecated_reason: null |
3269 | deprecated_rule: |
3270 | check_str: rule:metadef_default |
3271 | + deprecated_reason: ' |
3272 | + |
3273 | + The metadata API now supports project scope and default roles. |
3274 | + |
3275 | + ' |
3276 | + deprecated_since: X |
3277 | name: get_metadef_namespaces |
3278 | - deprecated_since: null |
3279 | description: List namespace. |
3280 | name: get_metadef_namespaces |
3281 | operations: |
3282 | @@ -463,11 +577,15 @@ |
3283 | - project |
3284 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3285 | or 'public':%(visibility)s)) |
3286 | - deprecated_reason: null |
3287 | deprecated_rule: |
3288 | check_str: rule:metadef_default |
3289 | + deprecated_reason: ' |
3290 | + |
3291 | + The metadata API now supports project scope and default roles. |
3292 | + |
3293 | + ' |
3294 | + deprecated_since: X |
3295 | name: get_metadef_object |
3296 | - deprecated_since: null |
3297 | description: Get a specific object from a namespace. |
3298 | name: get_metadef_object |
3299 | operations: |
3300 | @@ -477,11 +595,15 @@ |
3301 | - project |
3302 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3303 | or 'public':%(visibility)s)) |
3304 | - deprecated_reason: null |
3305 | deprecated_rule: |
3306 | check_str: rule:metadef_default |
3307 | + deprecated_reason: ' |
3308 | + |
3309 | + The metadata API now supports project scope and default roles. |
3310 | + |
3311 | + ' |
3312 | + deprecated_since: X |
3313 | name: get_metadef_objects |
3314 | - deprecated_since: null |
3315 | description: Get objects from a namespace. |
3316 | name: get_metadef_objects |
3317 | operations: |
3318 | @@ -515,11 +637,15 @@ |
3319 | - project |
3320 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3321 | or 'public':%(visibility)s)) |
3322 | - deprecated_reason: null |
3323 | deprecated_rule: |
3324 | check_str: rule:metadef_default |
3325 | + deprecated_reason: ' |
3326 | + |
3327 | + The metadata API now supports project scope and default roles. |
3328 | + |
3329 | + ' |
3330 | + deprecated_since: X |
3331 | name: list_metadef_resource_types |
3332 | - deprecated_since: null |
3333 | description: List meta definition resource types. |
3334 | name: list_metadef_resource_types |
3335 | operations: |
3336 | @@ -529,11 +655,15 @@ |
3337 | - project |
3338 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3339 | or 'public':%(visibility)s)) |
3340 | - deprecated_reason: null |
3341 | deprecated_rule: |
3342 | check_str: rule:metadef_default |
3343 | + deprecated_reason: ' |
3344 | + |
3345 | + The metadata API now supports project scope and default roles. |
3346 | + |
3347 | + ' |
3348 | + deprecated_since: X |
3349 | name: get_metadef_resource_type |
3350 | - deprecated_since: null |
3351 | description: Get meta definition resource types associations. |
3352 | name: get_metadef_resource_type |
3353 | operations: |
3354 | @@ -559,11 +689,15 @@ |
3355 | - project |
3356 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3357 | or 'public':%(visibility)s)) |
3358 | - deprecated_reason: null |
3359 | deprecated_rule: |
3360 | check_str: rule:metadef_default |
3361 | + deprecated_reason: ' |
3362 | + |
3363 | + The metadata API now supports project scope and default roles. |
3364 | + |
3365 | + ' |
3366 | + deprecated_since: X |
3367 | name: get_metadef_property |
3368 | - deprecated_since: null |
3369 | description: Get a specific meta definition property. |
3370 | name: get_metadef_property |
3371 | operations: |
3372 | @@ -573,11 +707,15 @@ |
3373 | - project |
3374 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3375 | or 'public':%(visibility)s)) |
3376 | - deprecated_reason: null |
3377 | deprecated_rule: |
3378 | check_str: rule:metadef_default |
3379 | + deprecated_reason: ' |
3380 | + |
3381 | + The metadata API now supports project scope and default roles. |
3382 | + |
3383 | + ' |
3384 | + deprecated_since: X |
3385 | name: get_metadef_properties |
3386 | - deprecated_since: null |
3387 | description: List meta definition properties. |
3388 | name: get_metadef_properties |
3389 | operations: |
3390 | @@ -611,11 +749,15 @@ |
3391 | - project |
3392 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3393 | or 'public':%(visibility)s)) |
3394 | - deprecated_reason: null |
3395 | deprecated_rule: |
3396 | check_str: rule:metadef_default |
3397 | + deprecated_reason: ' |
3398 | + |
3399 | + The metadata API now supports project scope and default roles. |
3400 | + |
3401 | + ' |
3402 | + deprecated_since: X |
3403 | name: get_metadef_tag |
3404 | - deprecated_since: null |
3405 | description: Get tag definition. |
3406 | name: get_metadef_tag |
3407 | operations: |
3408 | @@ -625,11 +767,15 @@ |
3409 | - project |
3410 | - check_str: rule:context_is_admin or (role:reader and (project_id:%(project_id)s |
3411 | or 'public':%(visibility)s)) |
3412 | - deprecated_reason: null |
3413 | deprecated_rule: |
3414 | check_str: rule:metadef_default |
3415 | + deprecated_reason: ' |
3416 | + |
3417 | + The metadata API now supports project scope and default roles. |
3418 | + |
3419 | + ' |
3420 | + deprecated_since: X |
3421 | name: get_metadef_tags |
3422 | - deprecated_since: null |
3423 | description: List tag definitions. |
3424 | name: get_metadef_tags |
3425 | operations: |
3426 | @@ -678,11 +824,15 @@ |
3427 | scope_types: |
3428 | - project |
3429 | - check_str: rule:context_is_admin |
3430 | - deprecated_reason: null |
3431 | deprecated_rule: |
3432 | check_str: rule:manage_image_cache |
3433 | + deprecated_reason: ' |
3434 | + |
3435 | + The image API now supports roles. |
3436 | + |
3437 | + ' |
3438 | + deprecated_since: X |
3439 | name: cache_image |
3440 | - deprecated_since: null |
3441 | description: Queue image for caching |
3442 | name: cache_image |
3443 | operations: |
3444 | @@ -691,11 +841,15 @@ |
3445 | scope_types: |
3446 | - project |
3447 | - check_str: rule:context_is_admin |
3448 | - deprecated_reason: null |
3449 | deprecated_rule: |
3450 | check_str: rule:manage_image_cache |
3451 | + deprecated_reason: ' |
3452 | + |
3453 | + The image API now supports roles. |
3454 | + |
3455 | + ' |
3456 | + deprecated_since: X |
3457 | name: cache_list |
3458 | - deprecated_since: null |
3459 | description: List cache status |
3460 | name: cache_list |
3461 | operations: |
3462 | @@ -704,11 +858,15 @@ |
3463 | scope_types: |
3464 | - project |
3465 | - check_str: rule:context_is_admin |
3466 | - deprecated_reason: null |
3467 | deprecated_rule: |
3468 | check_str: rule:manage_image_cache |
3469 | + deprecated_reason: ' |
3470 | + |
3471 | + The image API now supports roles. |
3472 | + |
3473 | + ' |
3474 | + deprecated_since: X |
3475 | name: cache_delete |
3476 | - deprecated_since: null |
3477 | description: Delete image(s) from cache and/or queue |
3478 | name: cache_delete |
3479 | operations: |
3480 | diff --git a/openstack_dashboard/conf/default_policies/keystone.yaml b/openstack_dashboard/conf/default_policies/keystone.yaml |
3481 | index aa3a3af..d2f1965 100644 |
3482 | --- a/openstack_dashboard/conf/default_policies/keystone.yaml |
3483 | +++ b/openstack_dashboard/conf/default_policies/keystone.yaml |
3484 | @@ -118,11 +118,12 @@ |
3485 | scope_types: |
3486 | - project |
3487 | - check_str: (role:reader and system_scope:all) or rule:owner |
3488 | - deprecated_reason: null |
3489 | deprecated_rule: |
3490 | check_str: rule:admin_or_owner |
3491 | + deprecated_reason: The application credential API is now aware of system scope |
3492 | + and default roles. |
3493 | + deprecated_since: T |
3494 | name: identity:get_application_credential |
3495 | - deprecated_since: null |
3496 | description: Show application credential details. |
3497 | name: identity:get_application_credential |
3498 | operations: |
3499 | @@ -134,11 +135,12 @@ |
3500 | - system |
3501 | - project |
3502 | - check_str: (role:reader and system_scope:all) or rule:owner |
3503 | - deprecated_reason: null |
3504 | deprecated_rule: |
3505 | check_str: rule:admin_or_owner |
3506 | + deprecated_reason: The application credential API is now aware of system scope |
3507 | + and default roles. |
3508 | + deprecated_since: T |
3509 | name: identity:list_application_credentials |
3510 | - deprecated_since: null |
3511 | description: List application credentials for a user. |
3512 | name: identity:list_application_credentials |
3513 | operations: |
3514 | @@ -158,11 +160,12 @@ |
3515 | scope_types: |
3516 | - project |
3517 | - check_str: (role:admin and system_scope:all) or rule:owner |
3518 | - deprecated_reason: null |
3519 | deprecated_rule: |
3520 | check_str: rule:admin_or_owner |
3521 | + deprecated_reason: The application credential API is now aware of system scope |
3522 | + and default roles. |
3523 | + deprecated_since: T |
3524 | name: identity:delete_application_credential |
3525 | - deprecated_since: null |
3526 | description: Delete an application credential. |
3527 | name: identity:delete_application_credential |
3528 | operations: |
3529 | @@ -208,11 +211,12 @@ |
3530 | path: /v3/auth/system |
3531 | scope_types: null |
3532 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3533 | - deprecated_reason: null |
3534 | deprecated_rule: |
3535 | check_str: rule:admin_required |
3536 | + deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default |
3537 | + roles. |
3538 | + deprecated_since: T |
3539 | name: identity:get_consumer |
3540 | - deprecated_since: null |
3541 | description: Show OAUTH1 consumer details. |
3542 | name: identity:get_consumer |
3543 | operations: |
3544 | @@ -222,11 +226,12 @@ |
3545 | - system |
3546 | - project |
3547 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3548 | - deprecated_reason: null |
3549 | deprecated_rule: |
3550 | check_str: rule:admin_required |
3551 | + deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default |
3552 | + roles. |
3553 | + deprecated_since: T |
3554 | name: identity:list_consumers |
3555 | - deprecated_since: null |
3556 | description: List OAUTH1 consumers. |
3557 | name: identity:list_consumers |
3558 | operations: |
3559 | @@ -236,11 +241,12 @@ |
3560 | - system |
3561 | - project |
3562 | - check_str: rule:admin_required |
3563 | - deprecated_reason: null |
3564 | deprecated_rule: |
3565 | check_str: rule:admin_required |
3566 | + deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default |
3567 | + roles. |
3568 | + deprecated_since: T |
3569 | name: identity:create_consumer |
3570 | - deprecated_since: null |
3571 | description: Create OAUTH1 consumer. |
3572 | name: identity:create_consumer |
3573 | operations: |
3574 | @@ -250,11 +256,12 @@ |
3575 | - system |
3576 | - project |
3577 | - check_str: rule:admin_required |
3578 | - deprecated_reason: null |
3579 | deprecated_rule: |
3580 | check_str: rule:admin_required |
3581 | + deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default |
3582 | + roles. |
3583 | + deprecated_since: T |
3584 | name: identity:update_consumer |
3585 | - deprecated_since: null |
3586 | description: Update OAUTH1 consumer. |
3587 | name: identity:update_consumer |
3588 | operations: |
3589 | @@ -264,11 +271,12 @@ |
3590 | - system |
3591 | - project |
3592 | - check_str: rule:admin_required |
3593 | - deprecated_reason: null |
3594 | deprecated_rule: |
3595 | check_str: rule:admin_required |
3596 | + deprecated_reason: The OAUTH1 consumer API is now aware of system scope and default |
3597 | + roles. |
3598 | + deprecated_since: T |
3599 | name: identity:delete_consumer |
3600 | - deprecated_since: null |
3601 | description: Delete OAUTH1 consumer. |
3602 | name: identity:delete_consumer |
3603 | operations: |
3604 | @@ -278,11 +286,12 @@ |
3605 | - system |
3606 | - project |
3607 | - check_str: (role:reader and system_scope:all) or user_id:%(target.credential.user_id)s |
3608 | - deprecated_reason: null |
3609 | deprecated_rule: |
3610 | check_str: rule:admin_required |
3611 | + deprecated_reason: The credential API is now aware of system scope and default |
3612 | + roles. |
3613 | + deprecated_since: S |
3614 | name: identity:get_credential |
3615 | - deprecated_since: null |
3616 | description: Show credentials details. |
3617 | name: identity:get_credential |
3618 | operations: |
3619 | @@ -292,11 +301,12 @@ |
3620 | - system |
3621 | - project |
3622 | - check_str: (role:reader and system_scope:all) or user_id:%(target.credential.user_id)s |
3623 | - deprecated_reason: null |
3624 | deprecated_rule: |
3625 | check_str: rule:admin_required |
3626 | + deprecated_reason: The credential API is now aware of system scope and default |
3627 | + roles. |
3628 | + deprecated_since: S |
3629 | name: identity:list_credentials |
3630 | - deprecated_since: null |
3631 | description: List credentials. |
3632 | name: identity:list_credentials |
3633 | operations: |
3634 | @@ -306,11 +316,12 @@ |
3635 | - system |
3636 | - project |
3637 | - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s |
3638 | - deprecated_reason: null |
3639 | deprecated_rule: |
3640 | check_str: rule:admin_required |
3641 | + deprecated_reason: The credential API is now aware of system scope and default |
3642 | + roles. |
3643 | + deprecated_since: S |
3644 | name: identity:create_credential |
3645 | - deprecated_since: null |
3646 | description: Create credential. |
3647 | name: identity:create_credential |
3648 | operations: |
3649 | @@ -320,11 +331,12 @@ |
3650 | - system |
3651 | - project |
3652 | - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s |
3653 | - deprecated_reason: null |
3654 | deprecated_rule: |
3655 | check_str: rule:admin_required |
3656 | + deprecated_reason: The credential API is now aware of system scope and default |
3657 | + roles. |
3658 | + deprecated_since: S |
3659 | name: identity:update_credential |
3660 | - deprecated_since: null |
3661 | description: Update credential. |
3662 | name: identity:update_credential |
3663 | operations: |
3664 | @@ -334,11 +346,12 @@ |
3665 | - system |
3666 | - project |
3667 | - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s |
3668 | - deprecated_reason: null |
3669 | deprecated_rule: |
3670 | check_str: rule:admin_required |
3671 | + deprecated_reason: The credential API is now aware of system scope and default |
3672 | + roles. |
3673 | + deprecated_since: S |
3674 | name: identity:delete_credential |
3675 | - deprecated_since: null |
3676 | description: Delete credential. |
3677 | name: identity:delete_credential |
3678 | operations: |
3679 | @@ -349,11 +362,11 @@ |
3680 | - project |
3681 | - check_str: rule:admin_required or (role:reader and system_scope:all) or token.domain.id:%(target.domain.id)s |
3682 | or token.project.domain.id:%(target.domain.id)s |
3683 | - deprecated_reason: null |
3684 | deprecated_rule: |
3685 | check_str: rule:admin_required or token.project.domain.id:%(target.domain.id)s |
3686 | + deprecated_reason: The domain API is now aware of system scope and default roles. |
3687 | + deprecated_since: S |
3688 | name: identity:get_domain |
3689 | - deprecated_since: null |
3690 | description: Show domain details. |
3691 | name: identity:get_domain |
3692 | operations: |
3693 | @@ -365,11 +378,11 @@ |
3694 | - project |
3695 | - check_str: rule:admin_required or (role:reader and system_scope:all) or (role:reader |
3696 | and domain_id:%(target.domain.id)s) |
3697 | - deprecated_reason: null |
3698 | deprecated_rule: |
3699 | check_str: rule:admin_required |
3700 | + deprecated_reason: The domain API is now aware of system scope and default roles. |
3701 | + deprecated_since: S |
3702 | name: identity:list_domains |
3703 | - deprecated_since: null |
3704 | description: List domains. |
3705 | name: identity:list_domains |
3706 | operations: |
3707 | @@ -380,11 +393,11 @@ |
3708 | - domain |
3709 | - project |
3710 | - check_str: rule:admin_required |
3711 | - deprecated_reason: null |
3712 | deprecated_rule: |
3713 | check_str: rule:admin_required |
3714 | + deprecated_reason: The domain API is now aware of system scope and default roles. |
3715 | + deprecated_since: S |
3716 | name: identity:create_domain |
3717 | - deprecated_since: null |
3718 | description: Create domain. |
3719 | name: identity:create_domain |
3720 | operations: |
3721 | @@ -394,11 +407,11 @@ |
3722 | - system |
3723 | - project |
3724 | - check_str: rule:admin_required |
3725 | - deprecated_reason: null |
3726 | deprecated_rule: |
3727 | check_str: rule:admin_required |
3728 | + deprecated_reason: The domain API is now aware of system scope and default roles. |
3729 | + deprecated_since: S |
3730 | name: identity:update_domain |
3731 | - deprecated_since: null |
3732 | description: Update domain. |
3733 | name: identity:update_domain |
3734 | operations: |
3735 | @@ -408,11 +421,11 @@ |
3736 | - system |
3737 | - project |
3738 | - check_str: rule:admin_required |
3739 | - deprecated_reason: null |
3740 | deprecated_rule: |
3741 | check_str: rule:admin_required |
3742 | + deprecated_reason: The domain API is now aware of system scope and default roles. |
3743 | + deprecated_since: S |
3744 | name: identity:delete_domain |
3745 | - deprecated_since: null |
3746 | description: Delete domain. |
3747 | name: identity:delete_domain |
3748 | operations: |
3749 | @@ -422,11 +435,12 @@ |
3750 | - system |
3751 | - project |
3752 | - check_str: rule:admin_required |
3753 | - deprecated_reason: null |
3754 | deprecated_rule: |
3755 | check_str: rule:admin_required |
3756 | + deprecated_reason: The domain config API is now aware of system scope and default |
3757 | + roles. |
3758 | + deprecated_since: T |
3759 | name: identity:create_domain_config |
3760 | - deprecated_since: null |
3761 | description: Create domain configuration. |
3762 | name: identity:create_domain_config |
3763 | operations: |
3764 | @@ -436,11 +450,12 @@ |
3765 | - system |
3766 | - project |
3767 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3768 | - deprecated_reason: null |
3769 | deprecated_rule: |
3770 | check_str: rule:admin_required |
3771 | + deprecated_reason: The domain config API is now aware of system scope and default |
3772 | + roles. |
3773 | + deprecated_since: T |
3774 | name: identity:get_domain_config |
3775 | - deprecated_since: null |
3776 | description: Get the entire domain configuration for a domain, an option group within |
3777 | a domain, or a specific configuration option within a group for a domain. |
3778 | name: identity:get_domain_config |
3779 | @@ -478,11 +493,12 @@ |
3780 | - domain |
3781 | - project |
3782 | - check_str: rule:admin_required |
3783 | - deprecated_reason: null |
3784 | deprecated_rule: |
3785 | check_str: rule:admin_required |
3786 | + deprecated_reason: The domain config API is now aware of system scope and default |
3787 | + roles. |
3788 | + deprecated_since: T |
3789 | name: identity:update_domain_config |
3790 | - deprecated_since: null |
3791 | description: Update domain configuration for either a domain, specific group or |
3792 | a specific option in a group. |
3793 | name: identity:update_domain_config |
3794 | @@ -497,11 +513,12 @@ |
3795 | - system |
3796 | - project |
3797 | - check_str: rule:admin_required |
3798 | - deprecated_reason: null |
3799 | deprecated_rule: |
3800 | check_str: rule:admin_required |
3801 | + deprecated_reason: The domain config API is now aware of system scope and default |
3802 | + roles. |
3803 | + deprecated_since: T |
3804 | name: identity:delete_domain_config |
3805 | - deprecated_since: null |
3806 | description: Delete domain configuration for either a domain, specific group or |
3807 | a specific option in a group. |
3808 | name: identity:delete_domain_config |
3809 | @@ -516,11 +533,12 @@ |
3810 | - system |
3811 | - project |
3812 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3813 | - deprecated_reason: null |
3814 | deprecated_rule: |
3815 | check_str: rule:admin_required |
3816 | + deprecated_reason: The domain config API is now aware of system scope and default |
3817 | + roles. |
3818 | + deprecated_since: T |
3819 | name: identity:get_domain_config_default |
3820 | - deprecated_since: null |
3821 | description: Get domain configuration default for either a domain, specific group |
3822 | or a specific option in a group. |
3823 | name: identity:get_domain_config_default |
3824 | @@ -541,11 +559,12 @@ |
3825 | - system |
3826 | - project |
3827 | - check_str: (role:reader and system_scope:all) or user_id:%(target.credential.user_id)s |
3828 | - deprecated_reason: null |
3829 | deprecated_rule: |
3830 | check_str: rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s) |
3831 | + deprecated_reason: The EC2 credential API is now aware of system scope and default |
3832 | + roles. |
3833 | + deprecated_since: T |
3834 | name: identity:ec2_get_credential |
3835 | - deprecated_since: null |
3836 | description: Show ec2 credential details. |
3837 | name: identity:ec2_get_credential |
3838 | operations: |
3839 | @@ -555,11 +574,12 @@ |
3840 | - system |
3841 | - project |
3842 | - check_str: (role:reader and system_scope:all) or rule:owner |
3843 | - deprecated_reason: null |
3844 | deprecated_rule: |
3845 | check_str: rule:admin_or_owner |
3846 | + deprecated_reason: The EC2 credential API is now aware of system scope and default |
3847 | + roles. |
3848 | + deprecated_since: T |
3849 | name: identity:ec2_list_credentials |
3850 | - deprecated_since: null |
3851 | description: List ec2 credentials. |
3852 | name: identity:ec2_list_credentials |
3853 | operations: |
3854 | @@ -569,11 +589,12 @@ |
3855 | - system |
3856 | - project |
3857 | - check_str: (role:admin and system_scope:all) or rule:owner |
3858 | - deprecated_reason: null |
3859 | deprecated_rule: |
3860 | check_str: rule:admin_or_owner |
3861 | + deprecated_reason: The EC2 credential API is now aware of system scope and default |
3862 | + roles. |
3863 | + deprecated_since: T |
3864 | name: identity:ec2_create_credential |
3865 | - deprecated_since: null |
3866 | description: Create ec2 credential. |
3867 | name: identity:ec2_create_credential |
3868 | operations: |
3869 | @@ -583,11 +604,12 @@ |
3870 | - system |
3871 | - project |
3872 | - check_str: (role:admin and system_scope:all) or user_id:%(target.credential.user_id)s |
3873 | - deprecated_reason: null |
3874 | deprecated_rule: |
3875 | check_str: rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s) |
3876 | + deprecated_reason: The EC2 credential API is now aware of system scope and default |
3877 | + roles. |
3878 | + deprecated_since: T |
3879 | name: identity:ec2_delete_credential |
3880 | - deprecated_since: null |
3881 | description: Delete ec2 credential. |
3882 | name: identity:ec2_delete_credential |
3883 | operations: |
3884 | @@ -597,11 +619,11 @@ |
3885 | - system |
3886 | - project |
3887 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3888 | - deprecated_reason: null |
3889 | deprecated_rule: |
3890 | check_str: rule:admin_required |
3891 | + deprecated_reason: The endpoint API is now aware of system scope and default roles. |
3892 | + deprecated_since: S |
3893 | name: identity:get_endpoint |
3894 | - deprecated_since: null |
3895 | description: Show endpoint details. |
3896 | name: identity:get_endpoint |
3897 | operations: |
3898 | @@ -611,11 +633,11 @@ |
3899 | - system |
3900 | - project |
3901 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3902 | - deprecated_reason: null |
3903 | deprecated_rule: |
3904 | check_str: rule:admin_required |
3905 | + deprecated_reason: The endpoint API is now aware of system scope and default roles. |
3906 | + deprecated_since: S |
3907 | name: identity:list_endpoints |
3908 | - deprecated_since: null |
3909 | description: List endpoints. |
3910 | name: identity:list_endpoints |
3911 | operations: |
3912 | @@ -625,11 +647,11 @@ |
3913 | - system |
3914 | - project |
3915 | - check_str: rule:admin_required |
3916 | - deprecated_reason: null |
3917 | deprecated_rule: |
3918 | check_str: rule:admin_required |
3919 | + deprecated_reason: The endpoint API is now aware of system scope and default roles. |
3920 | + deprecated_since: S |
3921 | name: identity:create_endpoint |
3922 | - deprecated_since: null |
3923 | description: Create endpoint. |
3924 | name: identity:create_endpoint |
3925 | operations: |
3926 | @@ -639,11 +661,11 @@ |
3927 | - system |
3928 | - project |
3929 | - check_str: rule:admin_required |
3930 | - deprecated_reason: null |
3931 | deprecated_rule: |
3932 | check_str: rule:admin_required |
3933 | + deprecated_reason: The endpoint API is now aware of system scope and default roles. |
3934 | + deprecated_since: S |
3935 | name: identity:update_endpoint |
3936 | - deprecated_since: null |
3937 | description: Update endpoint. |
3938 | name: identity:update_endpoint |
3939 | operations: |
3940 | @@ -653,11 +675,11 @@ |
3941 | - system |
3942 | - project |
3943 | - check_str: rule:admin_required |
3944 | - deprecated_reason: null |
3945 | deprecated_rule: |
3946 | check_str: rule:admin_required |
3947 | + deprecated_reason: The endpoint API is now aware of system scope and default roles. |
3948 | + deprecated_since: S |
3949 | name: identity:delete_endpoint |
3950 | - deprecated_since: null |
3951 | description: Delete endpoint. |
3952 | name: identity:delete_endpoint |
3953 | operations: |
3954 | @@ -667,11 +689,12 @@ |
3955 | - system |
3956 | - project |
3957 | - check_str: rule:admin_required |
3958 | - deprecated_reason: null |
3959 | deprecated_rule: |
3960 | check_str: rule:admin_required |
3961 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
3962 | + roles. |
3963 | + deprecated_since: T |
3964 | name: identity:create_endpoint_group |
3965 | - deprecated_since: null |
3966 | description: Create endpoint group. |
3967 | name: identity:create_endpoint_group |
3968 | operations: |
3969 | @@ -681,11 +704,12 @@ |
3970 | - system |
3971 | - project |
3972 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3973 | - deprecated_reason: null |
3974 | deprecated_rule: |
3975 | check_str: rule:admin_required |
3976 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
3977 | + roles. |
3978 | + deprecated_since: T |
3979 | name: identity:list_endpoint_groups |
3980 | - deprecated_since: null |
3981 | description: List endpoint groups. |
3982 | name: identity:list_endpoint_groups |
3983 | operations: |
3984 | @@ -695,11 +719,12 @@ |
3985 | - system |
3986 | - project |
3987 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
3988 | - deprecated_reason: null |
3989 | deprecated_rule: |
3990 | check_str: rule:admin_required |
3991 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
3992 | + roles. |
3993 | + deprecated_since: T |
3994 | name: identity:get_endpoint_group |
3995 | - deprecated_since: null |
3996 | description: Get endpoint group. |
3997 | name: identity:get_endpoint_group |
3998 | operations: |
3999 | @@ -711,11 +736,12 @@ |
4000 | - system |
4001 | - project |
4002 | - check_str: rule:admin_required |
4003 | - deprecated_reason: null |
4004 | deprecated_rule: |
4005 | check_str: rule:admin_required |
4006 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4007 | + roles. |
4008 | + deprecated_since: T |
4009 | name: identity:update_endpoint_group |
4010 | - deprecated_since: null |
4011 | description: Update endpoint group. |
4012 | name: identity:update_endpoint_group |
4013 | operations: |
4014 | @@ -725,11 +751,12 @@ |
4015 | - system |
4016 | - project |
4017 | - check_str: rule:admin_required |
4018 | - deprecated_reason: null |
4019 | deprecated_rule: |
4020 | check_str: rule:admin_required |
4021 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4022 | + roles. |
4023 | + deprecated_since: T |
4024 | name: identity:delete_endpoint_group |
4025 | - deprecated_since: null |
4026 | description: Delete endpoint group. |
4027 | name: identity:delete_endpoint_group |
4028 | operations: |
4029 | @@ -739,11 +766,12 @@ |
4030 | - system |
4031 | - project |
4032 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4033 | - deprecated_reason: null |
4034 | deprecated_rule: |
4035 | check_str: rule:admin_required |
4036 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4037 | + roles. |
4038 | + deprecated_since: T |
4039 | name: identity:list_projects_associated_with_endpoint_group |
4040 | - deprecated_since: null |
4041 | description: List all projects associated with a specific endpoint group. |
4042 | name: identity:list_projects_associated_with_endpoint_group |
4043 | operations: |
4044 | @@ -753,11 +781,12 @@ |
4045 | - system |
4046 | - project |
4047 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4048 | - deprecated_reason: null |
4049 | deprecated_rule: |
4050 | check_str: rule:admin_required |
4051 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4052 | + roles. |
4053 | + deprecated_since: T |
4054 | name: identity:list_endpoints_associated_with_endpoint_group |
4055 | - deprecated_since: null |
4056 | description: List all endpoints associated with an endpoint group. |
4057 | name: identity:list_endpoints_associated_with_endpoint_group |
4058 | operations: |
4059 | @@ -767,11 +796,12 @@ |
4060 | - system |
4061 | - project |
4062 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4063 | - deprecated_reason: null |
4064 | deprecated_rule: |
4065 | check_str: rule:admin_required |
4066 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4067 | + roles. |
4068 | + deprecated_since: T |
4069 | name: identity:get_endpoint_group_in_project |
4070 | - deprecated_since: null |
4071 | description: Check if an endpoint group is associated with a project. |
4072 | name: identity:get_endpoint_group_in_project |
4073 | operations: |
4074 | @@ -783,11 +813,12 @@ |
4075 | - system |
4076 | - project |
4077 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4078 | - deprecated_reason: null |
4079 | deprecated_rule: |
4080 | check_str: rule:admin_required |
4081 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4082 | + roles. |
4083 | + deprecated_since: T |
4084 | name: identity:list_endpoint_groups_for_project |
4085 | - deprecated_since: null |
4086 | description: List endpoint groups associated with a specific project. |
4087 | name: identity:list_endpoint_groups_for_project |
4088 | operations: |
4089 | @@ -797,11 +828,12 @@ |
4090 | - system |
4091 | - project |
4092 | - check_str: rule:admin_required |
4093 | - deprecated_reason: null |
4094 | deprecated_rule: |
4095 | check_str: rule:admin_required |
4096 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4097 | + roles. |
4098 | + deprecated_since: T |
4099 | name: identity:add_endpoint_group_to_project |
4100 | - deprecated_since: null |
4101 | description: Allow a project to access an endpoint group. |
4102 | name: identity:add_endpoint_group_to_project |
4103 | operations: |
4104 | @@ -811,11 +843,12 @@ |
4105 | - system |
4106 | - project |
4107 | - check_str: rule:admin_required |
4108 | - deprecated_reason: null |
4109 | deprecated_rule: |
4110 | check_str: rule:admin_required |
4111 | + deprecated_reason: The endpoint groups API is now aware of system scope and default |
4112 | + roles. |
4113 | + deprecated_since: T |
4114 | name: identity:remove_endpoint_group_from_project |
4115 | - deprecated_since: null |
4116 | description: Remove endpoint group from project. |
4117 | name: identity:remove_endpoint_group_from_project |
4118 | operations: |
4119 | @@ -830,11 +863,12 @@ |
4120 | or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.project.domain_id)s) |
4121 | or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.domain.id)s)) |
4122 | and (domain_id:%(target.role.domain_id)s or None:%(target.role.domain_id)s)) |
4123 | - deprecated_reason: null |
4124 | deprecated_rule: |
4125 | check_str: rule:admin_required |
4126 | + deprecated_reason: The assignment API is now aware of system scope and default |
4127 | + roles. |
4128 | + deprecated_since: S |
4129 | name: identity:check_grant |
4130 | - deprecated_since: null |
4131 | description: Check a role grant between a target and an actor. A target can be either |
4132 | a domain or a project. An actor can be either a user or a group. These terms also |
4133 | apply to the OS-INHERIT APIs, where grants on the target are inherited to all |
4134 | @@ -882,11 +916,12 @@ |
4135 | or (role:reader and domain_id:%(target.user.domain_id)s and domain_id:%(target.domain.id)s) |
4136 | or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.project.domain_id)s) |
4137 | or (role:reader and domain_id:%(target.group.domain_id)s and domain_id:%(target.domain.id)s)) |
4138 | - deprecated_reason: null |
4139 | deprecated_rule: |
4140 | check_str: rule:admin_required |
4141 | + deprecated_reason: The assignment API is now aware of system scope and default |
4142 | + roles. |
4143 | + deprecated_since: S |
4144 | name: identity:list_grants |
4145 | - deprecated_since: null |
4146 | description: List roles granted to an actor on a target. A target can be either |
4147 | a domain or a project. An actor can be either a user or a group. For the OS-INHERIT |
4148 | APIs, it is possible to list inherited role grants for actors on domains, where |
4149 | @@ -923,11 +958,12 @@ |
4150 | and domain_id:%(target.project.domain_id)s) or (role:admin and domain_id:%(target.group.domain_id)s |
4151 | and domain_id:%(target.domain.id)s)) and (domain_id:%(target.role.domain_id)s |
4152 | or None:%(target.role.domain_id)s) |
4153 | - deprecated_reason: null |
4154 | deprecated_rule: |
4155 | check_str: rule:admin_required |
4156 | + deprecated_reason: The assignment API is now aware of system scope and default |
4157 | + roles. |
4158 | + deprecated_since: S |
4159 | name: identity:create_grant |
4160 | - deprecated_since: null |
4161 | description: Create a role grant between a target and an actor. A target can be |
4162 | either a domain or a project. An actor can be either a user or a group. These |
4163 | terms also apply to the OS-INHERIT APIs, where grants on the target are inherited |
4164 | @@ -960,11 +996,12 @@ |
4165 | and domain_id:%(target.project.domain_id)s) or (role:admin and domain_id:%(target.group.domain_id)s |
4166 | and domain_id:%(target.domain.id)s)) and (domain_id:%(target.role.domain_id)s |
4167 | or None:%(target.role.domain_id)s) |
4168 | - deprecated_reason: null |
4169 | deprecated_rule: |
4170 | check_str: rule:admin_required |
4171 | + deprecated_reason: The assignment API is now aware of system scope and default |
4172 | + roles. |
4173 | + deprecated_since: S |
4174 | name: identity:revoke_grant |
4175 | - deprecated_since: null |
4176 | description: Revoke a role grant between a target and an actor. A target can be |
4177 | either a domain or a project. An actor can be either a user or a group. These |
4178 | terms also apply to the OS-INHERIT APIs, where grants on the target are inherited |
4179 | @@ -994,11 +1031,12 @@ |
4180 | - domain |
4181 | - project |
4182 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4183 | - deprecated_reason: null |
4184 | deprecated_rule: |
4185 | check_str: rule:admin_required |
4186 | + deprecated_reason: The assignment API is now aware of system scope and default |
4187 | + roles. |
4188 | + deprecated_since: S |
4189 | name: identity:list_system_grants_for_user |
4190 | - deprecated_since: null |
4191 | description: List all grants a specific user has on the system. |
4192 | name: identity:list_system_grants_for_user |
4193 | operations: |
4194 | @@ -1010,11 +1048,12 @@ |
4195 | - system |
4196 | - project |
4197 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4198 | - deprecated_reason: null |
4199 | deprecated_rule: |
4200 | check_str: rule:admin_required |
4201 | + deprecated_reason: The assignment API is now aware of system scope and default |
4202 | + roles. |
4203 | + deprecated_since: S |
4204 | name: identity:check_system_grant_for_user |
4205 | - deprecated_since: null |
4206 | description: Check if a user has a role on the system. |
4207 | name: identity:check_system_grant_for_user |
4208 | operations: |
4209 | @@ -1026,11 +1065,12 @@ |
4210 | - system |
4211 | - project |
4212 | - check_str: rule:admin_required |
4213 | - deprecated_reason: null |
4214 | deprecated_rule: |
4215 | check_str: rule:admin_required |
4216 | + deprecated_reason: The assignment API is now aware of system scope and default |
4217 | + roles. |
4218 | + deprecated_since: S |
4219 | name: identity:create_system_grant_for_user |
4220 | - deprecated_since: null |
4221 | description: Grant a user a role on the system. |
4222 | name: identity:create_system_grant_for_user |
4223 | operations: |
4224 | @@ -1041,11 +1081,12 @@ |
4225 | - system |
4226 | - project |
4227 | - check_str: rule:admin_required |
4228 | - deprecated_reason: null |
4229 | deprecated_rule: |
4230 | check_str: rule:admin_required |
4231 | + deprecated_reason: The assignment API is now aware of system scope and default |
4232 | + roles. |
4233 | + deprecated_since: S |
4234 | name: identity:revoke_system_grant_for_user |
4235 | - deprecated_since: null |
4236 | description: Remove a role from a user on the system. |
4237 | name: identity:revoke_system_grant_for_user |
4238 | operations: |
4239 | @@ -1056,11 +1097,12 @@ |
4240 | - system |
4241 | - project |
4242 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4243 | - deprecated_reason: null |
4244 | deprecated_rule: |
4245 | check_str: rule:admin_required |
4246 | + deprecated_reason: The assignment API is now aware of system scope and default |
4247 | + roles. |
4248 | + deprecated_since: S |
4249 | name: identity:list_system_grants_for_group |
4250 | - deprecated_since: null |
4251 | description: List all grants a specific group has on the system. |
4252 | name: identity:list_system_grants_for_group |
4253 | operations: |
4254 | @@ -1072,11 +1114,12 @@ |
4255 | - system |
4256 | - project |
4257 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4258 | - deprecated_reason: null |
4259 | deprecated_rule: |
4260 | check_str: rule:admin_required |
4261 | + deprecated_reason: The assignment API is now aware of system scope and default |
4262 | + roles. |
4263 | + deprecated_since: S |
4264 | name: identity:check_system_grant_for_group |
4265 | - deprecated_since: null |
4266 | description: Check if a group has a role on the system. |
4267 | name: identity:check_system_grant_for_group |
4268 | operations: |
4269 | @@ -1088,11 +1131,12 @@ |
4270 | - system |
4271 | - project |
4272 | - check_str: rule:admin_required |
4273 | - deprecated_reason: null |
4274 | deprecated_rule: |
4275 | check_str: rule:admin_required |
4276 | + deprecated_reason: The assignment API is now aware of system scope and default |
4277 | + roles. |
4278 | + deprecated_since: S |
4279 | name: identity:create_system_grant_for_group |
4280 | - deprecated_since: null |
4281 | description: Grant a group a role on the system. |
4282 | name: identity:create_system_grant_for_group |
4283 | operations: |
4284 | @@ -1103,11 +1147,12 @@ |
4285 | - system |
4286 | - project |
4287 | - check_str: rule:admin_required |
4288 | - deprecated_reason: null |
4289 | deprecated_rule: |
4290 | check_str: rule:admin_required |
4291 | + deprecated_reason: The assignment API is now aware of system scope and default |
4292 | + roles. |
4293 | + deprecated_since: S |
4294 | name: identity:revoke_system_grant_for_group |
4295 | - deprecated_since: null |
4296 | description: Remove a role from a group on the system. |
4297 | name: identity:revoke_system_grant_for_group |
4298 | operations: |
4299 | @@ -1119,11 +1164,11 @@ |
4300 | - project |
4301 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4302 | and domain_id:%(target.group.domain_id)s) |
4303 | - deprecated_reason: null |
4304 | deprecated_rule: |
4305 | check_str: rule:admin_required |
4306 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4307 | + deprecated_since: S |
4308 | name: identity:get_group |
4309 | - deprecated_since: null |
4310 | description: Show group details. |
4311 | name: identity:get_group |
4312 | operations: |
4313 | @@ -1137,11 +1182,11 @@ |
4314 | - project |
4315 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4316 | and domain_id:%(target.group.domain_id)s) |
4317 | - deprecated_reason: null |
4318 | deprecated_rule: |
4319 | check_str: rule:admin_required |
4320 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4321 | + deprecated_since: S |
4322 | name: identity:list_groups |
4323 | - deprecated_since: null |
4324 | description: List groups. |
4325 | name: identity:list_groups |
4326 | operations: |
4327 | @@ -1155,11 +1200,11 @@ |
4328 | - project |
4329 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4330 | and domain_id:%(target.user.domain_id)s) or user_id:%(user_id)s |
4331 | - deprecated_reason: null |
4332 | deprecated_rule: |
4333 | check_str: rule:admin_or_owner |
4334 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4335 | + deprecated_since: S |
4336 | name: identity:list_groups_for_user |
4337 | - deprecated_since: null |
4338 | description: List groups to which a user belongs. |
4339 | name: identity:list_groups_for_user |
4340 | operations: |
4341 | @@ -1172,11 +1217,11 @@ |
4342 | - domain |
4343 | - project |
4344 | - check_str: rule:admin_required |
4345 | - deprecated_reason: null |
4346 | deprecated_rule: |
4347 | check_str: rule:admin_required |
4348 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4349 | + deprecated_since: S |
4350 | name: identity:create_group |
4351 | - deprecated_since: null |
4352 | description: Create group. |
4353 | name: identity:create_group |
4354 | operations: |
4355 | @@ -1187,11 +1232,11 @@ |
4356 | - domain |
4357 | - project |
4358 | - check_str: rule:admin_required |
4359 | - deprecated_reason: null |
4360 | deprecated_rule: |
4361 | check_str: rule:admin_required |
4362 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4363 | + deprecated_since: S |
4364 | name: identity:update_group |
4365 | - deprecated_since: null |
4366 | description: Update group. |
4367 | name: identity:update_group |
4368 | operations: |
4369 | @@ -1202,11 +1247,11 @@ |
4370 | - domain |
4371 | - project |
4372 | - check_str: rule:admin_required |
4373 | - deprecated_reason: null |
4374 | deprecated_rule: |
4375 | check_str: rule:admin_required |
4376 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4377 | + deprecated_since: S |
4378 | name: identity:delete_group |
4379 | - deprecated_since: null |
4380 | description: Delete group. |
4381 | name: identity:delete_group |
4382 | operations: |
4383 | @@ -1218,11 +1263,11 @@ |
4384 | - project |
4385 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4386 | and domain_id:%(target.group.domain_id)s) |
4387 | - deprecated_reason: null |
4388 | deprecated_rule: |
4389 | check_str: rule:admin_required |
4390 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4391 | + deprecated_since: S |
4392 | name: identity:list_users_in_group |
4393 | - deprecated_since: null |
4394 | description: List members of a specific group. |
4395 | name: identity:list_users_in_group |
4396 | operations: |
4397 | @@ -1235,11 +1280,11 @@ |
4398 | - domain |
4399 | - project |
4400 | - check_str: rule:admin_required |
4401 | - deprecated_reason: null |
4402 | deprecated_rule: |
4403 | check_str: rule:admin_required |
4404 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4405 | + deprecated_since: S |
4406 | name: identity:remove_user_from_group |
4407 | - deprecated_since: null |
4408 | description: Remove user from group. |
4409 | name: identity:remove_user_from_group |
4410 | operations: |
4411 | @@ -1251,11 +1296,11 @@ |
4412 | - project |
4413 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4414 | and domain_id:%(target.group.domain_id)s and domain_id:%(target.user.domain_id)s) |
4415 | - deprecated_reason: null |
4416 | deprecated_rule: |
4417 | check_str: rule:admin_required |
4418 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4419 | + deprecated_since: S |
4420 | name: identity:check_user_in_group |
4421 | - deprecated_since: null |
4422 | description: Check whether a user is a member of a group. |
4423 | name: identity:check_user_in_group |
4424 | operations: |
4425 | @@ -1268,11 +1313,11 @@ |
4426 | - domain |
4427 | - project |
4428 | - check_str: rule:admin_required |
4429 | - deprecated_reason: null |
4430 | deprecated_rule: |
4431 | check_str: rule:admin_required |
4432 | + deprecated_reason: The group API is now aware of system scope and default roles. |
4433 | + deprecated_since: S |
4434 | name: identity:add_user_to_group |
4435 | - deprecated_since: null |
4436 | description: Add user to group. |
4437 | name: identity:add_user_to_group |
4438 | operations: |
4439 | @@ -1283,11 +1328,12 @@ |
4440 | - domain |
4441 | - project |
4442 | - check_str: rule:admin_required |
4443 | - deprecated_reason: null |
4444 | deprecated_rule: |
4445 | check_str: rule:admin_required |
4446 | + deprecated_reason: The identity provider API is now aware of system scope and |
4447 | + default roles. |
4448 | + deprecated_since: S |
4449 | name: identity:create_identity_provider |
4450 | - deprecated_since: null |
4451 | description: Create identity provider. |
4452 | name: identity:create_identity_provider |
4453 | operations: |
4454 | @@ -1297,11 +1343,12 @@ |
4455 | - system |
4456 | - project |
4457 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4458 | - deprecated_reason: null |
4459 | deprecated_rule: |
4460 | check_str: rule:admin_required |
4461 | + deprecated_reason: The identity provider API is now aware of system scope and |
4462 | + default roles. |
4463 | + deprecated_since: S |
4464 | name: identity:list_identity_providers |
4465 | - deprecated_since: null |
4466 | description: List identity providers. |
4467 | name: identity:list_identity_providers |
4468 | operations: |
4469 | @@ -1313,11 +1360,12 @@ |
4470 | - system |
4471 | - project |
4472 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4473 | - deprecated_reason: null |
4474 | deprecated_rule: |
4475 | check_str: rule:admin_required |
4476 | + deprecated_reason: The identity provider API is now aware of system scope and |
4477 | + default roles. |
4478 | + deprecated_since: S |
4479 | name: identity:get_identity_provider |
4480 | - deprecated_since: null |
4481 | description: Get identity provider. |
4482 | name: identity:get_identity_provider |
4483 | operations: |
4484 | @@ -1329,11 +1377,12 @@ |
4485 | - system |
4486 | - project |
4487 | - check_str: rule:admin_required |
4488 | - deprecated_reason: null |
4489 | deprecated_rule: |
4490 | check_str: rule:admin_required |
4491 | + deprecated_reason: The identity provider API is now aware of system scope and |
4492 | + default roles. |
4493 | + deprecated_since: S |
4494 | name: identity:update_identity_provider |
4495 | - deprecated_since: null |
4496 | description: Update identity provider. |
4497 | name: identity:update_identity_provider |
4498 | operations: |
4499 | @@ -1343,11 +1392,12 @@ |
4500 | - system |
4501 | - project |
4502 | - check_str: rule:admin_required |
4503 | - deprecated_reason: null |
4504 | deprecated_rule: |
4505 | check_str: rule:admin_required |
4506 | + deprecated_reason: The identity provider API is now aware of system scope and |
4507 | + default roles. |
4508 | + deprecated_since: S |
4509 | name: identity:delete_identity_provider |
4510 | - deprecated_since: null |
4511 | description: Delete identity provider. |
4512 | name: identity:delete_identity_provider |
4513 | operations: |
4514 | @@ -1357,11 +1407,12 @@ |
4515 | - system |
4516 | - project |
4517 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4518 | - deprecated_reason: null |
4519 | deprecated_rule: |
4520 | check_str: rule:admin_required |
4521 | + deprecated_reason: The implied role API is now aware of system scope and default |
4522 | + roles. |
4523 | + deprecated_since: T |
4524 | name: identity:get_implied_role |
4525 | - deprecated_since: null |
4526 | description: Get information about an association between two roles. When a relationship |
4527 | exists between a prior role and an implied role and the prior role is assigned |
4528 | to a user, the user also assumes the implied role. |
4529 | @@ -1373,11 +1424,12 @@ |
4530 | - system |
4531 | - project |
4532 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4533 | - deprecated_reason: null |
4534 | deprecated_rule: |
4535 | check_str: rule:admin_required |
4536 | + deprecated_reason: The implied role API is now aware of system scope and default |
4537 | + roles. |
4538 | + deprecated_since: T |
4539 | name: identity:list_implied_roles |
4540 | - deprecated_since: null |
4541 | description: List associations between two roles. When a relationship exists between |
4542 | a prior role and an implied role and the prior role is assigned to a user, the |
4543 | user also assumes the implied role. This will return all the implied roles that |
4544 | @@ -1392,11 +1444,12 @@ |
4545 | - system |
4546 | - project |
4547 | - check_str: rule:admin_required |
4548 | - deprecated_reason: null |
4549 | deprecated_rule: |
4550 | check_str: rule:admin_required |
4551 | + deprecated_reason: The implied role API is now aware of system scope and default |
4552 | + roles. |
4553 | + deprecated_since: T |
4554 | name: identity:create_implied_role |
4555 | - deprecated_since: null |
4556 | description: Create an association between two roles. When a relationship exists |
4557 | between a prior role and an implied role and the prior role is assigned to a user, |
4558 | the user also assumes the implied role. |
4559 | @@ -1408,11 +1461,12 @@ |
4560 | - system |
4561 | - project |
4562 | - check_str: rule:admin_required |
4563 | - deprecated_reason: null |
4564 | deprecated_rule: |
4565 | check_str: rule:admin_required |
4566 | + deprecated_reason: The implied role API is now aware of system scope and default |
4567 | + roles. |
4568 | + deprecated_since: T |
4569 | name: identity:delete_implied_role |
4570 | - deprecated_since: null |
4571 | description: Delete the association between two roles. When a relationship exists |
4572 | between a prior role and an implied role and the prior role is assigned to a user, |
4573 | the user also assumes the implied role. Removing the association will cause that |
4574 | @@ -1425,11 +1479,12 @@ |
4575 | - system |
4576 | - project |
4577 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4578 | - deprecated_reason: null |
4579 | deprecated_rule: |
4580 | check_str: rule:admin_required |
4581 | + deprecated_reason: The implied role API is now aware of system scope and default |
4582 | + roles. |
4583 | + deprecated_since: T |
4584 | name: identity:list_role_inference_rules |
4585 | - deprecated_since: null |
4586 | description: List all associations between two roles in the system. When a relationship |
4587 | exists between a prior role and an implied role and the prior role is assigned |
4588 | to a user, the user also assumes the implied role. |
4589 | @@ -1443,11 +1498,12 @@ |
4590 | - system |
4591 | - project |
4592 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4593 | - deprecated_reason: null |
4594 | deprecated_rule: |
4595 | check_str: rule:admin_required |
4596 | + deprecated_reason: The implied role API is now aware of system scope and default |
4597 | + roles. |
4598 | + deprecated_since: T |
4599 | name: identity:check_implied_role |
4600 | - deprecated_since: null |
4601 | description: Check an association between two roles. When a relationship exists |
4602 | between a prior role and an implied role and the prior role is assigned to a user, |
4603 | the user also assumes the implied role. |
4604 | @@ -1524,11 +1580,12 @@ |
4605 | - system |
4606 | - project |
4607 | - check_str: rule:admin_required |
4608 | - deprecated_reason: null |
4609 | deprecated_rule: |
4610 | check_str: rule:admin_required |
4611 | + deprecated_reason: The federated mapping API is now aware of system scope and |
4612 | + default roles. |
4613 | + deprecated_since: S |
4614 | name: identity:create_mapping |
4615 | - deprecated_since: null |
4616 | description: Create a new federated mapping containing one or more sets of rules. |
4617 | name: identity:create_mapping |
4618 | operations: |
4619 | @@ -1538,11 +1595,12 @@ |
4620 | - system |
4621 | - project |
4622 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4623 | - deprecated_reason: null |
4624 | deprecated_rule: |
4625 | check_str: rule:admin_required |
4626 | + deprecated_reason: The federated mapping API is now aware of system scope and |
4627 | + default roles. |
4628 | + deprecated_since: S |
4629 | name: identity:get_mapping |
4630 | - deprecated_since: null |
4631 | description: Get a federated mapping. |
4632 | name: identity:get_mapping |
4633 | operations: |
4634 | @@ -1554,11 +1612,12 @@ |
4635 | - system |
4636 | - project |
4637 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4638 | - deprecated_reason: null |
4639 | deprecated_rule: |
4640 | check_str: rule:admin_required |
4641 | + deprecated_reason: The federated mapping API is now aware of system scope and |
4642 | + default roles. |
4643 | + deprecated_since: S |
4644 | name: identity:list_mappings |
4645 | - deprecated_since: null |
4646 | description: List federated mappings. |
4647 | name: identity:list_mappings |
4648 | operations: |
4649 | @@ -1570,11 +1629,12 @@ |
4650 | - system |
4651 | - project |
4652 | - check_str: rule:admin_required |
4653 | - deprecated_reason: null |
4654 | deprecated_rule: |
4655 | check_str: rule:admin_required |
4656 | + deprecated_reason: The federated mapping API is now aware of system scope and |
4657 | + default roles. |
4658 | + deprecated_since: S |
4659 | name: identity:delete_mapping |
4660 | - deprecated_since: null |
4661 | description: Delete a federated mapping. |
4662 | name: identity:delete_mapping |
4663 | operations: |
4664 | @@ -1584,11 +1644,12 @@ |
4665 | - system |
4666 | - project |
4667 | - check_str: rule:admin_required |
4668 | - deprecated_reason: null |
4669 | deprecated_rule: |
4670 | check_str: rule:admin_required |
4671 | + deprecated_reason: The federated mapping API is now aware of system scope and |
4672 | + default roles. |
4673 | + deprecated_since: S |
4674 | name: identity:update_mapping |
4675 | - deprecated_since: null |
4676 | description: Update a federated mapping. |
4677 | name: identity:update_mapping |
4678 | operations: |
4679 | @@ -1598,11 +1659,11 @@ |
4680 | - system |
4681 | - project |
4682 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4683 | - deprecated_reason: null |
4684 | deprecated_rule: |
4685 | check_str: rule:admin_required |
4686 | + deprecated_reason: The policy API is now aware of system scope and default roles. |
4687 | + deprecated_since: T |
4688 | name: identity:get_policy |
4689 | - deprecated_since: null |
4690 | description: Show policy details. |
4691 | name: identity:get_policy |
4692 | operations: |
4693 | @@ -1612,11 +1673,11 @@ |
4694 | - system |
4695 | - project |
4696 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4697 | - deprecated_reason: null |
4698 | deprecated_rule: |
4699 | check_str: rule:admin_required |
4700 | + deprecated_reason: The policy API is now aware of system scope and default roles. |
4701 | + deprecated_since: T |
4702 | name: identity:list_policies |
4703 | - deprecated_since: null |
4704 | description: List policies. |
4705 | name: identity:list_policies |
4706 | operations: |
4707 | @@ -1626,11 +1687,11 @@ |
4708 | - system |
4709 | - project |
4710 | - check_str: rule:admin_required |
4711 | - deprecated_reason: null |
4712 | deprecated_rule: |
4713 | check_str: rule:admin_required |
4714 | + deprecated_reason: The policy API is now aware of system scope and default roles. |
4715 | + deprecated_since: T |
4716 | name: identity:create_policy |
4717 | - deprecated_since: null |
4718 | description: Create policy. |
4719 | name: identity:create_policy |
4720 | operations: |
4721 | @@ -1640,11 +1701,11 @@ |
4722 | - system |
4723 | - project |
4724 | - check_str: rule:admin_required |
4725 | - deprecated_reason: null |
4726 | deprecated_rule: |
4727 | check_str: rule:admin_required |
4728 | + deprecated_reason: The policy API is now aware of system scope and default roles. |
4729 | + deprecated_since: T |
4730 | name: identity:update_policy |
4731 | - deprecated_since: null |
4732 | description: Update policy. |
4733 | name: identity:update_policy |
4734 | operations: |
4735 | @@ -1654,11 +1715,11 @@ |
4736 | - system |
4737 | - project |
4738 | - check_str: rule:admin_required |
4739 | - deprecated_reason: null |
4740 | deprecated_rule: |
4741 | check_str: rule:admin_required |
4742 | + deprecated_reason: The policy API is now aware of system scope and default roles. |
4743 | + deprecated_since: T |
4744 | name: identity:delete_policy |
4745 | - deprecated_since: null |
4746 | description: Delete policy. |
4747 | name: identity:delete_policy |
4748 | operations: |
4749 | @@ -1668,11 +1729,12 @@ |
4750 | - system |
4751 | - project |
4752 | - check_str: rule:admin_required |
4753 | - deprecated_reason: null |
4754 | deprecated_rule: |
4755 | check_str: rule:admin_required |
4756 | + deprecated_reason: The policy association API is now aware of system scope and |
4757 | + default roles. |
4758 | + deprecated_since: T |
4759 | name: identity:create_policy_association_for_endpoint |
4760 | - deprecated_since: null |
4761 | description: Associate a policy to a specific endpoint. |
4762 | name: identity:create_policy_association_for_endpoint |
4763 | operations: |
4764 | @@ -1682,11 +1744,12 @@ |
4765 | - system |
4766 | - project |
4767 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4768 | - deprecated_reason: null |
4769 | deprecated_rule: |
4770 | check_str: rule:admin_required |
4771 | + deprecated_reason: The policy association API is now aware of system scope and |
4772 | + default roles. |
4773 | + deprecated_since: T |
4774 | name: identity:check_policy_association_for_endpoint |
4775 | - deprecated_since: null |
4776 | description: Check policy association for endpoint. |
4777 | name: identity:check_policy_association_for_endpoint |
4778 | operations: |
4779 | @@ -1698,11 +1761,12 @@ |
4780 | - system |
4781 | - project |
4782 | - check_str: rule:admin_required |
4783 | - deprecated_reason: null |
4784 | deprecated_rule: |
4785 | check_str: rule:admin_required |
4786 | + deprecated_reason: The policy association API is now aware of system scope and |
4787 | + default roles. |
4788 | + deprecated_since: T |
4789 | name: identity:delete_policy_association_for_endpoint |
4790 | - deprecated_since: null |
4791 | description: Delete policy association for endpoint. |
4792 | name: identity:delete_policy_association_for_endpoint |
4793 | operations: |
4794 | @@ -1712,11 +1776,12 @@ |
4795 | - system |
4796 | - project |
4797 | - check_str: rule:admin_required |
4798 | - deprecated_reason: null |
4799 | deprecated_rule: |
4800 | check_str: rule:admin_required |
4801 | + deprecated_reason: The policy association API is now aware of system scope and |
4802 | + default roles. |
4803 | + deprecated_since: T |
4804 | name: identity:create_policy_association_for_service |
4805 | - deprecated_since: null |
4806 | description: Associate a policy to a specific service. |
4807 | name: identity:create_policy_association_for_service |
4808 | operations: |
4809 | @@ -1726,11 +1791,12 @@ |
4810 | - system |
4811 | - project |
4812 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4813 | - deprecated_reason: null |
4814 | deprecated_rule: |
4815 | check_str: rule:admin_required |
4816 | + deprecated_reason: The policy association API is now aware of system scope and |
4817 | + default roles. |
4818 | + deprecated_since: T |
4819 | name: identity:check_policy_association_for_service |
4820 | - deprecated_since: null |
4821 | description: Check policy association for service. |
4822 | name: identity:check_policy_association_for_service |
4823 | operations: |
4824 | @@ -1742,11 +1808,12 @@ |
4825 | - system |
4826 | - project |
4827 | - check_str: rule:admin_required |
4828 | - deprecated_reason: null |
4829 | deprecated_rule: |
4830 | check_str: rule:admin_required |
4831 | + deprecated_reason: The policy association API is now aware of system scope and |
4832 | + default roles. |
4833 | + deprecated_since: T |
4834 | name: identity:delete_policy_association_for_service |
4835 | - deprecated_since: null |
4836 | description: Delete policy association for service. |
4837 | name: identity:delete_policy_association_for_service |
4838 | operations: |
4839 | @@ -1756,11 +1823,12 @@ |
4840 | - system |
4841 | - project |
4842 | - check_str: rule:admin_required |
4843 | - deprecated_reason: null |
4844 | deprecated_rule: |
4845 | check_str: rule:admin_required |
4846 | + deprecated_reason: The policy association API is now aware of system scope and |
4847 | + default roles. |
4848 | + deprecated_since: T |
4849 | name: identity:create_policy_association_for_region_and_service |
4850 | - deprecated_since: null |
4851 | description: Associate a policy to a specific region and service combination. |
4852 | name: identity:create_policy_association_for_region_and_service |
4853 | operations: |
4854 | @@ -1770,11 +1838,12 @@ |
4855 | - system |
4856 | - project |
4857 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4858 | - deprecated_reason: null |
4859 | deprecated_rule: |
4860 | check_str: rule:admin_required |
4861 | + deprecated_reason: The policy association API is now aware of system scope and |
4862 | + default roles. |
4863 | + deprecated_since: T |
4864 | name: identity:check_policy_association_for_region_and_service |
4865 | - deprecated_since: null |
4866 | description: Check policy association for region and service. |
4867 | name: identity:check_policy_association_for_region_and_service |
4868 | operations: |
4869 | @@ -1786,11 +1855,12 @@ |
4870 | - system |
4871 | - project |
4872 | - check_str: rule:admin_required |
4873 | - deprecated_reason: null |
4874 | deprecated_rule: |
4875 | check_str: rule:admin_required |
4876 | + deprecated_reason: The policy association API is now aware of system scope and |
4877 | + default roles. |
4878 | + deprecated_since: T |
4879 | name: identity:delete_policy_association_for_region_and_service |
4880 | - deprecated_since: null |
4881 | description: Delete policy association for region and service. |
4882 | name: identity:delete_policy_association_for_region_and_service |
4883 | operations: |
4884 | @@ -1800,11 +1870,12 @@ |
4885 | - system |
4886 | - project |
4887 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4888 | - deprecated_reason: null |
4889 | deprecated_rule: |
4890 | check_str: rule:admin_required |
4891 | + deprecated_reason: The policy association API is now aware of system scope and |
4892 | + default roles. |
4893 | + deprecated_since: T |
4894 | name: identity:get_policy_for_endpoint |
4895 | - deprecated_since: null |
4896 | description: Get policy for endpoint. |
4897 | name: identity:get_policy_for_endpoint |
4898 | operations: |
4899 | @@ -1816,11 +1887,12 @@ |
4900 | - system |
4901 | - project |
4902 | - check_str: rule:admin_required or (role:reader and system_scope:all) |
4903 | - deprecated_reason: null |
4904 | deprecated_rule: |
4905 | check_str: rule:admin_required |
4906 | + deprecated_reason: The policy association API is now aware of system scope and |
4907 | + default roles. |
4908 | + deprecated_since: T |
4909 | name: identity:list_endpoints_for_policy |
4910 | - deprecated_since: null |
4911 | description: List endpoints for policy. |
4912 | name: identity:list_endpoints_for_policy |
4913 | operations: |
4914 | @@ -1831,11 +1903,11 @@ |
4915 | - project |
4916 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4917 | and domain_id:%(target.project.domain_id)s) or project_id:%(target.project.id)s |
4918 | - deprecated_reason: null |
4919 | deprecated_rule: |
4920 | check_str: rule:admin_required or project_id:%(target.project.id)s |
4921 | + deprecated_reason: The project API is now aware of system scope and default roles. |
4922 | + deprecated_since: S |
4923 | name: identity:get_project |
4924 | - deprecated_since: null |
4925 | description: Show project details. |
4926 | name: identity:get_project |
4927 | operations: |
4928 | @@ -1847,11 +1919,11 @@ |
4929 | - project |
4930 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4931 | and domain_id:%(target.domain_id)s) |
4932 | - deprecated_reason: null |
4933 | deprecated_rule: |
4934 | check_str: rule:admin_required |
4935 | + deprecated_reason: The project API is now aware of system scope and default roles. |
4936 | + deprecated_since: S |
4937 | name: identity:list_projects |
4938 | - deprecated_since: null |
4939 | description: List projects. |
4940 | name: identity:list_projects |
4941 | operations: |
4942 | @@ -1863,11 +1935,11 @@ |
4943 | - project |
4944 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
4945 | and domain_id:%(target.user.domain_id)s) or user_id:%(target.user.id)s |
4946 | - deprecated_reason: null |
4947 | deprecated_rule: |
4948 | check_str: rule:admin_or_owner |
4949 | + deprecated_reason: The project API is now aware of system scope and default roles. |
4950 | + deprecated_since: S |
4951 | name: identity:list_user_projects |
4952 | - deprecated_since: null |
4953 | description: List projects for user. |
4954 | name: identity:list_user_projects |
4955 | operations: |
4956 | @@ -1878,11 +1950,11 @@ |
4957 | - domain |
4958 | - project |
4959 | - check_str: rule:admin_required |
4960 | - deprecated_reason: null |
4961 | deprecated_rule: |
4962 | check_str: rule:admin_required |
4963 | + deprecated_reason: The project API is now aware of system scope and default roles. |
4964 | + deprecated_since: S |
4965 | name: identity:create_project |
4966 | - deprecated_since: null |
4967 | description: Create project. |
4968 | name: identity:create_project |
4969 | operations: |
4970 | @@ -1893,11 +1965,11 @@ |
4971 | - domain |
4972 | - project |
4973 | - check_str: rule:admin_required |
4974 | - deprecated_reason: null |
4975 | deprecated_rule: |
4976 | check_str: rule:admin_required |
4977 | + deprecated_reason: The project API is now aware of system scope and default roles. |
4978 | + deprecated_since: S |
4979 | name: identity:update_project |
4980 | - deprecated_since: null |
4981 | description: Update project. |
4982 | name: identity:update_project |
4983 | operations: |
4984 | @@ -1908,11 +1980,11 @@ |
4985 | - domain |
4986 | - project |
4987 | - check_str: rule:admin_required |
4988 | - deprecated_reason: null |
4989 | deprecated_rule: |
4990 | check_str: rule:admin_required |
4991 | + deprecated_reason: The project API is now aware of system scope and default roles. |
4992 | + deprecated_since: S |
4993 | name: identity:delete_project |
4994 | - deprecated_since: null |
4995 | description: Delete project. |
4996 | name: identity:delete_project |
4997 | operations: |
4998 | @@ -1924,11 +1996,11 @@ |
4999 | - project |
5000 | - check_str: (rule:admin_required) or (role:reader and system_scope:all) or (role:reader |
The diff has been truncated for viewing.
The bug reports contains the debdiff.